<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 06 May 2026 16:07:44 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>BSD Now - Episodes Tagged with “Pcbsd”</title>
    <link>https://www.bsdnow.tv/tags/pcbsd</link>
    <pubDate>Wed, 12 Apr 2017 08:00:00 -0400</pubDate>
    <description>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A weekly podcast and the place to B...SD</itunes:subtitle>
    <itunes:author>JT Pennington</itunes:author>
    <itunes:summary>Created by three guys who love BSD, we cover the latest news and have an extensive series of tutorials, as well as interviews with various people from all areas of the BSD community. It also serves as a platform for support and questions. We love and advocate FreeBSD, OpenBSD, NetBSD, DragonFlyBSD and TrueOS. Our show aims to be helpful and informative for new users that want to learn about them, but still be entertaining for the people who are already pros.
The show airs on Wednesdays at 2:00PM (US Eastern time) and the edited version is usually up the following day. 
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>berkeley,freebsd,openbsd,netbsd,dragonflybsd,trueos,trident,hardenedbsd,tutorial,howto,guide,bsd,interview</itunes:keywords>
    <itunes:owner>
      <itunes:name>JT Pennington</itunes:name>
      <itunes:email>feedback@bsdnow.tv</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<itunes:category text="Education">
  <itunes:category text="How To"/>
</itunes:category>
<item>
  <title>189: Codified Summer</title>
  <link>https://www.bsdnow.tv/189</link>
  <guid isPermaLink="false">f479797b-02a4-4e79-b3f3-d11d954d578a</guid>
  <pubDate>Wed, 12 Apr 2017 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f479797b-02a4-4e79-b3f3-d11d954d578a.mp3" length="92041828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we interview Wendell from Level1Techs, cover Google Summer of Code on the different BSD projects, cover YubiKey usage, dive into how NICs work &amp;</itunes:subtitle>
  <itunes:duration>2:33:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show we interview Wendell from Level1Techs, cover Google Summer of Code on the different BSD projects, cover YubiKey usage, dive into how NICs work &amp;amp;&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;Google summer of code for BSDs&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsd.org/projects/summerofcode.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://wiki.freebsd.org/SummerOfCodeIdeas" target="_blank" rel="nofollow noopener"&gt;FreeBSD's existing list of GSoC Ideas for potential students&lt;/a&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD/Xen: import the grant-table bus_dma(9) handlers from OpenBSD&lt;/li&gt;
&lt;li&gt;Add support for usbdump file-format to wireshark and vusb-analyzer&lt;/li&gt;
&lt;li&gt;Write a new boot environment manager&lt;/li&gt;
&lt;li&gt;Basic smoke test of all base utilities&lt;/li&gt;
&lt;li&gt;Port OpenBSD's pf testing framework and tests&lt;/li&gt;
&lt;li&gt;Userspace Address Space Annotation&lt;/li&gt;
&lt;li&gt;zstandard integration in libstand&lt;/li&gt;
&lt;li&gt;Replace mergesort implementation&lt;/li&gt;
&lt;li&gt;Test Kload (kexec for FreeBSD)&lt;/li&gt;
&lt;li&gt;Kernel fuzzing suite&lt;/li&gt;
&lt;li&gt;Integrate MFSBSD into the release building tools&lt;/li&gt;
&lt;li&gt;NVMe controller emulation for bhyve&lt;/li&gt;
&lt;li&gt;Verification of bhyve's instruction emulation&lt;/li&gt;
&lt;li&gt;VGA emulation improvements for bhyve&lt;/li&gt;
&lt;li&gt;audit framework test suite&lt;/li&gt;
&lt;li&gt;Add more FreeBSD testing to Xen osstest&lt;/li&gt;
&lt;li&gt;Lua in bootloader&lt;/li&gt;
&lt;li&gt;POSIX compliance testing framework&lt;/li&gt;
&lt;li&gt;coreclr: add Microsoft's coreclr and corefx to the Ports tree.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://wiki.netbsd.org/projects/gsoc/" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Kernel-level projects&lt;/li&gt;
&lt;li&gt;Medium&lt;/li&gt;
&lt;li&gt;ISDN NT support and Asterisk integration &lt;/li&gt;
&lt;li&gt;LED/LCD Generic API &lt;/li&gt;
&lt;li&gt;NetBSD/azure -- Bringing NetBSD to Microsoft Azure &lt;/li&gt;
&lt;li&gt;OpenCrypto swcrypto(4) enhancements &lt;/li&gt;
&lt;li&gt;Scalable entropy gathering &lt;/li&gt;
&lt;li&gt;Userland PCI drivers &lt;/li&gt;
&lt;li&gt;Hard&lt;/li&gt;
&lt;li&gt;Real asynchronous I/O &lt;/li&gt;
&lt;li&gt;Parallelize page queues &lt;/li&gt;
&lt;li&gt;Tickless NetBSD with high-resolution timers &lt;/li&gt;
&lt;li&gt; Userland projects&lt;/li&gt;
&lt;li&gt;Easy&lt;/li&gt;
&lt;li&gt;Inetd enhancements -- Add new features to inetd &lt;/li&gt;
&lt;li&gt;Curses library automated testing &lt;/li&gt;
&lt;li&gt;Medium&lt;/li&gt;
&lt;li&gt;Make Anita support additional virtual machine systems &lt;/li&gt;
&lt;li&gt;Create an SQL backend and statistics/query page for ATF test results &lt;/li&gt;
&lt;li&gt;Light weight precision user level time reading &lt;/li&gt;
&lt;li&gt;Query optimizer for find(1) &lt;/li&gt;
&lt;li&gt;Port launchd &lt;/li&gt;
&lt;li&gt;Secure-PLT - supporting RELRO binaries &lt;/li&gt;
&lt;li&gt;Sysinst alternative interface &lt;/li&gt;
&lt;li&gt;Hard&lt;/li&gt;
&lt;li&gt;Verification tool for NetBSD32 &lt;/li&gt;
&lt;li&gt;pkgsrc projects&lt;/li&gt;
&lt;li&gt;Easy&lt;/li&gt;
&lt;li&gt;Version control config files &lt;/li&gt;
&lt;li&gt;Spawn support in pkgsrc tools &lt;/li&gt;
&lt;li&gt;Authentication server meta-package &lt;/li&gt;
&lt;li&gt;Medium&lt;/li&gt;
&lt;li&gt;pkgin improvements &lt;/li&gt;
&lt;li&gt;Unify standard installation tasks &lt;/li&gt;
&lt;li&gt;Hard&lt;/li&gt;
&lt;li&gt;Add dependency information to binary packages &lt;/li&gt;
&lt;li&gt;Tool to find dependencies precisely &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://llvm.org/OpenProjects.html#gsoc17" target="_blank" rel="nofollow noopener"&gt;LLVM&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fuzzing the Bitcode reader &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Description of the project: The optimizer is 25-30% slower when debug info are enabled, it'd be nice to track all the places where we don't do a good job about ignoring them!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Extend clang AST to provide information for the type as written in template instantiations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Description of the project: When instantiating a template, the template arguments are canonicalized before being substituted into the template pattern. Clang does not preserve type sugar when subsequently accessing members of the instantiation. Clang should "re-sugar" the type when performing member access on a class template specialization, based on the type sugar of the accessed specialization. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Shell auto-completion support for clang.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Bash and other shells support typing a partial command and then automatically completing it for the user (or at least providing suggestions how to complete) when pressing the tab key. This is usually only supported for popular programs such as package managers (e.g. pressing tab after typing "apt-get install late" queries the APT package database and lists all packages that start with "late"). As of now clang's frontend isn't supported by any common shell. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Clang-based C/C++ diff tool.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Description of the project: Every developer has to interact with diff tools daily. The algorithms are usually based on detecting "longest common subsequences", which is agnostic to the file type content. A tool that would understand the structure of the code may provide a better diff experience by being robust against, for example, clang-format changes.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Find dereference of pointers.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Description of the project: Find dereference of pointer before checking for nullptr.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Warn if virtual calls are made from constructors or destructors.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Description of the project: Implement a path-sensitive checker that warns if virtual calls are made from constructors and destructors, which is not valid in case of pure virtual calls and could be a sign of user error in non-pure calls. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Improve Code Layout&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Description of the project: The goal for the project is trying to improve the layout/performances of the generated executable. The primary object format considered for the project is ELF but this can be extended to other object formats. The project will touch both LLVM and lld.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=149119308705465&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Why Isn’t OpenBSD in Google Summer of Code 2017?&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://news.ycombinator.com/item?id=14020814" target="_blank" rel="nofollow noopener"&gt;Hacker News Discussion Thread&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://dtrace.org/blogs/rm/2016/09/15/turtles-on-the-wire-understanding-how-the-os-uses-the-modern-nic/" target="_blank" rel="nofollow noopener"&gt;Turtles on the Wire: Understanding How the OS Uses the Modern NIC&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Simple NIC&lt;/li&gt;
&lt;li&gt;MAC Address Filters and Promiscuous Mode&lt;/li&gt;
&lt;li&gt;Problem: The Single Busy CPU&lt;/li&gt;
&lt;li&gt;A Swing and a Miss&lt;/li&gt;
&lt;li&gt;Nine Rings for Packets Doomed to be Hashed&lt;/li&gt;
&lt;li&gt;Problem: Density, Density, Density&lt;/li&gt;
&lt;li&gt;A Brief Aside: The Virtual NIC&lt;/li&gt;
&lt;li&gt;Always Promiscuous?&lt;/li&gt;
&lt;li&gt;The Classification Challenge&lt;/li&gt;
&lt;li&gt;Problem: CPUs are too ‘slow’&lt;/li&gt;
&lt;li&gt;Problem: The Interrupts are Coming in too Hot&lt;/li&gt;
&lt;li&gt;Solution One: Do Less Work&lt;/li&gt;
&lt;li&gt;Solution Two: Turn Off Interrupts&lt;/li&gt;
&lt;li&gt;Recapping&lt;/li&gt;
&lt;li&gt;Future Directions and More Reading&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://akat1.pl/?id=3" target="_blank" rel="nofollow noopener"&gt;Make Dragonfly BSD great again!&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Recently I spent some time reading Dragonfly BSD code. While doing so I spotted a vulnerability in the sysvsem subsystem that let user to point to any piece of memory and write data through it (including the kernel space). This can be turned into execution of arbitrary code in the kernel context and by exploiting this, we're gonna make Dragonfly BSD great again!&lt;/p&gt;

&lt;p&gt;&amp;gt; Dragonfly BSD is a BSD system which originally comes from the FreeBSD project. In 2003 Matthew Dillon forked code from the 4.x branch of the FreeBSD and started a new flavour.&lt;br&gt;
&amp;gt; I thought of Dragonfly BSD as just another fork, but during EuroBSDCon 2015 I accidentally saw the talk about graphical stack in the Dragonfly BSD. I confused rooms, but it was too late to escape as I was sitting in the middle of a row, and the exit seemed light years away from me. :-) Anyway, this talk was a sign to me that it's not just a niche of a niche of a niche of a niche operating system. I recommend spending a few minutes of your precious time to check out the HAMMER file system, Dragonfly's approach to MP, process snapshots and other cool features that it offers. Wikipedia article is a good starter&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;With the exploit, they are able to change the name of the operating system back to FreeBSD, and escalate from an unprivileged user to root.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The Bug itself is located in the semctl(2) system call implementation. bcopy(3) in line 385 copies semid_ds structure to memory pointed by arg-&amp;gt;buf, this pointer is fully controlled by the user, as it's one of the syscall's arguments. So the bad thing here is that we can copy things to arbitrary address, but we have not idea what we copy yet. This code was introduced by wrongly merging code from the FreeBSD project, &lt;em&gt;bah&lt;/em&gt;, bug happens.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Using this access, the example code shows how to overwrite the function pointers in the kernel used for the open() syscall, and how to overwrite the ostype global, changing the name of the operating system.&lt;/li&gt;
&lt;li&gt;In the second example, the reference to the credentials of the user trying to open a file are used to overwrite that data, making the user root.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The bug was fixed in uber fast manner (within few hours!) by Matthew Dillon, version 4.6.1 released shortly after that seems to be safe. In case you care, you know what to do!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Thanks to Mateusz Kocielski for the detailed post, and finding the bug
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Wendell - &lt;a href="mailto:wendell@level1techs.com" target="_blank" rel="nofollow noopener"&gt;wendell@level1techs.com&lt;/a&gt; / &lt;a href="https://twitter.com/tekwendell" target="_blank" rel="nofollow noopener"&gt;@tekwendell&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Host of Level1Techs website, podcast and YouTube channel&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/using-yubikeys-everywhere" target="_blank" rel="nofollow noopener"&gt;Using yubikeys everywhere&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst is back, with an interesting post about YUBI Keys&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Everybody is getting real excited about yubikeys recently, so I figured I should get excited, too. I have so far resisted two factor authorizing everything, but this seemed like another fun experiment. There’s a lot written about yubikeys and how you should use one, but nothing I’ve read answered a few of the specific questions I had&lt;br&gt;
&amp;gt; To begin with, I ordered two yubikeys. One regular sized 4 and one nano. I wanted to play with different form factors to see which is better for various uses, and I wanted to test having a key and a backup key. Everybody always talks about having one yubikey. And then if you lose it, terrible things happen. Can this problem be alleviated with two keys? I’m also very curious what happens when I try to login to a service with my phone after enabling U2F.&lt;br&gt;
&amp;gt; We’ve got three computers (and operating systems) in the mix, along with a number of (mostly web) services. Wherever possible, I want to use a yubikey both to login to the computer and to authorize myself to remote services.&lt;br&gt;
&amp;gt; I started my adventure on my chromebook. Ultimate goal would be to use the yubikey for local logins. Either as a second factor, or as an alternative factor. First things first and we need to get the yubikey into the account I use to sign into the chromebook. Alas, there is apparently no way to enroll only a security key for a Google account. Every time I tried, it would ask me for my phone number. That is not what I want. Zero stars.&lt;br&gt;
&amp;gt; Giving up on protecting the chromebook itself, at least maybe I can use it to enable U2F with some other sites. U2F is currently limited to Chrome, but it sounds like everything I want. Facebook signup using U2F was pretty easy. Go to account settings, security subheading, add the device. Tap the button when it glows. Key added. Note that it’s possible to add a key without actually enabling two factor auth, in which case you can still login with only a password, but no way to login with no password and only a USB key. Logged out to confirm it would check the key, and everything looked good, so I killed all my other active sessions. Now for the phone test. Not quite as smooth. Tried to login, the Facebook app then tells me it has sent me an SMS and to enter the code in the box. But I don’t have a phone number attached. I’m not getting an SMS code.&lt;br&gt;
&amp;gt; Meanwhile, on my laptop, I have a new notification about a login attempt. Follow the prompts to confirm it’s me and permit the login. This doesn’t have any effect on the phone, however. I have to tap back, return to the login screen, and enter my password again. This time the login succeeds. So everything works, but there are still some rough patches in the flow. Ideally, the phone would more accurately tell me to visit the desktop site, and then automatically proceed after I approve. (The messenger app crashed after telling me my session had expired, but upon restarting it was able to borrow the Facebook app credentials and I was immediately logged back in.)&lt;br&gt;
&amp;gt; Let’s configure Dropbox next. Dropbox won’t let you add a security key to an account until after you’ve already set up some other mobile authenticator. I already had the Duo app on my phone, so I picked that, and after a short QR scan, I’m ready to add the yubikey. So the key works to access Dropbox via Chrome. Accessing Dropbox via my phone or Firefox requires entering a six digit code. No way to use a yubikey in a three legged configuration&lt;br&gt;
&amp;gt; I don’t use Github, but I know they support two factors, so let’s try them next. Very similar to Dropbox. In order to set up a key, I must first set up an authenticator app. This time I went with Yubico’s own desktop authenticator. Instead of scanning the QR code, type in some giant number (on my Windows laptop), and it spits out an endless series of six digit numbers, but only while the yubikey is inserted. I guess this is kind of what I want, although a three pound yubikey is kind of unwieldy.&lt;br&gt;
&amp;gt; As part of my experiment, I noticed that Dropbox verifies passwords before even looking at the second auth. I have a feeling that they should be checked at the same time. No sense allowing my password guessing attack to proceed while I plot how to steal someone’s yubikey. In a sense, the yubikey should serve as a salt, preventing me from mounting such an attack until I have it, thus creating a race where the victim notices the key is gone and revokes access before I learn the password. If I know the password, the instant I grab the key I get access. Along similar lines, I was able to complete a password reset without entering any kind of secondary code.&lt;br&gt;
&amp;gt; Having my phone turn into a second factor is a big part of what I’m looking to avoid with the yubikey. I’d like to be able to take my phone with me, logged into some sites but not all, and unable to login to the rest. All these sites that require using my phone as mobile authenticator are making that difficult. I bought the yubikey because it was cheaper than buying another phone! Using the Yubico desktop authenticator seems the best way around that.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The article also provides instructions for configuring the Yubikey on OpenBSD&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; A few notes about OTP. As mentioned, the secret key is the real password. It’s stored on whatever laptop or server you login to. Meaning any of those machines can take the key and use it to login to any other machine. If you use the same yubikey to login to both your laptop and a remote server, your stolen laptop can trivially be used to login to the server without the key. Be mindful of that when setting up multiple machines. Also, the OTP counter isn’t synced between machines in this setup, which allows limited replay attacks.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ted didn’t switch his SSH keys to the Yubikey, because it doesn’t support ED25519, and he just finished rotating all of his keys and doesn’t want to do it again.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I did most of my experimenting with the larger yubikey, since it was easier to move between machines. For operations involving logging into a web site, however, I’d prefer the nano. It’s very small, even smaller than the tiniest wireless mouse transcievers I’ve seen. So small, in fact, I had trouble removing it because I couldn’t find anything small enough to fit through the tiny loop. But probably a good thing. Most other micro USB gadgets stick out just enough to snag when pushing a laptop into a bag. Not the nano. You lose a port, but there’s really no reason to ever take it out. Just leave it in, and then tap it whenever you login to the tubes. It would not be a good choice for authenticating to the local machine, however. The larger device, sized to fit on a keychain, is much better for that. &lt;br&gt;
&amp;gt; It is possible to use two keys as backups. Facebook and Dropbox allow adding two U2F keys. This is perhaps a little tiresome if there’s lots of sites, as I see no way to clone a key. You have to login to every service. For challenge response and OTP, however, the personalization tool makes it easy to generate lots of yubikeys with the same secrets. On the other hand, a single device supports an infinite number of U2F sites. The programmable interfaces like OTP are limited to only two slots, and the first is already used by the factory OTP setup.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.grenadille.net/post/2017/02/13/What-happened-to-my-vlan" target="_blank" rel="nofollow noopener"&gt;What happened to my vlan&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; A long term goal of the effort I'm driving to unlock OpenBSD's Network Stack is obviously to increase performances. So I'd understand that you find confusing when some of our changes introduce performance regressions.&lt;br&gt;
&amp;gt; It is just really hard to do incremental changes without introducing temporary regressions. But as much as security is a process, improving performance is also a process. Recently markus@ told me that vlan(4) performances dropped in last releases. He had some ideas why but he couldn't provide evidences. So what really happened?&lt;br&gt;
&amp;gt; Hrvoje Popovski was kind enough to help me with some tests. He first confirmed that on his Xeon box (E5-2643 v2 @ 3.50GHz), forwarding performances without pf(4) dropped from 1.42Mpps to 880Kpps when using vlan(4) on both interfaces.&lt;br&gt;
&amp;gt; Together vlan_input() and vlan_start() represent 25% of the time CPU1 spends processing packets. This is not exactly between 33% and 50% but it is close enough. The assumption we made earlier is certainly too simple. If we compare the amount of work done in process context, represented by if_input_process() we clearly see that half of the CPU time is not spent in ether_input().&lt;br&gt;
&amp;gt; I'm not sure how this is related to the measured performance drop. It is actually hard to tell since packets are currently being processed in 3 different contexts. One of the arguments mikeb@ raised when we discussed moving everything in a single context, is that it is simpler to analyse and hopefully make it scale.&lt;br&gt;
&amp;gt; With some measurements, a couple of nice pictures, a bit of analysis and some educated guesses we are now in measure of saying that the performances impact observed with vlan(4) is certainly due to the pseudo-driver itself. A decrease of 30% to 50% is not what I would expect from such pseudo-driver.&lt;br&gt;
&amp;gt; I originally heard that the reason for this regression was the use of SRP but by looking at the profiling data it seems to me that the queuing API is the problem. In the graph above the CPU time spent in if_input() and if_enqueue() from vlan(4) is impressive. Remember, in the case of vlan(4) these operations are done per packet!&lt;br&gt;
&amp;gt; When if_input() has been introduced the queuing API did not exist and putting/taking a single packet on/from an interface queue was cheap. Now it requires a mutex per operation, which in the case of packets received and sent on vlan(4) means grabbing three mutexes per packets.&lt;br&gt;
&amp;gt; I still can't say if my analysis is correct or not, but at least it could explain the decrease observed by Hrvoje when testing multiple vlan(4) configurations. vlan_input() takes one mutex per packet, so it decreases the number of forwarded packets by ~100Kpps on this machine, while vlan_start() taking two mutexes decreases it by ~200Kpps.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An interesting analysis of the routing performance regression on OpenBSD&lt;/li&gt;
&lt;li&gt;I have asked Olivier Cochard-Labbe about doing a similar comparison of routing performance on FreeBSD when a vlan pseudo interface is added to the forwarding path
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_the_first_bsd_introducing" target="_blank" rel="nofollow noopener"&gt;NetBSD: the first BSD introducing a modern process plugin framework in LLDB&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Clean up in ptrace(2) ATF tests&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; We have created some maintanance burden for the current ptrace(2) regression tests. The main issues with them is code duplication and the splitting between generic (Machine Independent) and port-specific (Machine Dependent) test files. I've eliminated some of the ballast and merged tests into the appropriate directory tests/lib/libc/sys/. The old location (tests/kernel) was a violation of the tests/README recommendation&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;PTRACE_FORK on !x86 ports&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Along with the motivation from Martin Husemann we have investigated the issue with PTRACE_FORK ATF regression tests. It was discovered that these tests aren't functional on evbarm, alpha, shark, sparc and sparc64 and likely on other non-x86 ports. We have discovered that there is a missing SIGTRAP emitted from the child, during the fork(2) handshake. The proper order of operations is as follows:&lt;/p&gt;

&lt;p&gt;&amp;gt;&amp;gt; parent emits SIGTRAP with si_code=TRAP_CHLD and pe_set_event=pid of forkee&lt;br&gt;
 &amp;gt;&amp;gt; child emits SIGTRAP with si_code=TRAP_CHLD and pe_set_event=pid of forker&lt;/p&gt;

&lt;p&gt;&amp;gt; Only the x86 ports were emitting the second SIGTRAP signal.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;PT_SYSCALL and PT_SYSCALLEMU&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; With the addition of PT_SYSCALLEMU we can implement a virtual kernel syscall monitor. It means that we can fake syscalls within a debugger. In order to achieve this feature, we need to use the PT_SYSCALL operation, catch SIGTRAP with si_code=TRAP_SCE (syscall entry), call PT_SYSCALLEMU and perform an emulated userspace syscall that would have been done by the kernel, followed by calling another PT_SYSCALL with si_code=TRAP_SCX.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What has been done in LLDB&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; A lot of work has been done with the goal to get breakpoints functional. This target penetrated bugs in the existing local patches and unveiled missing features required to be added. My initial test was tracing a dummy hello-world application in C. I have sniffed the GDB Remote Protocol packets and compared them between Linux and NetBSD. This helped to streamline both versions and bring the NetBSD support to the required Linux level.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Plan for the next milestone&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I've listed the following goals for the next milestone.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;watchpoints support&lt;/li&gt;
&lt;li&gt;floating point registers support&lt;/li&gt;
&lt;li&gt;enhance core(5) and make it work for multiple threads&lt;/li&gt;
&lt;li&gt;introduce PT_SETSTEP and PT_CLEARSTEP in ptrace(2)&lt;/li&gt;
&lt;li&gt;support threads in the NetBSD Process Plugin&lt;/li&gt;
&lt;li&gt;research F_GETPATH in fcntl(2)&lt;/li&gt;
&lt;li&gt;Beyond the next milestone is x86 32-bit support.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.2-relnotes.txt" target="_blank" rel="nofollow noopener"&gt;LibreSSL 2.5.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added the recallocarray(3) memory allocation function, and converted various places in the library to use it, such as CBB and BUF_MEM_grow. recallocarray(3) is similar to reallocarray. Newly allocated memory is cleared similar to calloc(3). Memory that becomes unallocated while shrinking or moving existing allocations is explicitly discarded by unmapping or clearing to 0.&lt;/li&gt;
&lt;li&gt;Added new root CAs from SECOM Trust Systems / Security Communication of Japan.&lt;/li&gt;
&lt;li&gt;Added EVP interface for MD5+SHA1 hashes.&lt;/li&gt;
&lt;li&gt;Fixed DTLS client failures when the server sends a certificate request.&lt;/li&gt;
&lt;li&gt;Correct handling of padding when upgrading an SSLv2 challenge into an SSLv3/TLS connection.&lt;/li&gt;
&lt;li&gt;Allow protocols and ciphers to be set on a TLS config object in libtls.&lt;/li&gt;
&lt;li&gt;Improved nc(1) TLS handshake CPU usage and server-side error reporting.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://hardenedbsd.org/article/op/2017-03-30/stable-release-hardenedbsd-stable-11-stable-v4616" target="_blank" rel="nofollow noopener"&gt;HardenedBSD Stable v46.16 released&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.reddit.com/r/openbsd/comments/5vggn7/knoxbug_looking_for_openbsd_people_in_knoxville/" target="_blank" rel="nofollow noopener"&gt;KnoxBUG looking for OpenBSD people in Knoxville TN area&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;KnoxBUG Tuesday, April 18, 2017 - 6:00pm : Caleb Cooper: Advanced BASH Scripting](&lt;a href="http://knoxbug.org/2017-04-18" target="_blank" rel="nofollow noopener"&gt;http://knoxbug.org/2017-04-18&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170405110059" target="_blank" rel="nofollow noopener"&gt;e2k17 Nano hackathon report from Bob Beck&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Noah Chelliah, Host of the Linux Action Show calls Linux a ‘Bad Science Project’ and ditches Linux for TrueOS](&lt;a href="https://youtu.be/yXB85_olYhQ?t=3238" target="_blank" rel="nofollow noopener"&gt;https://youtu.be/yXB85_olYhQ?t=3238&lt;/a&gt;)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://dpaste.com/1H43JGV#wrap" target="_blank" rel="nofollow noopener"&gt;James - ZFS Mounting&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://dpaste.com/18VNAJK#wrap" target="_blank" rel="nofollow noopener"&gt;Kevin - Virtualization&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://dpaste.com/0R7CRZ7#wrap" target="_blank" rel="nofollow noopener"&gt;Ben - Jails&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://dpaste.com/2Z1P23T#wrap" target="_blank" rel="nofollow noopener"&gt;Florian - ZFS and Migrating Linux userlands&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://dpaste.com/26M453F#wrap" target="_blank" rel="nofollow noopener"&gt;q5sys - question for the community&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, Wendell, Level1Techs, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we interview Wendell from Level1Techs, cover Google Summer of Code on the different BSD projects, cover YubiKey usage, dive into how NICs work &amp;</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>Google summer of code for BSDs</h3>

<ul>
<li><p><a href="https://www.freebsd.org/projects/summerofcode.html" rel="nofollow">FreeBSD</a></p></li>
<li><p><a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">FreeBSD&#39;s existing list of GSoC Ideas for potential students</a> </p>

<ul>
<li>FreeBSD/Xen: import the grant-table bus_dma(9) handlers from OpenBSD</li>
<li>Add support for usbdump file-format to wireshark and vusb-analyzer</li>
<li>Write a new boot environment manager</li>
<li>Basic smoke test of all base utilities</li>
<li>Port OpenBSD&#39;s pf testing framework and tests</li>
<li>Userspace Address Space Annotation</li>
<li>zstandard integration in libstand</li>
<li>Replace mergesort implementation</li>
<li>Test Kload (kexec for FreeBSD)</li>
<li>Kernel fuzzing suite</li>
<li>Integrate MFSBSD into the release building tools</li>
<li>NVMe controller emulation for bhyve</li>
<li>Verification of bhyve&#39;s instruction emulation</li>
<li>VGA emulation improvements for bhyve</li>
<li>audit framework test suite</li>
<li>Add more FreeBSD testing to Xen osstest</li>
<li>Lua in bootloader</li>
<li>POSIX compliance testing framework</li>
<li>coreclr: add Microsoft&#39;s coreclr and corefx to the Ports tree.</li>
</ul></li>
<li><p><a href="https://wiki.netbsd.org/projects/gsoc/" rel="nofollow">NetBSD</a></p>

<ul>
<li>Kernel-level projects</li>
<li>Medium</li>
<li>ISDN NT support and Asterisk integration </li>
<li>LED/LCD Generic API </li>
<li>NetBSD/azure -- Bringing NetBSD to Microsoft Azure </li>
<li>OpenCrypto swcrypto(4) enhancements </li>
<li>Scalable entropy gathering </li>
<li>Userland PCI drivers </li>
<li>Hard</li>
<li>Real asynchronous I/O </li>
<li>Parallelize page queues </li>
<li>Tickless NetBSD with high-resolution timers </li>
<li> Userland projects</li>
<li>Easy</li>
<li>Inetd enhancements -- Add new features to inetd </li>
<li>Curses library automated testing </li>
<li>Medium</li>
<li>Make Anita support additional virtual machine systems </li>
<li>Create an SQL backend and statistics/query page for ATF test results </li>
<li>Light weight precision user level time reading </li>
<li>Query optimizer for find(1) </li>
<li>Port launchd </li>
<li>Secure-PLT - supporting RELRO binaries </li>
<li>Sysinst alternative interface </li>
<li>Hard</li>
<li>Verification tool for NetBSD32 </li>
<li>pkgsrc projects</li>
<li>Easy</li>
<li>Version control config files </li>
<li>Spawn support in pkgsrc tools </li>
<li>Authentication server meta-package </li>
<li>Medium</li>
<li>pkgin improvements </li>
<li>Unify standard installation tasks </li>
<li>Hard</li>
<li>Add dependency information to binary packages </li>
<li>Tool to find dependencies precisely </li>
</ul></li>
<li><p><a href="http://llvm.org/OpenProjects.html#gsoc17" rel="nofollow">LLVM</a></p>

<ul>
<li>Fuzzing the Bitcode reader </li>
</ul></li>
</ul>

<blockquote>
<p>Description of the project: The optimizer is 25-30% slower when debug info are enabled, it&#39;d be nice to track all the places where we don&#39;t do a good job about ignoring them!</p>
</blockquote>

<ul>
<li>Extend clang AST to provide information for the type as written in template instantiations.</li>
</ul>

<blockquote>
<p>Description of the project: When instantiating a template, the template arguments are canonicalized before being substituted into the template pattern. Clang does not preserve type sugar when subsequently accessing members of the instantiation. Clang should &quot;re-sugar&quot; the type when performing member access on a class template specialization, based on the type sugar of the accessed specialization. </p>
</blockquote>

<ul>
<li>Shell auto-completion support for clang.</li>
</ul>

<blockquote>
<p>Bash and other shells support typing a partial command and then automatically completing it for the user (or at least providing suggestions how to complete) when pressing the tab key. This is usually only supported for popular programs such as package managers (e.g. pressing tab after typing &quot;apt-get install late&quot; queries the APT package database and lists all packages that start with &quot;late&quot;). As of now clang&#39;s frontend isn&#39;t supported by any common shell. </p>
</blockquote>

<ul>
<li>Clang-based C/C++ diff tool.</li>
</ul>

<blockquote>
<p>Description of the project: Every developer has to interact with diff tools daily. The algorithms are usually based on detecting &quot;longest common subsequences&quot;, which is agnostic to the file type content. A tool that would understand the structure of the code may provide a better diff experience by being robust against, for example, clang-format changes.</p>
</blockquote>

<ul>
<li>Find dereference of pointers.</li>
</ul>

<blockquote>
<p>Description of the project: Find dereference of pointer before checking for nullptr.</p>
</blockquote>

<ul>
<li>Warn if virtual calls are made from constructors or destructors.</li>
</ul>

<blockquote>
<p>Description of the project: Implement a path-sensitive checker that warns if virtual calls are made from constructors and destructors, which is not valid in case of pure virtual calls and could be a sign of user error in non-pure calls. </p>
</blockquote>

<ul>
<li>Improve Code Layout</li>
</ul>

<blockquote>
<p>Description of the project: The goal for the project is trying to improve the layout/performances of the generated executable. The primary object format considered for the project is ELF but this can be extended to other object formats. The project will touch both LLVM and lld.</p>
</blockquote>

<ul>
<li><p><a href="http://marc.info/?l=openbsd-misc&m=149119308705465&w=2" rel="nofollow">Why Isnt OpenBSD in Google Summer of Code 2017?</a></p></li>
<li><p><a href="https://news.ycombinator.com/item?id=14020814" rel="nofollow">Hacker News Discussion Thread</a></p>

<hr></li>
</ul>

<h3><a href="http://dtrace.org/blogs/rm/2016/09/15/turtles-on-the-wire-understanding-how-the-os-uses-the-modern-nic/" rel="nofollow">Turtles on the Wire: Understanding How the OS Uses the Modern NIC</a></h3>

<ul>
<li>The Simple NIC</li>
<li>MAC Address Filters and Promiscuous Mode</li>
<li>Problem: The Single Busy CPU</li>
<li>A Swing and a Miss</li>
<li>Nine Rings for Packets Doomed to be Hashed</li>
<li>Problem: Density, Density, Density</li>
<li>A Brief Aside: The Virtual NIC</li>
<li>Always Promiscuous?</li>
<li>The Classification Challenge</li>
<li>Problem: CPUs are too slow</li>
<li>Problem: The Interrupts are Coming in too Hot</li>
<li>Solution One: Do Less Work</li>
<li>Solution Two: Turn Off Interrupts</li>
<li>Recapping</li>
<li>Future Directions and More Reading</li>
</ul>

<hr>

<h3><a href="http://akat1.pl/?id=3" rel="nofollow">Make Dragonfly BSD great again!</a></h3>

<blockquote>
<p>Recently I spent some time reading Dragonfly BSD code. While doing so I spotted a vulnerability in the sysvsem subsystem that let user to point to any piece of memory and write data through it (including the kernel space). This can be turned into execution of arbitrary code in the kernel context and by exploiting this, we&#39;re gonna make Dragonfly BSD great again!</p>

<p>Dragonfly BSD is a BSD system which originally comes from the FreeBSD project. In 2003 Matthew Dillon forked code from the 4.x branch of the FreeBSD and started a new flavour.<br>
I thought of Dragonfly BSD as just another fork, but during EuroBSDCon 2015 I accidentally saw the talk about graphical stack in the Dragonfly BSD. I confused rooms, but it was too late to escape as I was sitting in the middle of a row, and the exit seemed light years away from me. :-) Anyway, this talk was a sign to me that it&#39;s not just a niche of a niche of a niche of a niche operating system. I recommend spending a few minutes of your precious time to check out the HAMMER file system, Dragonfly&#39;s approach to MP, process snapshots and other cool features that it offers. Wikipedia article is a good starter</p>
</blockquote>

<ul>
<li>With the exploit, they are able to change the name of the operating system back to FreeBSD, and escalate from an unprivileged user to root.</li>
</ul>

<blockquote>
<p>The Bug itself is located in the semctl(2) system call implementation. bcopy(3) in line 385 copies semid_ds structure to memory pointed by arg-&gt;buf, this pointer is fully controlled by the user, as it&#39;s one of the syscall&#39;s arguments. So the bad thing here is that we can copy things to arbitrary address, but we have not idea what we copy yet. This code was introduced by wrongly merging code from the FreeBSD project, <em>bah</em>, bug happens.</p>
</blockquote>

<ul>
<li>Using this access, the example code shows how to overwrite the function pointers in the kernel used for the open() syscall, and how to overwrite the ostype global, changing the name of the operating system.</li>
<li>In the second example, the reference to the credentials of the user trying to open a file are used to overwrite that data, making the user root.</li>
</ul>

<blockquote>
<p>The bug was fixed in uber fast manner (within few hours!) by Matthew Dillon, version 4.6.1 released shortly after that seems to be safe. In case you care, you know what to do!</p>
</blockquote>

<ul>
<li>Thanks to Mateusz Kocielski for the detailed post, and finding the bug
***</li>
</ul>

<h2>Interview - Wendell - <a href="mailto:wendell@level1techs.com" rel="nofollow">wendell@level1techs.com</a> / <a href="https://twitter.com/tekwendell" rel="nofollow">@tekwendell</a></h2>

<ul>
<li>Host of Level1Techs website, podcast and YouTube channel</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/using-yubikeys-everywhere" rel="nofollow">Using yubikeys everywhere</a></h3>

<ul>
<li>Ted Unangst is back, with an interesting post about YUBI Keys</li>
</ul>

<blockquote>
<p>Everybody is getting real excited about yubikeys recently, so I figured I should get excited, too. I have so far resisted two factor authorizing everything, but this seemed like another fun experiment. Theres a lot written about yubikeys and how you should use one, but nothing Ive read answered a few of the specific questions I had<br>
To begin with, I ordered two yubikeys. One regular sized 4 and one nano. I wanted to play with different form factors to see which is better for various uses, and I wanted to test having a key and a backup key. Everybody always talks about having one yubikey. And then if you lose it, terrible things happen. Can this problem be alleviated with two keys? Im also very curious what happens when I try to login to a service with my phone after enabling U2F.<br>
Weve got three computers (and operating systems) in the mix, along with a number of (mostly web) services. Wherever possible, I want to use a yubikey both to login to the computer and to authorize myself to remote services.<br>
I started my adventure on my chromebook. Ultimate goal would be to use the yubikey for local logins. Either as a second factor, or as an alternative factor. First things first and we need to get the yubikey into the account I use to sign into the chromebook. Alas, there is apparently no way to enroll only a security key for a Google account. Every time I tried, it would ask me for my phone number. That is not what I want. Zero stars.<br>
Giving up on protecting the chromebook itself, at least maybe I can use it to enable U2F with some other sites. U2F is currently limited to Chrome, but it sounds like everything I want. Facebook signup using U2F was pretty easy. Go to account settings, security subheading, add the device. Tap the button when it glows. Key added. Note that its possible to add a key without actually enabling two factor auth, in which case you can still login with only a password, but no way to login with no password and only a USB key. Logged out to confirm it would check the key, and everything looked good, so I killed all my other active sessions. Now for the phone test. Not quite as smooth. Tried to login, the Facebook app then tells me it has sent me an SMS and to enter the code in the box. But I dont have a phone number attached. Im not getting an SMS code.<br>
Meanwhile, on my laptop, I have a new notification about a login attempt. Follow the prompts to confirm its me and permit the login. This doesnt have any effect on the phone, however. I have to tap back, return to the login screen, and enter my password again. This time the login succeeds. So everything works, but there are still some rough patches in the flow. Ideally, the phone would more accurately tell me to visit the desktop site, and then automatically proceed after I approve. (The messenger app crashed after telling me my session had expired, but upon restarting it was able to borrow the Facebook app credentials and I was immediately logged back in.)<br>
Lets configure Dropbox next. Dropbox wont let you add a security key to an account until after youve already set up some other mobile authenticator. I already had the Duo app on my phone, so I picked that, and after a short QR scan, Im ready to add the yubikey. So the key works to access Dropbox via Chrome. Accessing Dropbox via my phone or Firefox requires entering a six digit code. No way to use a yubikey in a three legged configuration<br>
I dont use Github, but I know they support two factors, so lets try them next. Very similar to Dropbox. In order to set up a key, I must first set up an authenticator app. This time I went with Yubicos own desktop authenticator. Instead of scanning the QR code, type in some giant number (on my Windows laptop), and it spits out an endless series of six digit numbers, but only while the yubikey is inserted. I guess this is kind of what I want, although a three pound yubikey is kind of unwieldy.<br>
As part of my experiment, I noticed that Dropbox verifies passwords before even looking at the second auth. I have a feeling that they should be checked at the same time. No sense allowing my password guessing attack to proceed while I plot how to steal someones yubikey. In a sense, the yubikey should serve as a salt, preventing me from mounting such an attack until I have it, thus creating a race where the victim notices the key is gone and revokes access before I learn the password. If I know the password, the instant I grab the key I get access. Along similar lines, I was able to complete a password reset without entering any kind of secondary code.<br>
Having my phone turn into a second factor is a big part of what Im looking to avoid with the yubikey. Id like to be able to take my phone with me, logged into some sites but not all, and unable to login to the rest. All these sites that require using my phone as mobile authenticator are making that difficult. I bought the yubikey because it was cheaper than buying another phone! Using the Yubico desktop authenticator seems the best way around that.</p>
</blockquote>

<ul>
<li>The article also provides instructions for configuring the Yubikey on OpenBSD</li>
</ul>

<blockquote>
<p>A few notes about OTP. As mentioned, the secret key is the real password. Its stored on whatever laptop or server you login to. Meaning any of those machines can take the key and use it to login to any other machine. If you use the same yubikey to login to both your laptop and a remote server, your stolen laptop can trivially be used to login to the server without the key. Be mindful of that when setting up multiple machines. Also, the OTP counter isnt synced between machines in this setup, which allows limited replay attacks.</p>
</blockquote>

<ul>
<li>Ted didnt switch his SSH keys to the Yubikey, because it doesnt support ED25519, and he just finished rotating all of his keys and doesnt want to do it again.</li>
</ul>

<blockquote>
<p>I did most of my experimenting with the larger yubikey, since it was easier to move between machines. For operations involving logging into a web site, however, Id prefer the nano. Its very small, even smaller than the tiniest wireless mouse transcievers Ive seen. So small, in fact, I had trouble removing it because I couldnt find anything small enough to fit through the tiny loop. But probably a good thing. Most other micro USB gadgets stick out just enough to snag when pushing a laptop into a bag. Not the nano. You lose a port, but theres really no reason to ever take it out. Just leave it in, and then tap it whenever you login to the tubes. It would not be a good choice for authenticating to the local machine, however. The larger device, sized to fit on a keychain, is much better for that. <br>
It is possible to use two keys as backups. Facebook and Dropbox allow adding two U2F keys. This is perhaps a little tiresome if theres lots of sites, as I see no way to clone a key. You have to login to every service. For challenge response and OTP, however, the personalization tool makes it easy to generate lots of yubikeys with the same secrets. On the other hand, a single device supports an infinite number of U2F sites. The programmable interfaces like OTP are limited to only two slots, and the first is already used by the factory OTP setup.</p>

<hr>
</blockquote>

<h3><a href="http://www.grenadille.net/post/2017/02/13/What-happened-to-my-vlan" rel="nofollow">What happened to my vlan</a></h3>

<blockquote>
<p>A long term goal of the effort I&#39;m driving to unlock OpenBSD&#39;s Network Stack is obviously to increase performances. So I&#39;d understand that you find confusing when some of our changes introduce performance regressions.<br>
It is just really hard to do incremental changes without introducing temporary regressions. But as much as security is a process, improving performance is also a process. Recently markus@ told me that vlan(4) performances dropped in last releases. He had some ideas why but he couldn&#39;t provide evidences. So what really happened?<br>
Hrvoje Popovski was kind enough to help me with some tests. He first confirmed that on his Xeon box (E5-2643 v2 @ 3.50GHz), forwarding performances without pf(4) dropped from 1.42Mpps to 880Kpps when using vlan(4) on both interfaces.<br>
Together vlan_input() and vlan_start() represent 25% of the time CPU1 spends processing packets. This is not exactly between 33% and 50% but it is close enough. The assumption we made earlier is certainly too simple. If we compare the amount of work done in process context, represented by if_input_process() we clearly see that half of the CPU time is not spent in ether_input().<br>
I&#39;m not sure how this is related to the measured performance drop. It is actually hard to tell since packets are currently being processed in 3 different contexts. One of the arguments mikeb@ raised when we discussed moving everything in a single context, is that it is simpler to analyse and hopefully make it scale.<br>
With some measurements, a couple of nice pictures, a bit of analysis and some educated guesses we are now in measure of saying that the performances impact observed with vlan(4) is certainly due to the pseudo-driver itself. A decrease of 30% to 50% is not what I would expect from such pseudo-driver.<br>
I originally heard that the reason for this regression was the use of SRP but by looking at the profiling data it seems to me that the queuing API is the problem. In the graph above the CPU time spent in if_input() and if_enqueue() from vlan(4) is impressive. Remember, in the case of vlan(4) these operations are done per packet!<br>
When if_input() has been introduced the queuing API did not exist and putting/taking a single packet on/from an interface queue was cheap. Now it requires a mutex per operation, which in the case of packets received and sent on vlan(4) means grabbing three mutexes per packets.<br>
I still can&#39;t say if my analysis is correct or not, but at least it could explain the decrease observed by Hrvoje when testing multiple vlan(4) configurations. vlan_input() takes one mutex per packet, so it decreases the number of forwarded packets by ~100Kpps on this machine, while vlan_start() taking two mutexes decreases it by ~200Kpps.</p>
</blockquote>

<ul>
<li>An interesting analysis of the routing performance regression on OpenBSD</li>
<li>I have asked Olivier Cochard-Labbe about doing a similar comparison of routing performance on FreeBSD when a vlan pseudo interface is added to the forwarding path
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_the_first_bsd_introducing" rel="nofollow">NetBSD: the first BSD introducing a modern process plugin framework in LLDB</a></h3>

<ul>
<li>Clean up in ptrace(2) ATF tests</li>
</ul>

<blockquote>
<p>We have created some maintanance burden for the current ptrace(2) regression tests. The main issues with them is code duplication and the splitting between generic (Machine Independent) and port-specific (Machine Dependent) test files. I&#39;ve eliminated some of the ballast and merged tests into the appropriate directory tests/lib/libc/sys/. The old location (tests/kernel) was a violation of the tests/README recommendation</p>
</blockquote>

<ul>
<li>PTRACE_FORK on !x86 ports</li>
</ul>

<blockquote>
<p>Along with the motivation from Martin Husemann we have investigated the issue with PTRACE_FORK ATF regression tests. It was discovered that these tests aren&#39;t functional on evbarm, alpha, shark, sparc and sparc64 and likely on other non-x86 ports. We have discovered that there is a missing SIGTRAP emitted from the child, during the fork(2) handshake. The proper order of operations is as follows:</p>

<blockquote>
<p>parent emits SIGTRAP with si_code=TRAP_CHLD and pe_set_event=pid of forkee<br>
child emits SIGTRAP with si_code=TRAP_CHLD and pe_set_event=pid of forker</p>
</blockquote>

<p>Only the x86 ports were emitting the second SIGTRAP signal.</p>
</blockquote>

<ul>
<li>PT_SYSCALL and PT_SYSCALLEMU</li>
</ul>

<blockquote>
<p>With the addition of PT_SYSCALLEMU we can implement a virtual kernel syscall monitor. It means that we can fake syscalls within a debugger. In order to achieve this feature, we need to use the PT_SYSCALL operation, catch SIGTRAP with si_code=TRAP_SCE (syscall entry), call PT_SYSCALLEMU and perform an emulated userspace syscall that would have been done by the kernel, followed by calling another PT_SYSCALL with si_code=TRAP_SCX.</p>
</blockquote>

<ul>
<li>What has been done in LLDB</li>
</ul>

<blockquote>
<p>A lot of work has been done with the goal to get breakpoints functional. This target penetrated bugs in the existing local patches and unveiled missing features required to be added. My initial test was tracing a dummy hello-world application in C. I have sniffed the GDB Remote Protocol packets and compared them between Linux and NetBSD. This helped to streamline both versions and bring the NetBSD support to the required Linux level.</p>
</blockquote>

<ul>
<li>Plan for the next milestone</li>
</ul>

<blockquote>
<p>I&#39;ve listed the following goals for the next milestone.</p>
</blockquote>

<ul>
<li>watchpoints support</li>
<li>floating point registers support</li>
<li>enhance core(5) and make it work for multiple threads</li>
<li>introduce PT_SETSTEP and PT_CLEARSTEP in ptrace(2)</li>
<li>support threads in the NetBSD Process Plugin</li>
<li>research F_GETPATH in fcntl(2)</li>
<li>Beyond the next milestone is x86 32-bit support.</li>
</ul>

<h3><a href="https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.2-relnotes.txt" rel="nofollow">LibreSSL 2.5.2 released</a></h3>

<ul>
<li>Added the recallocarray(3) memory allocation function, and converted various places in the library to use it, such as CBB and BUF_MEM_grow. recallocarray(3) is similar to reallocarray. Newly allocated memory is cleared similar to calloc(3). Memory that becomes unallocated while shrinking or moving existing allocations is explicitly discarded by unmapping or clearing to 0.</li>
<li>Added new root CAs from SECOM Trust Systems / Security Communication of Japan.</li>
<li>Added EVP interface for MD5+SHA1 hashes.</li>
<li>Fixed DTLS client failures when the server sends a certificate request.</li>
<li>Correct handling of padding when upgrading an SSLv2 challenge into an SSLv3/TLS connection.</li>
<li>Allow protocols and ciphers to be set on a TLS config object in libtls.</li>
<li>Improved nc(1) TLS handshake CPU usage and server-side error reporting.</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://hardenedbsd.org/article/op/2017-03-30/stable-release-hardenedbsd-stable-11-stable-v4616" rel="nofollow">HardenedBSD Stable v46.16 released</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/5vggn7/knoxbug_looking_for_openbsd_people_in_knoxville/" rel="nofollow">KnoxBUG looking for OpenBSD people in Knoxville TN area</a></li>
<li>KnoxBUG Tuesday, April 18, 2017 - 6:00pm : Caleb Cooper: Advanced BASH Scripting](<a href="http://knoxbug.org/2017-04-18" rel="nofollow">http://knoxbug.org/2017-04-18</a>)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170405110059" rel="nofollow">e2k17 Nano hackathon report from Bob Beck</a></li>
<li>Noah Chelliah, Host of the Linux Action Show calls Linux a Bad Science Project and ditches Linux for TrueOS](<a href="https://youtu.be/yXB85_olYhQ?t=3238" rel="nofollow">https://youtu.be/yXB85_olYhQ?t=3238</a>)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="http://dpaste.com/1H43JGV#wrap" rel="nofollow">James - ZFS Mounting</a></p></li>
<li><p><a href="http://dpaste.com/18VNAJK#wrap" rel="nofollow">Kevin - Virtualization</a></p></li>
<li><p><a href="http://dpaste.com/0R7CRZ7#wrap" rel="nofollow">Ben - Jails</a></p></li>
<li><p><a href="http://dpaste.com/2Z1P23T#wrap" rel="nofollow">Florian - ZFS and Migrating Linux userlands</a></p></li>
<li><p><a href="http://dpaste.com/26M453F#wrap" rel="nofollow">q5sys - question for the community</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we interview Wendell from Level1Techs, cover Google Summer of Code on the different BSD projects, cover YubiKey usage, dive into how NICs work &amp;</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>Google summer of code for BSDs</h3>

<ul>
<li><p><a href="https://www.freebsd.org/projects/summerofcode.html" rel="nofollow">FreeBSD</a></p></li>
<li><p><a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">FreeBSD&#39;s existing list of GSoC Ideas for potential students</a> </p>

<ul>
<li>FreeBSD/Xen: import the grant-table bus_dma(9) handlers from OpenBSD</li>
<li>Add support for usbdump file-format to wireshark and vusb-analyzer</li>
<li>Write a new boot environment manager</li>
<li>Basic smoke test of all base utilities</li>
<li>Port OpenBSD&#39;s pf testing framework and tests</li>
<li>Userspace Address Space Annotation</li>
<li>zstandard integration in libstand</li>
<li>Replace mergesort implementation</li>
<li>Test Kload (kexec for FreeBSD)</li>
<li>Kernel fuzzing suite</li>
<li>Integrate MFSBSD into the release building tools</li>
<li>NVMe controller emulation for bhyve</li>
<li>Verification of bhyve&#39;s instruction emulation</li>
<li>VGA emulation improvements for bhyve</li>
<li>audit framework test suite</li>
<li>Add more FreeBSD testing to Xen osstest</li>
<li>Lua in bootloader</li>
<li>POSIX compliance testing framework</li>
<li>coreclr: add Microsoft&#39;s coreclr and corefx to the Ports tree.</li>
</ul></li>
<li><p><a href="https://wiki.netbsd.org/projects/gsoc/" rel="nofollow">NetBSD</a></p>

<ul>
<li>Kernel-level projects</li>
<li>Medium</li>
<li>ISDN NT support and Asterisk integration </li>
<li>LED/LCD Generic API </li>
<li>NetBSD/azure -- Bringing NetBSD to Microsoft Azure </li>
<li>OpenCrypto swcrypto(4) enhancements </li>
<li>Scalable entropy gathering </li>
<li>Userland PCI drivers </li>
<li>Hard</li>
<li>Real asynchronous I/O </li>
<li>Parallelize page queues </li>
<li>Tickless NetBSD with high-resolution timers </li>
<li> Userland projects</li>
<li>Easy</li>
<li>Inetd enhancements -- Add new features to inetd </li>
<li>Curses library automated testing </li>
<li>Medium</li>
<li>Make Anita support additional virtual machine systems </li>
<li>Create an SQL backend and statistics/query page for ATF test results </li>
<li>Light weight precision user level time reading </li>
<li>Query optimizer for find(1) </li>
<li>Port launchd </li>
<li>Secure-PLT - supporting RELRO binaries </li>
<li>Sysinst alternative interface </li>
<li>Hard</li>
<li>Verification tool for NetBSD32 </li>
<li>pkgsrc projects</li>
<li>Easy</li>
<li>Version control config files </li>
<li>Spawn support in pkgsrc tools </li>
<li>Authentication server meta-package </li>
<li>Medium</li>
<li>pkgin improvements </li>
<li>Unify standard installation tasks </li>
<li>Hard</li>
<li>Add dependency information to binary packages </li>
<li>Tool to find dependencies precisely </li>
</ul></li>
<li><p><a href="http://llvm.org/OpenProjects.html#gsoc17" rel="nofollow">LLVM</a></p>

<ul>
<li>Fuzzing the Bitcode reader </li>
</ul></li>
</ul>

<blockquote>
<p>Description of the project: The optimizer is 25-30% slower when debug info are enabled, it&#39;d be nice to track all the places where we don&#39;t do a good job about ignoring them!</p>
</blockquote>

<ul>
<li>Extend clang AST to provide information for the type as written in template instantiations.</li>
</ul>

<blockquote>
<p>Description of the project: When instantiating a template, the template arguments are canonicalized before being substituted into the template pattern. Clang does not preserve type sugar when subsequently accessing members of the instantiation. Clang should &quot;re-sugar&quot; the type when performing member access on a class template specialization, based on the type sugar of the accessed specialization. </p>
</blockquote>

<ul>
<li>Shell auto-completion support for clang.</li>
</ul>

<blockquote>
<p>Bash and other shells support typing a partial command and then automatically completing it for the user (or at least providing suggestions how to complete) when pressing the tab key. This is usually only supported for popular programs such as package managers (e.g. pressing tab after typing &quot;apt-get install late&quot; queries the APT package database and lists all packages that start with &quot;late&quot;). As of now clang&#39;s frontend isn&#39;t supported by any common shell. </p>
</blockquote>

<ul>
<li>Clang-based C/C++ diff tool.</li>
</ul>

<blockquote>
<p>Description of the project: Every developer has to interact with diff tools daily. The algorithms are usually based on detecting &quot;longest common subsequences&quot;, which is agnostic to the file type content. A tool that would understand the structure of the code may provide a better diff experience by being robust against, for example, clang-format changes.</p>
</blockquote>

<ul>
<li>Find dereference of pointers.</li>
</ul>

<blockquote>
<p>Description of the project: Find dereference of pointer before checking for nullptr.</p>
</blockquote>

<ul>
<li>Warn if virtual calls are made from constructors or destructors.</li>
</ul>

<blockquote>
<p>Description of the project: Implement a path-sensitive checker that warns if virtual calls are made from constructors and destructors, which is not valid in case of pure virtual calls and could be a sign of user error in non-pure calls. </p>
</blockquote>

<ul>
<li>Improve Code Layout</li>
</ul>

<blockquote>
<p>Description of the project: The goal for the project is trying to improve the layout/performances of the generated executable. The primary object format considered for the project is ELF but this can be extended to other object formats. The project will touch both LLVM and lld.</p>
</blockquote>

<ul>
<li><p><a href="http://marc.info/?l=openbsd-misc&m=149119308705465&w=2" rel="nofollow">Why Isnt OpenBSD in Google Summer of Code 2017?</a></p></li>
<li><p><a href="https://news.ycombinator.com/item?id=14020814" rel="nofollow">Hacker News Discussion Thread</a></p>

<hr></li>
</ul>

<h3><a href="http://dtrace.org/blogs/rm/2016/09/15/turtles-on-the-wire-understanding-how-the-os-uses-the-modern-nic/" rel="nofollow">Turtles on the Wire: Understanding How the OS Uses the Modern NIC</a></h3>

<ul>
<li>The Simple NIC</li>
<li>MAC Address Filters and Promiscuous Mode</li>
<li>Problem: The Single Busy CPU</li>
<li>A Swing and a Miss</li>
<li>Nine Rings for Packets Doomed to be Hashed</li>
<li>Problem: Density, Density, Density</li>
<li>A Brief Aside: The Virtual NIC</li>
<li>Always Promiscuous?</li>
<li>The Classification Challenge</li>
<li>Problem: CPUs are too slow</li>
<li>Problem: The Interrupts are Coming in too Hot</li>
<li>Solution One: Do Less Work</li>
<li>Solution Two: Turn Off Interrupts</li>
<li>Recapping</li>
<li>Future Directions and More Reading</li>
</ul>

<hr>

<h3><a href="http://akat1.pl/?id=3" rel="nofollow">Make Dragonfly BSD great again!</a></h3>

<blockquote>
<p>Recently I spent some time reading Dragonfly BSD code. While doing so I spotted a vulnerability in the sysvsem subsystem that let user to point to any piece of memory and write data through it (including the kernel space). This can be turned into execution of arbitrary code in the kernel context and by exploiting this, we&#39;re gonna make Dragonfly BSD great again!</p>

<p>Dragonfly BSD is a BSD system which originally comes from the FreeBSD project. In 2003 Matthew Dillon forked code from the 4.x branch of the FreeBSD and started a new flavour.<br>
I thought of Dragonfly BSD as just another fork, but during EuroBSDCon 2015 I accidentally saw the talk about graphical stack in the Dragonfly BSD. I confused rooms, but it was too late to escape as I was sitting in the middle of a row, and the exit seemed light years away from me. :-) Anyway, this talk was a sign to me that it&#39;s not just a niche of a niche of a niche of a niche operating system. I recommend spending a few minutes of your precious time to check out the HAMMER file system, Dragonfly&#39;s approach to MP, process snapshots and other cool features that it offers. Wikipedia article is a good starter</p>
</blockquote>

<ul>
<li>With the exploit, they are able to change the name of the operating system back to FreeBSD, and escalate from an unprivileged user to root.</li>
</ul>

<blockquote>
<p>The Bug itself is located in the semctl(2) system call implementation. bcopy(3) in line 385 copies semid_ds structure to memory pointed by arg-&gt;buf, this pointer is fully controlled by the user, as it&#39;s one of the syscall&#39;s arguments. So the bad thing here is that we can copy things to arbitrary address, but we have not idea what we copy yet. This code was introduced by wrongly merging code from the FreeBSD project, <em>bah</em>, bug happens.</p>
</blockquote>

<ul>
<li>Using this access, the example code shows how to overwrite the function pointers in the kernel used for the open() syscall, and how to overwrite the ostype global, changing the name of the operating system.</li>
<li>In the second example, the reference to the credentials of the user trying to open a file are used to overwrite that data, making the user root.</li>
</ul>

<blockquote>
<p>The bug was fixed in uber fast manner (within few hours!) by Matthew Dillon, version 4.6.1 released shortly after that seems to be safe. In case you care, you know what to do!</p>
</blockquote>

<ul>
<li>Thanks to Mateusz Kocielski for the detailed post, and finding the bug
***</li>
</ul>

<h2>Interview - Wendell - <a href="mailto:wendell@level1techs.com" rel="nofollow">wendell@level1techs.com</a> / <a href="https://twitter.com/tekwendell" rel="nofollow">@tekwendell</a></h2>

<ul>
<li>Host of Level1Techs website, podcast and YouTube channel</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/using-yubikeys-everywhere" rel="nofollow">Using yubikeys everywhere</a></h3>

<ul>
<li>Ted Unangst is back, with an interesting post about YUBI Keys</li>
</ul>

<blockquote>
<p>Everybody is getting real excited about yubikeys recently, so I figured I should get excited, too. I have so far resisted two factor authorizing everything, but this seemed like another fun experiment. Theres a lot written about yubikeys and how you should use one, but nothing Ive read answered a few of the specific questions I had<br>
To begin with, I ordered two yubikeys. One regular sized 4 and one nano. I wanted to play with different form factors to see which is better for various uses, and I wanted to test having a key and a backup key. Everybody always talks about having one yubikey. And then if you lose it, terrible things happen. Can this problem be alleviated with two keys? Im also very curious what happens when I try to login to a service with my phone after enabling U2F.<br>
Weve got three computers (and operating systems) in the mix, along with a number of (mostly web) services. Wherever possible, I want to use a yubikey both to login to the computer and to authorize myself to remote services.<br>
I started my adventure on my chromebook. Ultimate goal would be to use the yubikey for local logins. Either as a second factor, or as an alternative factor. First things first and we need to get the yubikey into the account I use to sign into the chromebook. Alas, there is apparently no way to enroll only a security key for a Google account. Every time I tried, it would ask me for my phone number. That is not what I want. Zero stars.<br>
Giving up on protecting the chromebook itself, at least maybe I can use it to enable U2F with some other sites. U2F is currently limited to Chrome, but it sounds like everything I want. Facebook signup using U2F was pretty easy. Go to account settings, security subheading, add the device. Tap the button when it glows. Key added. Note that its possible to add a key without actually enabling two factor auth, in which case you can still login with only a password, but no way to login with no password and only a USB key. Logged out to confirm it would check the key, and everything looked good, so I killed all my other active sessions. Now for the phone test. Not quite as smooth. Tried to login, the Facebook app then tells me it has sent me an SMS and to enter the code in the box. But I dont have a phone number attached. Im not getting an SMS code.<br>
Meanwhile, on my laptop, I have a new notification about a login attempt. Follow the prompts to confirm its me and permit the login. This doesnt have any effect on the phone, however. I have to tap back, return to the login screen, and enter my password again. This time the login succeeds. So everything works, but there are still some rough patches in the flow. Ideally, the phone would more accurately tell me to visit the desktop site, and then automatically proceed after I approve. (The messenger app crashed after telling me my session had expired, but upon restarting it was able to borrow the Facebook app credentials and I was immediately logged back in.)<br>
Lets configure Dropbox next. Dropbox wont let you add a security key to an account until after youve already set up some other mobile authenticator. I already had the Duo app on my phone, so I picked that, and after a short QR scan, Im ready to add the yubikey. So the key works to access Dropbox via Chrome. Accessing Dropbox via my phone or Firefox requires entering a six digit code. No way to use a yubikey in a three legged configuration<br>
I dont use Github, but I know they support two factors, so lets try them next. Very similar to Dropbox. In order to set up a key, I must first set up an authenticator app. This time I went with Yubicos own desktop authenticator. Instead of scanning the QR code, type in some giant number (on my Windows laptop), and it spits out an endless series of six digit numbers, but only while the yubikey is inserted. I guess this is kind of what I want, although a three pound yubikey is kind of unwieldy.<br>
As part of my experiment, I noticed that Dropbox verifies passwords before even looking at the second auth. I have a feeling that they should be checked at the same time. No sense allowing my password guessing attack to proceed while I plot how to steal someones yubikey. In a sense, the yubikey should serve as a salt, preventing me from mounting such an attack until I have it, thus creating a race where the victim notices the key is gone and revokes access before I learn the password. If I know the password, the instant I grab the key I get access. Along similar lines, I was able to complete a password reset without entering any kind of secondary code.<br>
Having my phone turn into a second factor is a big part of what Im looking to avoid with the yubikey. Id like to be able to take my phone with me, logged into some sites but not all, and unable to login to the rest. All these sites that require using my phone as mobile authenticator are making that difficult. I bought the yubikey because it was cheaper than buying another phone! Using the Yubico desktop authenticator seems the best way around that.</p>
</blockquote>

<ul>
<li>The article also provides instructions for configuring the Yubikey on OpenBSD</li>
</ul>

<blockquote>
<p>A few notes about OTP. As mentioned, the secret key is the real password. Its stored on whatever laptop or server you login to. Meaning any of those machines can take the key and use it to login to any other machine. If you use the same yubikey to login to both your laptop and a remote server, your stolen laptop can trivially be used to login to the server without the key. Be mindful of that when setting up multiple machines. Also, the OTP counter isnt synced between machines in this setup, which allows limited replay attacks.</p>
</blockquote>

<ul>
<li>Ted didnt switch his SSH keys to the Yubikey, because it doesnt support ED25519, and he just finished rotating all of his keys and doesnt want to do it again.</li>
</ul>

<blockquote>
<p>I did most of my experimenting with the larger yubikey, since it was easier to move between machines. For operations involving logging into a web site, however, Id prefer the nano. Its very small, even smaller than the tiniest wireless mouse transcievers Ive seen. So small, in fact, I had trouble removing it because I couldnt find anything small enough to fit through the tiny loop. But probably a good thing. Most other micro USB gadgets stick out just enough to snag when pushing a laptop into a bag. Not the nano. You lose a port, but theres really no reason to ever take it out. Just leave it in, and then tap it whenever you login to the tubes. It would not be a good choice for authenticating to the local machine, however. The larger device, sized to fit on a keychain, is much better for that. <br>
It is possible to use two keys as backups. Facebook and Dropbox allow adding two U2F keys. This is perhaps a little tiresome if theres lots of sites, as I see no way to clone a key. You have to login to every service. For challenge response and OTP, however, the personalization tool makes it easy to generate lots of yubikeys with the same secrets. On the other hand, a single device supports an infinite number of U2F sites. The programmable interfaces like OTP are limited to only two slots, and the first is already used by the factory OTP setup.</p>

<hr>
</blockquote>

<h3><a href="http://www.grenadille.net/post/2017/02/13/What-happened-to-my-vlan" rel="nofollow">What happened to my vlan</a></h3>

<blockquote>
<p>A long term goal of the effort I&#39;m driving to unlock OpenBSD&#39;s Network Stack is obviously to increase performances. So I&#39;d understand that you find confusing when some of our changes introduce performance regressions.<br>
It is just really hard to do incremental changes without introducing temporary regressions. But as much as security is a process, improving performance is also a process. Recently markus@ told me that vlan(4) performances dropped in last releases. He had some ideas why but he couldn&#39;t provide evidences. So what really happened?<br>
Hrvoje Popovski was kind enough to help me with some tests. He first confirmed that on his Xeon box (E5-2643 v2 @ 3.50GHz), forwarding performances without pf(4) dropped from 1.42Mpps to 880Kpps when using vlan(4) on both interfaces.<br>
Together vlan_input() and vlan_start() represent 25% of the time CPU1 spends processing packets. This is not exactly between 33% and 50% but it is close enough. The assumption we made earlier is certainly too simple. If we compare the amount of work done in process context, represented by if_input_process() we clearly see that half of the CPU time is not spent in ether_input().<br>
I&#39;m not sure how this is related to the measured performance drop. It is actually hard to tell since packets are currently being processed in 3 different contexts. One of the arguments mikeb@ raised when we discussed moving everything in a single context, is that it is simpler to analyse and hopefully make it scale.<br>
With some measurements, a couple of nice pictures, a bit of analysis and some educated guesses we are now in measure of saying that the performances impact observed with vlan(4) is certainly due to the pseudo-driver itself. A decrease of 30% to 50% is not what I would expect from such pseudo-driver.<br>
I originally heard that the reason for this regression was the use of SRP but by looking at the profiling data it seems to me that the queuing API is the problem. In the graph above the CPU time spent in if_input() and if_enqueue() from vlan(4) is impressive. Remember, in the case of vlan(4) these operations are done per packet!<br>
When if_input() has been introduced the queuing API did not exist and putting/taking a single packet on/from an interface queue was cheap. Now it requires a mutex per operation, which in the case of packets received and sent on vlan(4) means grabbing three mutexes per packets.<br>
I still can&#39;t say if my analysis is correct or not, but at least it could explain the decrease observed by Hrvoje when testing multiple vlan(4) configurations. vlan_input() takes one mutex per packet, so it decreases the number of forwarded packets by ~100Kpps on this machine, while vlan_start() taking two mutexes decreases it by ~200Kpps.</p>
</blockquote>

<ul>
<li>An interesting analysis of the routing performance regression on OpenBSD</li>
<li>I have asked Olivier Cochard-Labbe about doing a similar comparison of routing performance on FreeBSD when a vlan pseudo interface is added to the forwarding path
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_the_first_bsd_introducing" rel="nofollow">NetBSD: the first BSD introducing a modern process plugin framework in LLDB</a></h3>

<ul>
<li>Clean up in ptrace(2) ATF tests</li>
</ul>

<blockquote>
<p>We have created some maintanance burden for the current ptrace(2) regression tests. The main issues with them is code duplication and the splitting between generic (Machine Independent) and port-specific (Machine Dependent) test files. I&#39;ve eliminated some of the ballast and merged tests into the appropriate directory tests/lib/libc/sys/. The old location (tests/kernel) was a violation of the tests/README recommendation</p>
</blockquote>

<ul>
<li>PTRACE_FORK on !x86 ports</li>
</ul>

<blockquote>
<p>Along with the motivation from Martin Husemann we have investigated the issue with PTRACE_FORK ATF regression tests. It was discovered that these tests aren&#39;t functional on evbarm, alpha, shark, sparc and sparc64 and likely on other non-x86 ports. We have discovered that there is a missing SIGTRAP emitted from the child, during the fork(2) handshake. The proper order of operations is as follows:</p>

<blockquote>
<p>parent emits SIGTRAP with si_code=TRAP_CHLD and pe_set_event=pid of forkee<br>
child emits SIGTRAP with si_code=TRAP_CHLD and pe_set_event=pid of forker</p>
</blockquote>

<p>Only the x86 ports were emitting the second SIGTRAP signal.</p>
</blockquote>

<ul>
<li>PT_SYSCALL and PT_SYSCALLEMU</li>
</ul>

<blockquote>
<p>With the addition of PT_SYSCALLEMU we can implement a virtual kernel syscall monitor. It means that we can fake syscalls within a debugger. In order to achieve this feature, we need to use the PT_SYSCALL operation, catch SIGTRAP with si_code=TRAP_SCE (syscall entry), call PT_SYSCALLEMU and perform an emulated userspace syscall that would have been done by the kernel, followed by calling another PT_SYSCALL with si_code=TRAP_SCX.</p>
</blockquote>

<ul>
<li>What has been done in LLDB</li>
</ul>

<blockquote>
<p>A lot of work has been done with the goal to get breakpoints functional. This target penetrated bugs in the existing local patches and unveiled missing features required to be added. My initial test was tracing a dummy hello-world application in C. I have sniffed the GDB Remote Protocol packets and compared them between Linux and NetBSD. This helped to streamline both versions and bring the NetBSD support to the required Linux level.</p>
</blockquote>

<ul>
<li>Plan for the next milestone</li>
</ul>

<blockquote>
<p>I&#39;ve listed the following goals for the next milestone.</p>
</blockquote>

<ul>
<li>watchpoints support</li>
<li>floating point registers support</li>
<li>enhance core(5) and make it work for multiple threads</li>
<li>introduce PT_SETSTEP and PT_CLEARSTEP in ptrace(2)</li>
<li>support threads in the NetBSD Process Plugin</li>
<li>research F_GETPATH in fcntl(2)</li>
<li>Beyond the next milestone is x86 32-bit support.</li>
</ul>

<h3><a href="https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.2-relnotes.txt" rel="nofollow">LibreSSL 2.5.2 released</a></h3>

<ul>
<li>Added the recallocarray(3) memory allocation function, and converted various places in the library to use it, such as CBB and BUF_MEM_grow. recallocarray(3) is similar to reallocarray. Newly allocated memory is cleared similar to calloc(3). Memory that becomes unallocated while shrinking or moving existing allocations is explicitly discarded by unmapping or clearing to 0.</li>
<li>Added new root CAs from SECOM Trust Systems / Security Communication of Japan.</li>
<li>Added EVP interface for MD5+SHA1 hashes.</li>
<li>Fixed DTLS client failures when the server sends a certificate request.</li>
<li>Correct handling of padding when upgrading an SSLv2 challenge into an SSLv3/TLS connection.</li>
<li>Allow protocols and ciphers to be set on a TLS config object in libtls.</li>
<li>Improved nc(1) TLS handshake CPU usage and server-side error reporting.</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://hardenedbsd.org/article/op/2017-03-30/stable-release-hardenedbsd-stable-11-stable-v4616" rel="nofollow">HardenedBSD Stable v46.16 released</a></li>
<li><a href="https://www.reddit.com/r/openbsd/comments/5vggn7/knoxbug_looking_for_openbsd_people_in_knoxville/" rel="nofollow">KnoxBUG looking for OpenBSD people in Knoxville TN area</a></li>
<li>KnoxBUG Tuesday, April 18, 2017 - 6:00pm : Caleb Cooper: Advanced BASH Scripting](<a href="http://knoxbug.org/2017-04-18" rel="nofollow">http://knoxbug.org/2017-04-18</a>)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170405110059" rel="nofollow">e2k17 Nano hackathon report from Bob Beck</a></li>
<li>Noah Chelliah, Host of the Linux Action Show calls Linux a Bad Science Project and ditches Linux for TrueOS](<a href="https://youtu.be/yXB85_olYhQ?t=3238" rel="nofollow">https://youtu.be/yXB85_olYhQ?t=3238</a>)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><p><a href="http://dpaste.com/1H43JGV#wrap" rel="nofollow">James - ZFS Mounting</a></p></li>
<li><p><a href="http://dpaste.com/18VNAJK#wrap" rel="nofollow">Kevin - Virtualization</a></p></li>
<li><p><a href="http://dpaste.com/0R7CRZ7#wrap" rel="nofollow">Ben - Jails</a></p></li>
<li><p><a href="http://dpaste.com/2Z1P23T#wrap" rel="nofollow">Florian - ZFS and Migrating Linux userlands</a></p></li>
<li><p><a href="http://dpaste.com/26M453F#wrap" rel="nofollow">q5sys - question for the community</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>188: And then the murders began</title>
  <link>https://www.bsdnow.tv/188</link>
  <guid isPermaLink="false">3f745bc2-94ef-484d-89a0-b716571c789c</guid>
  <pubDate>Wed, 05 Apr 2017 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3f745bc2-94ef-484d-89a0-b716571c789c.mp3" length="60237652" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Today on BSD Now, the latest Dragonfly BSD release, RaidZ performance, another OpenSSL Vulnerability, and more; all this week on BSD Now.</itunes:subtitle>
  <itunes:duration>1:23:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Today on BSD Now, the latest Dragonfly BSD release, RaidZ performance, another OpenSSL Vulnerability, and more; all this week on BSD Now.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflybsd.org/release48/" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD 4.8 is released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Improved kernel performance

&lt;ul&gt;
&lt;li&gt;This release further localizes cache lines and reduces/removes cache ping-ponging on globals. For bulk builds on many-cores or multi-socket systems, we have around a 5% improvement, and certain subsystems such as namecache lookups and exec()s see massive focused improvements. See the corresponding mailing list post with details.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Support for eMMC booting, and mobile and high-performance PCIe SSDs

&lt;ul&gt;
&lt;li&gt;This kernel release includes support for eMMC storage as the boot device. We also sport a brand new SMP-friendly, high-performance NVMe SSD driver (PCIe SSD storage). Initial device test results are available.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;EFI support

&lt;ul&gt;
&lt;li&gt;The installer can now create an EFI or legacy installation. Numerous adjustments have been made to userland utilities and the kernel to support EFI as a mainstream boot environment. The /boot filesystem may now be placed either in its own GPT slice, or in a DragonFly disklabel inside a GPT slice.&lt;/li&gt;
&lt;li&gt;DragonFly, by default, creates a GPT slice for all of DragonFly and places a DragonFly disklabel inside it with all the standard DFly partitions, such that the disk names are roughly the same as they would be in a legacy system.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Improved graphics support

&lt;ul&gt;
&lt;li&gt;The i915 driver has been updated to match the version found with the Linux 4.6 kernel. Broadwell and Skylake processor users will see improvements.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Other user-affecting changes

&lt;ul&gt;
&lt;li&gt;Kernel is now built using -O2.&lt;/li&gt;
&lt;li&gt;VKernels now use COW, so multiple vkernels can share one disk image.&lt;/li&gt;
&lt;li&gt;powerd() is now sensitive to time and temperature changes.&lt;/li&gt;
&lt;li&gt;Non-boot-filesystem kernel modules can be loaded in rc.conf instead of loader.conf.
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/openzfs/openzfs/pull/321" target="_blank" rel="nofollow noopener"&gt;#8005 poor performance of 1MB writes on certain RAID-Z configurations&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Matt Ahrens posts a new patch for OpenZFS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Background: RAID-Z requires that space be allocated in multiples of P+1 sectors,because this is the minimum size block that can have the required amount of parity. Thus blocks on RAIDZ1 must be allocated in a multiple of 2 sectors; on RAIDZ2 multiple of 3; and on RAIDZ3 multiple of 4. A sector is a unit of 2&lt;sup&gt;ashift&lt;/sup&gt; bytes, typically 512B or 4KB.&lt;br&gt;
&amp;gt; To satisfy this constraint, the allocation size is rounded up to the proper multiple, resulting in up to 3 "pad sectors" at the end of some blocks. The contents of these pad sectors are not used, so we do not need to read or write these sectors. However, some storage hardware performs much worse (around 1/2 as fast) on mostly-contiguous writes when there are small gaps of non-overwritten data between the writes. Therefore, ZFS creates "optional" zio's when writing RAID-Z blocks that include pad sectors. If writing a pad sector will fill the gap between two (required) writes, we will issue the optional zio, thus doubling performance. The gap-filling performance improvement was introduced in July 2009.&lt;br&gt;
&amp;gt; Writing the optional zio is done by the io aggregation code in vdev_queue.c. The problem is that it is also subject to the limit on the size of aggregate writes, zfs_vdev_aggregation_limit, which is by default 128KB. For a given block, if the amount of data plus padding written to a leaf device exceeds zfs_vdev_aggregation_limit, the optional zio will not be written, resulting in a ~2x performance degradation.&lt;br&gt;
&amp;gt; The solution is to aggregate optional zio's regardless of the aggregation size limit.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;As you can see from the graphs, this can make a large difference in performance.&lt;/li&gt;
&lt;li&gt;I encourage you to read the entire commit message, it is well written and very detailed.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://guidovranken.wordpress.com/2017/01/28/can-you-spot-the-vulnerability/" target="_blank" rel="nofollow noopener"&gt;Can you spot the OpenSSL vulnerability &lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; This code was introduced in OpenSSL 1.1.0d, which was released a couple of days ago. This is in the server SSL code, ssl/statem/statem_srvr.c, ssl_bytes_to_cipher_list()), and can easily be reached remotely. Can you spot the vulnerability?&lt;br&gt;
&amp;gt; So there is a loop, and within that loop we have an ‘if’ statement, that tests a number of conditions. If any of those conditions fail, OPENSSL_free(raw) is called. But raw isn’t the address that was allocated; raw is increment every loop. Hence, there is a remote invalid free vulnerability.&lt;br&gt;
&amp;gt; But not quite. None of those checks in the ‘if’ statement can actually fail; earlier on in the function, there is a check that verifies that the packet contains at least 1 byte, so PACKET_get_1 cannot fail. Furthermore, earlier in the function it is verified that the packet length is a multiple of 3, hence PACKET_copy_bytes and PACKET_forward cannot fail.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So, does the code do what the original author thought, or expected it to do?&lt;/li&gt;
&lt;li&gt;But what about the next person that modifies that code, maybe changing or removing one of the earlier checks, allowing one of those if conditions to fail, and execute the bad code?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Nonetheless OpenSSL has acknowledged that the OPENSSL_free line needs a rewrite: &lt;a href="https://github.com/openssl/openssl/pull/2312" target="_blank" rel="nofollow noopener"&gt;Pull Request #2312&lt;/a&gt;&lt;br&gt;
&amp;gt; PS I’m not posting this to ridicule the OpenSSL project or their programming skills. I just like reading code and finding corner cases that impact security, which is an effort that ultimately works in everybody’s best interest, and I like to share what I find. Programming is a very difficult enterprise and everybody makes mistakes.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Thanks to Guido Vranken for the sharp eye and the blog post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://distill.pub/2017/research-debt/" target="_blank" rel="nofollow noopener"&gt;Research Debt&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;I found this article interesting as it relates to not just research, but a lot of technical areas in general&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Achieving a research-level understanding of most topics is like climbing a mountain. Aspiring researchers must struggle to understand vast bodies of work that came before them, to learn techniques, and to gain intuition. Upon reaching the top, the new researcher begins doing novel work, throwing new stones onto the top of the mountain and making it a little taller for whoever comes next. &lt;br&gt;
&amp;gt; People expect the climb to be hard. It reflects the tremendous progress and cumulative effort that’s gone into the research. The climb is seen as an intellectual pilgrimage, the labor a rite of passage. But the climb could be massively easier. It’s entirely possible to build paths and staircases into these mountains. The climb isn’t something to be proud of. The climb isn’t progress: the climb is a mountain of debt.&lt;br&gt;
&amp;gt; Programmers talk about technical debt: there are ways to write software that are faster in the short run but problematic in the long run.&lt;/p&gt;

&lt;p&gt;&amp;gt; Poor Exposition – Often, there is no good explanation of important ideas and one has to struggle to understand them. This problem is so pervasive that we take it for granted and don’t appreciate how much better things could be.&lt;/p&gt;

&lt;p&gt;&amp;gt; Undigested Ideas – Most ideas start off rough and hard to understand. They become radically easier as we polish them, developing the right analogies, language, and ways of thinking.&lt;/p&gt;

&lt;p&gt;&amp;gt; Bad abstractions and notation – Abstractions and notation are the user interface of research, shaping how we think and communicate. Unfortunately, we often get stuck with the first formalisms to develop even when they’re bad. For example, an object with extra electrons is negative, and pi is wrong&lt;/p&gt;

&lt;p&gt;&amp;gt; Noise – Being a researcher is like standing in the middle of a construction site. Countless papers scream for your attention and there’s no easy way to filter or summarize them. We think noise is the main way experts experience research debt.&lt;/p&gt;

&lt;p&gt;&amp;gt; There’s a tradeoff between the energy put into explaining an idea, and the energy needed to understand it. On one extreme, the explainer can painstakingly craft a beautiful explanation, leading their audience to understanding without even realizing it could have been difficult. On the other extreme, the explainer can do the absolute minimum and abandon their audience to struggle. This energy is called interpretive labor&lt;br&gt;
&amp;gt; Research distillation is the opposite of research debt. It can be incredibly satisfying, combining deep scientific understanding, empathy, and design to do justice to our research and lay bare beautiful insights. Distillation is also hard. It’s tempting to think of explaining an idea as just putting a layer of polish on it, but good explanations often involve transforming the idea. This kind of refinement of an idea can take just as much effort and deep understanding as the initial discovery.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The distillation can often times require an entirely different set of skills than the original creation of the idea. Almost all of the BSD projects have some great ideas or subsystems that just need distillation into easy to understand and use platforms or tools.&lt;br&gt;
&amp;gt; Like the theoretician, the experimentalist or the research engineer, the research distiller is an integral role for a healthy research community. Right now, almost no one is filling it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Anyway, if that bit piqued your interest, go read the full article and the suggested further reading.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blather.michaelwlucas.com/archives/2902" target="_blank" rel="nofollow noopener"&gt;And then the murders began.&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; A whole bunch of people have pointed me at articles like &lt;a href="http://thehookmag.com/2017/03/adding-murders-began-second-sentence-book-makes-instantly-better-125462/" target="_blank" rel="nofollow noopener"&gt;this one&lt;/a&gt;, which claim that you can improve almost any book by making the second sentence “And then the murders began.”&lt;br&gt;
&amp;gt; It’s entirely possible they’re correct. But let’s check, with a sampling of books. As different books come in different tenses and have different voices, I’ve made some minor changes.&lt;/p&gt;

&lt;p&gt;&amp;gt;“Welcome to Cisco Routers for the Desperate! And then the murders begin.” — Cisco Routers for the Desperate, 2nd ed&lt;/p&gt;

&lt;p&gt;&amp;gt; “Over the last ten years, OpenSSH has become the standard tool for remote management of Unix-like systems and many network devices. And then the murders began.” — SSH Mastery&lt;/p&gt;

&lt;p&gt;&amp;gt; “The Z File System, or ZFS, is a complicated beast, but it is also the most powerful tool in a sysadmin’s Batman-esque utility belt. And then the murders begin.” — FreeBSD Mastery: Advanced ZFS&lt;/p&gt;

&lt;p&gt;&amp;gt; “Blood shall rain from the sky, and great shall be the lamentation of the Linux fans. And then, the murders will begin.” — Absolute FreeBSD, 3rd Ed&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://github.com/firehol/netdata" target="_blank" rel="nofollow noopener"&gt;Netdata now supports FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; netdata is a system for distributed real-time performance and health monitoring. It provides unparalleled insights, in real-time, of everything happening on the system it runs (including applications such as web and database servers), using modern interactive web dashboards.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;From the release notes: &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; apps.plugin ported for FreeBSD&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/firehol/netdata/wiki" target="_blank" rel="nofollow noopener"&gt;Check out their demo sites&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://distrowatch.com/weekly.php?issue=20170220#raspbsd" target="_blank" rel="nofollow noopener"&gt;Distrowatch Weekly reviews RaspBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; RaspBSD is a FreeBSD-based project which strives to create a custom build of FreeBSD for single board and hobbyist computers. RaspBSD takes a recent snapshot of FreeBSD and adds on additional components, such as the LXDE desktop and a few graphical applications. The RaspBSD project currently has live images for Raspberry Pi devices, the Banana Pi, Pine64 and BeagleBone Black &amp;amp; Green computers.&lt;/p&gt;

&lt;p&gt;&amp;gt; The default RaspBSD system is quite minimal, running a mere 16 processes when I was logged in. In the background the operating system runs cron, OpenSSH, syslog and the powerd power management service. Other than the user's shell and terminals, nothing else is running. This means RaspBSD uses little memory, requiring just 16MB of active memory and 31MB of wired or kernel memory.&lt;/p&gt;

&lt;p&gt;&amp;gt; I made note of a few practical differences between running RaspBSD on the Pi verses my usual Raspbian operating system. One minor difference is RaspBSD turns off the Pi's external power light after booting. Raspbian leaves the light on. This means it looks like the Pi is off when it is running RaspBSD, but it also saves a little electricity.&lt;/p&gt;

&lt;p&gt;&amp;gt; Conclusions: Apart from these little differences, running RaspBSD on the Pi was a very similar experience to running Raspbian and my time with the operating system was pleasantly trouble-free. Long-term, I think applying source updates to the base system might be tedious and SD disk operations were slow. However, the Pi usually is not utilized for its speed, but rather its low cost and low-energy usage. For people who are looking for a small home server or very minimal desktop box, RaspBSD running on the Pi should be suitable. &lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://media-bell-labs-com.s3.amazonaws.com/pages/20170327_1602/statement%20regarding%20Unix%203-7-17.pdf" target="_blank" rel="nofollow noopener"&gt;Research UNIX V8, V9 and V10 made public by Alcatel-Lucent&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Alcatel-Lucent USA Inc. (“ALU-USA”), on behalf of itself and Nokia Bell Laboratories agrees, to the extent of its ability to do so, that it will not assert its copyright rights with respect to any non-commercial copying, distribution, performance, display or creation of derivative works of Research Unix®1 Editions 8, 9, and 10.&lt;/li&gt;
&lt;li&gt;Research Unix is a term used to refer to versions of the Unix operating system for DEC PDP-7, PDP-11, VAX and Interdata 7/32 and 8/32 computers, developed in the Bell Labs Computing Science Research Center.  The version breakdown can be viewed on its &lt;a href="https://en.wikipedia.org/wiki/Research_Unix" target="_blank" rel="nofollow noopener"&gt;Wikipedia page&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;It only took 30+ years, but now they’re public&lt;/li&gt;
&lt;li&gt;You can grab them from &lt;a href="http://www.tuhs.org/Archive/Distributions/Research/" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;If you’re wondering what happened with Research Unix, After Version 10, Unix development at Bell Labs was stopped in favor of a successor system, &lt;a href="http://plan9.bell-labs.com/plan9/" target="_blank" rel="nofollow noopener"&gt;Plan 9&lt;/a&gt;; which itself was succeeded by &lt;a href="http://www.vitanuova.com/inferno/" target="_blank" rel="nofollow noopener"&gt;Inferno&lt;/a&gt;.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/freebsd/freebsd/blob/master/share/misc/bsd-family-tree" target="_blank" rel="nofollow noopener"&gt;The BSD Family Tree&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://permissions-calculator.org/" target="_blank" rel="nofollow noopener"&gt;Unix Permissions Calculator&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://sourceforge.net/projects/nas4free/files/NAS4Free-11.0.0.4/11.0.0.4.4141/" target="_blank" rel="nofollow noopener"&gt;NAS4Free release 11.0.0.4 now available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsdmag.org/download/simple-quorum-drive-freebsd-ctl-ha-beast-storage-system/" target="_blank" rel="nofollow noopener"&gt;Another BSD Mag released for free downloads&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://forum.opnsense.org/index.php?topic=4898.msg19359" target="_blank" rel="nofollow noopener"&gt;OPNsense 17.1.4 released&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/gozes/status/846779901738991620" target="_blank" rel="nofollow noopener"&gt;gozes asks via twitter about how get involved in FreeBSD&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today on BSD Now, the latest Dragonfly BSD release, RaidZ performance, another OpenSSL Vulnerability, and more; all this week on BSD Now.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.dragonflybsd.org/release48/" rel="nofollow">DragonFly BSD 4.8 is released</a></h3>

<ul>
<li>Improved kernel performance

<ul>
<li>This release further localizes cache lines and reduces/removes cache ping-ponging on globals. For bulk builds on many-cores or multi-socket systems, we have around a 5% improvement, and certain subsystems such as namecache lookups and exec()s see massive focused improvements. See the corresponding mailing list post with details.</li>
</ul></li>
<li>Support for eMMC booting, and mobile and high-performance PCIe SSDs

<ul>
<li>This kernel release includes support for eMMC storage as the boot device. We also sport a brand new SMP-friendly, high-performance NVMe SSD driver (PCIe SSD storage). Initial device test results are available.</li>
</ul></li>
<li>EFI support

<ul>
<li>The installer can now create an EFI or legacy installation. Numerous adjustments have been made to userland utilities and the kernel to support EFI as a mainstream boot environment. The /boot filesystem may now be placed either in its own GPT slice, or in a DragonFly disklabel inside a GPT slice.</li>
<li>DragonFly, by default, creates a GPT slice for all of DragonFly and places a DragonFly disklabel inside it with all the standard DFly partitions, such that the disk names are roughly the same as they would be in a legacy system.</li>
</ul></li>
<li>Improved graphics support

<ul>
<li>The i915 driver has been updated to match the version found with the Linux 4.6 kernel. Broadwell and Skylake processor users will see improvements.</li>
</ul></li>
<li>Other user-affecting changes

<ul>
<li>Kernel is now built using -O2.</li>
<li>VKernels now use COW, so multiple vkernels can share one disk image.</li>
<li>powerd() is now sensitive to time and temperature changes.</li>
<li>Non-boot-filesystem kernel modules can be loaded in rc.conf instead of loader.conf.
***</li>
</ul></li>
</ul>

<h3><a href="https://github.com/openzfs/openzfs/pull/321" rel="nofollow">#8005 poor performance of 1MB writes on certain RAID-Z configurations</a></h3>

<ul>
<li>Matt Ahrens posts a new patch for OpenZFS</li>
</ul>

<blockquote>
<p>Background: RAID-Z requires that space be allocated in multiples of P+1 sectors,because this is the minimum size block that can have the required amount of parity. Thus blocks on RAIDZ1 must be allocated in a multiple of 2 sectors; on RAIDZ2 multiple of 3; and on RAIDZ3 multiple of 4. A sector is a unit of 2<sup>ashift</sup> bytes, typically 512B or 4KB.<br>
To satisfy this constraint, the allocation size is rounded up to the proper multiple, resulting in up to 3 &quot;pad sectors&quot; at the end of some blocks. The contents of these pad sectors are not used, so we do not need to read or write these sectors. However, some storage hardware performs much worse (around 1/2 as fast) on mostly-contiguous writes when there are small gaps of non-overwritten data between the writes. Therefore, ZFS creates &quot;optional&quot; zio&#39;s when writing RAID-Z blocks that include pad sectors. If writing a pad sector will fill the gap between two (required) writes, we will issue the optional zio, thus doubling performance. The gap-filling performance improvement was introduced in July 2009.<br>
Writing the optional zio is done by the io aggregation code in vdev_queue.c. The problem is that it is also subject to the limit on the size of aggregate writes, zfs_vdev_aggregation_limit, which is by default 128KB. For a given block, if the amount of data plus padding written to a leaf device exceeds zfs_vdev_aggregation_limit, the optional zio will not be written, resulting in a ~2x performance degradation.<br>
The solution is to aggregate optional zio&#39;s regardless of the aggregation size limit.</p>
</blockquote>

<ul>
<li>As you can see from the graphs, this can make a large difference in performance.</li>
<li>I encourage you to read the entire commit message, it is well written and very detailed.
***</li>
</ul>

<h3><a href="https://guidovranken.wordpress.com/2017/01/28/can-you-spot-the-vulnerability/" rel="nofollow">Can you spot the OpenSSL vulnerability </a></h3>

<blockquote>
<p>This code was introduced in OpenSSL 1.1.0d, which was released a couple of days ago. This is in the server SSL code, ssl/statem/statem_srvr.c, ssl_bytes_to_cipher_list()), and can easily be reached remotely. Can you spot the vulnerability?<br>
So there is a loop, and within that loop we have an ‘if’ statement, that tests a number of conditions. If any of those conditions fail, OPENSSL_free(raw) is called. But raw isn’t the address that was allocated; raw is increment every loop. Hence, there is a remote invalid free vulnerability.<br>
But not quite. None of those checks in the ‘if’ statement can actually fail; earlier on in the function, there is a check that verifies that the packet contains at least 1 byte, so PACKET_get_1 cannot fail. Furthermore, earlier in the function it is verified that the packet length is a multiple of 3, hence PACKET_copy_bytes and PACKET_forward cannot fail.</p>
</blockquote>

<ul>
<li>So, does the code do what the original author thought, or expected it to do?</li>
<li>But what about the next person that modifies that code, maybe changing or removing one of the earlier checks, allowing one of those if conditions to fail, and execute the bad code?</li>
</ul>

<blockquote>
<p>Nonetheless OpenSSL has acknowledged that the OPENSSL_free line needs a rewrite: <a href="https://github.com/openssl/openssl/pull/2312" rel="nofollow">Pull Request #2312</a><br>
PS I’m not posting this to ridicule the OpenSSL project or their programming skills. I just like reading code and finding corner cases that impact security, which is an effort that ultimately works in everybody’s best interest, and I like to share what I find. Programming is a very difficult enterprise and everybody makes mistakes.</p>
</blockquote>

<ul>
<li>Thanks to Guido Vranken for the sharp eye and the blog post
***</li>
</ul>

<h3><a href="http://distill.pub/2017/research-debt/" rel="nofollow">Research Debt</a></h3>

<ul>
<li>I found this article interesting as it relates to not just research, but a lot of technical areas in general</li>
</ul>

<blockquote>
<p>Achieving a research-level understanding of most topics is like climbing a mountain. Aspiring researchers must struggle to understand vast bodies of work that came before them, to learn techniques, and to gain intuition. Upon reaching the top, the new researcher begins doing novel work, throwing new stones onto the top of the mountain and making it a little taller for whoever comes next. <br>
People expect the climb to be hard. It reflects the tremendous progress and cumulative effort that’s gone into the research. The climb is seen as an intellectual pilgrimage, the labor a rite of passage. But the climb could be massively easier. It’s entirely possible to build paths and staircases into these mountains. The climb isn’t something to be proud of. The climb isn’t progress: the climb is a mountain of debt.<br>
Programmers talk about technical debt: there are ways to write software that are faster in the short run but problematic in the long run.</p>

<p>Poor Exposition – Often, there is no good explanation of important ideas and one has to struggle to understand them. This problem is so pervasive that we take it for granted and don’t appreciate how much better things could be.</p>

<p>Undigested Ideas – Most ideas start off rough and hard to understand. They become radically easier as we polish them, developing the right analogies, language, and ways of thinking.</p>

<p>Bad abstractions and notation – Abstractions and notation are the user interface of research, shaping how we think and communicate. Unfortunately, we often get stuck with the first formalisms to develop even when they’re bad. For example, an object with extra electrons is negative, and pi is wrong</p>

<p>Noise – Being a researcher is like standing in the middle of a construction site. Countless papers scream for your attention and there’s no easy way to filter or summarize them. We think noise is the main way experts experience research debt.</p>

<p>There’s a tradeoff between the energy put into explaining an idea, and the energy needed to understand it. On one extreme, the explainer can painstakingly craft a beautiful explanation, leading their audience to understanding without even realizing it could have been difficult. On the other extreme, the explainer can do the absolute minimum and abandon their audience to struggle. This energy is called interpretive labor<br>
Research distillation is the opposite of research debt. It can be incredibly satisfying, combining deep scientific understanding, empathy, and design to do justice to our research and lay bare beautiful insights. Distillation is also hard. It’s tempting to think of explaining an idea as just putting a layer of polish on it, but good explanations often involve transforming the idea. This kind of refinement of an idea can take just as much effort and deep understanding as the initial discovery.</p>

<ul>
<li>The distillation can often times require an entirely different set of skills than the original creation of the idea. Almost all of the BSD projects have some great ideas or subsystems that just need distillation into easy to understand and use platforms or tools.
Like the theoretician, the experimentalist or the research engineer, the research distiller is an integral role for a healthy research community. Right now, almost no one is filling it.</li>
</ul>
</blockquote>

<ul>
<li>Anyway, if that bit piqued your interest, go read the full article and the suggested further reading.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://blather.michaelwlucas.com/archives/2902" rel="nofollow">And then the murders began.</a></h3>

<blockquote>
<p>A whole bunch of people have pointed me at articles like <a href="http://thehookmag.com/2017/03/adding-murders-began-second-sentence-book-makes-instantly-better-125462/" rel="nofollow">this one</a>, which claim that you can improve almost any book by making the second sentence “And then the murders began.”<br>
It’s entirely possible they’re correct. But let’s check, with a sampling of books. As different books come in different tenses and have different voices, I’ve made some minor changes.</p>

<p>“Welcome to Cisco Routers for the Desperate! And then the murders begin.” — Cisco Routers for the Desperate, 2nd ed</p>

<p>“Over the last ten years, OpenSSH has become the standard tool for remote management of Unix-like systems and many network devices. And then the murders began.” — SSH Mastery</p>

<p>“The Z File System, or ZFS, is a complicated beast, but it is also the most powerful tool in a sysadmin’s Batman-esque utility belt. And then the murders begin.” — FreeBSD Mastery: Advanced ZFS</p>

<p>“Blood shall rain from the sky, and great shall be the lamentation of the Linux fans. And then, the murders will begin.” — Absolute FreeBSD, 3rd Ed</p>
</blockquote>

<hr>

<h3><a href="https://github.com/firehol/netdata" rel="nofollow">Netdata now supports FreeBSD</a></h3>

<blockquote>
<p>netdata is a system for distributed real-time performance and health monitoring. It provides unparalleled insights, in real-time, of everything happening on the system it runs (including applications such as web and database servers), using modern interactive web dashboards.</p>
</blockquote>

<ul>
<li>From the release notes: </li>
</ul>

<blockquote>
<p>apps.plugin ported for FreeBSD</p>
</blockquote>

<ul>
<li><a href="https://github.com/firehol/netdata/wiki" rel="nofollow">Check out their demo sites</a>
***</li>
</ul>

<h3><a href="https://distrowatch.com/weekly.php?issue=20170220#raspbsd" rel="nofollow">Distrowatch Weekly reviews RaspBSD</a></h3>

<blockquote>
<p>RaspBSD is a FreeBSD-based project which strives to create a custom build of FreeBSD for single board and hobbyist computers. RaspBSD takes a recent snapshot of FreeBSD and adds on additional components, such as the LXDE desktop and a few graphical applications. The RaspBSD project currently has live images for Raspberry Pi devices, the Banana Pi, Pine64 and BeagleBone Black &amp; Green computers.</p>

<p>The default RaspBSD system is quite minimal, running a mere 16 processes when I was logged in. In the background the operating system runs cron, OpenSSH, syslog and the powerd power management service. Other than the user&#39;s shell and terminals, nothing else is running. This means RaspBSD uses little memory, requiring just 16MB of active memory and 31MB of wired or kernel memory.</p>

<p>I made note of a few practical differences between running RaspBSD on the Pi verses my usual Raspbian operating system. One minor difference is RaspBSD turns off the Pi&#39;s external power light after booting. Raspbian leaves the light on. This means it looks like the Pi is off when it is running RaspBSD, but it also saves a little electricity.</p>

<p>Conclusions: Apart from these little differences, running RaspBSD on the Pi was a very similar experience to running Raspbian and my time with the operating system was pleasantly trouble-free. Long-term, I think applying source updates to the base system might be tedious and SD disk operations were slow. However, the Pi usually is not utilized for its speed, but rather its low cost and low-energy usage. For people who are looking for a small home server or very minimal desktop box, RaspBSD running on the Pi should be suitable. </p>

<hr>
</blockquote>

<h3><a href="https://media-bell-labs-com.s3.amazonaws.com/pages/20170327_1602/statement%20regarding%20Unix%203-7-17.pdf" rel="nofollow">Research UNIX V8, V9 and V10 made public by Alcatel-Lucent</a></h3>

<ul>
<li>Alcatel-Lucent USA Inc. (“ALU-USA”), on behalf of itself and Nokia Bell Laboratories agrees, to the extent of its ability to do so, that it will not assert its copyright rights with respect to any non-commercial copying, distribution, performance, display or creation of derivative works of Research Unix®1 Editions 8, 9, and 10.</li>
<li>Research Unix is a term used to refer to versions of the Unix operating system for DEC PDP-7, PDP-11, VAX and Interdata 7/32 and 8/32 computers, developed in the Bell Labs Computing Science Research Center.  The version breakdown can be viewed on its <a href="https://en.wikipedia.org/wiki/Research_Unix" rel="nofollow">Wikipedia page</a></li>
<li>It only took 30+ years, but now they’re public</li>
<li>You can grab them from <a href="http://www.tuhs.org/Archive/Distributions/Research/" rel="nofollow">here</a></li>
<li>If you’re wondering what happened with Research Unix, After Version 10, Unix development at Bell Labs was stopped in favor of a successor system, <a href="http://plan9.bell-labs.com/plan9/" rel="nofollow">Plan 9</a>; which itself was succeeded by <a href="http://www.vitanuova.com/inferno/" rel="nofollow">Inferno</a>.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://github.com/freebsd/freebsd/blob/master/share/misc/bsd-family-tree" rel="nofollow">The BSD Family Tree</a></li>
<li><a href="http://permissions-calculator.org/" rel="nofollow">Unix Permissions Calculator</a></li>
<li><a href="https://sourceforge.net/projects/nas4free/files/NAS4Free-11.0.0.4/11.0.0.4.4141/" rel="nofollow">NAS4Free release 11.0.0.4 now available</a></li>
<li><a href="https://bsdmag.org/download/simple-quorum-drive-freebsd-ctl-ha-beast-storage-system/" rel="nofollow">Another BSD Mag released for free downloads</a></li>
<li><a href="https://forum.opnsense.org/index.php?topic=4898.msg19359" rel="nofollow">OPNsense 17.1.4 released</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://twitter.com/gozes/status/846779901738991620" rel="nofollow">gozes asks via twitter about how get involved in FreeBSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today on BSD Now, the latest Dragonfly BSD release, RaidZ performance, another OpenSSL Vulnerability, and more; all this week on BSD Now.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.dragonflybsd.org/release48/" rel="nofollow">DragonFly BSD 4.8 is released</a></h3>

<ul>
<li>Improved kernel performance

<ul>
<li>This release further localizes cache lines and reduces/removes cache ping-ponging on globals. For bulk builds on many-cores or multi-socket systems, we have around a 5% improvement, and certain subsystems such as namecache lookups and exec()s see massive focused improvements. See the corresponding mailing list post with details.</li>
</ul></li>
<li>Support for eMMC booting, and mobile and high-performance PCIe SSDs

<ul>
<li>This kernel release includes support for eMMC storage as the boot device. We also sport a brand new SMP-friendly, high-performance NVMe SSD driver (PCIe SSD storage). Initial device test results are available.</li>
</ul></li>
<li>EFI support

<ul>
<li>The installer can now create an EFI or legacy installation. Numerous adjustments have been made to userland utilities and the kernel to support EFI as a mainstream boot environment. The /boot filesystem may now be placed either in its own GPT slice, or in a DragonFly disklabel inside a GPT slice.</li>
<li>DragonFly, by default, creates a GPT slice for all of DragonFly and places a DragonFly disklabel inside it with all the standard DFly partitions, such that the disk names are roughly the same as they would be in a legacy system.</li>
</ul></li>
<li>Improved graphics support

<ul>
<li>The i915 driver has been updated to match the version found with the Linux 4.6 kernel. Broadwell and Skylake processor users will see improvements.</li>
</ul></li>
<li>Other user-affecting changes

<ul>
<li>Kernel is now built using -O2.</li>
<li>VKernels now use COW, so multiple vkernels can share one disk image.</li>
<li>powerd() is now sensitive to time and temperature changes.</li>
<li>Non-boot-filesystem kernel modules can be loaded in rc.conf instead of loader.conf.
***</li>
</ul></li>
</ul>

<h3><a href="https://github.com/openzfs/openzfs/pull/321" rel="nofollow">#8005 poor performance of 1MB writes on certain RAID-Z configurations</a></h3>

<ul>
<li>Matt Ahrens posts a new patch for OpenZFS</li>
</ul>

<blockquote>
<p>Background: RAID-Z requires that space be allocated in multiples of P+1 sectors,because this is the minimum size block that can have the required amount of parity. Thus blocks on RAIDZ1 must be allocated in a multiple of 2 sectors; on RAIDZ2 multiple of 3; and on RAIDZ3 multiple of 4. A sector is a unit of 2<sup>ashift</sup> bytes, typically 512B or 4KB.<br>
To satisfy this constraint, the allocation size is rounded up to the proper multiple, resulting in up to 3 &quot;pad sectors&quot; at the end of some blocks. The contents of these pad sectors are not used, so we do not need to read or write these sectors. However, some storage hardware performs much worse (around 1/2 as fast) on mostly-contiguous writes when there are small gaps of non-overwritten data between the writes. Therefore, ZFS creates &quot;optional&quot; zio&#39;s when writing RAID-Z blocks that include pad sectors. If writing a pad sector will fill the gap between two (required) writes, we will issue the optional zio, thus doubling performance. The gap-filling performance improvement was introduced in July 2009.<br>
Writing the optional zio is done by the io aggregation code in vdev_queue.c. The problem is that it is also subject to the limit on the size of aggregate writes, zfs_vdev_aggregation_limit, which is by default 128KB. For a given block, if the amount of data plus padding written to a leaf device exceeds zfs_vdev_aggregation_limit, the optional zio will not be written, resulting in a ~2x performance degradation.<br>
The solution is to aggregate optional zio&#39;s regardless of the aggregation size limit.</p>
</blockquote>

<ul>
<li>As you can see from the graphs, this can make a large difference in performance.</li>
<li>I encourage you to read the entire commit message, it is well written and very detailed.
***</li>
</ul>

<h3><a href="https://guidovranken.wordpress.com/2017/01/28/can-you-spot-the-vulnerability/" rel="nofollow">Can you spot the OpenSSL vulnerability </a></h3>

<blockquote>
<p>This code was introduced in OpenSSL 1.1.0d, which was released a couple of days ago. This is in the server SSL code, ssl/statem/statem_srvr.c, ssl_bytes_to_cipher_list()), and can easily be reached remotely. Can you spot the vulnerability?<br>
So there is a loop, and within that loop we have an ‘if’ statement, that tests a number of conditions. If any of those conditions fail, OPENSSL_free(raw) is called. But raw isn’t the address that was allocated; raw is increment every loop. Hence, there is a remote invalid free vulnerability.<br>
But not quite. None of those checks in the ‘if’ statement can actually fail; earlier on in the function, there is a check that verifies that the packet contains at least 1 byte, so PACKET_get_1 cannot fail. Furthermore, earlier in the function it is verified that the packet length is a multiple of 3, hence PACKET_copy_bytes and PACKET_forward cannot fail.</p>
</blockquote>

<ul>
<li>So, does the code do what the original author thought, or expected it to do?</li>
<li>But what about the next person that modifies that code, maybe changing or removing one of the earlier checks, allowing one of those if conditions to fail, and execute the bad code?</li>
</ul>

<blockquote>
<p>Nonetheless OpenSSL has acknowledged that the OPENSSL_free line needs a rewrite: <a href="https://github.com/openssl/openssl/pull/2312" rel="nofollow">Pull Request #2312</a><br>
PS I’m not posting this to ridicule the OpenSSL project or their programming skills. I just like reading code and finding corner cases that impact security, which is an effort that ultimately works in everybody’s best interest, and I like to share what I find. Programming is a very difficult enterprise and everybody makes mistakes.</p>
</blockquote>

<ul>
<li>Thanks to Guido Vranken for the sharp eye and the blog post
***</li>
</ul>

<h3><a href="http://distill.pub/2017/research-debt/" rel="nofollow">Research Debt</a></h3>

<ul>
<li>I found this article interesting as it relates to not just research, but a lot of technical areas in general</li>
</ul>

<blockquote>
<p>Achieving a research-level understanding of most topics is like climbing a mountain. Aspiring researchers must struggle to understand vast bodies of work that came before them, to learn techniques, and to gain intuition. Upon reaching the top, the new researcher begins doing novel work, throwing new stones onto the top of the mountain and making it a little taller for whoever comes next. <br>
People expect the climb to be hard. It reflects the tremendous progress and cumulative effort that’s gone into the research. The climb is seen as an intellectual pilgrimage, the labor a rite of passage. But the climb could be massively easier. It’s entirely possible to build paths and staircases into these mountains. The climb isn’t something to be proud of. The climb isn’t progress: the climb is a mountain of debt.<br>
Programmers talk about technical debt: there are ways to write software that are faster in the short run but problematic in the long run.</p>

<p>Poor Exposition – Often, there is no good explanation of important ideas and one has to struggle to understand them. This problem is so pervasive that we take it for granted and don’t appreciate how much better things could be.</p>

<p>Undigested Ideas – Most ideas start off rough and hard to understand. They become radically easier as we polish them, developing the right analogies, language, and ways of thinking.</p>

<p>Bad abstractions and notation – Abstractions and notation are the user interface of research, shaping how we think and communicate. Unfortunately, we often get stuck with the first formalisms to develop even when they’re bad. For example, an object with extra electrons is negative, and pi is wrong</p>

<p>Noise – Being a researcher is like standing in the middle of a construction site. Countless papers scream for your attention and there’s no easy way to filter or summarize them. We think noise is the main way experts experience research debt.</p>

<p>There’s a tradeoff between the energy put into explaining an idea, and the energy needed to understand it. On one extreme, the explainer can painstakingly craft a beautiful explanation, leading their audience to understanding without even realizing it could have been difficult. On the other extreme, the explainer can do the absolute minimum and abandon their audience to struggle. This energy is called interpretive labor<br>
Research distillation is the opposite of research debt. It can be incredibly satisfying, combining deep scientific understanding, empathy, and design to do justice to our research and lay bare beautiful insights. Distillation is also hard. It’s tempting to think of explaining an idea as just putting a layer of polish on it, but good explanations often involve transforming the idea. This kind of refinement of an idea can take just as much effort and deep understanding as the initial discovery.</p>

<ul>
<li>The distillation can often times require an entirely different set of skills than the original creation of the idea. Almost all of the BSD projects have some great ideas or subsystems that just need distillation into easy to understand and use platforms or tools.
Like the theoretician, the experimentalist or the research engineer, the research distiller is an integral role for a healthy research community. Right now, almost no one is filling it.</li>
</ul>
</blockquote>

<ul>
<li>Anyway, if that bit piqued your interest, go read the full article and the suggested further reading.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://blather.michaelwlucas.com/archives/2902" rel="nofollow">And then the murders began.</a></h3>

<blockquote>
<p>A whole bunch of people have pointed me at articles like <a href="http://thehookmag.com/2017/03/adding-murders-began-second-sentence-book-makes-instantly-better-125462/" rel="nofollow">this one</a>, which claim that you can improve almost any book by making the second sentence “And then the murders began.”<br>
It’s entirely possible they’re correct. But let’s check, with a sampling of books. As different books come in different tenses and have different voices, I’ve made some minor changes.</p>

<p>“Welcome to Cisco Routers for the Desperate! And then the murders begin.” — Cisco Routers for the Desperate, 2nd ed</p>

<p>“Over the last ten years, OpenSSH has become the standard tool for remote management of Unix-like systems and many network devices. And then the murders began.” — SSH Mastery</p>

<p>“The Z File System, or ZFS, is a complicated beast, but it is also the most powerful tool in a sysadmin’s Batman-esque utility belt. And then the murders begin.” — FreeBSD Mastery: Advanced ZFS</p>

<p>“Blood shall rain from the sky, and great shall be the lamentation of the Linux fans. And then, the murders will begin.” — Absolute FreeBSD, 3rd Ed</p>
</blockquote>

<hr>

<h3><a href="https://github.com/firehol/netdata" rel="nofollow">Netdata now supports FreeBSD</a></h3>

<blockquote>
<p>netdata is a system for distributed real-time performance and health monitoring. It provides unparalleled insights, in real-time, of everything happening on the system it runs (including applications such as web and database servers), using modern interactive web dashboards.</p>
</blockquote>

<ul>
<li>From the release notes: </li>
</ul>

<blockquote>
<p>apps.plugin ported for FreeBSD</p>
</blockquote>

<ul>
<li><a href="https://github.com/firehol/netdata/wiki" rel="nofollow">Check out their demo sites</a>
***</li>
</ul>

<h3><a href="https://distrowatch.com/weekly.php?issue=20170220#raspbsd" rel="nofollow">Distrowatch Weekly reviews RaspBSD</a></h3>

<blockquote>
<p>RaspBSD is a FreeBSD-based project which strives to create a custom build of FreeBSD for single board and hobbyist computers. RaspBSD takes a recent snapshot of FreeBSD and adds on additional components, such as the LXDE desktop and a few graphical applications. The RaspBSD project currently has live images for Raspberry Pi devices, the Banana Pi, Pine64 and BeagleBone Black &amp; Green computers.</p>

<p>The default RaspBSD system is quite minimal, running a mere 16 processes when I was logged in. In the background the operating system runs cron, OpenSSH, syslog and the powerd power management service. Other than the user&#39;s shell and terminals, nothing else is running. This means RaspBSD uses little memory, requiring just 16MB of active memory and 31MB of wired or kernel memory.</p>

<p>I made note of a few practical differences between running RaspBSD on the Pi verses my usual Raspbian operating system. One minor difference is RaspBSD turns off the Pi&#39;s external power light after booting. Raspbian leaves the light on. This means it looks like the Pi is off when it is running RaspBSD, but it also saves a little electricity.</p>

<p>Conclusions: Apart from these little differences, running RaspBSD on the Pi was a very similar experience to running Raspbian and my time with the operating system was pleasantly trouble-free. Long-term, I think applying source updates to the base system might be tedious and SD disk operations were slow. However, the Pi usually is not utilized for its speed, but rather its low cost and low-energy usage. For people who are looking for a small home server or very minimal desktop box, RaspBSD running on the Pi should be suitable. </p>

<hr>
</blockquote>

<h3><a href="https://media-bell-labs-com.s3.amazonaws.com/pages/20170327_1602/statement%20regarding%20Unix%203-7-17.pdf" rel="nofollow">Research UNIX V8, V9 and V10 made public by Alcatel-Lucent</a></h3>

<ul>
<li>Alcatel-Lucent USA Inc. (“ALU-USA”), on behalf of itself and Nokia Bell Laboratories agrees, to the extent of its ability to do so, that it will not assert its copyright rights with respect to any non-commercial copying, distribution, performance, display or creation of derivative works of Research Unix®1 Editions 8, 9, and 10.</li>
<li>Research Unix is a term used to refer to versions of the Unix operating system for DEC PDP-7, PDP-11, VAX and Interdata 7/32 and 8/32 computers, developed in the Bell Labs Computing Science Research Center.  The version breakdown can be viewed on its <a href="https://en.wikipedia.org/wiki/Research_Unix" rel="nofollow">Wikipedia page</a></li>
<li>It only took 30+ years, but now they’re public</li>
<li>You can grab them from <a href="http://www.tuhs.org/Archive/Distributions/Research/" rel="nofollow">here</a></li>
<li>If you’re wondering what happened with Research Unix, After Version 10, Unix development at Bell Labs was stopped in favor of a successor system, <a href="http://plan9.bell-labs.com/plan9/" rel="nofollow">Plan 9</a>; which itself was succeeded by <a href="http://www.vitanuova.com/inferno/" rel="nofollow">Inferno</a>.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://github.com/freebsd/freebsd/blob/master/share/misc/bsd-family-tree" rel="nofollow">The BSD Family Tree</a></li>
<li><a href="http://permissions-calculator.org/" rel="nofollow">Unix Permissions Calculator</a></li>
<li><a href="https://sourceforge.net/projects/nas4free/files/NAS4Free-11.0.0.4/11.0.0.4.4141/" rel="nofollow">NAS4Free release 11.0.0.4 now available</a></li>
<li><a href="https://bsdmag.org/download/simple-quorum-drive-freebsd-ctl-ha-beast-storage-system/" rel="nofollow">Another BSD Mag released for free downloads</a></li>
<li><a href="https://forum.opnsense.org/index.php?topic=4898.msg19359" rel="nofollow">OPNsense 17.1.4 released</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://twitter.com/gozes/status/846779901738991620" rel="nofollow">gozes asks via twitter about how get involved in FreeBSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>187: Catching up to BSD</title>
  <link>https://www.bsdnow.tv/187</link>
  <guid isPermaLink="false">b7d43c1e-0c39-4060-af6a-29ab64c4945c</guid>
  <pubDate>Wed, 29 Mar 2017 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b7d43c1e-0c39-4060-af6a-29ab64c4945c.mp3" length="54147316" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Catching up to BSD, news about the NetBSD project, a BSD Phone, and a bunch of OpenBSD and TrueOS News.</itunes:subtitle>
  <itunes:duration>1:15:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Catching up to BSD, news about the NetBSD project, a BSD Phone, and a bunch of OpenBSD and TrueOS News.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.netbsd.org/releases/formal-7/NetBSD-7.1.html" target="_blank" rel="nofollow noopener"&gt;NetBSD 7.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This update represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Kernel&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://netbsd.gw.com/cgi-bin/man-cgi?compat_linux+8.i386+NetBSD-7.1" target="_blank" rel="nofollow noopener"&gt;compat_linux(8)&lt;/a&gt;: Fully support sched_setaffinity and sched_getaffinity, fixing, e.g., the Intel Math Kernel Library.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;DTrace:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Avoid redefined symbol errors when loading the module.&lt;/li&gt;
&lt;li&gt;Fix module autoload.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;IPFilter:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fix matching of ICMP queries when NAT'd through IPF.&lt;/li&gt;
&lt;li&gt;Fix lookup of original destination address when using a redirect rule. This is required for transparent proxying by squid, for example.&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://netbsd.gw.com/cgi-bin/man-cgi?ipsec+4.i386+NetBSD-7.1" target="_blank" rel="nofollow noopener"&gt;ipsec(4)&lt;/a&gt;: Fix NAT-T issue with NetBSD being the host behind NAT.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Drivers&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Add vioscsi driver for the Google Compute Engine disk.&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://netbsd.gw.com/cgi-bin/man-cgi?ichsmb+4.i386+NetBSD-7.1" target="_blank" rel="nofollow noopener"&gt;ichsmb(4)&lt;/a&gt;: Add support for Braswell CPU and Intel 100 Series.&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://netbsd.gw.com/cgi-bin/man-cgi?wm+4.i386+NetBSD-7.1" target="_blank" rel="nofollow noopener"&gt;wm(4)&lt;/a&gt;:&lt;/li&gt;
&lt;li&gt;Add C2000 KX and 2.5G support.&lt;/li&gt;
&lt;li&gt;Add Wake On Lan support.&lt;/li&gt;
&lt;li&gt;Fixed a lot of bugs&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Security Fixes&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-001.txt.asc" target="_blank" rel="nofollow noopener"&gt;NetBSD-SA2017-001&lt;/a&gt; Memory leak in the connect system call.&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-002.txt.asc" target="_blank" rel="nofollow noopener"&gt;NetBSD-SA2017-002&lt;/a&gt; Several vulnerabilities in ARP.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;ARM related&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Support for Raspberry Pi Zero.&lt;/li&gt;
&lt;li&gt;ODROID-C1 Ethernet now works.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/summary_of_the_preliminary_lldb" target="_blank" rel="nofollow noopener"&gt;Summary of the preliminary LLDB support project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;What has been done in NetBSD&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Verified the full matrix of combinations of wait(2) and ptrace(2) in the following&lt;/li&gt;
&lt;li&gt;GNU libstdc++ std::call_once bug investigation test-cases&lt;/li&gt;
&lt;li&gt;Improving documentation and other minor system parts&lt;/li&gt;
&lt;li&gt;Documentation of ptrace(2) and explanation how debuggers work&lt;/li&gt;
&lt;li&gt;Introduction of new siginfo(2) codes for SIGTRAP&lt;/li&gt;
&lt;li&gt;New ptrace(2) interfaces&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;What has been done in LLDB&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Native Process NetBSD Plugin&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The MonitorCallback function&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Other LLDB code, out of the NativeProcessNetBSD Plugin&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Automated LLDB Test Results Summary&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Plan for the next milestone&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;fix conflict with system-wide py-six&lt;/li&gt;
&lt;li&gt;add support for auxv read operation&lt;/li&gt;
&lt;li&gt;switch resolution of pid -&amp;gt; path to executable from /proc to sysctl(7)&lt;/li&gt;
&lt;li&gt;recognize Real-Time Signals (SIGRTMIN-SIGRTMAX)&lt;/li&gt;
&lt;li&gt;upstream !NetBSDProcessPlugin code&lt;/li&gt;
&lt;li&gt;switch std::call_once to llvm::call_once&lt;/li&gt;
&lt;li&gt;add new ptrace(2) interface to lock and unlock threads from execution&lt;/li&gt;
&lt;li&gt;switch the current PT_WATCHPOINT interface to PT_GETDBREGS and PT_SETDBREGS&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://hackaday.io/project/13145-bsd-based-secure-smartphone" target="_blank" rel="nofollow noopener"&gt;Actually building a FreeBSD Phone &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There have been a number of different projects that have proposed building a FreeBSD based smart phone&lt;/li&gt;
&lt;li&gt;This project is a bit different, and I think that gives it a better chance to make progress&lt;/li&gt;
&lt;li&gt;It uses off-the-shelf parts, so while not as neatly integrated as a regular smartphone device, it makes a much better prototype, and is more readily available.&lt;/li&gt;
&lt;li&gt;Hardware overview: X86-based, long-lasting (user-replaceable) battery, WWAN Modem (w/LTE), 4-5" LCD Touchscreen (Preferably w/720p resolution, IPS), upgradable storage.&lt;/li&gt;
&lt;li&gt;Currently targeting the UDOO Ultra platform. It features Intel Pentium N3710 (2.56GHz Quad-core, HD Graphics 405 [16 EUs @ 700MHz], VT-x, AES-NI), 2x4GB DDR3L RAM, 32GB eMMC storage built-in, further expansion w/M.2 SSD &amp;amp; MicroSD slot, lots of connectivity onboard.&lt;/li&gt;
&lt;li&gt;Software: FreeBSD Hypervisor (bhyve or Xen) to run atop the hardware, hosting two separate hosts.

&lt;ul&gt;
&lt;li&gt;One will run an instance of pfSense, the "World's Most Popular Open Source Firewall" to handle the WWAN connection, routing, and Firewall (as well as Secure VPN if desired).&lt;/li&gt;
&lt;li&gt;The other instance will run a slimmed down installation of FreeBSD. The UI will be tweaked to work best in this form factor &amp;amp; resources tuned for this platform. There will be a strong reliance on Google Chromium &amp;amp; Google's services (like Google Voice).&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The project has a detailed log, and it looks like the hardware it is based on will ship in the next few weeks, so we expect to see more activity.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2017-March/313261.html" target="_blank" rel="nofollow noopener"&gt;NVME M.2 card road tests (Matt Dillon)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD’s Matt Dillon has posted a rundown of the various M.2 NVMe devices he has tested

&lt;ul&gt;
&lt;li&gt;SAMSUNG 951&lt;/li&gt;
&lt;li&gt;SAMSUNG 960 EVO&lt;/li&gt;
&lt;li&gt;TOSHIBA OCZ RD400&lt;/li&gt;
&lt;li&gt;INTEL 600P&lt;/li&gt;
&lt;li&gt;WD BLACK 256G&lt;/li&gt;
&lt;li&gt;MYDIGITALSSD&lt;/li&gt;
&lt;li&gt;PLEXTOR M8Pe&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;It is interesting to see the relative performance of each device, but also how they handle the workload and manage their temperature (or don’t in a few cases)&lt;/li&gt;
&lt;li&gt;The link provides a lot of detail about different block sizes and overall performance
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.bolthole.com/solaris/zrep/" target="_blank" rel="nofollow noopener"&gt;ZREP ZFS replication and failover&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"zrep", a robust yet easy to use ZFS based replication and failover solution. It can also serve as the conduit to create a simple backup hub.&lt;/li&gt;
&lt;li&gt;The tool was originally written for Solaris, and is written in ksh&lt;/li&gt;
&lt;li&gt;However, it seems people have used it on FreeBSD and even FreeNAS by installing the ksh93 port&lt;/li&gt;
&lt;li&gt;Has anyone used this? How does it compare to tools like zxfer?&lt;/li&gt;
&lt;li&gt;There is a FreeBSD port, but it is a few versions behind, someone should update it&lt;/li&gt;
&lt;li&gt;We would be interested in hearing some feedback
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Catching up on some TrueOS News&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.trueos.org/blog/trueos-security-wikileaks-revelations/" target="_blank" rel="nofollow noopener"&gt;TrueOS Security and Wikileaks revelations&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.trueos.org/blog/new-jail-management-utilities/" target="_blank" rel="nofollow noopener"&gt;New Jail management utilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=PyraePQyCGY" target="_blank" rel="nofollow noopener"&gt;Ken Moore's talk about Sysadm from Linuxfest 2016&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.trueos.org/blog/community-spotlight-basics-using-zfs-trueos/" target="_blank" rel="nofollow noopener"&gt;The Basics of using ZFS with TrueOS&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Catching up on some OpenBSD News&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/61.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.1 coming May 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170223044255" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation 2016 Fundraising (goal: $250K actual: $573K)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.openbsdfoundation.org/campaign2017.html" target="_blank" rel="nofollow noopener"&gt;The OpenBSD Foundation 2017 Fundraising Campaign&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://marc.info/?l=openbsd-announce&amp;amp;m=148839684520133&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD MitM attack against WPA1/WPA2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.openbsd.org/papers/asiabsdcon2017-vmm-slides.pdf" target="_blank" rel="nofollow noopener"&gt;OpenBSD vmm/vmd Update&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://hardenedbsd.org/article/shawn-webb/2017-03-02/introducing-cfi" target="_blank" rel="nofollow noopener"&gt;HardenedBSD News: Introducing CFI&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freshports.org/sysutils/py3-iocage/" target="_blank" rel="nofollow noopener"&gt;New version of Iocage (Python 3) on FreshPorts&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://leaf.dragonflybsd.org/%7Esephe/perf_cmp.pdf" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD Network performance comparison as of today&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://knoxbug.org/content/knoxbug-wants-you" target="_blank" rel="nofollow noopener"&gt;KnoxBUG recap&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://pastebin.com/7B47nuC0" target="_blank" rel="nofollow noopener"&gt;Noel asks about moving to bhyve/jails&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Catching up to BSD, news about the NetBSD project, a BSD Phone, and a bunch of OpenBSD and TrueOS News.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.netbsd.org/releases/formal-7/NetBSD-7.1.html" rel="nofollow">NetBSD 7.1 released</a></h3>

<ul>
<li>This update represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements.</li>
<li><p>Kernel</p>

<ul>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?compat_linux+8.i386+NetBSD-7.1" rel="nofollow">compat_linux(8)</a>: Fully support sched_setaffinity and sched_getaffinity, fixing, e.g., the Intel Math Kernel Library.</li>
</ul></li>
<li><p>DTrace:</p>

<ul>
<li>Avoid redefined symbol errors when loading the module.</li>
<li>Fix module autoload.</li>
</ul></li>
<li><p>IPFilter:</p>

<ul>
<li>Fix matching of ICMP queries when NAT&#39;d through IPF.</li>
<li>Fix lookup of original destination address when using a redirect rule. This is required for transparent proxying by squid, for example.</li>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?ipsec+4.i386+NetBSD-7.1" rel="nofollow">ipsec(4)</a>: Fix NAT-T issue with NetBSD being the host behind NAT.</li>
</ul></li>
<li><p>Drivers</p>

<ul>
<li>Add vioscsi driver for the Google Compute Engine disk.</li>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?ichsmb+4.i386+NetBSD-7.1" rel="nofollow">ichsmb(4)</a>: Add support for Braswell CPU and Intel 100 Series.</li>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?wm+4.i386+NetBSD-7.1" rel="nofollow">wm(4)</a>:</li>
<li>Add C2000 KX and 2.5G support.</li>
<li>Add Wake On Lan support.</li>
<li>Fixed a lot of bugs</li>
</ul></li>
<li><p>Security Fixes</p>

<ul>
<li><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-001.txt.asc" rel="nofollow">NetBSD-SA2017-001</a> Memory leak in the connect system call.</li>
<li><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-002.txt.asc" rel="nofollow">NetBSD-SA2017-002</a> Several vulnerabilities in ARP.</li>
</ul></li>
<li><p>ARM related</p>

<ul>
<li>Support for Raspberry Pi Zero.</li>
<li>ODROID-C1 Ethernet now works.</li>
</ul></li>
</ul>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/summary_of_the_preliminary_lldb" rel="nofollow">Summary of the preliminary LLDB support project</a></h3>

<ul>
<li><p>What has been done in NetBSD</p>

<ul>
<li>Verified the full matrix of combinations of wait(2) and ptrace(2) in the following</li>
<li>GNU libstdc++ std::call_once bug investigation test-cases</li>
<li>Improving documentation and other minor system parts</li>
<li>Documentation of ptrace(2) and explanation how debuggers work</li>
<li>Introduction of new siginfo(2) codes for SIGTRAP</li>
<li>New ptrace(2) interfaces</li>
</ul></li>
<li><p>What has been done in LLDB</p></li>
<li><p>Native Process NetBSD Plugin</p></li>
<li><p>The MonitorCallback function</p></li>
<li><p>Other LLDB code, out of the NativeProcessNetBSD Plugin</p></li>
<li><p>Automated LLDB Test Results Summary</p></li>
<li><p>Plan for the next milestone</p>

<ul>
<li>fix conflict with system-wide py-six</li>
<li>add support for auxv read operation</li>
<li>switch resolution of pid -&gt; path to executable from /proc to sysctl(7)</li>
<li>recognize Real-Time Signals (SIGRTMIN-SIGRTMAX)</li>
<li>upstream !NetBSDProcessPlugin code</li>
<li>switch std::call_once to llvm::call_once</li>
<li>add new ptrace(2) interface to lock and unlock threads from execution</li>
<li>switch the current PT_WATCHPOINT interface to PT_GETDBREGS and PT_SETDBREGS</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://hackaday.io/project/13145-bsd-based-secure-smartphone" rel="nofollow">Actually building a FreeBSD Phone </a></h3>

<ul>
<li>There have been a number of different projects that have proposed building a FreeBSD based smart phone</li>
<li>This project is a bit different, and I think that gives it a better chance to make progress</li>
<li>It uses off-the-shelf parts, so while not as neatly integrated as a regular smartphone device, it makes a much better prototype, and is more readily available.</li>
<li>Hardware overview: X86-based, long-lasting (user-replaceable) battery, WWAN Modem (w/LTE), 4-5&quot; LCD Touchscreen (Preferably w/720p resolution, IPS), upgradable storage.</li>
<li>Currently targeting the UDOO Ultra platform. It features Intel Pentium N3710 (2.56GHz Quad-core, HD Graphics 405 [16 EUs @ 700MHz], VT-x, AES-NI), 2x4GB DDR3L RAM, 32GB eMMC storage built-in, further expansion w/M.2 SSD &amp; MicroSD slot, lots of connectivity onboard.</li>
<li>Software: FreeBSD Hypervisor (bhyve or Xen) to run atop the hardware, hosting two separate hosts.

<ul>
<li>One will run an instance of pfSense, the &quot;World&#39;s Most Popular Open Source Firewall&quot; to handle the WWAN connection, routing, and Firewall (as well as Secure VPN if desired).</li>
<li>The other instance will run a slimmed down installation of FreeBSD. The UI will be tweaked to work best in this form factor &amp; resources tuned for this platform. There will be a strong reliance on Google Chromium &amp; Google&#39;s services (like Google Voice).</li>
</ul></li>
<li>The project has a detailed log, and it looks like the hardware it is based on will ship in the next few weeks, so we expect to see more activity.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2017-March/313261.html" rel="nofollow">NVME M.2 card road tests (Matt Dillon)</a></h3>

<ul>
<li>DragonFlyBSD’s Matt Dillon has posted a rundown of the various M.2 NVMe devices he has tested

<ul>
<li>SAMSUNG 951</li>
<li>SAMSUNG 960 EVO</li>
<li>TOSHIBA OCZ RD400</li>
<li>INTEL 600P</li>
<li>WD BLACK 256G</li>
<li>MYDIGITALSSD</li>
<li>PLEXTOR M8Pe</li>
</ul></li>
<li>It is interesting to see the relative performance of each device, but also how they handle the workload and manage their temperature (or don’t in a few cases)</li>
<li>The link provides a lot of detail about different block sizes and overall performance
***</li>
</ul>

<h3><a href="http://www.bolthole.com/solaris/zrep/" rel="nofollow">ZREP ZFS replication and failover</a></h3>

<ul>
<li>&quot;zrep&quot;, a robust yet easy to use ZFS based replication and failover solution. It can also serve as the conduit to create a simple backup hub.</li>
<li>The tool was originally written for Solaris, and is written in ksh</li>
<li>However, it seems people have used it on FreeBSD and even FreeNAS by installing the ksh93 port</li>
<li>Has anyone used this? How does it compare to tools like zxfer?</li>
<li>There is a FreeBSD port, but it is a few versions behind, someone should update it</li>
<li>We would be interested in hearing some feedback
***</li>
</ul>

<h3>Catching up on some TrueOS News</h3>

<ul>
<li><a href="https://www.trueos.org/blog/trueos-security-wikileaks-revelations/" rel="nofollow">TrueOS Security and Wikileaks revelations</a></li>
<li><a href="https://www.trueos.org/blog/new-jail-management-utilities/" rel="nofollow">New Jail management utilities</a></li>
<li><a href="https://www.youtube.com/watch?v=PyraePQyCGY" rel="nofollow">Ken Moore&#39;s talk about Sysadm from Linuxfest 2016</a></li>
<li><a href="https://www.trueos.org/blog/community-spotlight-basics-using-zfs-trueos/" rel="nofollow">The Basics of using ZFS with TrueOS</a>
***</li>
</ul>

<h3>Catching up on some OpenBSD News</h3>

<ul>
<li><a href="https://www.openbsd.org/61.html" rel="nofollow">OpenBSD 6.1 coming May 1</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170223044255" rel="nofollow">OpenBSD Foundation 2016 Fundraising (goal: $250K actual: $573K)</a></li>
<li><a href="http://www.openbsdfoundation.org/campaign2017.html" rel="nofollow">The OpenBSD Foundation 2017 Fundraising Campaign</a></li>
<li><a href="https://marc.info/?l=openbsd-announce&m=148839684520133&w=2" rel="nofollow">OpenBSD MitM attack against WPA1/WPA2</a></li>
<li><a href="https://www.openbsd.org/papers/asiabsdcon2017-vmm-slides.pdf" rel="nofollow">OpenBSD vmm/vmd Update</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://hardenedbsd.org/article/shawn-webb/2017-03-02/introducing-cfi" rel="nofollow">HardenedBSD News: Introducing CFI</a> </li>
<li><a href="https://www.freshports.org/sysutils/py3-iocage/" rel="nofollow">New version of Iocage (Python 3) on FreshPorts</a></li>
<li><a href="https://leaf.dragonflybsd.org/%7Esephe/perf_cmp.pdf" rel="nofollow">DragonFly BSD Network performance comparison as of today</a></li>
<li><a href="http://knoxbug.org/content/knoxbug-wants-you" rel="nofollow">KnoxBUG recap</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://pastebin.com/7B47nuC0" rel="nofollow">Noel asks about moving to bhyve/jails</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Catching up to BSD, news about the NetBSD project, a BSD Phone, and a bunch of OpenBSD and TrueOS News.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.netbsd.org/releases/formal-7/NetBSD-7.1.html" rel="nofollow">NetBSD 7.1 released</a></h3>

<ul>
<li>This update represents a selected subset of fixes deemed important for security or stability reasons, as well as new features and enhancements.</li>
<li><p>Kernel</p>

<ul>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?compat_linux+8.i386+NetBSD-7.1" rel="nofollow">compat_linux(8)</a>: Fully support sched_setaffinity and sched_getaffinity, fixing, e.g., the Intel Math Kernel Library.</li>
</ul></li>
<li><p>DTrace:</p>

<ul>
<li>Avoid redefined symbol errors when loading the module.</li>
<li>Fix module autoload.</li>
</ul></li>
<li><p>IPFilter:</p>

<ul>
<li>Fix matching of ICMP queries when NAT&#39;d through IPF.</li>
<li>Fix lookup of original destination address when using a redirect rule. This is required for transparent proxying by squid, for example.</li>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?ipsec+4.i386+NetBSD-7.1" rel="nofollow">ipsec(4)</a>: Fix NAT-T issue with NetBSD being the host behind NAT.</li>
</ul></li>
<li><p>Drivers</p>

<ul>
<li>Add vioscsi driver for the Google Compute Engine disk.</li>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?ichsmb+4.i386+NetBSD-7.1" rel="nofollow">ichsmb(4)</a>: Add support for Braswell CPU and Intel 100 Series.</li>
<li><a href="http://netbsd.gw.com/cgi-bin/man-cgi?wm+4.i386+NetBSD-7.1" rel="nofollow">wm(4)</a>:</li>
<li>Add C2000 KX and 2.5G support.</li>
<li>Add Wake On Lan support.</li>
<li>Fixed a lot of bugs</li>
</ul></li>
<li><p>Security Fixes</p>

<ul>
<li><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-001.txt.asc" rel="nofollow">NetBSD-SA2017-001</a> Memory leak in the connect system call.</li>
<li><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2017-002.txt.asc" rel="nofollow">NetBSD-SA2017-002</a> Several vulnerabilities in ARP.</li>
</ul></li>
<li><p>ARM related</p>

<ul>
<li>Support for Raspberry Pi Zero.</li>
<li>ODROID-C1 Ethernet now works.</li>
</ul></li>
</ul>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/summary_of_the_preliminary_lldb" rel="nofollow">Summary of the preliminary LLDB support project</a></h3>

<ul>
<li><p>What has been done in NetBSD</p>

<ul>
<li>Verified the full matrix of combinations of wait(2) and ptrace(2) in the following</li>
<li>GNU libstdc++ std::call_once bug investigation test-cases</li>
<li>Improving documentation and other minor system parts</li>
<li>Documentation of ptrace(2) and explanation how debuggers work</li>
<li>Introduction of new siginfo(2) codes for SIGTRAP</li>
<li>New ptrace(2) interfaces</li>
</ul></li>
<li><p>What has been done in LLDB</p></li>
<li><p>Native Process NetBSD Plugin</p></li>
<li><p>The MonitorCallback function</p></li>
<li><p>Other LLDB code, out of the NativeProcessNetBSD Plugin</p></li>
<li><p>Automated LLDB Test Results Summary</p></li>
<li><p>Plan for the next milestone</p>

<ul>
<li>fix conflict with system-wide py-six</li>
<li>add support for auxv read operation</li>
<li>switch resolution of pid -&gt; path to executable from /proc to sysctl(7)</li>
<li>recognize Real-Time Signals (SIGRTMIN-SIGRTMAX)</li>
<li>upstream !NetBSDProcessPlugin code</li>
<li>switch std::call_once to llvm::call_once</li>
<li>add new ptrace(2) interface to lock and unlock threads from execution</li>
<li>switch the current PT_WATCHPOINT interface to PT_GETDBREGS and PT_SETDBREGS</li>
</ul></li>
</ul>

<hr>

<h3><a href="https://hackaday.io/project/13145-bsd-based-secure-smartphone" rel="nofollow">Actually building a FreeBSD Phone </a></h3>

<ul>
<li>There have been a number of different projects that have proposed building a FreeBSD based smart phone</li>
<li>This project is a bit different, and I think that gives it a better chance to make progress</li>
<li>It uses off-the-shelf parts, so while not as neatly integrated as a regular smartphone device, it makes a much better prototype, and is more readily available.</li>
<li>Hardware overview: X86-based, long-lasting (user-replaceable) battery, WWAN Modem (w/LTE), 4-5&quot; LCD Touchscreen (Preferably w/720p resolution, IPS), upgradable storage.</li>
<li>Currently targeting the UDOO Ultra platform. It features Intel Pentium N3710 (2.56GHz Quad-core, HD Graphics 405 [16 EUs @ 700MHz], VT-x, AES-NI), 2x4GB DDR3L RAM, 32GB eMMC storage built-in, further expansion w/M.2 SSD &amp; MicroSD slot, lots of connectivity onboard.</li>
<li>Software: FreeBSD Hypervisor (bhyve or Xen) to run atop the hardware, hosting two separate hosts.

<ul>
<li>One will run an instance of pfSense, the &quot;World&#39;s Most Popular Open Source Firewall&quot; to handle the WWAN connection, routing, and Firewall (as well as Secure VPN if desired).</li>
<li>The other instance will run a slimmed down installation of FreeBSD. The UI will be tweaked to work best in this form factor &amp; resources tuned for this platform. There will be a strong reliance on Google Chromium &amp; Google&#39;s services (like Google Voice).</li>
</ul></li>
<li>The project has a detailed log, and it looks like the hardware it is based on will ship in the next few weeks, so we expect to see more activity.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2017-March/313261.html" rel="nofollow">NVME M.2 card road tests (Matt Dillon)</a></h3>

<ul>
<li>DragonFlyBSD’s Matt Dillon has posted a rundown of the various M.2 NVMe devices he has tested

<ul>
<li>SAMSUNG 951</li>
<li>SAMSUNG 960 EVO</li>
<li>TOSHIBA OCZ RD400</li>
<li>INTEL 600P</li>
<li>WD BLACK 256G</li>
<li>MYDIGITALSSD</li>
<li>PLEXTOR M8Pe</li>
</ul></li>
<li>It is interesting to see the relative performance of each device, but also how they handle the workload and manage their temperature (or don’t in a few cases)</li>
<li>The link provides a lot of detail about different block sizes and overall performance
***</li>
</ul>

<h3><a href="http://www.bolthole.com/solaris/zrep/" rel="nofollow">ZREP ZFS replication and failover</a></h3>

<ul>
<li>&quot;zrep&quot;, a robust yet easy to use ZFS based replication and failover solution. It can also serve as the conduit to create a simple backup hub.</li>
<li>The tool was originally written for Solaris, and is written in ksh</li>
<li>However, it seems people have used it on FreeBSD and even FreeNAS by installing the ksh93 port</li>
<li>Has anyone used this? How does it compare to tools like zxfer?</li>
<li>There is a FreeBSD port, but it is a few versions behind, someone should update it</li>
<li>We would be interested in hearing some feedback
***</li>
</ul>

<h3>Catching up on some TrueOS News</h3>

<ul>
<li><a href="https://www.trueos.org/blog/trueos-security-wikileaks-revelations/" rel="nofollow">TrueOS Security and Wikileaks revelations</a></li>
<li><a href="https://www.trueos.org/blog/new-jail-management-utilities/" rel="nofollow">New Jail management utilities</a></li>
<li><a href="https://www.youtube.com/watch?v=PyraePQyCGY" rel="nofollow">Ken Moore&#39;s talk about Sysadm from Linuxfest 2016</a></li>
<li><a href="https://www.trueos.org/blog/community-spotlight-basics-using-zfs-trueos/" rel="nofollow">The Basics of using ZFS with TrueOS</a>
***</li>
</ul>

<h3>Catching up on some OpenBSD News</h3>

<ul>
<li><a href="https://www.openbsd.org/61.html" rel="nofollow">OpenBSD 6.1 coming May 1</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170223044255" rel="nofollow">OpenBSD Foundation 2016 Fundraising (goal: $250K actual: $573K)</a></li>
<li><a href="http://www.openbsdfoundation.org/campaign2017.html" rel="nofollow">The OpenBSD Foundation 2017 Fundraising Campaign</a></li>
<li><a href="https://marc.info/?l=openbsd-announce&m=148839684520133&w=2" rel="nofollow">OpenBSD MitM attack against WPA1/WPA2</a></li>
<li><a href="https://www.openbsd.org/papers/asiabsdcon2017-vmm-slides.pdf" rel="nofollow">OpenBSD vmm/vmd Update</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://hardenedbsd.org/article/shawn-webb/2017-03-02/introducing-cfi" rel="nofollow">HardenedBSD News: Introducing CFI</a> </li>
<li><a href="https://www.freshports.org/sysutils/py3-iocage/" rel="nofollow">New version of Iocage (Python 3) on FreshPorts</a></li>
<li><a href="https://leaf.dragonflybsd.org/%7Esephe/perf_cmp.pdf" rel="nofollow">DragonFly BSD Network performance comparison as of today</a></li>
<li><a href="http://knoxbug.org/content/knoxbug-wants-you" rel="nofollow">KnoxBUG recap</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="https://pastebin.com/7B47nuC0" rel="nofollow">Noel asks about moving to bhyve/jails</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>186: The Fast And the Firewall: Tokyo Drift</title>
  <link>https://www.bsdnow.tv/186</link>
  <guid isPermaLink="false">09c4e852-2672-45ab-8305-fc91d8b928e6</guid>
  <pubDate>Wed, 22 Mar 2017 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/09c4e852-2672-45ab-8305-fc91d8b928e6.mp3" length="83580628" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, reports from AsiaBSDcon, TrueOS and FreeBSD news,  Optimizing IllumOS Kernel, your questions and more.</itunes:subtitle>
  <itunes:duration>2:54:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, reports from AsiaBSDcon, TrueOS and FreeBSD news,  Optimizing IllumOS Kernel, your questions and more.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="" target="_blank" rel="nofollow noopener"&gt;AsiaBSDcon Reports and Reviews&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://2017.asiabsdcon.org/program.html.en" target="_blank" rel="nofollow noopener"&gt;AsiaBSDcon schedule&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://bhyvecon.org/" target="_blank" rel="nofollow noopener"&gt;Schedule and slides from the 4th bhyvecon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ixsystems.com/blog/ixsystems-attends-asiabsdcon-2017" target="_blank" rel="nofollow noopener"&gt;Michael Dexter’s trip report on the iXsystems blog&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2017/03/13/msg000729.html" target="_blank" rel="nofollow noopener"&gt;NetBSD AsiaBSDcon booth report&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.trueos.org/blog/trueos-community-guidelines/" target="_blank" rel="nofollow noopener"&gt;TrueOS Community Guidelines are here!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;TrueOS has published its new Community Guidelines&lt;/li&gt;
&lt;li&gt;The TrueOS Project has existed for over ten years. Until now, there was no formally defined process for interested individuals in the TrueOS community to earn contributor status as an active committer to this long-standing project. The current core TrueOS developers (Kris Moore, Ken Moore, and Joe Maloney) want to provide the community more opportunities to directly impact the TrueOS Project, and wish to formalize the process for interested people to gain full commit access to the TrueOS repositories.&lt;/li&gt;
&lt;li&gt;These describe what is expected of community members and committers&lt;/li&gt;
&lt;li&gt;They also describe the process of getting commit access to the TrueOS repo:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;Previously, Kris directly handed out commit bits. Now, the Core developers have provided a small list of requirements for gaining a TrueOS commit bit:&lt;/p&gt;

&lt;p&gt;&amp;gt;Create five or more pull requests in a TrueOS Project repository within a single six month period. &lt;/p&gt;

&lt;p&gt;&amp;gt;Stay active in the TrueOS community through at least one of the available community channels (Gitter, Discourse, IRC, etc.). &lt;/p&gt;

&lt;p&gt;&amp;gt;Request commit access from the core developers via &lt;a href="mailto:core@trueos.org" target="_blank" rel="nofollow noopener"&gt;core@trueos.org&lt;/a&gt; OR Core developers contact you concerning commit access.&lt;/p&gt;

&lt;p&gt;&amp;gt; Pull requests can be any contribution to the project, from minor documentation tweaks to creating full utilities.&lt;/p&gt;

&lt;p&gt;&amp;gt; At the end of every month, the core developers review the commit logs, removing elements that break the Project or deviate too far from its intended purpose. Additionally, outstanding pull requests with no active dissension are immediately merged, if possible. For example, a user submits a pull request which adds a little-used OpenRC script. No one from the community comments on the request or otherwise argues against its inclusion, resulting in an automatic merge at the end of the month. In this manner, solid contributions are routinely added to the project and never left in a state of “limbo”.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The page also describes the perks of being a TrueOS committer:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Contributors to the TrueOS Project enjoy a number of benefits, including:&lt;/p&gt;

&lt;p&gt;&amp;gt; A personal TrueOS email alias: @trueos.org&lt;/p&gt;

&lt;p&gt;&amp;gt; Full access for managing TrueOS issues on GitHub.&lt;/p&gt;

&lt;p&gt;&amp;gt; Regular meetings with the core developers and other contributors.&lt;/p&gt;

&lt;p&gt;&amp;gt; Access to private chat channels with the core developers.&lt;/p&gt;

&lt;p&gt;&amp;gt; Recognition as part of an online Who’s Who of TrueOS developers.&lt;/p&gt;

&lt;p&gt;&amp;gt; The eternal gratitude of the core developers of TrueOS.&lt;/p&gt;

&lt;p&gt;&amp;gt; A warm, fuzzy feeling.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/news-and-events/latest-news/new-uranium-level-donation-and-collaborative-partnership-with-intel/" target="_blank" rel="nofollow noopener"&gt;Intel Donates 250.000 $ to the FreeBSD Foundation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More details about the deal: Systems Thinking: &lt;a href="https://www.freebsdfoundation.org/blog/systems-thinking-intel-and-the-freebsd-project/" target="_blank" rel="nofollow noopener"&gt;Intel and the FreeBSD Project&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Intel will be more actively engaging with the FreeBSD Foundation and the FreeBSD Project to deliver more timely support for Intel products and technologies in FreeBSD.&lt;/p&gt;

&lt;p&gt;&amp;gt; Intel has contributed code to FreeBSD for individual device drivers (i.e. NICs) in the past, but is now seeking a more holistic “systems thinking” approach. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://01.org/blogs/imad/2017/intel-increases-support-freebsd-project" target="_blank" rel="nofollow noopener"&gt;Intel Blog Post &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; We will work closely with the FreeBSD Foundation to ensure the drivers, tools, and applications needed on Intel® SSD-based storage appliances are available to the community. This collaboration will also provide timely support for future Intel® 3D XPoint™ products.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Thank you very much, Intel!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://globalengineer.wordpress.com/2017/03/05/applied-freebsd-basic-iscsi/" target="_blank" rel="nofollow noopener"&gt;Applied FreeBSD: Basic iSCSI&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; iSCSI is often touted as a low-cost replacement for fibre-channel (FC) Storage Area Networks (SANs). Instead of having to setup a separate fibre-channel network for the SAN, or invest in the infrastructure to run Fibre-Channel over Ethernet (FCoE), iSCSI runs on top of standard TCP/IP. This means that the same network equipment used for routing user data on a network could be utilized for the storage as well.&lt;/p&gt;

&lt;p&gt;&amp;gt; This article will cover a very basic setup where a FreeBSD server is configured as an iSCSI Target, and another FreeBSD server is configured as the iSCSI Initiator. The iSCSI Target will export a single disk drive, and the initiator will create a filesystem on this disk and mount it locally. Advanced topics, such as multipath, ZFS storage pools, failover controllers, etc. are not covered.&lt;/p&gt;

&lt;p&gt;&amp;gt; The real magic is the /etc/ctl.conf file, which contains all of the information necessary for ctld to share disk drives on the network. Check out the man page for /etc/ctl.conf for more details; below is the configuration file that I created for this test setup. Note that on a system that has never had iSCSI configured, there will be no existing configuration file, so go ahead and create it.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Then, enable ctld and start it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;sysrc ctld_enable=”YES”&lt;/li&gt;
&lt;li&gt;service ctld start&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You can use the ctladm command to see what is going on:&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;root@bsdtarget:/dev # ctladm lunlist&lt;/p&gt;

&lt;p&gt;(7:0:0/0):  Fixed Direct Access SPC-4 SCSI device&lt;/p&gt;

&lt;p&gt;(7:0:1/1):  Fixed Direct Access SPC-4 SCSI device&lt;/p&gt;

&lt;p&gt;root@bsdtarget:/dev # ctladm devlist&lt;/p&gt;

&lt;p&gt;LUN Backend Size (Blocks) BS Serial Number Device ID&lt;/p&gt;

&lt;p&gt;0 block 10485760 512 MYSERIAL 0 MYDEVID 0&lt;/p&gt;

&lt;p&gt;1 block 10485760 512 MYSERIAL 1 MYDEVID 1&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Now, let’s configure the client side:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; In order for a FreeBSD host to become an iSCSI Initiator, the iscsd daemon needs to be started.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;sysrc iscsid_enable=”YES”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;service iscsid start&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Next, the iSCSI Initiator can manually connect to the iSCSI target using the iscsictl tool. While setting up a new iSCSI session, this is probably the best option. Once you are sure the configuration is correct, add the configuration to the /etc/iscsi.conf file (see man page for this file). For iscsictl, pass the IP address of the target as well as the iSCSI IQN for the session:&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;+ iscsictl -A -p 192.168.22.128 -t iqn.2017-02.lab.testing:basictarget
&lt;/code&gt;&lt;/pre&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;You should now have a new device (check dmesg), in this case, da1&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The guide them walks through partitioning the disk, and laying down a UFS file system, and mounting it&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This it walks through how to disconnect iscsi, incase you don’t want it anymore&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;This all looked nice and easy, and it works very well. Now lets see what happens when you try to mount the iSCSI from Windows&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ok, that wasn’t so bad.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Now, instead of sharing an entire space disk on the host via iSCSI, share a zvol. Now your windows machine can be backed by ZFS. All of your problems are solved.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Philipp Buehler - &lt;a href="mailto:pbuehler@sysfive.com" target="_blank" rel="nofollow noopener"&gt;pbuehler@sysfive.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Technical Lead at SysFive, and Former OpenBSD Committer&lt;/p&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170316080827" target="_blank" rel="nofollow noopener"&gt;Half a dozen new features in mandoc -T html&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://man.openbsd.org/mandoc.1" target="_blank" rel="nofollow noopener"&gt;mandoc&lt;/a&gt;’s HTML output mode got some new features&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Even though mdoc(7) is a semantic markup language, traditionally none of the semantic annotations were communicated to the reader. [...] Now, at least in -T html output mode, you can see the semantic function of marked-up words by hovering your mouse over them.&lt;/p&gt;

&lt;p&gt;&amp;gt; In terminal output modes, we have the ctags(1)-like internal search facility built around the less(1) tag jump (:t) feature for quite some time now. We now have a similar feature in -T html output mode. To jump to (almost) the same places in the text, go to the address bar of the browser, type a hash mark ('#') after the URI, then the name of the option, command, variable, error code etc. you want to jump to, and hit enter.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check out the full report by Ingo Schwarze (schwarze@) and try out these new features
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://zfs-create.blogspot.com/2014/05/optimizing-illumos-kernel-crypto.html" target="_blank" rel="nofollow noopener"&gt;Optimizing IllumOS Kernel Crypto&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sašo Kiselkov, of ZFS fame, looked into the performance of the OpenSolaris kernel crypto framework and found it lacking.&lt;/li&gt;
&lt;li&gt;The article also spends a few minutes on the different modes and how they work.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;  Recently I've had some motivation to look into the KCF on Illumos and discovered that, unbeknownst to me, we already had an AES-NI implementation that was automatically enabled when running on Intel and AMD CPUs with AES-NI support. This work was done back in 2010 by Dan Anderson.This was great news, so I set out to test the performance in Illumos in a VM on my Mac with a Core i5 3210M (2.5GHz normal, 3.1GHz turbo).&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The initial tests of “what the hardware can do” were done in OpenSSL&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; So now comes the test for the KCF. I wrote a quick'n'dirty crypto test module that just performed a bunch of encryption operations and timed the results.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;KCF got around 100 MB/s for each algorithm, except half that for AES-GCM&lt;/li&gt;
&lt;li&gt;OpenSSL had done over 3000 MB/s for CTR mode, 500 MB/s for CBC, and 1000 MB/s for GCM&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; What the hell is that?! This is just plain unacceptable. Obviously we must have hit some nasty performance snag somewhere, because this is comical. And sure enough, we did.&lt;/p&gt;

&lt;p&gt;&amp;gt; When looking around in the AES-NI implementation I came across this bit in aes_intel.s that performed the CLTS instruction.&lt;/p&gt;

&lt;p&gt;&amp;gt; This is a problem: 3.1.2 Instructions That Cause VM Exits ConditionallyCLTS. The CLTS instruction causes a VM exit if the bits in position 3 (corresponding to CR0.TS) are set in both the CR0 guest/host mask and the CR0 read shadow.&lt;/p&gt;

&lt;p&gt;&amp;gt; The CLTS instruction signals to the CPU that we're about to use FPU registers (which is needed for AES-NI), which in VMware causes an exit into the hypervisor. And we've been doing it for every single AES block! Needless to say, performing the equivalent of a very expensive context switch every 16 bytes is going to hurt encryption performance a bit. The reason why the kernel is issuing CLTS is because for performance reasons, the kernel doesn't save and restore FPU register state on kernel thread context switches. So whenever we need to use FPU registers inside the kernel, we must disable kernel thread preemption via a call to kpreempt_disable() and kpreempt_enable() and save and restore FPU register state manually. During this time, we cannot be descheduled (because if we were, some other thread might clobber our FPU registers), so if a thread does this for too long, it can lead to unexpected latency bubbles&lt;/p&gt;

&lt;p&gt;&amp;gt; The solution was to restructure the AES and KCF block crypto implementations in such a way that we execute encryption in meaningfully small chunks. I opted for 32k bytes, for reasons which I'll explain below. Unfortunately, doing this restructuring work was a bit more complicated than one would imagine, since in the KCF the implementation of the AES encryption algorithm and the block cipher modes is separated into two separate modules that interact through an internal API, which wasn't really conducive to high performance (we'll get to that later). Anyway, having fixed the issue here and running the code at near native speed, this is what I get:&lt;/p&gt;

&lt;p&gt;AES-128/CTR: 439 MB/s&lt;/p&gt;

&lt;p&gt;AES-128/CBC: 483 MB/s&lt;/p&gt;

&lt;p&gt;AES-128/GCM: 252 MB/s&lt;/p&gt;

&lt;p&gt;&amp;gt; Not disastrous anymore, but still, very, very bad. Of course, you've got keep in mind, the thing we're comparing it to, OpenSSL, is no slouch. It's got hand-written highly optimized inline assembly implementations of most of these encryption functions and their specific modes, for lots of platforms. That's a ton of code to maintain and optimize, but I'll be damned if I let this kind of performance gap persist.&lt;/p&gt;

&lt;p&gt;&amp;gt; Fixing this, however, is not so trivial anymore. It pertains to how the KCF's block cipher mode API interacts with the cipher algorithms. It is beautifully designed and implemented in a fashion that creates minimum code duplication, but this also means that it's inherently inefficient.&lt;/p&gt;

&lt;p&gt;&amp;gt; ECB, CBC and CTR gained the ability to pass an algorithm-specific "fastpath" implementation of the block cipher mode, because these functions benefit greatly from pipelining multiple cipher calls into a single place.&lt;/p&gt;

&lt;p&gt;&amp;gt; ECB, CTR and CBC decryption benefit enormously from being able to exploit the wide XMM register file on Intel to perform encryption/decryption operations on 8 blocks at the same time in a non-interlocking manner. The performance gains here are on the order of 5-8x.CBC encryption benefits from not having to copy the previously encrypted ciphertext blocks into memory and back into registers to XOR them with the subsequent plaintext blocks, though here the gains are more modest, around 1.3-1.5x.&lt;/p&gt;

&lt;p&gt;&amp;gt; After all of this work, this is how the results now look on Illumos, even inside of a VM:&lt;/p&gt;

&lt;p&gt;Algorithm/Mode 128k ops&lt;/p&gt;

&lt;p&gt;AES-128/CTR: 3121 MB/s&lt;/p&gt;

&lt;p&gt;AES-128/CBC: 691 MB/s&lt;/p&gt;

&lt;p&gt;AES-128/GCM: 1053 MB/s&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So the CTR and GCM speeds have actually caught up to OpenSSL, and CBC is actually faster than OpenSSL.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; On the decryption side of things, CBC decryption also jumped from 627 MB/s to 3011 MB/s. Seeing these performance numbers, you can see why I chose 32k for the operation size in between kernel preemption barriers. Even on the slowest hardware with AES-NI, we can expect at least 300-400 MB/s/core of throughput, so even in the worst case, we'll be hogging the CPU for at most ~0.1ms per run.&lt;/p&gt;

&lt;p&gt;&amp;gt; Overall, we're even a little bit faster than OpenSSL in some tests, though that's probably down to us encrypting 128k blocks vs 8k in the "openssl speed" utility. Anyway, having fixed this monstrous atrocity of a performance bug, I can now finally get some sleep.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;To made these tests repeatable, and to ensure that the changes didn’t break the crypto algorithms, Saso created a crypto_test kernel module.&lt;/li&gt;
&lt;li&gt;I have recently created a FreeBSD version of crypto_test.ko, for much the same purposes&lt;/li&gt;
&lt;li&gt;Initial performance on FreeBSD is not as bad, if you have the aesni.ko module loaded, but it is not up to speed with OpenSSL. You cannot directly compare to the benchmarks Saso did, because the CPUs are vastly different.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://wiki.freebsd.org/OpenCryptoPerformance" target="_blank" rel="nofollow noopener"&gt;Performance results&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;I hope to do some more tests on a range of different sized CPUs in order to determine how the algorithms scale across different clock speeds.&lt;/li&gt;
&lt;li&gt;I also want to look at, or get help and have someone else look at, implementing some of the same optimizations that Saso did.&lt;/li&gt;
&lt;li&gt;It currently seems like there isn’t a way to perform addition crypto operations in the same session without regenerating the key table. Processing additional buffers in an existing session might offer a number of optimizations for bulk operations, although in many cases, each block is encrypted with a different key and/or IV, so it might not be very useful.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.brendangregg.com/specials.html" target="_blank" rel="nofollow noopener"&gt;Brendan Gregg’s special freeware tools for sysadmins&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;These tools need to be in every (not so) serious sysadmins toolbox. &lt;/li&gt;
&lt;li&gt;Triple ROT13 encryption algorithm (beware: export restrictions may apply)&lt;/li&gt;
&lt;li&gt;/usr/bin/maybe, in case true and false don’t provide too little choice...&lt;/li&gt;
&lt;li&gt;The bottom command lists you all the processes using the least CPU cycles.&lt;/li&gt;
&lt;li&gt;Check out the rest of the tools. &lt;/li&gt;
&lt;li&gt;You wrote similar tools and want us to cover them in the show? Send us an email to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.lieberbiber.de/2017/03/14/a-look-at-the-year-20362038-problems-and-time-proofness-in-various-systems/" target="_blank" rel="nofollow noopener"&gt;A look at 2038 &lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I remember the Y2K problem quite vividly. The world was going crazy for years, paying insane amounts of money to experts to fix critical legacy systems, and there was a neverending stream of predictions from the media on how it’s all going to fail. Most didn’t even understand what the problem was, and I remember one magazine writing something like the following:&lt;br&gt;
&amp;gt; Most systems store the current year as a two-digit value to save space. When the value rolls over on New Year’s Eve 1999, those two digits will be “00”, and “00” means “halt operation” in the machine language of many central processing units. If you’re in an elevator at this time, it will stop working and you may fall to your death.&lt;br&gt;
&amp;gt; I still don’t know why they thought a computer would suddenly interpret data as code, but people believed them. We could see a nearby hydropower plant from my parents’ house, and we expected it to go up in flames as soon as the clock passed midnight, while at least two airplanes crashed in our garden at the same time. Then nothing happened. I think one of the most “severe” problems was the police not being able to open their car garages the next day because their RFID tokens had both a start and end date for validity, and the system clock had actually rolled over to 1900, so the tokens were “not yet valid”.&lt;br&gt;
&amp;gt; That was 17 years ago. One of the reasons why Y2K wasn’t as bad as it could have been is that many systems had never used the “two-digit-year” representation internally, but use some form of “timestamp” relative to a fixed date (the “epoch”).&lt;br&gt;
&amp;gt; The actual problem with time and dates rolling over is that systems calculate timestamp differences all day. Since a timestamp derived from the system clock seemingly only increases with each query, it is very common to just calculate diff = now - before and never care about the fact that now could suddenly be lower than before because the system clock has rolled over. In this case diff is suddenly negative, and if other parts of the code make further use of the suddenly negative value, things can go horribly wrong.&lt;br&gt;
&amp;gt; A good example was a bug in the generator control units (GCUs) aboard Boeing 787 “Dreamliner” aircrafts, discovered in 2015. An internal timestamp counter would overflow roughly 248 days after the system had been powered on, triggering a shut down to “safe mode”. The aircraft has four generator units, but if all were powered up at the same time, they would all fail at the same time. This sounds like an overflow caused by a signed 32-bit counter counting the number of centiseconds since boot, overflowing after 248.55 days, and luckily no airline had been using their Boing 787 models for such a long time between maintenance intervals.&lt;br&gt;
&amp;gt; The “obvious” solution is to simply switch to 64-Bit values and call it day, which would push overflow dates far into the future (as long as you don’t do it like the IBM S/370 mentioned before). But as we’ve learned from the Y2K problem, you have to assume that computer systems, computer software and stored data (which often contains timestamps in some form) will stay with us for much longer than we might think. The years 2036 and 2038 might be far in the future, but we have to assume that many of the things we make and sell today are going to be used and supported for more than just 19 years. Also many systems have to store dates which are far in the future. A 30 year mortgage taken out in 2008 could have already triggered the bug, and for some banks it supposedly did.&lt;br&gt;
&amp;gt; sys_gettimeofday() is one of the most used system calls on a generic Linux system and returns the current time in form of an UNIX timestamp (time_t data type) plus fraction (suseconds_t data type). Many applications have to know the current time and date to do things, e.g. displaying it, using it in game timing loops, invalidating caches after their lifetime ends, perform an action after a specific moment has passed, etc. In a 32-Bit UNIX system, time_t is usually defined as a signed 32-Bit Integer.&lt;br&gt;
&amp;gt; When kernel, libraries and applications are compiled, the compiler will turn this assumption machine code and all components later have to match each other. So a 32-Bit Linux application or library still expects the kernel to return a 32-Bit value even if the kernel is running on a 64-Bit architecture and has 32-Bit compatibility. The same holds true for applications calling into libraries. This is a major problem, because there will be a lot of legacy software running in 2038. Systems which used an unsigned 32-Bit Integer for time_t push the problem back to 2106, but I don’t know about many of those.&lt;br&gt;
&amp;gt; The developers of the GNU C library (glibc), the default standard C library for many GNU/Linux systems, have come up with a design for year 2038 proofness for their library. Besides the time_t data type itself, a number of other data structures have fields based on time_t or the combined struct timespec and struct timeval types. Many methods beside those intended for setting and querying the current time use timestamps&lt;br&gt;
&amp;gt; 32-Bit Windows applications, or Windows applications defining _USE_32BIT_TIME_T, can be hit by the year 2038 problem too if they use the time_t data type. The __time64_t data type had been available since Visual C 7.1, but only Visual C 8 (default with Visual Studio 2015) expanded time_t to 64 bits by default. The change will only be effective after a recompilation, legacy applications will continue to be affected.&lt;br&gt;
&amp;gt; If you live in a 64-Bit world and use a 64-Bit kernel with 64-Bit only applications, you might think you can just ignore the problem. In such a constellation all instances of the standard time_t data type for system calls, libraries and applications are signed 64-Bit Integers which will overflow in around 292 billion years. But many data formats, file systems and network protocols still specify 32-Bit time fields, and you might have to read/write this data or talk to legacy systems after 2038. So solving the problem on your side alone is not enough.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Then the article goes on to describe how all of this will break your file systems. Not to mention your databases and other file formats.&lt;/li&gt;
&lt;li&gt;Also see &lt;a href="https://www.openbsd.org/papers/eurobsdcon_2013_time_t/mgp00001.html" target="_blank" rel="nofollow noopener"&gt;Theo De Raadt’s EuroBSDCon 2013 Presentation&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://blather.michaelwlucas.com/archives/2895" target="_blank" rel="nofollow noopener"&gt;Michael Lucas: Get your name in “Absolute FreeBSD 3rd Edition”&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=r315435" target="_blank" rel="nofollow noopener"&gt;ZFS compressed ARC stats to top&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.dragonflydigest.com/2017/03/14/19452.html" target="_blank" rel="nofollow noopener"&gt;Matthew Dillon discovered HAMMER was repeating itself when writing to disk.  Fixing that issue doubled write speeds&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.tedunangst.com/flak/post/shrt-nms-fr-clrty" target="_blank" rel="nofollow noopener"&gt;TedU on Meaningful Short Names &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/blog/submit-your-work-vbsdcon-and-eurobsdcon-cfps-now-open/" target="_blank" rel="nofollow noopener"&gt;vBSDcon and EuroBSDcon Call for Papers are open&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/NMshpZ7n" target="_blank" rel="nofollow noopener"&gt;Craig asks about BSD server management&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/UqRwMcRk" target="_blank" rel="nofollow noopener"&gt;Michael asks about jails as a router between networks&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/i1ZD6eXN" target="_blank" rel="nofollow noopener"&gt;Todd asks about connecting jails &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/QzW5c9wV" target="_blank" rel="nofollow noopener"&gt;Dave writes in with an interesting link&lt;/a&gt;
&amp;gt; applications crash more often due to errors than corruptions. In the case of corruption, a few applications (e.g., Log-Cabin, ZooKeeper) can use checksums and redundancy to recover, leading to a correct behavior; however, when the corruption is transformed into an error, these applications crash, resulting in reduced availability.
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, reports from AsiaBSDcon, TrueOS and FreeBSD news,  Optimizing IllumOS Kernel, your questions and more.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="" rel="nofollow">AsiaBSDcon Reports and Reviews</a></h3>

<ul>
<li><a href="https://2017.asiabsdcon.org/program.html.en" rel="nofollow">AsiaBSDcon schedule</a></li>
<li><a href="http://bhyvecon.org/" rel="nofollow">Schedule and slides from the 4th bhyvecon</a></li>
<li><a href="https://www.ixsystems.com/blog/ixsystems-attends-asiabsdcon-2017" rel="nofollow">Michael Dexter’s trip report on the iXsystems blog</a></li>
<li><a href="http://mail-index.netbsd.org/netbsd-advocacy/2017/03/13/msg000729.html" rel="nofollow">NetBSD AsiaBSDcon booth report</a>
***</li>
</ul>

<h3><a href="https://www.trueos.org/blog/trueos-community-guidelines/" rel="nofollow">TrueOS Community Guidelines are here!</a></h3>

<ul>
<li>TrueOS has published its new Community Guidelines</li>
<li>The TrueOS Project has existed for over ten years. Until now, there was no formally defined process for interested individuals in the TrueOS community to earn contributor status as an active committer to this long-standing project. The current core TrueOS developers (Kris Moore, Ken Moore, and Joe Maloney) want to provide the community more opportunities to directly impact the TrueOS Project, and wish to formalize the process for interested people to gain full commit access to the TrueOS repositories.</li>
<li>These describe what is expected of community members and committers</li>
<li>They also describe the process of getting commit access to the TrueOS repo:</li>
</ul>

<blockquote>
<p>Previously, Kris directly handed out commit bits. Now, the Core developers have provided a small list of requirements for gaining a TrueOS commit bit:</p>

<p>Create five or more pull requests in a TrueOS Project repository within a single six month period. </p>

<p>Stay active in the TrueOS community through at least one of the available community channels (Gitter, Discourse, IRC, etc.). </p>

<p>Request commit access from the core developers via <a href="mailto:core@trueos.org" rel="nofollow">core@trueos.org</a> OR Core developers contact you concerning commit access.</p>

<p>Pull requests can be any contribution to the project, from minor documentation tweaks to creating full utilities.</p>

<p>At the end of every month, the core developers review the commit logs, removing elements that break the Project or deviate too far from its intended purpose. Additionally, outstanding pull requests with no active dissension are immediately merged, if possible. For example, a user submits a pull request which adds a little-used OpenRC script. No one from the community comments on the request or otherwise argues against its inclusion, resulting in an automatic merge at the end of the month. In this manner, solid contributions are routinely added to the project and never left in a state of “limbo”.</p>
</blockquote>

<ul>
<li>The page also describes the perks of being a TrueOS committer:</li>
</ul>

<blockquote>
<p>Contributors to the TrueOS Project enjoy a number of benefits, including:</p>

<p>A personal TrueOS email alias: <youralias>@trueos.org</p>

<p>Full access for managing TrueOS issues on GitHub.</p>

<p>Regular meetings with the core developers and other contributors.</p>

<p>Access to private chat channels with the core developers.</p>

<p>Recognition as part of an online Who’s Who of TrueOS developers.</p>

<p>The eternal gratitude of the core developers of TrueOS.</p>

<p>A warm, fuzzy feeling.</p>
</blockquote>

<hr>

<h3><a href="https://www.freebsdfoundation.org/news-and-events/latest-news/new-uranium-level-donation-and-collaborative-partnership-with-intel/" rel="nofollow">Intel Donates 250.000 $ to the FreeBSD Foundation</a></h3>

<ul>
<li>More details about the deal: Systems Thinking: <a href="https://www.freebsdfoundation.org/blog/systems-thinking-intel-and-the-freebsd-project/" rel="nofollow">Intel and the FreeBSD Project</a> </li>
</ul>

<blockquote>
<p>Intel will be more actively engaging with the FreeBSD Foundation and the FreeBSD Project to deliver more timely support for Intel products and technologies in FreeBSD.</p>

<p>Intel has contributed code to FreeBSD for individual device drivers (i.e. NICs) in the past, but is now seeking a more holistic “systems thinking” approach. </p>
</blockquote>

<ul>
<li><a href="https://01.org/blogs/imad/2017/intel-increases-support-freebsd-project" rel="nofollow">Intel Blog Post </a></li>
</ul>

<blockquote>
<p>We will work closely with the FreeBSD Foundation to ensure the drivers, tools, and applications needed on Intel® SSD-based storage appliances are available to the community. This collaboration will also provide timely support for future Intel® 3D XPoint™ products.</p>
</blockquote>

<ul>
<li>Thank you very much, Intel!
***</li>
</ul>

<h3><a href="https://globalengineer.wordpress.com/2017/03/05/applied-freebsd-basic-iscsi/" rel="nofollow">Applied FreeBSD: Basic iSCSI</a></h3>

<blockquote>
<p>iSCSI is often touted as a low-cost replacement for fibre-channel (FC) Storage Area Networks (SANs). Instead of having to setup a separate fibre-channel network for the SAN, or invest in the infrastructure to run Fibre-Channel over Ethernet (FCoE), iSCSI runs on top of standard TCP/IP. This means that the same network equipment used for routing user data on a network could be utilized for the storage as well.</p>

<p>This article will cover a very basic setup where a FreeBSD server is configured as an iSCSI Target, and another FreeBSD server is configured as the iSCSI Initiator. The iSCSI Target will export a single disk drive, and the initiator will create a filesystem on this disk and mount it locally. Advanced topics, such as multipath, ZFS storage pools, failover controllers, etc. are not covered.</p>

<p>The real magic is the /etc/ctl.conf file, which contains all of the information necessary for ctld to share disk drives on the network. Check out the man page for /etc/ctl.conf for more details; below is the configuration file that I created for this test setup. Note that on a system that has never had iSCSI configured, there will be no existing configuration file, so go ahead and create it.</p>
</blockquote>

<ul>
<li><p>Then, enable ctld and start it:</p>

<ul>
<li>sysrc ctld_enable=”YES”</li>
<li>service ctld start</li>
</ul></li>
<li><p>You can use the ctladm command to see what is going on:</p></li>
</ul>

<p>root@bsdtarget:/dev # ctladm lunlist</p>

<p>(7:0:0/0): <FREEBSD CTLDISK 0001> Fixed Direct Access SPC-4 SCSI device</p>

<p>(7:0:1/1): <FREEBSD CTLDISK 0001> Fixed Direct Access SPC-4 SCSI device</p>

<p>root@bsdtarget:/dev # ctladm devlist</p>

<p>LUN Backend Size (Blocks) BS Serial Number Device ID</p>

<p>0 block 10485760 512 MYSERIAL 0 MYDEVID 0</p>

<p>1 block 10485760 512 MYSERIAL 1 MYDEVID 1</p>

<ul>
<li>Now, let’s configure the client side:</li>
</ul>

<blockquote>
<p>In order for a FreeBSD host to become an iSCSI Initiator, the iscsd daemon needs to be started.</p>
</blockquote>

<ul>
<li><p>sysrc iscsid_enable=”YES”</p></li>
<li><p>service iscsid start</p></li>
</ul>

<blockquote>
<p>Next, the iSCSI Initiator can manually connect to the iSCSI target using the iscsictl tool. While setting up a new iSCSI session, this is probably the best option. Once you are sure the configuration is correct, add the configuration to the /etc/iscsi.conf file (see man page for this file). For iscsictl, pass the IP address of the target as well as the iSCSI IQN for the session:</p>
</blockquote>

<pre><code>+ iscsictl -A -p 192.168.22.128 -t iqn.2017-02.lab.testing:basictarget
</code></pre>

<ul>
<li><p>You should now have a new device (check dmesg), in this case, da1</p></li>
<li><p>The guide them walks through partitioning the disk, and laying down a UFS file system, and mounting it</p></li>
<li><p>This it walks through how to disconnect iscsi, incase you don’t want it anymore</p></li>
<li><p>This all looked nice and easy, and it works very well. Now lets see what happens when you try to mount the iSCSI from Windows</p></li>
<li><p>Ok, that wasn’t so bad.</p></li>
<li><p>Now, instead of sharing an entire space disk on the host via iSCSI, share a zvol. Now your windows machine can be backed by ZFS. All of your problems are solved.</p></li>
</ul>

<hr>

<h2>Interview - Philipp Buehler - <a href="mailto:pbuehler@sysfive.com" rel="nofollow">pbuehler@sysfive.com</a></h2>

<p>Technical Lead at SysFive, and Former OpenBSD Committer</p>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170316080827" rel="nofollow">Half a dozen new features in mandoc -T html</a></h3>

<ul>
<li><a href="http://man.openbsd.org/mandoc.1" rel="nofollow">mandoc</a>’s HTML output mode got some new features</li>
</ul>

<blockquote>
<p>Even though mdoc(7) is a semantic markup language, traditionally none of the semantic annotations were communicated to the reader. [...] Now, at least in -T html output mode, you can see the semantic function of marked-up words by hovering your mouse over them.</p>

<p>In terminal output modes, we have the ctags(1)-like internal search facility built around the less(1) tag jump (:t) feature for quite some time now. We now have a similar feature in -T html output mode. To jump to (almost) the same places in the text, go to the address bar of the browser, type a hash mark (&#39;#&#39;) after the URI, then the name of the option, command, variable, error code etc. you want to jump to, and hit enter.</p>
</blockquote>

<ul>
<li>Check out the full report by Ingo Schwarze (schwarze@) and try out these new features
***</li>
</ul>

<h3><a href="http://zfs-create.blogspot.com/2014/05/optimizing-illumos-kernel-crypto.html" rel="nofollow">Optimizing IllumOS Kernel Crypto</a></h3>

<ul>
<li>Sašo Kiselkov, of ZFS fame, looked into the performance of the OpenSolaris kernel crypto framework and found it lacking.</li>
<li>The article also spends a few minutes on the different modes and how they work.</li>
</ul>

<blockquote>
<p>Recently I&#39;ve had some motivation to look into the KCF on Illumos and discovered that, unbeknownst to me, we already had an AES-NI implementation that was automatically enabled when running on Intel and AMD CPUs with AES-NI support. This work was done back in 2010 by Dan Anderson.This was great news, so I set out to test the performance in Illumos in a VM on my Mac with a Core i5 3210M (2.5GHz normal, 3.1GHz turbo).</p>
</blockquote>

<ul>
<li>The initial tests of “what the hardware can do” were done in OpenSSL</li>
</ul>

<blockquote>
<p>So now comes the test for the KCF. I wrote a quick&#39;n&#39;dirty crypto test module that just performed a bunch of encryption operations and timed the results.</p>
</blockquote>

<ul>
<li>KCF got around 100 MB/s for each algorithm, except half that for AES-GCM</li>
<li>OpenSSL had done over 3000 MB/s for CTR mode, 500 MB/s for CBC, and 1000 MB/s for GCM</li>
</ul>

<blockquote>
<p>What the hell is that?! This is just plain unacceptable. Obviously we must have hit some nasty performance snag somewhere, because this is comical. And sure enough, we did.</p>

<p>When looking around in the AES-NI implementation I came across this bit in aes_intel.s that performed the CLTS instruction.</p>

<p>This is a problem: 3.1.2 Instructions That Cause VM Exits ConditionallyCLTS. The CLTS instruction causes a VM exit if the bits in position 3 (corresponding to CR0.TS) are set in both the CR0 guest/host mask and the CR0 read shadow.</p>

<p>The CLTS instruction signals to the CPU that we&#39;re about to use FPU registers (which is needed for AES-NI), which in VMware causes an exit into the hypervisor. And we&#39;ve been doing it for every single AES block! Needless to say, performing the equivalent of a very expensive context switch every 16 bytes is going to hurt encryption performance a bit. The reason why the kernel is issuing CLTS is because for performance reasons, the kernel doesn&#39;t save and restore FPU register state on kernel thread context switches. So whenever we need to use FPU registers inside the kernel, we must disable kernel thread preemption via a call to kpreempt_disable() and kpreempt_enable() and save and restore FPU register state manually. During this time, we cannot be descheduled (because if we were, some other thread might clobber our FPU registers), so if a thread does this for too long, it can lead to unexpected latency bubbles</p>

<p>The solution was to restructure the AES and KCF block crypto implementations in such a way that we execute encryption in meaningfully small chunks. I opted for 32k bytes, for reasons which I&#39;ll explain below. Unfortunately, doing this restructuring work was a bit more complicated than one would imagine, since in the KCF the implementation of the AES encryption algorithm and the block cipher modes is separated into two separate modules that interact through an internal API, which wasn&#39;t really conducive to high performance (we&#39;ll get to that later). Anyway, having fixed the issue here and running the code at near native speed, this is what I get:</p>
</blockquote>

<p>AES-128/CTR: 439 MB/s</p>

<p>AES-128/CBC: 483 MB/s</p>

<p>AES-128/GCM: 252 MB/s</p>

<blockquote>
<p>Not disastrous anymore, but still, very, very bad. Of course, you&#39;ve got keep in mind, the thing we&#39;re comparing it to, OpenSSL, is no slouch. It&#39;s got hand-written highly optimized inline assembly implementations of most of these encryption functions and their specific modes, for lots of platforms. That&#39;s a ton of code to maintain and optimize, but I&#39;ll be damned if I let this kind of performance gap persist.</p>

<p>Fixing this, however, is not so trivial anymore. It pertains to how the KCF&#39;s block cipher mode API interacts with the cipher algorithms. It is beautifully designed and implemented in a fashion that creates minimum code duplication, but this also means that it&#39;s inherently inefficient.</p>

<p>ECB, CBC and CTR gained the ability to pass an algorithm-specific &quot;fastpath&quot; implementation of the block cipher mode, because these functions benefit greatly from pipelining multiple cipher calls into a single place.</p>

<p>ECB, CTR and CBC decryption benefit enormously from being able to exploit the wide XMM register file on Intel to perform encryption/decryption operations on 8 blocks at the same time in a non-interlocking manner. The performance gains here are on the order of 5-8x.CBC encryption benefits from not having to copy the previously encrypted ciphertext blocks into memory and back into registers to XOR them with the subsequent plaintext blocks, though here the gains are more modest, around 1.3-1.5x.</p>

<p>After all of this work, this is how the results now look on Illumos, even inside of a VM:</p>
</blockquote>

<p>Algorithm/Mode 128k ops</p>

<p>AES-128/CTR: 3121 MB/s</p>

<p>AES-128/CBC: 691 MB/s</p>

<p>AES-128/GCM: 1053 MB/s</p>

<ul>
<li>So the CTR and GCM speeds have actually caught up to OpenSSL, and CBC is actually faster than OpenSSL.</li>
</ul>

<blockquote>
<p>On the decryption side of things, CBC decryption also jumped from 627 MB/s to 3011 MB/s. Seeing these performance numbers, you can see why I chose 32k for the operation size in between kernel preemption barriers. Even on the slowest hardware with AES-NI, we can expect at least 300-400 MB/s/core of throughput, so even in the worst case, we&#39;ll be hogging the CPU for at most ~0.1ms per run.</p>

<p>Overall, we&#39;re even a little bit faster than OpenSSL in some tests, though that&#39;s probably down to us encrypting 128k blocks vs 8k in the &quot;openssl speed&quot; utility. Anyway, having fixed this monstrous atrocity of a performance bug, I can now finally get some sleep.</p>
</blockquote>

<ul>
<li>To made these tests repeatable, and to ensure that the changes didn’t break the crypto algorithms, Saso created a crypto_test kernel module.</li>
<li>I have recently created a FreeBSD version of crypto_test.ko, for much the same purposes</li>
<li>Initial performance on FreeBSD is not as bad, if you have the aesni.ko module loaded, but it is not up to speed with OpenSSL. You cannot directly compare to the benchmarks Saso did, because the CPUs are vastly different.</li>
<li><a href="https://wiki.freebsd.org/OpenCryptoPerformance" rel="nofollow">Performance results</a></li>
<li>I hope to do some more tests on a range of different sized CPUs in order to determine how the algorithms scale across different clock speeds.</li>
<li>I also want to look at, or get help and have someone else look at, implementing some of the same optimizations that Saso did.</li>
<li>It currently seems like there isn’t a way to perform addition crypto operations in the same session without regenerating the key table. Processing additional buffers in an existing session might offer a number of optimizations for bulk operations, although in many cases, each block is encrypted with a different key and/or IV, so it might not be very useful.
***</li>
</ul>

<h3><a href="http://www.brendangregg.com/specials.html" rel="nofollow">Brendan Gregg’s special freeware tools for sysadmins</a></h3>

<ul>
<li>These tools need to be in every (not so) serious sysadmins toolbox. </li>
<li>Triple ROT13 encryption algorithm (beware: export restrictions may apply)</li>
<li>/usr/bin/maybe, in case true and false don’t provide too little choice...</li>
<li>The bottom command lists you all the processes using the least CPU cycles.</li>
<li>Check out the rest of the tools. </li>
<li>You wrote similar tools and want us to cover them in the show? Send us an email to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a> 
***</li>
</ul>

<h3><a href="http://www.lieberbiber.de/2017/03/14/a-look-at-the-year-20362038-problems-and-time-proofness-in-various-systems/" rel="nofollow">A look at 2038 </a></h3>

<blockquote>
<p>I remember the Y2K problem quite vividly. The world was going crazy for years, paying insane amounts of money to experts to fix critical legacy systems, and there was a neverending stream of predictions from the media on how it’s all going to fail. Most didn’t even understand what the problem was, and I remember one magazine writing something like the following:<br>
Most systems store the current year as a two-digit value to save space. When the value rolls over on New Year’s Eve 1999, those two digits will be “00”, and “00” means “halt operation” in the machine language of many central processing units. If you’re in an elevator at this time, it will stop working and you may fall to your death.<br>
I still don’t know why they thought a computer would suddenly interpret data as code, but people believed them. We could see a nearby hydropower plant from my parents’ house, and we expected it to go up in flames as soon as the clock passed midnight, while at least two airplanes crashed in our garden at the same time. Then nothing happened. I think one of the most “severe” problems was the police not being able to open their car garages the next day because their RFID tokens had both a start and end date for validity, and the system clock had actually rolled over to 1900, so the tokens were “not yet valid”.<br>
That was 17 years ago. One of the reasons why Y2K wasn’t as bad as it could have been is that many systems had never used the “two-digit-year” representation internally, but use some form of “timestamp” relative to a fixed date (the “epoch”).<br>
The actual problem with time and dates rolling over is that systems calculate timestamp differences all day. Since a timestamp derived from the system clock seemingly only increases with each query, it is very common to just calculate diff = now - before and never care about the fact that now could suddenly be lower than before because the system clock has rolled over. In this case diff is suddenly negative, and if other parts of the code make further use of the suddenly negative value, things can go horribly wrong.<br>
A good example was a bug in the generator control units (GCUs) aboard Boeing 787 “Dreamliner” aircrafts, discovered in 2015. An internal timestamp counter would overflow roughly 248 days after the system had been powered on, triggering a shut down to “safe mode”. The aircraft has four generator units, but if all were powered up at the same time, they would all fail at the same time. This sounds like an overflow caused by a signed 32-bit counter counting the number of centiseconds since boot, overflowing after 248.55 days, and luckily no airline had been using their Boing 787 models for such a long time between maintenance intervals.<br>
The “obvious” solution is to simply switch to 64-Bit values and call it day, which would push overflow dates far into the future (as long as you don’t do it like the IBM S/370 mentioned before). But as we’ve learned from the Y2K problem, you have to assume that computer systems, computer software and stored data (which often contains timestamps in some form) will stay with us for much longer than we might think. The years 2036 and 2038 might be far in the future, but we have to assume that many of the things we make and sell today are going to be used and supported for more than just 19 years. Also many systems have to store dates which are far in the future. A 30 year mortgage taken out in 2008 could have already triggered the bug, and for some banks it supposedly did.<br>
sys_gettimeofday() is one of the most used system calls on a generic Linux system and returns the current time in form of an UNIX timestamp (time_t data type) plus fraction (suseconds_t data type). Many applications have to know the current time and date to do things, e.g. displaying it, using it in game timing loops, invalidating caches after their lifetime ends, perform an action after a specific moment has passed, etc. In a 32-Bit UNIX system, time_t is usually defined as a signed 32-Bit Integer.<br>
When kernel, libraries and applications are compiled, the compiler will turn this assumption machine code and all components later have to match each other. So a 32-Bit Linux application or library still expects the kernel to return a 32-Bit value even if the kernel is running on a 64-Bit architecture and has 32-Bit compatibility. The same holds true for applications calling into libraries. This is a major problem, because there will be a lot of legacy software running in 2038. Systems which used an unsigned 32-Bit Integer for time_t push the problem back to 2106, but I don’t know about many of those.<br>
The developers of the GNU C library (glibc), the default standard C library for many GNU/Linux systems, have come up with a design for year 2038 proofness for their library. Besides the time_t data type itself, a number of other data structures have fields based on time_t or the combined struct timespec and struct timeval types. Many methods beside those intended for setting and querying the current time use timestamps<br>
32-Bit Windows applications, or Windows applications defining _USE_32BIT_TIME_T, can be hit by the year 2038 problem too if they use the time_t data type. The __time64_t data type had been available since Visual C 7.1, but only Visual C 8 (default with Visual Studio 2015) expanded time_t to 64 bits by default. The change will only be effective after a recompilation, legacy applications will continue to be affected.<br>
If you live in a 64-Bit world and use a 64-Bit kernel with 64-Bit only applications, you might think you can just ignore the problem. In such a constellation all instances of the standard time_t data type for system calls, libraries and applications are signed 64-Bit Integers which will overflow in around 292 billion years. But many data formats, file systems and network protocols still specify 32-Bit time fields, and you might have to read/write this data or talk to legacy systems after 2038. So solving the problem on your side alone is not enough.</p>
</blockquote>

<ul>
<li>Then the article goes on to describe how all of this will break your file systems. Not to mention your databases and other file formats.</li>
<li>Also see <a href="https://www.openbsd.org/papers/eurobsdcon_2013_time_t/mgp00001.html" rel="nofollow">Theo De Raadt’s EuroBSDCon 2013 Presentation</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://blather.michaelwlucas.com/archives/2895" rel="nofollow">Michael Lucas: Get your name in “Absolute FreeBSD 3rd Edition”</a></p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=r315435" rel="nofollow">ZFS compressed ARC stats to top</a></p></li>
<li><p><a href="https://www.dragonflydigest.com/2017/03/14/19452.html" rel="nofollow">Matthew Dillon discovered HAMMER was repeating itself when writing to disk.  Fixing that issue doubled write speeds</a></p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/shrt-nms-fr-clrty" rel="nofollow">TedU on Meaningful Short Names </a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/submit-your-work-vbsdcon-and-eurobsdcon-cfps-now-open/" rel="nofollow">vBSDcon and EuroBSDcon Call for Papers are open</a></p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/NMshpZ7n" rel="nofollow">Craig asks about BSD server management</a></li>
<li><a href="http://pastebin.com/UqRwMcRk" rel="nofollow">Michael asks about jails as a router between networks</a></li>
<li><a href="http://pastebin.com/i1ZD6eXN" rel="nofollow">Todd asks about connecting jails </a></li>
<li><a href="http://pastebin.com/QzW5c9wV" rel="nofollow">Dave writes in with an interesting link</a>
&gt; applications crash more often due to errors than corruptions. In the case of corruption, a few applications (e.g., Log-Cabin, ZooKeeper) can use checksums and redundancy to recover, leading to a correct behavior; however, when the corruption is transformed into an error, these applications crash, resulting in reduced availability.
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, reports from AsiaBSDcon, TrueOS and FreeBSD news,  Optimizing IllumOS Kernel, your questions and more.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="" rel="nofollow">AsiaBSDcon Reports and Reviews</a></h3>

<ul>
<li><a href="https://2017.asiabsdcon.org/program.html.en" rel="nofollow">AsiaBSDcon schedule</a></li>
<li><a href="http://bhyvecon.org/" rel="nofollow">Schedule and slides from the 4th bhyvecon</a></li>
<li><a href="https://www.ixsystems.com/blog/ixsystems-attends-asiabsdcon-2017" rel="nofollow">Michael Dexter’s trip report on the iXsystems blog</a></li>
<li><a href="http://mail-index.netbsd.org/netbsd-advocacy/2017/03/13/msg000729.html" rel="nofollow">NetBSD AsiaBSDcon booth report</a>
***</li>
</ul>

<h3><a href="https://www.trueos.org/blog/trueos-community-guidelines/" rel="nofollow">TrueOS Community Guidelines are here!</a></h3>

<ul>
<li>TrueOS has published its new Community Guidelines</li>
<li>The TrueOS Project has existed for over ten years. Until now, there was no formally defined process for interested individuals in the TrueOS community to earn contributor status as an active committer to this long-standing project. The current core TrueOS developers (Kris Moore, Ken Moore, and Joe Maloney) want to provide the community more opportunities to directly impact the TrueOS Project, and wish to formalize the process for interested people to gain full commit access to the TrueOS repositories.</li>
<li>These describe what is expected of community members and committers</li>
<li>They also describe the process of getting commit access to the TrueOS repo:</li>
</ul>

<blockquote>
<p>Previously, Kris directly handed out commit bits. Now, the Core developers have provided a small list of requirements for gaining a TrueOS commit bit:</p>

<p>Create five or more pull requests in a TrueOS Project repository within a single six month period. </p>

<p>Stay active in the TrueOS community through at least one of the available community channels (Gitter, Discourse, IRC, etc.). </p>

<p>Request commit access from the core developers via <a href="mailto:core@trueos.org" rel="nofollow">core@trueos.org</a> OR Core developers contact you concerning commit access.</p>

<p>Pull requests can be any contribution to the project, from minor documentation tweaks to creating full utilities.</p>

<p>At the end of every month, the core developers review the commit logs, removing elements that break the Project or deviate too far from its intended purpose. Additionally, outstanding pull requests with no active dissension are immediately merged, if possible. For example, a user submits a pull request which adds a little-used OpenRC script. No one from the community comments on the request or otherwise argues against its inclusion, resulting in an automatic merge at the end of the month. In this manner, solid contributions are routinely added to the project and never left in a state of “limbo”.</p>
</blockquote>

<ul>
<li>The page also describes the perks of being a TrueOS committer:</li>
</ul>

<blockquote>
<p>Contributors to the TrueOS Project enjoy a number of benefits, including:</p>

<p>A personal TrueOS email alias: <youralias>@trueos.org</p>

<p>Full access for managing TrueOS issues on GitHub.</p>

<p>Regular meetings with the core developers and other contributors.</p>

<p>Access to private chat channels with the core developers.</p>

<p>Recognition as part of an online Who’s Who of TrueOS developers.</p>

<p>The eternal gratitude of the core developers of TrueOS.</p>

<p>A warm, fuzzy feeling.</p>
</blockquote>

<hr>

<h3><a href="https://www.freebsdfoundation.org/news-and-events/latest-news/new-uranium-level-donation-and-collaborative-partnership-with-intel/" rel="nofollow">Intel Donates 250.000 $ to the FreeBSD Foundation</a></h3>

<ul>
<li>More details about the deal: Systems Thinking: <a href="https://www.freebsdfoundation.org/blog/systems-thinking-intel-and-the-freebsd-project/" rel="nofollow">Intel and the FreeBSD Project</a> </li>
</ul>

<blockquote>
<p>Intel will be more actively engaging with the FreeBSD Foundation and the FreeBSD Project to deliver more timely support for Intel products and technologies in FreeBSD.</p>

<p>Intel has contributed code to FreeBSD for individual device drivers (i.e. NICs) in the past, but is now seeking a more holistic “systems thinking” approach. </p>
</blockquote>

<ul>
<li><a href="https://01.org/blogs/imad/2017/intel-increases-support-freebsd-project" rel="nofollow">Intel Blog Post </a></li>
</ul>

<blockquote>
<p>We will work closely with the FreeBSD Foundation to ensure the drivers, tools, and applications needed on Intel® SSD-based storage appliances are available to the community. This collaboration will also provide timely support for future Intel® 3D XPoint™ products.</p>
</blockquote>

<ul>
<li>Thank you very much, Intel!
***</li>
</ul>

<h3><a href="https://globalengineer.wordpress.com/2017/03/05/applied-freebsd-basic-iscsi/" rel="nofollow">Applied FreeBSD: Basic iSCSI</a></h3>

<blockquote>
<p>iSCSI is often touted as a low-cost replacement for fibre-channel (FC) Storage Area Networks (SANs). Instead of having to setup a separate fibre-channel network for the SAN, or invest in the infrastructure to run Fibre-Channel over Ethernet (FCoE), iSCSI runs on top of standard TCP/IP. This means that the same network equipment used for routing user data on a network could be utilized for the storage as well.</p>

<p>This article will cover a very basic setup where a FreeBSD server is configured as an iSCSI Target, and another FreeBSD server is configured as the iSCSI Initiator. The iSCSI Target will export a single disk drive, and the initiator will create a filesystem on this disk and mount it locally. Advanced topics, such as multipath, ZFS storage pools, failover controllers, etc. are not covered.</p>

<p>The real magic is the /etc/ctl.conf file, which contains all of the information necessary for ctld to share disk drives on the network. Check out the man page for /etc/ctl.conf for more details; below is the configuration file that I created for this test setup. Note that on a system that has never had iSCSI configured, there will be no existing configuration file, so go ahead and create it.</p>
</blockquote>

<ul>
<li><p>Then, enable ctld and start it:</p>

<ul>
<li>sysrc ctld_enable=”YES”</li>
<li>service ctld start</li>
</ul></li>
<li><p>You can use the ctladm command to see what is going on:</p></li>
</ul>

<p>root@bsdtarget:/dev # ctladm lunlist</p>

<p>(7:0:0/0): <FREEBSD CTLDISK 0001> Fixed Direct Access SPC-4 SCSI device</p>

<p>(7:0:1/1): <FREEBSD CTLDISK 0001> Fixed Direct Access SPC-4 SCSI device</p>

<p>root@bsdtarget:/dev # ctladm devlist</p>

<p>LUN Backend Size (Blocks) BS Serial Number Device ID</p>

<p>0 block 10485760 512 MYSERIAL 0 MYDEVID 0</p>

<p>1 block 10485760 512 MYSERIAL 1 MYDEVID 1</p>

<ul>
<li>Now, let’s configure the client side:</li>
</ul>

<blockquote>
<p>In order for a FreeBSD host to become an iSCSI Initiator, the iscsd daemon needs to be started.</p>
</blockquote>

<ul>
<li><p>sysrc iscsid_enable=”YES”</p></li>
<li><p>service iscsid start</p></li>
</ul>

<blockquote>
<p>Next, the iSCSI Initiator can manually connect to the iSCSI target using the iscsictl tool. While setting up a new iSCSI session, this is probably the best option. Once you are sure the configuration is correct, add the configuration to the /etc/iscsi.conf file (see man page for this file). For iscsictl, pass the IP address of the target as well as the iSCSI IQN for the session:</p>
</blockquote>

<pre><code>+ iscsictl -A -p 192.168.22.128 -t iqn.2017-02.lab.testing:basictarget
</code></pre>

<ul>
<li><p>You should now have a new device (check dmesg), in this case, da1</p></li>
<li><p>The guide them walks through partitioning the disk, and laying down a UFS file system, and mounting it</p></li>
<li><p>This it walks through how to disconnect iscsi, incase you don’t want it anymore</p></li>
<li><p>This all looked nice and easy, and it works very well. Now lets see what happens when you try to mount the iSCSI from Windows</p></li>
<li><p>Ok, that wasn’t so bad.</p></li>
<li><p>Now, instead of sharing an entire space disk on the host via iSCSI, share a zvol. Now your windows machine can be backed by ZFS. All of your problems are solved.</p></li>
</ul>

<hr>

<h2>Interview - Philipp Buehler - <a href="mailto:pbuehler@sysfive.com" rel="nofollow">pbuehler@sysfive.com</a></h2>

<p>Technical Lead at SysFive, and Former OpenBSD Committer</p>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170316080827" rel="nofollow">Half a dozen new features in mandoc -T html</a></h3>

<ul>
<li><a href="http://man.openbsd.org/mandoc.1" rel="nofollow">mandoc</a>’s HTML output mode got some new features</li>
</ul>

<blockquote>
<p>Even though mdoc(7) is a semantic markup language, traditionally none of the semantic annotations were communicated to the reader. [...] Now, at least in -T html output mode, you can see the semantic function of marked-up words by hovering your mouse over them.</p>

<p>In terminal output modes, we have the ctags(1)-like internal search facility built around the less(1) tag jump (:t) feature for quite some time now. We now have a similar feature in -T html output mode. To jump to (almost) the same places in the text, go to the address bar of the browser, type a hash mark (&#39;#&#39;) after the URI, then the name of the option, command, variable, error code etc. you want to jump to, and hit enter.</p>
</blockquote>

<ul>
<li>Check out the full report by Ingo Schwarze (schwarze@) and try out these new features
***</li>
</ul>

<h3><a href="http://zfs-create.blogspot.com/2014/05/optimizing-illumos-kernel-crypto.html" rel="nofollow">Optimizing IllumOS Kernel Crypto</a></h3>

<ul>
<li>Sašo Kiselkov, of ZFS fame, looked into the performance of the OpenSolaris kernel crypto framework and found it lacking.</li>
<li>The article also spends a few minutes on the different modes and how they work.</li>
</ul>

<blockquote>
<p>Recently I&#39;ve had some motivation to look into the KCF on Illumos and discovered that, unbeknownst to me, we already had an AES-NI implementation that was automatically enabled when running on Intel and AMD CPUs with AES-NI support. This work was done back in 2010 by Dan Anderson.This was great news, so I set out to test the performance in Illumos in a VM on my Mac with a Core i5 3210M (2.5GHz normal, 3.1GHz turbo).</p>
</blockquote>

<ul>
<li>The initial tests of “what the hardware can do” were done in OpenSSL</li>
</ul>

<blockquote>
<p>So now comes the test for the KCF. I wrote a quick&#39;n&#39;dirty crypto test module that just performed a bunch of encryption operations and timed the results.</p>
</blockquote>

<ul>
<li>KCF got around 100 MB/s for each algorithm, except half that for AES-GCM</li>
<li>OpenSSL had done over 3000 MB/s for CTR mode, 500 MB/s for CBC, and 1000 MB/s for GCM</li>
</ul>

<blockquote>
<p>What the hell is that?! This is just plain unacceptable. Obviously we must have hit some nasty performance snag somewhere, because this is comical. And sure enough, we did.</p>

<p>When looking around in the AES-NI implementation I came across this bit in aes_intel.s that performed the CLTS instruction.</p>

<p>This is a problem: 3.1.2 Instructions That Cause VM Exits ConditionallyCLTS. The CLTS instruction causes a VM exit if the bits in position 3 (corresponding to CR0.TS) are set in both the CR0 guest/host mask and the CR0 read shadow.</p>

<p>The CLTS instruction signals to the CPU that we&#39;re about to use FPU registers (which is needed for AES-NI), which in VMware causes an exit into the hypervisor. And we&#39;ve been doing it for every single AES block! Needless to say, performing the equivalent of a very expensive context switch every 16 bytes is going to hurt encryption performance a bit. The reason why the kernel is issuing CLTS is because for performance reasons, the kernel doesn&#39;t save and restore FPU register state on kernel thread context switches. So whenever we need to use FPU registers inside the kernel, we must disable kernel thread preemption via a call to kpreempt_disable() and kpreempt_enable() and save and restore FPU register state manually. During this time, we cannot be descheduled (because if we were, some other thread might clobber our FPU registers), so if a thread does this for too long, it can lead to unexpected latency bubbles</p>

<p>The solution was to restructure the AES and KCF block crypto implementations in such a way that we execute encryption in meaningfully small chunks. I opted for 32k bytes, for reasons which I&#39;ll explain below. Unfortunately, doing this restructuring work was a bit more complicated than one would imagine, since in the KCF the implementation of the AES encryption algorithm and the block cipher modes is separated into two separate modules that interact through an internal API, which wasn&#39;t really conducive to high performance (we&#39;ll get to that later). Anyway, having fixed the issue here and running the code at near native speed, this is what I get:</p>
</blockquote>

<p>AES-128/CTR: 439 MB/s</p>

<p>AES-128/CBC: 483 MB/s</p>

<p>AES-128/GCM: 252 MB/s</p>

<blockquote>
<p>Not disastrous anymore, but still, very, very bad. Of course, you&#39;ve got keep in mind, the thing we&#39;re comparing it to, OpenSSL, is no slouch. It&#39;s got hand-written highly optimized inline assembly implementations of most of these encryption functions and their specific modes, for lots of platforms. That&#39;s a ton of code to maintain and optimize, but I&#39;ll be damned if I let this kind of performance gap persist.</p>

<p>Fixing this, however, is not so trivial anymore. It pertains to how the KCF&#39;s block cipher mode API interacts with the cipher algorithms. It is beautifully designed and implemented in a fashion that creates minimum code duplication, but this also means that it&#39;s inherently inefficient.</p>

<p>ECB, CBC and CTR gained the ability to pass an algorithm-specific &quot;fastpath&quot; implementation of the block cipher mode, because these functions benefit greatly from pipelining multiple cipher calls into a single place.</p>

<p>ECB, CTR and CBC decryption benefit enormously from being able to exploit the wide XMM register file on Intel to perform encryption/decryption operations on 8 blocks at the same time in a non-interlocking manner. The performance gains here are on the order of 5-8x.CBC encryption benefits from not having to copy the previously encrypted ciphertext blocks into memory and back into registers to XOR them with the subsequent plaintext blocks, though here the gains are more modest, around 1.3-1.5x.</p>

<p>After all of this work, this is how the results now look on Illumos, even inside of a VM:</p>
</blockquote>

<p>Algorithm/Mode 128k ops</p>

<p>AES-128/CTR: 3121 MB/s</p>

<p>AES-128/CBC: 691 MB/s</p>

<p>AES-128/GCM: 1053 MB/s</p>

<ul>
<li>So the CTR and GCM speeds have actually caught up to OpenSSL, and CBC is actually faster than OpenSSL.</li>
</ul>

<blockquote>
<p>On the decryption side of things, CBC decryption also jumped from 627 MB/s to 3011 MB/s. Seeing these performance numbers, you can see why I chose 32k for the operation size in between kernel preemption barriers. Even on the slowest hardware with AES-NI, we can expect at least 300-400 MB/s/core of throughput, so even in the worst case, we&#39;ll be hogging the CPU for at most ~0.1ms per run.</p>

<p>Overall, we&#39;re even a little bit faster than OpenSSL in some tests, though that&#39;s probably down to us encrypting 128k blocks vs 8k in the &quot;openssl speed&quot; utility. Anyway, having fixed this monstrous atrocity of a performance bug, I can now finally get some sleep.</p>
</blockquote>

<ul>
<li>To made these tests repeatable, and to ensure that the changes didn’t break the crypto algorithms, Saso created a crypto_test kernel module.</li>
<li>I have recently created a FreeBSD version of crypto_test.ko, for much the same purposes</li>
<li>Initial performance on FreeBSD is not as bad, if you have the aesni.ko module loaded, but it is not up to speed with OpenSSL. You cannot directly compare to the benchmarks Saso did, because the CPUs are vastly different.</li>
<li><a href="https://wiki.freebsd.org/OpenCryptoPerformance" rel="nofollow">Performance results</a></li>
<li>I hope to do some more tests on a range of different sized CPUs in order to determine how the algorithms scale across different clock speeds.</li>
<li>I also want to look at, or get help and have someone else look at, implementing some of the same optimizations that Saso did.</li>
<li>It currently seems like there isn’t a way to perform addition crypto operations in the same session without regenerating the key table. Processing additional buffers in an existing session might offer a number of optimizations for bulk operations, although in many cases, each block is encrypted with a different key and/or IV, so it might not be very useful.
***</li>
</ul>

<h3><a href="http://www.brendangregg.com/specials.html" rel="nofollow">Brendan Gregg’s special freeware tools for sysadmins</a></h3>

<ul>
<li>These tools need to be in every (not so) serious sysadmins toolbox. </li>
<li>Triple ROT13 encryption algorithm (beware: export restrictions may apply)</li>
<li>/usr/bin/maybe, in case true and false don’t provide too little choice...</li>
<li>The bottom command lists you all the processes using the least CPU cycles.</li>
<li>Check out the rest of the tools. </li>
<li>You wrote similar tools and want us to cover them in the show? Send us an email to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a> 
***</li>
</ul>

<h3><a href="http://www.lieberbiber.de/2017/03/14/a-look-at-the-year-20362038-problems-and-time-proofness-in-various-systems/" rel="nofollow">A look at 2038 </a></h3>

<blockquote>
<p>I remember the Y2K problem quite vividly. The world was going crazy for years, paying insane amounts of money to experts to fix critical legacy systems, and there was a neverending stream of predictions from the media on how it’s all going to fail. Most didn’t even understand what the problem was, and I remember one magazine writing something like the following:<br>
Most systems store the current year as a two-digit value to save space. When the value rolls over on New Year’s Eve 1999, those two digits will be “00”, and “00” means “halt operation” in the machine language of many central processing units. If you’re in an elevator at this time, it will stop working and you may fall to your death.<br>
I still don’t know why they thought a computer would suddenly interpret data as code, but people believed them. We could see a nearby hydropower plant from my parents’ house, and we expected it to go up in flames as soon as the clock passed midnight, while at least two airplanes crashed in our garden at the same time. Then nothing happened. I think one of the most “severe” problems was the police not being able to open their car garages the next day because their RFID tokens had both a start and end date for validity, and the system clock had actually rolled over to 1900, so the tokens were “not yet valid”.<br>
That was 17 years ago. One of the reasons why Y2K wasn’t as bad as it could have been is that many systems had never used the “two-digit-year” representation internally, but use some form of “timestamp” relative to a fixed date (the “epoch”).<br>
The actual problem with time and dates rolling over is that systems calculate timestamp differences all day. Since a timestamp derived from the system clock seemingly only increases with each query, it is very common to just calculate diff = now - before and never care about the fact that now could suddenly be lower than before because the system clock has rolled over. In this case diff is suddenly negative, and if other parts of the code make further use of the suddenly negative value, things can go horribly wrong.<br>
A good example was a bug in the generator control units (GCUs) aboard Boeing 787 “Dreamliner” aircrafts, discovered in 2015. An internal timestamp counter would overflow roughly 248 days after the system had been powered on, triggering a shut down to “safe mode”. The aircraft has four generator units, but if all were powered up at the same time, they would all fail at the same time. This sounds like an overflow caused by a signed 32-bit counter counting the number of centiseconds since boot, overflowing after 248.55 days, and luckily no airline had been using their Boing 787 models for such a long time between maintenance intervals.<br>
The “obvious” solution is to simply switch to 64-Bit values and call it day, which would push overflow dates far into the future (as long as you don’t do it like the IBM S/370 mentioned before). But as we’ve learned from the Y2K problem, you have to assume that computer systems, computer software and stored data (which often contains timestamps in some form) will stay with us for much longer than we might think. The years 2036 and 2038 might be far in the future, but we have to assume that many of the things we make and sell today are going to be used and supported for more than just 19 years. Also many systems have to store dates which are far in the future. A 30 year mortgage taken out in 2008 could have already triggered the bug, and for some banks it supposedly did.<br>
sys_gettimeofday() is one of the most used system calls on a generic Linux system and returns the current time in form of an UNIX timestamp (time_t data type) plus fraction (suseconds_t data type). Many applications have to know the current time and date to do things, e.g. displaying it, using it in game timing loops, invalidating caches after their lifetime ends, perform an action after a specific moment has passed, etc. In a 32-Bit UNIX system, time_t is usually defined as a signed 32-Bit Integer.<br>
When kernel, libraries and applications are compiled, the compiler will turn this assumption machine code and all components later have to match each other. So a 32-Bit Linux application or library still expects the kernel to return a 32-Bit value even if the kernel is running on a 64-Bit architecture and has 32-Bit compatibility. The same holds true for applications calling into libraries. This is a major problem, because there will be a lot of legacy software running in 2038. Systems which used an unsigned 32-Bit Integer for time_t push the problem back to 2106, but I don’t know about many of those.<br>
The developers of the GNU C library (glibc), the default standard C library for many GNU/Linux systems, have come up with a design for year 2038 proofness for their library. Besides the time_t data type itself, a number of other data structures have fields based on time_t or the combined struct timespec and struct timeval types. Many methods beside those intended for setting and querying the current time use timestamps<br>
32-Bit Windows applications, or Windows applications defining _USE_32BIT_TIME_T, can be hit by the year 2038 problem too if they use the time_t data type. The __time64_t data type had been available since Visual C 7.1, but only Visual C 8 (default with Visual Studio 2015) expanded time_t to 64 bits by default. The change will only be effective after a recompilation, legacy applications will continue to be affected.<br>
If you live in a 64-Bit world and use a 64-Bit kernel with 64-Bit only applications, you might think you can just ignore the problem. In such a constellation all instances of the standard time_t data type for system calls, libraries and applications are signed 64-Bit Integers which will overflow in around 292 billion years. But many data formats, file systems and network protocols still specify 32-Bit time fields, and you might have to read/write this data or talk to legacy systems after 2038. So solving the problem on your side alone is not enough.</p>
</blockquote>

<ul>
<li>Then the article goes on to describe how all of this will break your file systems. Not to mention your databases and other file formats.</li>
<li>Also see <a href="https://www.openbsd.org/papers/eurobsdcon_2013_time_t/mgp00001.html" rel="nofollow">Theo De Raadt’s EuroBSDCon 2013 Presentation</a>
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://blather.michaelwlucas.com/archives/2895" rel="nofollow">Michael Lucas: Get your name in “Absolute FreeBSD 3rd Edition”</a></p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=r315435" rel="nofollow">ZFS compressed ARC stats to top</a></p></li>
<li><p><a href="https://www.dragonflydigest.com/2017/03/14/19452.html" rel="nofollow">Matthew Dillon discovered HAMMER was repeating itself when writing to disk.  Fixing that issue doubled write speeds</a></p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/shrt-nms-fr-clrty" rel="nofollow">TedU on Meaningful Short Names </a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/submit-your-work-vbsdcon-and-eurobsdcon-cfps-now-open/" rel="nofollow">vBSDcon and EuroBSDcon Call for Papers are open</a></p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/NMshpZ7n" rel="nofollow">Craig asks about BSD server management</a></li>
<li><a href="http://pastebin.com/UqRwMcRk" rel="nofollow">Michael asks about jails as a router between networks</a></li>
<li><a href="http://pastebin.com/i1ZD6eXN" rel="nofollow">Todd asks about connecting jails </a></li>
<li><a href="http://pastebin.com/QzW5c9wV" rel="nofollow">Dave writes in with an interesting link</a>
&gt; applications crash more often due to errors than corruptions. In the case of corruption, a few applications (e.g., Log-Cabin, ZooKeeper) can use checksums and redundancy to recover, leading to a correct behavior; however, when the corruption is transformed into an error, these applications crash, resulting in reduced availability.
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>185: Exit Interview</title>
  <link>https://www.bsdnow.tv/185</link>
  <guid isPermaLink="false">446a8257-5abe-44a0-848d-f0fa050eec68</guid>
  <pubDate>Thu, 16 Mar 2017 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/446a8257-5abe-44a0-848d-f0fa050eec68.mp3" length="39697780" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This is a very special BSD Now! New exciting changes are coming to the show and we’re gonna cover them, so stick around or you’ll miss it!</itunes:subtitle>
  <itunes:duration>55:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This is a very special BSD Now! New exciting changes are coming to the show and we’re gonna cover them, so stick around or you’ll miss it!&lt;/p&gt;

&lt;p&gt;&lt;/p&gt;&lt;h2&gt;Interview – Kris Moore – &lt;a href="mailto:kris@trueos.org" target="_blank" rel="nofollow noopener"&gt;&lt;/a&gt;&lt;a href="mailto:kris@trueos.org" target="_blank" rel="nofollow noopener"&gt;kris@trueos.org&lt;/a&gt; / &lt;a href="https://twitter.com/pcbsdKris" target="_blank" rel="nofollow noopener"&gt;@pcbsdKris&lt;/a&gt;&lt;br&gt;
&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;TrueOS founder, FreeNAS developer, BSD Now co-host&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Benedict Reuschling – &lt;a href="mailto:bcr@freebsd.org" target="_blank" rel="nofollow noopener"&gt;&lt;/a&gt;&lt;a href="mailto:bcr@freebsd.org" target="_blank" rel="nofollow noopener"&gt;bcr@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/bsdbcr" target="_blank" rel="nofollow noopener"&gt;@bsdbcr&lt;/a&gt;&lt;br&gt;
&lt;/h2&gt;&lt;ul&gt;
&lt;br&gt;
&lt;li&gt;FreeBSD commiter &amp;amp; FreeBSD Foundation Vice President, BSD Now co-host&lt;/li&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;/p&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This is a very special BSD Now! New exciting changes are coming to the show and we’re gonna cover them, so stick around or you’ll miss it!</p>

<p><h2>Interview – Kris Moore – <a href="mailto:kris@trueos.org"><a href="mailto:kris@trueos.org" rel="nofollow">kris@trueos.org</a></a> / <a href="https://twitter.com/pcbsdKris">@pcbsdKris</a></h2><ul><li>TrueOS founder, FreeNAS developer, BSD Now co-host</li></ul><h2>Benedict Reuschling – <a href="mailto:bcr@freebsd.org"><a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></a> / <a href="https://twitter.com/bsdbcr">@bsdbcr</a></h2><ul><li>FreeBSD commiter &amp; FreeBSD Foundation Vice President, BSD Now co-host</li></p>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This is a very special BSD Now! New exciting changes are coming to the show and we’re gonna cover them, so stick around or you’ll miss it!</p>

<p><h2>Interview – Kris Moore – <a href="mailto:kris@trueos.org"><a href="mailto:kris@trueos.org" rel="nofollow">kris@trueos.org</a></a> / <a href="https://twitter.com/pcbsdKris">@pcbsdKris</a></h2><ul><li>TrueOS founder, FreeNAS developer, BSD Now co-host</li></ul><h2>Benedict Reuschling – <a href="mailto:bcr@freebsd.org"><a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></a> / <a href="https://twitter.com/bsdbcr">@bsdbcr</a></h2><ul><li>FreeBSD commiter &amp; FreeBSD Foundation Vice President, BSD Now co-host</li></p>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>184: Tokyo Dreaming</title>
  <link>https://www.bsdnow.tv/184</link>
  <guid isPermaLink="false">5dde9785-effd-47e6-bcad-d71fe4690749</guid>
  <pubDate>Wed, 08 Mar 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5dde9785-effd-47e6-bcad-d71fe4690749.mp3" length="68369044" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, Allan and I are in Tokyo for AsiaBSDCon, but not to worry, we have a full episode lined up and ready to go. Hackathon reports</itunes:subtitle>
  <itunes:duration>1:34:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, Allan and I are in Tokyo for AsiaBSDCon, but not to worry, we have a full episode lined up and ready to go. Hackathon reports&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;OpenBSD A2k17 hackathon reports&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170131101827" target="_blank" rel="nofollow noopener"&gt;a2k17 hackathon report: Patrick Wildt on the arm64 port&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170203232049" target="_blank" rel="nofollow noopener"&gt;a2k17 hackathon report: Antoine Jacoutot on syspatch, rc.d improvements and more&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170127154356" target="_blank" rel="nofollow noopener"&gt;a2k17 hackathon report: Martin Pieuchot on NET_LOCK and much more &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170127031836" target="_blank" rel="nofollow noopener"&gt;a2k17 hackathon report: Kenneth Westerback on the hidden wonders of the build system, the network stack and more &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170125225403" target="_blank" rel="nofollow noopener"&gt;a2k17 hackathon report: Bob Beck on LibreSSL progress and more &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_fully_reproducible_builds" target="_blank" rel="nofollow noopener"&gt;NetBSD is now reproducible &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Christos Zoulas posts to the NetBSD blog that he has completed his project to make fully reproducible NetBSD builds for amd64 and sparc64&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I have been working on and off for almost a year trying to get reproducible builds (the same source tree always builds an identical cdrom) on NetBSD. I did not think at the time it would take as long or be so difficult, so I did not keep a log of all the changes I needed to make. I was also not the only one working on this. Other NetBSD developers have been making improvements for the past 6 years. I would like to acknowledge the NetBSD build system (aka build.sh) which is a fully portable cross-build system. This build system has given us a head-start in the reproducible builds work.&lt;/p&gt;

&lt;p&gt;&amp;gt; I would also like to acknowledge the work done by the Debian folks who have provided a platform to run, test and analyze reproducible builds. Special mention to the diffoscope tool that gives an excellent overview of what's different between binary files, by finding out what they are (and if they are containers what they contain) and then running the appropriate formatter and diff program to show what's different for each file.&lt;/p&gt;

&lt;p&gt;&amp;gt; Finally other developers who have started, motivated and did a lot of work getting us here like Joerg Sonnenberger and Thomas Klausner for their work on reproducible builds, and Todd Vierling and Luke Mewburn for their work on build.sh.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Some of the stumbling blocks that were overcome:

&lt;ul&gt;
&lt;li&gt;Timestamps&lt;/li&gt;
&lt;li&gt;Date/time/author embedded in source files&lt;/li&gt;
&lt;li&gt;Timezone sensitive code&lt;/li&gt;
&lt;li&gt;Directory order / build order&lt;/li&gt;
&lt;li&gt;Non-sanitized data stored in files&lt;/li&gt;
&lt;li&gt;Symbolic links / paths&lt;/li&gt;
&lt;li&gt;General tool inconsistencies: including gcc profiling, the fact that GPT partition tables, are by definition, globally unique each time they are created, and the iso9660 standard calls for a timestamp with a timezone.&lt;/li&gt;
&lt;li&gt;Toolchain&lt;/li&gt;
&lt;li&gt;Build information / tunables / environment. NetBSD now has a knob ‘MKREPRO’, if set to YES it sets a long list of variables to a consistent set of a values.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The post walks through how these problems where solves&lt;/li&gt;
&lt;li&gt;Future Work:

&lt;ul&gt;
&lt;li&gt;Vary more parameters and find more inconsistencies&lt;/li&gt;
&lt;li&gt;Verify that cross-building is reproducible&lt;/li&gt;
&lt;li&gt;Verify that unprivileged builds are reproducible&lt;/li&gt;
&lt;li&gt;Test on other platforms
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/features-are-faults-redux" target="_blank" rel="nofollow noopener"&gt;Features are faults redux&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;From Ted Unangst&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Last week I gave a talk for the security class at Notre Dame based on features are faults but with some various commentary added. It was an exciting trip, with the opportunity to meet and talk with the computer vision group as well. Some other highlights include the Indiana skillet I had for breakfast, which came with pickles and was amazing, and explaining the many wonders of cvs to the Linux users group over lunch. After that came the talk, which went a little something like this.&lt;/p&gt;

&lt;p&gt;&amp;gt; I got started with OpenBSD back about the same time I started college, although I had a slightly different perspective then. I was using OpenBSD because it included so many security features, therefore it must be the most secure system, right? For example, at some point I acquired a second computer. What’s the first thing anybody does when they get a second computer? That’s right, set up a kerberos domain. The idea that more is better was everywhere. This was also around the time that ipsec was getting its final touches, and everybody knew ipsec was going to be the most secure protocol ever because it had more options than any other secure transport. We’ll revisit this in a bit.&lt;/p&gt;

&lt;p&gt;&amp;gt; There’s been a partial attitude adjustment since then, with more people recognizing that layering complexity doesn’t result in more security. It’s not an additive process. There’s a whole talk there, about the perfect security that people can’t or won’t use. OpenBSD has definitely switched directions, including less code, not more. All the kerberos code was deleted a few years ago.&lt;/p&gt;

&lt;p&gt;&amp;gt; Let’s assume about one bug per 100 lines of code. That’s probably on the low end. Now say your operating system has 100 million lines of code. If I’ve done the math correctly, that’s literally a million bugs. So that’s one reason to avoid adding features. But that’s a solveable problem. If we pick the right language and the right compiler and the right tooling and with enough eyeballs and effort, we can fix all the bugs. We know how to build mostly correct software, we just don’t care.&lt;/p&gt;

&lt;p&gt;&amp;gt; As we add features to software, increasing its complexity, new unexpected behaviors start to emerge. What are the bounds? How many features can you add before craziness is inevitable? We can make some guesses. Less than a thousand for sure. Probably less than a hundred? Ten maybe? I’ll argue the answer is quite possibly two. Interesting corollary is that it’s impossible to have a program with exactly two features. Any program with two features has at least a third, but you don’t know what it is&lt;/p&gt;

&lt;p&gt;&amp;gt; My first example is a bug in the NetBSD ftp client. We had one feature, we added a second feature, and just like that we got a &lt;a href="http://marc.info/?l=oss-security&amp;amp;m=141451507810253&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;third misfeature&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&amp;gt; Our story begins long ago. The origins of this bug are probably older than I am. In the dark times before the web, FTP sites used to be a pretty popular way of publishing files. You run an ftp client, connect to a remote site, and then you can browse the remote server somewhat like a local filesystem. List files, change directories, get files. Typically there would be a README file telling you what’s what, but you don’t need to download a copy to keep. Instead we can pipe the output to a program like more. Right there in the ftp client. No need to disconnect.&lt;/p&gt;

&lt;p&gt;&amp;gt; Fast forward a few decades, and http is the new protocol of choice. http is a much less interactive protocol, but the ftp client has some handy features for batch downloads like progress bars, etc. So let’s add http support to ftp. This works pretty well. Lots of code reused.&lt;/p&gt;

&lt;p&gt;&amp;gt; http has one quirk however that ftp doesn’t have. Redirects. The server can redirect the client to a different file. So now you’re thinking, what happens if I download &lt;a href="http://somefile" target="_blank" rel="nofollow noopener"&gt;http://somefile&lt;/a&gt; and the server sends back 302 http://|reboot. ftp reconnects to the server, gets the 200, starts downloading and saves it to a file called |reboot. Except it doesn’t. The function that saves files looks at the first character of the name and if it’s a pipe, runs that command instead. And now you just rebooted your computer. Or worse.&lt;/p&gt;

&lt;p&gt;&amp;gt; It’s pretty obvious this is not the desired behavior, but where exactly did things go wrong? Arguably, all the pieces were working according to spec. In order to see this bug coming, you needed to know how the save function worked, you needed to know about redirects, and you needed to put all the implications together.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The post then goes into a lot more detail about other issues. We just don’t have time to cover it all today, but you should go read it, it is very enlightening&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; What do we do about this? That’s a tough question. It’s much easier to poke fun at all the people who got things wrong. But we can try. My attitudes are shaped by experiences with the OpenBSD project, and I think we are doing a decent job of containing the complexity. Keep paring away at dependencies and reducing interactions. As a developer, saying “no” to all feature requests is actually very productive. It’s so much faster than implementing the feature. Sometimes users complain, but I’ve often received later feedback from users that they’d come to appreciate the simplicity.&lt;/p&gt;

&lt;p&gt;&amp;gt; There was a question about which of these vulnerabilities were found by researchers, as opposed to troublemakers. The answer was most, if not all of them, but it made me realize one additional point I hadn’t mentioned. Unlike the prototypical buffer overflow vulnerability, exploiting features is very reliable. Exploiting something like shellshock or imagetragick requires no customized assembly and is independent of CPU, OS, version, stack alignment, malloc implementation, etc. Within about 24 hours of the initial release of shellshock, I had logs of people trying to exploit it. So unless you’re on about a 12 hour patch cycle, you’re going to have a bad time.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/changeset/base/314048" target="_blank" rel="nofollow noopener"&gt;reimplement zfsctl (.zfs) support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;avg@ (Andriy Gapon) has rewritten the .zfs support in FreeBSD&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The current code is written on top of GFS, a library with the generic support for writing filesystems, which was ported from Illumos. Because of significant differences between illumos VFS and FreeBSD VFS models, both the GFS and zfsctl code were heavily modified to work on FreeBSD.  Nonetheless, they still contain quite a few ugly hacks and bugs.&lt;/p&gt;

&lt;p&gt;&amp;gt; This is a reimplementation of the zfsctl code where the VFS-specific bits are written from scratch and only the code that interacts with the rest of ZFS is reused.&lt;/p&gt;

&lt;p&gt;&amp;gt; Some ideas are picked from an independent work by Will (wca@)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This work improves the overall quality of the ZFS port to FreeBSD&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The code that provides support for ZFS .zfs/ directory functionality has been reimplemented.  It is no longer possible to create a snapshot by mkdir under .zfs/snapshot/.  That should be the only user visible change.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;TIL: On IllumOS, you can create, rename, and destroy snapshots, by manipulating the virtual directories in the .zfs/snapshots directory.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If enough people would find this feature useful, maybe it could be implemented (rm and rename have never existed on FreeBSD). At the same time, it seems like rather a lot of work, when the ZFS command line tools work so well. Although wca@ pointed out on IRC, it can be useful to be able to create a snapshot over NFS, or SMB.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Konrad Witaszczyk - &lt;a href="mailto:def@freebsd.org" target="_blank" rel="nofollow noopener"&gt;def@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Encrypted Kernel Crash Dumps
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/changeset/base/313962" target="_blank" rel="nofollow noopener"&gt;PBKDF2 Performance improvements on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://jbp.io/2015/08/11/pbkdf2-performance-matters/" target="_blank" rel="nofollow noopener"&gt;Joe Pixton did some research&lt;/a&gt; and found that, because of the way the spec is written, most PBKDF2 implementations are 2x slower than they need to be.&lt;/li&gt;
&lt;li&gt;Since the PBKDF is used to derive a key, used for encryption, this poses a problem. The attacker can derive a key twice as fast as you can. On FreeBSD the PBKDF2 was configured to derive a SHA512-HMAC key that would take approximately 2 seconds to calculate. That is 2 seconds on one core. So an attacker can calculate the same key in 1 second, and use many cores.&lt;/li&gt;
&lt;li&gt;Luckily, 1 second is still a long time for each brute force guess. On modern CPUs with the fast algorithm, you can do about 500,000 iterations of PBKDF per second (per core).&lt;/li&gt;
&lt;li&gt;Until a recent change, OpenBSD used only 8192 iterations. It now uses a similar benchmark of ~2 seconds, and uses bcrypt instead of a SHA1-HMAC.&lt;/li&gt;
&lt;li&gt;Joe’s research showed that the majority of implementations were done the ‘slow’ way. Calculating the initial part of the outer round each iteration, instead of reusing the initial calculation over and over for each round.&lt;/li&gt;
&lt;li&gt;Joe submitted a match to FreeBSD to solve this problem. That patch was improved, and a test of tests were added by jmg@, but then work stalled&lt;/li&gt;
&lt;li&gt;I picked up the work, and fixed some merge conflicts in the patch that had cropped up based on work I had done that moved the HMAC code to a separate file.&lt;/li&gt;
&lt;li&gt;This work is now committed.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; With this change, all newly generated GELI keys will be approximately 2x as strong. Previously generated keys will take half as long to calculate, resulting in faster mounting of encrypted volumes. Users may choose to rekey, to generate a new key with the larger default number of iterations using the geli(8) setkey command. Security of existing data is not compromised, as ~1 second per brute force attempt is still a very high threshold.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If you are interested in the topic, I recommend the video of Joe’s presentation from the Passwords15 conference in Las Vegas
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.trueos.org/blog/quick-updating-screenshot-trueos-handbook/" target="_blank" rel="nofollow noopener"&gt;Quick How-To: Updating a screenshot in the TrueOS Handbook&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Docs writers, might be time to pay attention. This week we have a good walk-through of adding / updating new screenshots to the TrueOS Sphinx Documentation.&lt;/li&gt;
&lt;li&gt;For those who have not looked in the past, TrueOS and FreeNAS both have fantastic docs by the team over at iXsystems using Sphinx as their doc engine. &lt;/li&gt;
&lt;li&gt;Often we get questions from users asking what “they can do to help” but don’t necessarily have programming skills to apply. &lt;/li&gt;
&lt;li&gt;The good news is that using Sphinx is relatively easy, and after learning some minio rst syntax you can easily help fix, or even contribute to new sections of the TrueOS (Or FreeNAS) documentation. &lt;/li&gt;
&lt;li&gt;In this example, Tim takes us through the process of replacing an old out of date screenshot in the handbook with the latest hotness. &lt;/li&gt;
&lt;li&gt;Starting with a .png file, he then locates the old screenshot name and adds the updated version “lumina-e.png” to “lumina-f.png”. With the file added to the tree, the relevant section of .rst code can be adjusted and the sphinx build run to verify the output HTML looks correct.&lt;/li&gt;
&lt;li&gt;Using this method you can easily start to get involved with other aspects of documentation and next thing you know you’ll be writing boot-loaders like Allan!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.ossblog.org/learn-c-programming-with-9-excellent-open-source-books/" target="_blank" rel="nofollow noopener"&gt;Learn C Programming With 9 Excellent Open Source Books&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Now that you’ve easily mastered all your documentation skills, you may be ready to take on a new challenge. (Come on, that boot-loader isn’t going to write itself!)&lt;/li&gt;
&lt;li&gt;We wanted to point out some excellent resources to get you started on your journey into writing C.&lt;/li&gt;
&lt;li&gt;Before you think, “oh, more books to purchase”, wait there’s good news. These are the top-9 open-source books that you can download in digital form free of charge. Now I bet we got your attention.&lt;/li&gt;
&lt;li&gt;We start the rundown with “The C Book”, by Mike Banahan, Declan Brady and Mark Doran, which will lay the groundwork with your introduction into the C language and concepts. &lt;/li&gt;
&lt;li&gt;Next up, if you are going to do anything, do it with style, so take a read through the “C Elements of Style” which will make you popular at all the parties. (We can’t vouch for that statement)&lt;/li&gt;
&lt;li&gt;From here we have a book on using C to build your own minimal “lisp” interpreter, reference guides on GNU C and some other excellent introduction / mastery books to help round-out your programming skill set.&lt;/li&gt;
&lt;li&gt;Your C adventure awaits, hopefully these books can not only teach you good C, but also make you feel confident when looking at bits of the FreeBSD world or kernel with a proper foundation to back it up.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://eradman.com/posts/linuxvm-on-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Running a Linux VM on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over the past few years we’ve talked a lot about Virtualization, Bhyve or OpenBSD’s ‘vmm’, but qemu hasn’t gotten much attention.&lt;/li&gt;
&lt;li&gt;Today we have a blog post with details on how to deploy qemu to run Linux on top of an OpenBSD host system.&lt;/li&gt;
&lt;li&gt;The starts by showing us how to first provision the storage for qemu, using the handy ‘qemu-img’ command, which in this example only creates a 4GB disk, you’ll probably want more for real-world usage though.&lt;/li&gt;
&lt;li&gt;Next up the qemu command will be run, pay attention to the particular flags for network and memory setup. You’ll probably want to bump it up past the recommended 256M of memory.&lt;/li&gt;
&lt;li&gt;Networking is always the fun part, as the author describes his intended setup&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I want OpenBSD and Debian to be able to obtain an IP via DHCP on their wired interfaces and I don't want external networking required for an NFS share to the VM. To accomplish this I need two interfaces since dhclient will erase any other IPv4 addresses already assigned. We can't assign an address directly to the bridge, but we can configure a virtual Ethernet device and add it.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The setup for this portion involves touching a few more files, but isn’t that painless. Some “pf” rules to enable NAT for and dhcpd setup to assign a “fixed” IP to the vm will get us going, along with some additional details on how to configure the networking for inside the debian VM.&lt;/li&gt;
&lt;li&gt;Once those steps are completed you should be able to mount NFS and share data from the host to the VM painlessly. &lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.macobserver.com/podcasts/background-mode-jordan-hubbard/" target="_blank" rel="nofollow noopener"&gt;MacObserver: Interview with Open Source Developer &amp;amp; Former Apple Manager Jordan Hubbard &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/blog/2016-google-summer-of-code-mentor-summit-and-meetbsd-trip-report-gavin-atkinson/" target="_blank" rel="nofollow noopener"&gt;2016 Google Summer of Code Mentor Summit and MeetBSD Trip Report: Gavin Atkinson&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/TNyHBYwT" target="_blank" rel="nofollow noopener"&gt; Joe - BGP / Vultr Followup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/s4Ypezsz" target="_blank" rel="nofollow noopener"&gt; Ryan Moreno asks about Laptops &lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, Allan and I are in Tokyo for AsiaBSDCon, but not to worry, we have a full episode lined up and ready to go. Hackathon reports</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>OpenBSD A2k17 hackathon reports</h3>

<ul>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170131101827" rel="nofollow">a2k17 hackathon report: Patrick Wildt on the arm64 port</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170203232049" rel="nofollow">a2k17 hackathon report: Antoine Jacoutot on syspatch, rc.d improvements and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170127154356" rel="nofollow">a2k17 hackathon report: Martin Pieuchot on NET_LOCK and much more </a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170127031836" rel="nofollow">a2k17 hackathon report: Kenneth Westerback on the hidden wonders of the build system, the network stack and more </a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170125225403" rel="nofollow">a2k17 hackathon report: Bob Beck on LibreSSL progress and more </a> 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_fully_reproducible_builds" rel="nofollow">NetBSD is now reproducible </a></h3>

<ul>
<li>Christos Zoulas posts to the NetBSD blog that he has completed his project to make fully reproducible NetBSD builds for amd64 and sparc64</li>
</ul>

<blockquote>
<p>I have been working on and off for almost a year trying to get reproducible builds (the same source tree always builds an identical cdrom) on NetBSD. I did not think at the time it would take as long or be so difficult, so I did not keep a log of all the changes I needed to make. I was also not the only one working on this. Other NetBSD developers have been making improvements for the past 6 years. I would like to acknowledge the NetBSD build system (aka build.sh) which is a fully portable cross-build system. This build system has given us a head-start in the reproducible builds work.</p>

<p>I would also like to acknowledge the work done by the Debian folks who have provided a platform to run, test and analyze reproducible builds. Special mention to the diffoscope tool that gives an excellent overview of what&#39;s different between binary files, by finding out what they are (and if they are containers what they contain) and then running the appropriate formatter and diff program to show what&#39;s different for each file.</p>

<p>Finally other developers who have started, motivated and did a lot of work getting us here like Joerg Sonnenberger and Thomas Klausner for their work on reproducible builds, and Todd Vierling and Luke Mewburn for their work on build.sh.</p>
</blockquote>

<ul>
<li>Some of the stumbling blocks that were overcome:

<ul>
<li>Timestamps</li>
<li>Date/time/author embedded in source files</li>
<li>Timezone sensitive code</li>
<li>Directory order / build order</li>
<li>Non-sanitized data stored in files</li>
<li>Symbolic links / paths</li>
<li>General tool inconsistencies: including gcc profiling, the fact that GPT partition tables, are by definition, globally unique each time they are created, and the iso9660 standard calls for a timestamp with a timezone.</li>
<li>Toolchain</li>
<li>Build information / tunables / environment. NetBSD now has a knob ‘MKREPRO’, if set to YES it sets a long list of variables to a consistent set of a values.</li>
</ul></li>
<li>The post walks through how these problems where solves</li>
<li>Future Work:

<ul>
<li>Vary more parameters and find more inconsistencies</li>
<li>Verify that cross-building is reproducible</li>
<li>Verify that unprivileged builds are reproducible</li>
<li>Test on other platforms
***</li>
</ul></li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/features-are-faults-redux" rel="nofollow">Features are faults redux</a></h3>

<ul>
<li>From Ted Unangst</li>
</ul>

<blockquote>
<p>Last week I gave a talk for the security class at Notre Dame based on features are faults but with some various commentary added. It was an exciting trip, with the opportunity to meet and talk with the computer vision group as well. Some other highlights include the Indiana skillet I had for breakfast, which came with pickles and was amazing, and explaining the many wonders of cvs to the Linux users group over lunch. After that came the talk, which went a little something like this.</p>

<p>I got started with OpenBSD back about the same time I started college, although I had a slightly different perspective then. I was using OpenBSD because it included so many security features, therefore it must be the most secure system, right? For example, at some point I acquired a second computer. What’s the first thing anybody does when they get a second computer? That’s right, set up a kerberos domain. The idea that more is better was everywhere. This was also around the time that ipsec was getting its final touches, and everybody knew ipsec was going to be the most secure protocol ever because it had more options than any other secure transport. We’ll revisit this in a bit.</p>

<p>There’s been a partial attitude adjustment since then, with more people recognizing that layering complexity doesn’t result in more security. It’s not an additive process. There’s a whole talk there, about the perfect security that people can’t or won’t use. OpenBSD has definitely switched directions, including less code, not more. All the kerberos code was deleted a few years ago.</p>

<p>Let’s assume about one bug per 100 lines of code. That’s probably on the low end. Now say your operating system has 100 million lines of code. If I’ve done the math correctly, that’s literally a million bugs. So that’s one reason to avoid adding features. But that’s a solveable problem. If we pick the right language and the right compiler and the right tooling and with enough eyeballs and effort, we can fix all the bugs. We know how to build mostly correct software, we just don’t care.</p>

<p>As we add features to software, increasing its complexity, new unexpected behaviors start to emerge. What are the bounds? How many features can you add before craziness is inevitable? We can make some guesses. Less than a thousand for sure. Probably less than a hundred? Ten maybe? I’ll argue the answer is quite possibly two. Interesting corollary is that it’s impossible to have a program with exactly two features. Any program with two features has at least a third, but you don’t know what it is</p>

<p>My first example is a bug in the NetBSD ftp client. We had one feature, we added a second feature, and just like that we got a <a href="http://marc.info/?l=oss-security&m=141451507810253&w=2" rel="nofollow">third misfeature</a></p>

<p>Our story begins long ago. The origins of this bug are probably older than I am. In the dark times before the web, FTP sites used to be a pretty popular way of publishing files. You run an ftp client, connect to a remote site, and then you can browse the remote server somewhat like a local filesystem. List files, change directories, get files. Typically there would be a README file telling you what’s what, but you don’t need to download a copy to keep. Instead we can pipe the output to a program like more. Right there in the ftp client. No need to disconnect.</p>

<p>Fast forward a few decades, and http is the new protocol of choice. http is a much less interactive protocol, but the ftp client has some handy features for batch downloads like progress bars, etc. So let’s add http support to ftp. This works pretty well. Lots of code reused.</p>

<p>http has one quirk however that ftp doesn’t have. Redirects. The server can redirect the client to a different file. So now you’re thinking, what happens if I download <a href="http://somefile" rel="nofollow">http://somefile</a> and the server sends back 302 http://|reboot. ftp reconnects to the server, gets the 200, starts downloading and saves it to a file called |reboot. Except it doesn’t. The function that saves files looks at the first character of the name and if it’s a pipe, runs that command instead. And now you just rebooted your computer. Or worse.</p>

<p>It’s pretty obvious this is not the desired behavior, but where exactly did things go wrong? Arguably, all the pieces were working according to spec. In order to see this bug coming, you needed to know how the save function worked, you needed to know about redirects, and you needed to put all the implications together.</p>
</blockquote>

<ul>
<li>The post then goes into a lot more detail about other issues. We just don’t have time to cover it all today, but you should go read it, it is very enlightening</li>
</ul>

<blockquote>
<p>What do we do about this? That’s a tough question. It’s much easier to poke fun at all the people who got things wrong. But we can try. My attitudes are shaped by experiences with the OpenBSD project, and I think we are doing a decent job of containing the complexity. Keep paring away at dependencies and reducing interactions. As a developer, saying “no” to all feature requests is actually very productive. It’s so much faster than implementing the feature. Sometimes users complain, but I’ve often received later feedback from users that they’d come to appreciate the simplicity.</p>

<p>There was a question about which of these vulnerabilities were found by researchers, as opposed to troublemakers. The answer was most, if not all of them, but it made me realize one additional point I hadn’t mentioned. Unlike the prototypical buffer overflow vulnerability, exploiting features is very reliable. Exploiting something like shellshock or imagetragick requires no customized assembly and is independent of CPU, OS, version, stack alignment, malloc implementation, etc. Within about 24 hours of the initial release of shellshock, I had logs of people trying to exploit it. So unless you’re on about a 12 hour patch cycle, you’re going to have a bad time.</p>

<hr>
</blockquote>

<h3><a href="https://svnweb.freebsd.org/changeset/base/314048" rel="nofollow">reimplement zfsctl (.zfs) support</a></h3>

<ul>
<li>avg@ (Andriy Gapon) has rewritten the .zfs support in FreeBSD</li>
</ul>

<blockquote>
<p>The current code is written on top of GFS, a library with the generic support for writing filesystems, which was ported from Illumos. Because of significant differences between illumos VFS and FreeBSD VFS models, both the GFS and zfsctl code were heavily modified to work on FreeBSD.  Nonetheless, they still contain quite a few ugly hacks and bugs.</p>

<p>This is a reimplementation of the zfsctl code where the VFS-specific bits are written from scratch and only the code that interacts with the rest of ZFS is reused.</p>

<p>Some ideas are picked from an independent work by Will (wca@)</p>
</blockquote>

<ul>
<li>This work improves the overall quality of the ZFS port to FreeBSD</li>
</ul>

<blockquote>
<p>The code that provides support for ZFS .zfs/ directory functionality has been reimplemented.  It is no longer possible to create a snapshot by mkdir under .zfs/snapshot/.  That should be the only user visible change.</p>
</blockquote>

<ul>
<li><p>TIL: On IllumOS, you can create, rename, and destroy snapshots, by manipulating the virtual directories in the .zfs/snapshots directory.</p></li>
<li><p>If enough people would find this feature useful, maybe it could be implemented (rm and rename have never existed on FreeBSD). At the same time, it seems like rather a lot of work, when the ZFS command line tools work so well. Although wca@ pointed out on IRC, it can be useful to be able to create a snapshot over NFS, or SMB.</p>

<hr></li>
</ul>

<h2>Interview - Konrad Witaszczyk - <a href="mailto:def@freebsd.org" rel="nofollow">def@freebsd.org</a></h2>

<ul>
<li>Encrypted Kernel Crash Dumps
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/313962" rel="nofollow">PBKDF2 Performance improvements on FreeBSD</a></h3>

<ul>
<li><a href="https://jbp.io/2015/08/11/pbkdf2-performance-matters/" rel="nofollow">Joe Pixton did some research</a> and found that, because of the way the spec is written, most PBKDF2 implementations are 2x slower than they need to be.</li>
<li>Since the PBKDF is used to derive a key, used for encryption, this poses a problem. The attacker can derive a key twice as fast as you can. On FreeBSD the PBKDF2 was configured to derive a SHA512-HMAC key that would take approximately 2 seconds to calculate. That is 2 seconds on one core. So an attacker can calculate the same key in 1 second, and use many cores.</li>
<li>Luckily, 1 second is still a long time for each brute force guess. On modern CPUs with the fast algorithm, you can do about 500,000 iterations of PBKDF per second (per core).</li>
<li>Until a recent change, OpenBSD used only 8192 iterations. It now uses a similar benchmark of ~2 seconds, and uses bcrypt instead of a SHA1-HMAC.</li>
<li>Joe’s research showed that the majority of implementations were done the ‘slow’ way. Calculating the initial part of the outer round each iteration, instead of reusing the initial calculation over and over for each round.</li>
<li>Joe submitted a match to FreeBSD to solve this problem. That patch was improved, and a test of tests were added by jmg@, but then work stalled</li>
<li>I picked up the work, and fixed some merge conflicts in the patch that had cropped up based on work I had done that moved the HMAC code to a separate file.</li>
<li>This work is now committed.</li>
</ul>

<blockquote>
<p>With this change, all newly generated GELI keys will be approximately 2x as strong. Previously generated keys will take half as long to calculate, resulting in faster mounting of encrypted volumes. Users may choose to rekey, to generate a new key with the larger default number of iterations using the geli(8) setkey command. Security of existing data is not compromised, as ~1 second per brute force attempt is still a very high threshold.</p>
</blockquote>

<ul>
<li>If you are interested in the topic, I recommend the video of Joe’s presentation from the Passwords15 conference in Las Vegas
***</li>
</ul>

<h3><a href="https://www.trueos.org/blog/quick-updating-screenshot-trueos-handbook/" rel="nofollow">Quick How-To: Updating a screenshot in the TrueOS Handbook</a></h3>

<ul>
<li>Docs writers, might be time to pay attention. This week we have a good walk-through of adding / updating new screenshots to the TrueOS Sphinx Documentation.</li>
<li>For those who have not looked in the past, TrueOS and FreeNAS both have fantastic docs by the team over at iXsystems using Sphinx as their doc engine. </li>
<li>Often we get questions from users asking what “they can do to help” but don’t necessarily have programming skills to apply. </li>
<li>The good news is that using Sphinx is relatively easy, and after learning some minio rst syntax you can easily help fix, or even contribute to new sections of the TrueOS (Or FreeNAS) documentation. </li>
<li>In this example, Tim takes us through the process of replacing an old out of date screenshot in the handbook with the latest hotness. </li>
<li>Starting with a .png file, he then locates the old screenshot name and adds the updated version “lumina-e.png” to “lumina-f.png”. With the file added to the tree, the relevant section of .rst code can be adjusted and the sphinx build run to verify the output HTML looks correct.</li>
<li>Using this method you can easily start to get involved with other aspects of documentation and next thing you know you’ll be writing boot-loaders like Allan!
***</li>
</ul>

<h3><a href="https://www.ossblog.org/learn-c-programming-with-9-excellent-open-source-books/" rel="nofollow">Learn C Programming With 9 Excellent Open Source Books</a></h3>

<ul>
<li>Now that you’ve easily mastered all your documentation skills, you may be ready to take on a new challenge. (Come on, that boot-loader isn’t going to write itself!)</li>
<li>We wanted to point out some excellent resources to get you started on your journey into writing C.</li>
<li>Before you think, “oh, more books to purchase”, wait there’s good news. These are the top-9 open-source books that you can download in digital form free of charge. Now I bet we got your attention.</li>
<li>We start the rundown with “The C Book”, by Mike Banahan, Declan Brady and Mark Doran, which will lay the groundwork with your introduction into the C language and concepts. </li>
<li>Next up, if you are going to do anything, do it with style, so take a read through the “C Elements of Style” which will make you popular at all the parties. (We can’t vouch for that statement)</li>
<li>From here we have a book on using C to build your own minimal “lisp” interpreter, reference guides on GNU C and some other excellent introduction / mastery books to help round-out your programming skill set.</li>
<li>Your C adventure awaits, hopefully these books can not only teach you good C, but also make you feel confident when looking at bits of the FreeBSD world or kernel with a proper foundation to back it up.
***</li>
</ul>

<h3><a href="http://eradman.com/posts/linuxvm-on-openbsd.html" rel="nofollow">Running a Linux VM on OpenBSD</a></h3>

<ul>
<li>Over the past few years we’ve talked a lot about Virtualization, Bhyve or OpenBSD’s ‘vmm’, but qemu hasn’t gotten much attention.</li>
<li>Today we have a blog post with details on how to deploy qemu to run Linux on top of an OpenBSD host system.</li>
<li>The starts by showing us how to first provision the storage for qemu, using the handy ‘qemu-img’ command, which in this example only creates a 4GB disk, you’ll probably want more for real-world usage though.</li>
<li>Next up the qemu command will be run, pay attention to the particular flags for network and memory setup. You’ll probably want to bump it up past the recommended 256M of memory.</li>
<li>Networking is always the fun part, as the author describes his intended setup</li>
</ul>

<blockquote>
<p>I want OpenBSD and Debian to be able to obtain an IP via DHCP on their wired interfaces and I don&#39;t want external networking required for an NFS share to the VM. To accomplish this I need two interfaces since dhclient will erase any other IPv4 addresses already assigned. We can&#39;t assign an address directly to the bridge, but we can configure a virtual Ethernet device and add it.</p>
</blockquote>

<ul>
<li>The setup for this portion involves touching a few more files, but isn’t that painless. Some “pf” rules to enable NAT for and dhcpd setup to assign a “fixed” IP to the vm will get us going, along with some additional details on how to configure the networking for inside the debian VM.</li>
<li>Once those steps are completed you should be able to mount NFS and share data from the host to the VM painlessly. </li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.macobserver.com/podcasts/background-mode-jordan-hubbard/" rel="nofollow">MacObserver: Interview with Open Source Developer &amp; Former Apple Manager Jordan Hubbard </a> </p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/2016-google-summer-of-code-mentor-summit-and-meetbsd-trip-report-gavin-atkinson/" rel="nofollow">2016 Google Summer of Code Mentor Summit and MeetBSD Trip Report: Gavin Atkinson</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/TNyHBYwT" rel="nofollow"> Joe - BGP / Vultr Followup</a> </li>
<li><a href="http://pastebin.com/s4Ypezsz" rel="nofollow"> Ryan Moreno asks about Laptops </a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, Allan and I are in Tokyo for AsiaBSDCon, but not to worry, we have a full episode lined up and ready to go. Hackathon reports</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>OpenBSD A2k17 hackathon reports</h3>

<ul>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170131101827" rel="nofollow">a2k17 hackathon report: Patrick Wildt on the arm64 port</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170203232049" rel="nofollow">a2k17 hackathon report: Antoine Jacoutot on syspatch, rc.d improvements and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170127154356" rel="nofollow">a2k17 hackathon report: Martin Pieuchot on NET_LOCK and much more </a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170127031836" rel="nofollow">a2k17 hackathon report: Kenneth Westerback on the hidden wonders of the build system, the network stack and more </a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20170125225403" rel="nofollow">a2k17 hackathon report: Bob Beck on LibreSSL progress and more </a> 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_fully_reproducible_builds" rel="nofollow">NetBSD is now reproducible </a></h3>

<ul>
<li>Christos Zoulas posts to the NetBSD blog that he has completed his project to make fully reproducible NetBSD builds for amd64 and sparc64</li>
</ul>

<blockquote>
<p>I have been working on and off for almost a year trying to get reproducible builds (the same source tree always builds an identical cdrom) on NetBSD. I did not think at the time it would take as long or be so difficult, so I did not keep a log of all the changes I needed to make. I was also not the only one working on this. Other NetBSD developers have been making improvements for the past 6 years. I would like to acknowledge the NetBSD build system (aka build.sh) which is a fully portable cross-build system. This build system has given us a head-start in the reproducible builds work.</p>

<p>I would also like to acknowledge the work done by the Debian folks who have provided a platform to run, test and analyze reproducible builds. Special mention to the diffoscope tool that gives an excellent overview of what&#39;s different between binary files, by finding out what they are (and if they are containers what they contain) and then running the appropriate formatter and diff program to show what&#39;s different for each file.</p>

<p>Finally other developers who have started, motivated and did a lot of work getting us here like Joerg Sonnenberger and Thomas Klausner for their work on reproducible builds, and Todd Vierling and Luke Mewburn for their work on build.sh.</p>
</blockquote>

<ul>
<li>Some of the stumbling blocks that were overcome:

<ul>
<li>Timestamps</li>
<li>Date/time/author embedded in source files</li>
<li>Timezone sensitive code</li>
<li>Directory order / build order</li>
<li>Non-sanitized data stored in files</li>
<li>Symbolic links / paths</li>
<li>General tool inconsistencies: including gcc profiling, the fact that GPT partition tables, are by definition, globally unique each time they are created, and the iso9660 standard calls for a timestamp with a timezone.</li>
<li>Toolchain</li>
<li>Build information / tunables / environment. NetBSD now has a knob ‘MKREPRO’, if set to YES it sets a long list of variables to a consistent set of a values.</li>
</ul></li>
<li>The post walks through how these problems where solves</li>
<li>Future Work:

<ul>
<li>Vary more parameters and find more inconsistencies</li>
<li>Verify that cross-building is reproducible</li>
<li>Verify that unprivileged builds are reproducible</li>
<li>Test on other platforms
***</li>
</ul></li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/features-are-faults-redux" rel="nofollow">Features are faults redux</a></h3>

<ul>
<li>From Ted Unangst</li>
</ul>

<blockquote>
<p>Last week I gave a talk for the security class at Notre Dame based on features are faults but with some various commentary added. It was an exciting trip, with the opportunity to meet and talk with the computer vision group as well. Some other highlights include the Indiana skillet I had for breakfast, which came with pickles and was amazing, and explaining the many wonders of cvs to the Linux users group over lunch. After that came the talk, which went a little something like this.</p>

<p>I got started with OpenBSD back about the same time I started college, although I had a slightly different perspective then. I was using OpenBSD because it included so many security features, therefore it must be the most secure system, right? For example, at some point I acquired a second computer. What’s the first thing anybody does when they get a second computer? That’s right, set up a kerberos domain. The idea that more is better was everywhere. This was also around the time that ipsec was getting its final touches, and everybody knew ipsec was going to be the most secure protocol ever because it had more options than any other secure transport. We’ll revisit this in a bit.</p>

<p>There’s been a partial attitude adjustment since then, with more people recognizing that layering complexity doesn’t result in more security. It’s not an additive process. There’s a whole talk there, about the perfect security that people can’t or won’t use. OpenBSD has definitely switched directions, including less code, not more. All the kerberos code was deleted a few years ago.</p>

<p>Let’s assume about one bug per 100 lines of code. That’s probably on the low end. Now say your operating system has 100 million lines of code. If I’ve done the math correctly, that’s literally a million bugs. So that’s one reason to avoid adding features. But that’s a solveable problem. If we pick the right language and the right compiler and the right tooling and with enough eyeballs and effort, we can fix all the bugs. We know how to build mostly correct software, we just don’t care.</p>

<p>As we add features to software, increasing its complexity, new unexpected behaviors start to emerge. What are the bounds? How many features can you add before craziness is inevitable? We can make some guesses. Less than a thousand for sure. Probably less than a hundred? Ten maybe? I’ll argue the answer is quite possibly two. Interesting corollary is that it’s impossible to have a program with exactly two features. Any program with two features has at least a third, but you don’t know what it is</p>

<p>My first example is a bug in the NetBSD ftp client. We had one feature, we added a second feature, and just like that we got a <a href="http://marc.info/?l=oss-security&m=141451507810253&w=2" rel="nofollow">third misfeature</a></p>

<p>Our story begins long ago. The origins of this bug are probably older than I am. In the dark times before the web, FTP sites used to be a pretty popular way of publishing files. You run an ftp client, connect to a remote site, and then you can browse the remote server somewhat like a local filesystem. List files, change directories, get files. Typically there would be a README file telling you what’s what, but you don’t need to download a copy to keep. Instead we can pipe the output to a program like more. Right there in the ftp client. No need to disconnect.</p>

<p>Fast forward a few decades, and http is the new protocol of choice. http is a much less interactive protocol, but the ftp client has some handy features for batch downloads like progress bars, etc. So let’s add http support to ftp. This works pretty well. Lots of code reused.</p>

<p>http has one quirk however that ftp doesn’t have. Redirects. The server can redirect the client to a different file. So now you’re thinking, what happens if I download <a href="http://somefile" rel="nofollow">http://somefile</a> and the server sends back 302 http://|reboot. ftp reconnects to the server, gets the 200, starts downloading and saves it to a file called |reboot. Except it doesn’t. The function that saves files looks at the first character of the name and if it’s a pipe, runs that command instead. And now you just rebooted your computer. Or worse.</p>

<p>It’s pretty obvious this is not the desired behavior, but where exactly did things go wrong? Arguably, all the pieces were working according to spec. In order to see this bug coming, you needed to know how the save function worked, you needed to know about redirects, and you needed to put all the implications together.</p>
</blockquote>

<ul>
<li>The post then goes into a lot more detail about other issues. We just don’t have time to cover it all today, but you should go read it, it is very enlightening</li>
</ul>

<blockquote>
<p>What do we do about this? That’s a tough question. It’s much easier to poke fun at all the people who got things wrong. But we can try. My attitudes are shaped by experiences with the OpenBSD project, and I think we are doing a decent job of containing the complexity. Keep paring away at dependencies and reducing interactions. As a developer, saying “no” to all feature requests is actually very productive. It’s so much faster than implementing the feature. Sometimes users complain, but I’ve often received later feedback from users that they’d come to appreciate the simplicity.</p>

<p>There was a question about which of these vulnerabilities were found by researchers, as opposed to troublemakers. The answer was most, if not all of them, but it made me realize one additional point I hadn’t mentioned. Unlike the prototypical buffer overflow vulnerability, exploiting features is very reliable. Exploiting something like shellshock or imagetragick requires no customized assembly and is independent of CPU, OS, version, stack alignment, malloc implementation, etc. Within about 24 hours of the initial release of shellshock, I had logs of people trying to exploit it. So unless you’re on about a 12 hour patch cycle, you’re going to have a bad time.</p>

<hr>
</blockquote>

<h3><a href="https://svnweb.freebsd.org/changeset/base/314048" rel="nofollow">reimplement zfsctl (.zfs) support</a></h3>

<ul>
<li>avg@ (Andriy Gapon) has rewritten the .zfs support in FreeBSD</li>
</ul>

<blockquote>
<p>The current code is written on top of GFS, a library with the generic support for writing filesystems, which was ported from Illumos. Because of significant differences between illumos VFS and FreeBSD VFS models, both the GFS and zfsctl code were heavily modified to work on FreeBSD.  Nonetheless, they still contain quite a few ugly hacks and bugs.</p>

<p>This is a reimplementation of the zfsctl code where the VFS-specific bits are written from scratch and only the code that interacts with the rest of ZFS is reused.</p>

<p>Some ideas are picked from an independent work by Will (wca@)</p>
</blockquote>

<ul>
<li>This work improves the overall quality of the ZFS port to FreeBSD</li>
</ul>

<blockquote>
<p>The code that provides support for ZFS .zfs/ directory functionality has been reimplemented.  It is no longer possible to create a snapshot by mkdir under .zfs/snapshot/.  That should be the only user visible change.</p>
</blockquote>

<ul>
<li><p>TIL: On IllumOS, you can create, rename, and destroy snapshots, by manipulating the virtual directories in the .zfs/snapshots directory.</p></li>
<li><p>If enough people would find this feature useful, maybe it could be implemented (rm and rename have never existed on FreeBSD). At the same time, it seems like rather a lot of work, when the ZFS command line tools work so well. Although wca@ pointed out on IRC, it can be useful to be able to create a snapshot over NFS, or SMB.</p>

<hr></li>
</ul>

<h2>Interview - Konrad Witaszczyk - <a href="mailto:def@freebsd.org" rel="nofollow">def@freebsd.org</a></h2>

<ul>
<li>Encrypted Kernel Crash Dumps
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/313962" rel="nofollow">PBKDF2 Performance improvements on FreeBSD</a></h3>

<ul>
<li><a href="https://jbp.io/2015/08/11/pbkdf2-performance-matters/" rel="nofollow">Joe Pixton did some research</a> and found that, because of the way the spec is written, most PBKDF2 implementations are 2x slower than they need to be.</li>
<li>Since the PBKDF is used to derive a key, used for encryption, this poses a problem. The attacker can derive a key twice as fast as you can. On FreeBSD the PBKDF2 was configured to derive a SHA512-HMAC key that would take approximately 2 seconds to calculate. That is 2 seconds on one core. So an attacker can calculate the same key in 1 second, and use many cores.</li>
<li>Luckily, 1 second is still a long time for each brute force guess. On modern CPUs with the fast algorithm, you can do about 500,000 iterations of PBKDF per second (per core).</li>
<li>Until a recent change, OpenBSD used only 8192 iterations. It now uses a similar benchmark of ~2 seconds, and uses bcrypt instead of a SHA1-HMAC.</li>
<li>Joe’s research showed that the majority of implementations were done the ‘slow’ way. Calculating the initial part of the outer round each iteration, instead of reusing the initial calculation over and over for each round.</li>
<li>Joe submitted a match to FreeBSD to solve this problem. That patch was improved, and a test of tests were added by jmg@, but then work stalled</li>
<li>I picked up the work, and fixed some merge conflicts in the patch that had cropped up based on work I had done that moved the HMAC code to a separate file.</li>
<li>This work is now committed.</li>
</ul>

<blockquote>
<p>With this change, all newly generated GELI keys will be approximately 2x as strong. Previously generated keys will take half as long to calculate, resulting in faster mounting of encrypted volumes. Users may choose to rekey, to generate a new key with the larger default number of iterations using the geli(8) setkey command. Security of existing data is not compromised, as ~1 second per brute force attempt is still a very high threshold.</p>
</blockquote>

<ul>
<li>If you are interested in the topic, I recommend the video of Joe’s presentation from the Passwords15 conference in Las Vegas
***</li>
</ul>

<h3><a href="https://www.trueos.org/blog/quick-updating-screenshot-trueos-handbook/" rel="nofollow">Quick How-To: Updating a screenshot in the TrueOS Handbook</a></h3>

<ul>
<li>Docs writers, might be time to pay attention. This week we have a good walk-through of adding / updating new screenshots to the TrueOS Sphinx Documentation.</li>
<li>For those who have not looked in the past, TrueOS and FreeNAS both have fantastic docs by the team over at iXsystems using Sphinx as their doc engine. </li>
<li>Often we get questions from users asking what “they can do to help” but don’t necessarily have programming skills to apply. </li>
<li>The good news is that using Sphinx is relatively easy, and after learning some minio rst syntax you can easily help fix, or even contribute to new sections of the TrueOS (Or FreeNAS) documentation. </li>
<li>In this example, Tim takes us through the process of replacing an old out of date screenshot in the handbook with the latest hotness. </li>
<li>Starting with a .png file, he then locates the old screenshot name and adds the updated version “lumina-e.png” to “lumina-f.png”. With the file added to the tree, the relevant section of .rst code can be adjusted and the sphinx build run to verify the output HTML looks correct.</li>
<li>Using this method you can easily start to get involved with other aspects of documentation and next thing you know you’ll be writing boot-loaders like Allan!
***</li>
</ul>

<h3><a href="https://www.ossblog.org/learn-c-programming-with-9-excellent-open-source-books/" rel="nofollow">Learn C Programming With 9 Excellent Open Source Books</a></h3>

<ul>
<li>Now that you’ve easily mastered all your documentation skills, you may be ready to take on a new challenge. (Come on, that boot-loader isn’t going to write itself!)</li>
<li>We wanted to point out some excellent resources to get you started on your journey into writing C.</li>
<li>Before you think, “oh, more books to purchase”, wait there’s good news. These are the top-9 open-source books that you can download in digital form free of charge. Now I bet we got your attention.</li>
<li>We start the rundown with “The C Book”, by Mike Banahan, Declan Brady and Mark Doran, which will lay the groundwork with your introduction into the C language and concepts. </li>
<li>Next up, if you are going to do anything, do it with style, so take a read through the “C Elements of Style” which will make you popular at all the parties. (We can’t vouch for that statement)</li>
<li>From here we have a book on using C to build your own minimal “lisp” interpreter, reference guides on GNU C and some other excellent introduction / mastery books to help round-out your programming skill set.</li>
<li>Your C adventure awaits, hopefully these books can not only teach you good C, but also make you feel confident when looking at bits of the FreeBSD world or kernel with a proper foundation to back it up.
***</li>
</ul>

<h3><a href="http://eradman.com/posts/linuxvm-on-openbsd.html" rel="nofollow">Running a Linux VM on OpenBSD</a></h3>

<ul>
<li>Over the past few years we’ve talked a lot about Virtualization, Bhyve or OpenBSD’s ‘vmm’, but qemu hasn’t gotten much attention.</li>
<li>Today we have a blog post with details on how to deploy qemu to run Linux on top of an OpenBSD host system.</li>
<li>The starts by showing us how to first provision the storage for qemu, using the handy ‘qemu-img’ command, which in this example only creates a 4GB disk, you’ll probably want more for real-world usage though.</li>
<li>Next up the qemu command will be run, pay attention to the particular flags for network and memory setup. You’ll probably want to bump it up past the recommended 256M of memory.</li>
<li>Networking is always the fun part, as the author describes his intended setup</li>
</ul>

<blockquote>
<p>I want OpenBSD and Debian to be able to obtain an IP via DHCP on their wired interfaces and I don&#39;t want external networking required for an NFS share to the VM. To accomplish this I need two interfaces since dhclient will erase any other IPv4 addresses already assigned. We can&#39;t assign an address directly to the bridge, but we can configure a virtual Ethernet device and add it.</p>
</blockquote>

<ul>
<li>The setup for this portion involves touching a few more files, but isn’t that painless. Some “pf” rules to enable NAT for and dhcpd setup to assign a “fixed” IP to the vm will get us going, along with some additional details on how to configure the networking for inside the debian VM.</li>
<li>Once those steps are completed you should be able to mount NFS and share data from the host to the VM painlessly. </li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.macobserver.com/podcasts/background-mode-jordan-hubbard/" rel="nofollow">MacObserver: Interview with Open Source Developer &amp; Former Apple Manager Jordan Hubbard </a> </p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/2016-google-summer-of-code-mentor-summit-and-meetbsd-trip-report-gavin-atkinson/" rel="nofollow">2016 Google Summer of Code Mentor Summit and MeetBSD Trip Report: Gavin Atkinson</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/TNyHBYwT" rel="nofollow"> Joe - BGP / Vultr Followup</a> </li>
<li><a href="http://pastebin.com/s4Ypezsz" rel="nofollow"> Ryan Moreno asks about Laptops </a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>183: Getting Steamy Here</title>
  <link>https://www.bsdnow.tv/183</link>
  <guid isPermaLink="false">d02d2a1c-b37d-436b-b181-f2feb9af794d</guid>
  <pubDate>Wed, 01 Mar 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d02d2a1c-b37d-436b-b181-f2feb9af794d.mp3" length="51077524" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we have “Weird Unix Things”, “Is it getting Steamy in here?” and an Interview about BSD Sockets API. (Those</itunes:subtitle>
  <itunes:duration>1:10:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we have “Weird Unix Things”, “Is it getting Steamy in here?” and an Interview about BSD Sockets API. (Those&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.trueos.org/blog/playonbsd-trueos-getting-steamy-ive-much-wine/" target="_blank" rel="nofollow noopener"&gt;playonbsd with TrueOS: It’s Getting Steamy in Here and I’ve Had Too Much Wine&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; We’ve done a couple of tutorials in the past on using Steam and Wine with PC-BSD, but now with the addition of playonbsd to the AppCafe library, you have more options than ever before to game on your TrueOS system.  We’re going to have a look today at playonbsd, how it works with TrueOS, and what you can expect if you want to give it a try on your own system.  Let’s dive right in!&lt;/p&gt;

&lt;p&gt;&amp;gt; Once playonbsd is installed, go back to your blank desktop, right-click on the wallpaper, and select terminal.  Playonbsd does almost all the configuring for you, but there are still a couple of simple options you’ll want to configure to give yourself the best experience.  In your open terminal, type: playonbsd.  You can also find playonbsd by doing a fast search using Lumina’s built-in search function in the start menu after it’s been installed.  Once opened,  a graphical interface greets us with easy to navigate menus and even does most of the work for you.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A nice graphical UI that hides the complexity of setting up WINE and Steam, and lets you pick select the game you want, and get it setup&lt;/li&gt;
&lt;li&gt;Start gaming quicker, without the headache&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; If you’re a PC gamer, you should definitely give playonbsd a try!  You may be surprised at how well it works.  If you want to know ahead of time if your games are well supported or not, head on over to WineHQ and do a search.  Many people have tested and provided feedback and even solutions for potential problems with a large variety of video games. This is a great resource if you run into a glitch or other problem.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://jvns.ca/blog/2017/02/08/weird-unix-things-cd/" target="_blank" rel="nofollow noopener"&gt;Weird Unix thing: 'cd //'&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;So why can you do ‘cd //tmp’, and it isn’t the same as ‘cd /tmp’?&lt;/li&gt;
&lt;li&gt;The spec says:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; An implementation may further simplify curpath by removing any trailing  characters that are not also leading  characters, replacing multiple non-leading consecutive  characters with a single , and replacing three or more leading  characters with a single . If, as a result of this canonicalization, the curpath variable is null, no further steps shall be taken.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;“So! We can replace “three or more leading / characters with a single slash”. That does not say anything about what to do when there are 2 / characters though, which presumably is why cd //tmp leaves you at //tmp.”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; A pathname that begins with two successive slashes may be interpreted in an implementation-defined manner&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So what is it for? Well, the blog did a bit of digging and came up with &lt;a href="http://unix.stackexchange.com/questions/256497/on-what-systems-is-foo-bar-different-from-foo-bar/256569#256569" target="_blank" rel="nofollow noopener"&gt;this stackoverflow answer&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;In cygwin and some other systems // is treated as a unix-ified version of \, to access UNC windows file sharing paths like \server\share&lt;/li&gt;
&lt;li&gt;Perforce, the vcs, uses // to denote a path relative to the depot&lt;/li&gt;
&lt;li&gt;It seems to have been used in the path for a bunch of different network file systems, but also for myriad other things&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://arstechnica.com/apple/2017/02/testing-out-snapshots-in-apples-next-generation-apfs-file-system/" target="_blank" rel="nofollow noopener"&gt;Testing out snapshots in Apple’s next-generation APFS file system&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adam Leventhal takes his DTrace hammer to Apple’s new file system to see what is going on&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Back in June, Apple announced its new upcoming file system: APFS, or Apple File System. There was no mention of it in the WWDC keynote, but devotees needed no encouragement. They picked over every scintilla of data from the documentation on Apple’s developer site, extrapolating, interpolating, eager for whatever was about to come. In the WWDC session hall, the crowd buzzed with a nervous energy, eager for the grand unveiling of APFS. I myself badge-swapped my way into the conference just to get that first glimpse of Apple’s first original filesystem in the 30+ years since HFS&lt;/p&gt;

&lt;p&gt;&amp;gt; Apple’s presentation didn’t disappoint the hungry crowd. We hoped for a modern filesystem, optimized for next generation hardware, rich with features that have become the norm for data centers and professionals. With APFS, Apple showed a path to meeting those expectations. Dominic Giampaolo and Eric Tamura, leaders of the APFS team, shared performance optimizations, data integrity design, volume management, efficient storage of copied data, and snapshots—arguably the feature of APFS most directly in the user’s control.&lt;/p&gt;

&lt;p&gt;&amp;gt; It’s 2017, and Apple already appears to be making good on its promise with the revelation that the forthcoming iOS 10.3 will use APFS. The number of APFS tinkerers using it for their personal data has instantly gone from a few hundred to a few million. Beta users of iOS 10.3 have already made the switch apparently without incident. They have even ascribed unscientifically-significant performance improvements to APFS.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Previously Adam had used DTrace to find a new syscall introduced in OS X, fs_snapshot, but he had not dug into how to use it. Now it seems, the time has come&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Learning from XNU and making some educated guesses, I wrote my first C program to create an APFS snapshot. This section has a bit of code, which you can find in &lt;a href="https://github.com/ahl/apfs" target="_blank" rel="nofollow noopener"&gt;this Github repo&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;That just returned “fs_snapshot: Operation not permitted”&lt;/li&gt;
&lt;li&gt;So, being Adam, he used DTrace to figure out what the problem was&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Running this DTrace script in one terminal while running the snapshot program in another shows the code flow through the kernel as the program executes&lt;/p&gt;

&lt;p&gt;&amp;gt; In the code flow, the priv_check_cred() function jumps out as a good place to continue because of its name, the fact that fs_snapshot calls it directly, and the fact that it returns 1 which corresponds with EPERM, the error we were getting.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Turns out, it just requires some sudo&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; With a little more testing I wrote my own version of Apple's unreleased snapUtil command from the WWDC demo&lt;/p&gt;

&lt;p&gt;&amp;gt; We figured out the proper use of the fs_snapshot system call and reconstructed the WWDC snapUtil. But all this time an equivalent utility has been lurking on macOS Sierra. If you look in /System/Library/Filesystems/apfs.fs/Contents/Resources/, Apple has included a number of APFS-related utilities, including apfs_snapshot (and, tantalizingly, a tool called hfs_convert).&lt;/p&gt;

&lt;p&gt;&amp;gt; Snapshots let you preserve state to later peruse; we can also revert an APFS volume to a previous state to restore its contents. The current APFS semantics around rollback are a little odd. The revert operation succeeds, but it doesn't take effect until the APFS volume is next mounted&lt;/p&gt;

&lt;p&gt;&amp;gt; Another reason Apple may not have wanted people messing around with snapshots is that the feature appears to be incomplete. Winding yourself into a state where only a reboot can clear a mounted snapshot is easy, and using snapshots seems to break some of the diskutil APFS output&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It is interesting to see what you can do with DTrace, as well as to see what a DTrace and ZFS developer things of APFS
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Tom Jones - &lt;a href="mailto:tj@enoti.me" target="_blank" rel="nofollow noopener"&gt;tj@enoti.me&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Replacing the BSD Sockets API
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/eborisch/ethname" target="_blank" rel="nofollow noopener"&gt;FreeBSD rc.d script to map ethernet device names by MAC address&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Self-contained FreeBSD rc.d script for re-naming devices based on their MAC address. I needed it due to USB Ethernet devices coming up in different orders across OS upgrades.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Copy ethname into /usr/local/etc/rc.d/&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Add the following to rc.conf:&lt;br&gt;
&amp;gt; ethname_enable="YES"&lt;br&gt;
&amp;gt; ethname_devices="em0 ue0 ue1" # Replace with desired devices to rename&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Create /usr/local/etc/ifmap in the following format:  &lt;br&gt;
&amp;gt; 01:23:45:67:89:ab eth0&lt;br&gt;
&amp;gt; 01:23:45:67:89:ac eth1&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&amp;gt; That's it. Use ifconfig_="" settings in rc.conf with the new names.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I know MFSBSD has something like this, but a polished up hybrid of the two should likely be part of the base system if something is not already available&lt;/li&gt;
&lt;li&gt;This would be a great “Junior Job”, if say, a viewer wanted to get started with their first FreeBSD patch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/witchard/mog" target="_blank" rel="nofollow noopener"&gt;Mog: A different take on the Unix tool cat&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Do you abuse cat to view files?&lt;/li&gt;
&lt;li&gt;Did you know cat is meant for con*cat*enating files, meaning: cat part1 part2 part3 &amp;gt; wholething.txt&lt;/li&gt;
&lt;li&gt;mog is a tool for actually viewing files, and it adds quite a few nice features

&lt;ul&gt;
&lt;li&gt;Syntax highlight scripts&lt;/li&gt;
&lt;li&gt;Print a hex dump of binary files&lt;/li&gt;
&lt;li&gt;Show details of image files&lt;/li&gt;
&lt;li&gt;Perform objdump on executables&lt;/li&gt;
&lt;li&gt;List a directory&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; mog reads the $HOME/.mogrc config file which describes a series of operations it can do in an ordered manner. Each operation has a match command and an action command. For each file you give to mog it will test each match command in turn, when one matches it will perform the action. A reasonably useful config file is generated when you first run it.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/HowUnixBackspaces" target="_blank" rel="nofollow noopener"&gt;How Unix erases things when you type a backspace while entering text&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Yesterday I mentioned in passing that printing a DEL character doesn't actually erase anything. This raises an interesting question, because when you're typing something into a Unix system and hit your backspace key, Unix sure erases the last character that you entered. So how is it doing that?&lt;/p&gt;

&lt;p&gt;&amp;gt; The answer turns out to be basically what you'd expect, although the actual implementation rapidly gets complex. When you hit backspace, the kernel tty line discipline rubs out your previous character by printing (in the simple case) Ctrl-H, a space, and then another Ctrl-H.&lt;/p&gt;

&lt;p&gt;&amp;gt; Of course just backing up one character is not always the correct way of erasing input, and that's when it gets complicated for the kernel. To start with we have tabs, because when you (the user) backspace over a tab you want the cursor to jump all the way back, not just move back one space. The kernel has a certain amount of code to work out what column it thinks you're on and then back up an appropriate number of spaces with Ctrl-Hs.&lt;/p&gt;

&lt;p&gt;&amp;gt; Then we have the case when you quoted a control character while entering it, eg by typing Ctrl-V Ctrl-H; this causes the kernel to print the Ctrl-H instead of acting on it, and it prints it as the two character sequence &lt;sup&gt;H.&lt;/sup&gt; When you hit backspace to erase that, of course you want both (printed) characters to be rubbed out, not just the 'H'. So the kernel needs to keep track of that and rub out two characters instead of just one.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Chris then provides an example, from IllumOS, of the kernel trying to deal with multibyte characters&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; FreeBSD also handles backspacing a space specially, because you don't need to actually rub that out with a '\b \b' sequence; you can just print a plain \b. Other kernels don't seem to bother with this optimization. The FreeBSD code for this is in sys/kern/tty_ttydisc.c in the ttydisc_rubchar function&lt;/p&gt;

&lt;p&gt;&amp;gt; PS: If you want to see the kernel's handling of backspace in action, you usually can't test it at your shell prompt, because you're almost certainly using a shell that supports command line editing and readline and so on. Command line editing requires taking over input processing from the kernel, and so such shells are handling everything themselves. My usual way to see what the kernel is doing is to run 'cat &amp;gt;/dev/null' and then type away.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;And you thought the backspace key would be simple...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.freshports.org/graphics/wayland/" target="_blank" rel="nofollow noopener"&gt;FreeBSD ports now have Wayland&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve discussed the pending Wayland work, but we wanted to point you today to the ports which are in mainline FreeBSD ports tree now.&lt;/li&gt;
&lt;li&gt;First of all, (And I was wondering how they would deal with this) it has landed in the “graphics” category, since Wayland is the Anti-X11, putting it in x11/ didn’t make a lot of sense.&lt;/li&gt;
&lt;li&gt;Couple of notes before you start installing new packages and expecting wayland to “just work”&lt;/li&gt;
&lt;li&gt;First, this does require that you have working DRM from the kernel side. You’ll want to grab TrueOS or build from Matt Macy’s FreeBSD branches on GitHub before testing on any kind of modern Intel GPU. Nvidia with modesetting should be supported.&lt;/li&gt;
&lt;li&gt;Next, not all desktops will “just work”. You may need to grab experimental Weston for compositor. KDE / Gnome (And Lumina) and friends will grow Wayland support in the future, so don’t expect to just fire up $whatever and have it all work out of box.&lt;/li&gt;
&lt;li&gt;Feedback is needed! This is brand new functionality for FreeBSD, and the maintainers will want to hear your results. For us on the TrueOS side we are interested as well, since we want to port Lumina over to Wayland soon(ish)&lt;/li&gt;
&lt;li&gt;Happy Experimenting!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2017-joseph-kong/" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD 2017: Joseph Kong&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://opnsense.org/opnsense-17-1-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 17.1  “Eclectic Eagle”, based on FreeBSD 11 Released&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.koszek.com/blog/2017/01/28/why-you-should-start-programming-on-unix/" target="_blank" rel="nofollow noopener"&gt;Why you should start programming on UNIX&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://eradman.com/posts/opensmtpd-filtering.html" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD Mail Filtering&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/89AyGe5F" target="_blank" rel="nofollow noopener"&gt; Zane - Databases and Jails&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Te8sz9id" target="_blank" rel="nofollow noopener"&gt; Mohammad - USB Install&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/G2SzahWL" target="_blank" rel="nofollow noopener"&gt; Chuck - Updating Jails&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/71ExJLpL" target="_blank" rel="nofollow noopener"&gt; David - Lumina / LXQt&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we have “Weird Unix Things”, “Is it getting Steamy in here?” and an Interview about BSD Sockets API. (Those</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.trueos.org/blog/playonbsd-trueos-getting-steamy-ive-much-wine/" rel="nofollow">playonbsd with TrueOS: It’s Getting Steamy in Here and I’ve Had Too Much Wine</a></h3>

<blockquote>
<p>We’ve done a couple of tutorials in the past on using Steam and Wine with PC-BSD, but now with the addition of playonbsd to the AppCafe library, you have more options than ever before to game on your TrueOS system.  We’re going to have a look today at playonbsd, how it works with TrueOS, and what you can expect if you want to give it a try on your own system.  Let’s dive right in!</p>

<p>Once playonbsd is installed, go back to your blank desktop, right-click on the wallpaper, and select terminal.  Playonbsd does almost all the configuring for you, but there are still a couple of simple options you’ll want to configure to give yourself the best experience.  In your open terminal, type: playonbsd.  You can also find playonbsd by doing a fast search using Lumina’s built-in search function in the start menu after it’s been installed.  Once opened,  a graphical interface greets us with easy to navigate menus and even does most of the work for you.</p>
</blockquote>

<ul>
<li>A nice graphical UI that hides the complexity of setting up WINE and Steam, and lets you pick select the game you want, and get it setup</li>
<li>Start gaming quicker, without the headache</li>
</ul>

<blockquote>
<p>If you’re a PC gamer, you should definitely give playonbsd a try!  You may be surprised at how well it works.  If you want to know ahead of time if your games are well supported or not, head on over to WineHQ and do a search.  Many people have tested and provided feedback and even solutions for potential problems with a large variety of video games. This is a great resource if you run into a glitch or other problem.</p>
</blockquote>

<hr>

<h3><a href="https://jvns.ca/blog/2017/02/08/weird-unix-things-cd/" rel="nofollow">Weird Unix thing: &#39;cd //&#39;</a></h3>

<ul>
<li>So why can you do ‘cd //tmp’, and it isn’t the same as ‘cd /tmp’?</li>
<li>The spec says:</li>
</ul>

<blockquote>
<p>An implementation may further simplify curpath by removing any trailing <slash> characters that are not also leading <slash> characters, replacing multiple non-leading consecutive <slash> characters with a single <slash>, and replacing three or more leading <slash> characters with a single <slash>. If, as a result of this canonicalization, the curpath variable is null, no further steps shall be taken.</p>
</blockquote>

<ul>
<li>“So! We can replace “three or more leading / characters with a single slash”. That does not say anything about what to do when there are 2 / characters though, which presumably is why cd //tmp leaves you at //tmp.”</li>
</ul>

<blockquote>
<p>A pathname that begins with two successive slashes may be interpreted in an implementation-defined manner</p>
</blockquote>

<ul>
<li>So what is it for? Well, the blog did a bit of digging and came up with <a href="http://unix.stackexchange.com/questions/256497/on-what-systems-is-foo-bar-different-from-foo-bar/256569#256569" rel="nofollow">this stackoverflow answer</a></li>
<li>In cygwin and some other systems // is treated as a unix-ified version of \, to access UNC windows file sharing paths like \server\share</li>
<li>Perforce, the vcs, uses // to denote a path relative to the depot</li>
<li>It seems to have been used in the path for a bunch of different network file systems, but also for myriad other things</li>
</ul>

<hr>

<h3><a href="https://arstechnica.com/apple/2017/02/testing-out-snapshots-in-apples-next-generation-apfs-file-system/" rel="nofollow">Testing out snapshots in Apple’s next-generation APFS file system</a></h3>

<ul>
<li>Adam Leventhal takes his DTrace hammer to Apple’s new file system to see what is going on</li>
</ul>

<blockquote>
<p>Back in June, Apple announced its new upcoming file system: APFS, or Apple File System. There was no mention of it in the WWDC keynote, but devotees needed no encouragement. They picked over every scintilla of data from the documentation on Apple’s developer site, extrapolating, interpolating, eager for whatever was about to come. In the WWDC session hall, the crowd buzzed with a nervous energy, eager for the grand unveiling of APFS. I myself badge-swapped my way into the conference just to get that first glimpse of Apple’s first original filesystem in the 30+ years since HFS</p>

<p>Apple’s presentation didn’t disappoint the hungry crowd. We hoped for a modern filesystem, optimized for next generation hardware, rich with features that have become the norm for data centers and professionals. With APFS, Apple showed a path to meeting those expectations. Dominic Giampaolo and Eric Tamura, leaders of the APFS team, shared performance optimizations, data integrity design, volume management, efficient storage of copied data, and snapshots—arguably the feature of APFS most directly in the user’s control.</p>

<p>It’s 2017, and Apple already appears to be making good on its promise with the revelation that the forthcoming iOS 10.3 will use APFS. The number of APFS tinkerers using it for their personal data has instantly gone from a few hundred to a few million. Beta users of iOS 10.3 have already made the switch apparently without incident. They have even ascribed unscientifically-significant performance improvements to APFS.</p>
</blockquote>

<ul>
<li>Previously Adam had used DTrace to find a new syscall introduced in OS X, fs_snapshot, but he had not dug into how to use it. Now it seems, the time has come</li>
</ul>

<blockquote>
<p>Learning from XNU and making some educated guesses, I wrote my first C program to create an APFS snapshot. This section has a bit of code, which you can find in <a href="https://github.com/ahl/apfs" rel="nofollow">this Github repo</a></p>
</blockquote>

<ul>
<li>That just returned “fs_snapshot: Operation not permitted”</li>
<li>So, being Adam, he used DTrace to figure out what the problem was</li>
</ul>

<blockquote>
<p>Running this DTrace script in one terminal while running the snapshot program in another shows the code flow through the kernel as the program executes</p>

<p>In the code flow, the priv_check_cred() function jumps out as a good place to continue because of its name, the fact that fs_snapshot calls it directly, and the fact that it returns 1 which corresponds with EPERM, the error we were getting.</p>
</blockquote>

<ul>
<li>Turns out, it just requires some sudo</li>
</ul>

<blockquote>
<p>With a little more testing I wrote my own version of Apple&#39;s unreleased snapUtil command from the WWDC demo</p>

<p>We figured out the proper use of the fs_snapshot system call and reconstructed the WWDC snapUtil. But all this time an equivalent utility has been lurking on macOS Sierra. If you look in /System/Library/Filesystems/apfs.fs/Contents/Resources/, Apple has included a number of APFS-related utilities, including apfs_snapshot (and, tantalizingly, a tool called hfs_convert).</p>

<p>Snapshots let you preserve state to later peruse; we can also revert an APFS volume to a previous state to restore its contents. The current APFS semantics around rollback are a little odd. The revert operation succeeds, but it doesn&#39;t take effect until the APFS volume is next mounted</p>

<p>Another reason Apple may not have wanted people messing around with snapshots is that the feature appears to be incomplete. Winding yourself into a state where only a reboot can clear a mounted snapshot is easy, and using snapshots seems to break some of the diskutil APFS output</p>
</blockquote>

<ul>
<li>It is interesting to see what you can do with DTrace, as well as to see what a DTrace and ZFS developer things of APFS
***</li>
</ul>

<h2>Interview - Tom Jones - <a href="mailto:tj@enoti.me" rel="nofollow">tj@enoti.me</a></h2>

<ul>
<li>Replacing the BSD Sockets API
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/eborisch/ethname" rel="nofollow">FreeBSD rc.d script to map ethernet device names by MAC address</a></h3>

<blockquote>
<p>Self-contained FreeBSD rc.d script for re-naming devices based on their MAC address. I needed it due to USB Ethernet devices coming up in different orders across OS upgrades.</p>
</blockquote>

<ul>
<li>Copy ethname into /usr/local/etc/rc.d/</li>
<li><p>Add the following to rc.conf:</p>

<blockquote>
<p>ethname_enable=&quot;YES&quot;<br>
ethname_devices=&quot;em0 ue0 ue1&quot; # Replace with desired devices to rename</p>
</blockquote></li>
<li><p>Create /usr/local/etc/ifmap in the following format: <MAC address (in lower case)> <Desired name></p>

<blockquote>
<p>01:23:45:67:89:ab eth0<br>
01:23:45:67:89:ac eth1</p>
</blockquote></li>
</ul>

<p><br></p>

<blockquote>
<p>That&#39;s it. Use ifconfig_<name>=&quot;&quot; settings in rc.conf with the new names.</p>
</blockquote>

<ul>
<li>I know MFSBSD has something like this, but a polished up hybrid of the two should likely be part of the base system if something is not already available</li>
<li>This would be a great “Junior Job”, if say, a viewer wanted to get started with their first FreeBSD patch
***</li>
</ul>

<h3><a href="https://github.com/witchard/mog" rel="nofollow">Mog: A different take on the Unix tool cat</a></h3>

<ul>
<li>Do you abuse cat to view files?</li>
<li>Did you know cat is meant for con*cat*enating files, meaning: cat part1 part2 part3 &gt; wholething.txt</li>
<li>mog is a tool for actually viewing files, and it adds quite a few nice features

<ul>
<li>Syntax highlight scripts</li>
<li>Print a hex dump of binary files</li>
<li>Show details of image files</li>
<li>Perform objdump on executables</li>
<li>List a directory</li>
</ul></li>
</ul>

<blockquote>
<p>mog reads the $HOME/.mogrc config file which describes a series of operations it can do in an ordered manner. Each operation has a match command and an action command. For each file you give to mog it will test each match command in turn, when one matches it will perform the action. A reasonably useful config file is generated when you first run it.</p>

<hr>
</blockquote>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/HowUnixBackspaces" rel="nofollow">How Unix erases things when you type a backspace while entering text</a></h3>

<blockquote>
<p>Yesterday I mentioned in passing that printing a DEL character doesn&#39;t actually erase anything. This raises an interesting question, because when you&#39;re typing something into a Unix system and hit your backspace key, Unix sure erases the last character that you entered. So how is it doing that?</p>

<p>The answer turns out to be basically what you&#39;d expect, although the actual implementation rapidly gets complex. When you hit backspace, the kernel tty line discipline rubs out your previous character by printing (in the simple case) Ctrl-H, a space, and then another Ctrl-H.</p>

<p>Of course just backing up one character is not always the correct way of erasing input, and that&#39;s when it gets complicated for the kernel. To start with we have tabs, because when you (the user) backspace over a tab you want the cursor to jump all the way back, not just move back one space. The kernel has a certain amount of code to work out what column it thinks you&#39;re on and then back up an appropriate number of spaces with Ctrl-Hs.</p>

<p>Then we have the case when you quoted a control character while entering it, eg by typing Ctrl-V Ctrl-H; this causes the kernel to print the Ctrl-H instead of acting on it, and it prints it as the two character sequence <sup>H.</sup> When you hit backspace to erase that, of course you want both (printed) characters to be rubbed out, not just the &#39;H&#39;. So the kernel needs to keep track of that and rub out two characters instead of just one.</p>
</blockquote>

<ul>
<li>Chris then provides an example, from IllumOS, of the kernel trying to deal with multibyte characters</li>
</ul>

<blockquote>
<p>FreeBSD also handles backspacing a space specially, because you don&#39;t need to actually rub that out with a &#39;\b \b&#39; sequence; you can just print a plain \b. Other kernels don&#39;t seem to bother with this optimization. The FreeBSD code for this is in sys/kern/tty_ttydisc.c in the ttydisc_rubchar function</p>

<p>PS: If you want to see the kernel&#39;s handling of backspace in action, you usually can&#39;t test it at your shell prompt, because you&#39;re almost certainly using a shell that supports command line editing and readline and so on. Command line editing requires taking over input processing from the kernel, and so such shells are handling everything themselves. My usual way to see what the kernel is doing is to run &#39;cat &gt;/dev/null&#39; and then type away.</p>
</blockquote>

<ul>
<li>And you thought the backspace key would be simple...
***</li>
</ul>

<h3><a href="http://www.freshports.org/graphics/wayland/" rel="nofollow">FreeBSD ports now have Wayland</a></h3>

<ul>
<li>We’ve discussed the pending Wayland work, but we wanted to point you today to the ports which are in mainline FreeBSD ports tree now.</li>
<li>First of all, (And I was wondering how they would deal with this) it has landed in the “graphics” category, since Wayland is the Anti-X11, putting it in x11/ didn’t make a lot of sense.</li>
<li>Couple of notes before you start installing new packages and expecting wayland to “just work”</li>
<li>First, this does require that you have working DRM from the kernel side. You’ll want to grab TrueOS or build from Matt Macy’s FreeBSD branches on GitHub before testing on any kind of modern Intel GPU. Nvidia with modesetting should be supported.</li>
<li>Next, not all desktops will “just work”. You may need to grab experimental Weston for compositor. KDE / Gnome (And Lumina) and friends will grow Wayland support in the future, so don’t expect to just fire up $whatever and have it all work out of box.</li>
<li>Feedback is needed! This is brand new functionality for FreeBSD, and the maintainers will want to hear your results. For us on the TrueOS side we are interested as well, since we want to port Lumina over to Wayland soon(ish)</li>
<li>Happy Experimenting!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2017-joseph-kong/" rel="nofollow">Faces of FreeBSD 2017: Joseph Kong</a> </p></li>
<li><p><a href="https://opnsense.org/opnsense-17-1-released/" rel="nofollow">OPNsense 17.1  “Eclectic Eagle”, based on FreeBSD 11 Released</a> </p></li>
<li><p><a href="http://www.koszek.com/blog/2017/01/28/why-you-should-start-programming-on-unix/" rel="nofollow">Why you should start programming on UNIX</a> </p></li>
<li><p><a href="http://eradman.com/posts/opensmtpd-filtering.html" rel="nofollow">OpenSMTPD Mail Filtering</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/89AyGe5F" rel="nofollow"> Zane - Databases and Jails</a> </li>
<li><a href="http://pastebin.com/Te8sz9id" rel="nofollow"> Mohammad - USB Install</a> </li>
<li><a href="http://pastebin.com/G2SzahWL" rel="nofollow"> Chuck - Updating Jails</a> </li>
<li><a href="http://pastebin.com/71ExJLpL" rel="nofollow"> David - Lumina / LXQt</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we have “Weird Unix Things”, “Is it getting Steamy in here?” and an Interview about BSD Sockets API. (Those</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.trueos.org/blog/playonbsd-trueos-getting-steamy-ive-much-wine/" rel="nofollow">playonbsd with TrueOS: It’s Getting Steamy in Here and I’ve Had Too Much Wine</a></h3>

<blockquote>
<p>We’ve done a couple of tutorials in the past on using Steam and Wine with PC-BSD, but now with the addition of playonbsd to the AppCafe library, you have more options than ever before to game on your TrueOS system.  We’re going to have a look today at playonbsd, how it works with TrueOS, and what you can expect if you want to give it a try on your own system.  Let’s dive right in!</p>

<p>Once playonbsd is installed, go back to your blank desktop, right-click on the wallpaper, and select terminal.  Playonbsd does almost all the configuring for you, but there are still a couple of simple options you’ll want to configure to give yourself the best experience.  In your open terminal, type: playonbsd.  You can also find playonbsd by doing a fast search using Lumina’s built-in search function in the start menu after it’s been installed.  Once opened,  a graphical interface greets us with easy to navigate menus and even does most of the work for you.</p>
</blockquote>

<ul>
<li>A nice graphical UI that hides the complexity of setting up WINE and Steam, and lets you pick select the game you want, and get it setup</li>
<li>Start gaming quicker, without the headache</li>
</ul>

<blockquote>
<p>If you’re a PC gamer, you should definitely give playonbsd a try!  You may be surprised at how well it works.  If you want to know ahead of time if your games are well supported or not, head on over to WineHQ and do a search.  Many people have tested and provided feedback and even solutions for potential problems with a large variety of video games. This is a great resource if you run into a glitch or other problem.</p>
</blockquote>

<hr>

<h3><a href="https://jvns.ca/blog/2017/02/08/weird-unix-things-cd/" rel="nofollow">Weird Unix thing: &#39;cd //&#39;</a></h3>

<ul>
<li>So why can you do ‘cd //tmp’, and it isn’t the same as ‘cd /tmp’?</li>
<li>The spec says:</li>
</ul>

<blockquote>
<p>An implementation may further simplify curpath by removing any trailing <slash> characters that are not also leading <slash> characters, replacing multiple non-leading consecutive <slash> characters with a single <slash>, and replacing three or more leading <slash> characters with a single <slash>. If, as a result of this canonicalization, the curpath variable is null, no further steps shall be taken.</p>
</blockquote>

<ul>
<li>“So! We can replace “three or more leading / characters with a single slash”. That does not say anything about what to do when there are 2 / characters though, which presumably is why cd //tmp leaves you at //tmp.”</li>
</ul>

<blockquote>
<p>A pathname that begins with two successive slashes may be interpreted in an implementation-defined manner</p>
</blockquote>

<ul>
<li>So what is it for? Well, the blog did a bit of digging and came up with <a href="http://unix.stackexchange.com/questions/256497/on-what-systems-is-foo-bar-different-from-foo-bar/256569#256569" rel="nofollow">this stackoverflow answer</a></li>
<li>In cygwin and some other systems // is treated as a unix-ified version of \, to access UNC windows file sharing paths like \server\share</li>
<li>Perforce, the vcs, uses // to denote a path relative to the depot</li>
<li>It seems to have been used in the path for a bunch of different network file systems, but also for myriad other things</li>
</ul>

<hr>

<h3><a href="https://arstechnica.com/apple/2017/02/testing-out-snapshots-in-apples-next-generation-apfs-file-system/" rel="nofollow">Testing out snapshots in Apple’s next-generation APFS file system</a></h3>

<ul>
<li>Adam Leventhal takes his DTrace hammer to Apple’s new file system to see what is going on</li>
</ul>

<blockquote>
<p>Back in June, Apple announced its new upcoming file system: APFS, or Apple File System. There was no mention of it in the WWDC keynote, but devotees needed no encouragement. They picked over every scintilla of data from the documentation on Apple’s developer site, extrapolating, interpolating, eager for whatever was about to come. In the WWDC session hall, the crowd buzzed with a nervous energy, eager for the grand unveiling of APFS. I myself badge-swapped my way into the conference just to get that first glimpse of Apple’s first original filesystem in the 30+ years since HFS</p>

<p>Apple’s presentation didn’t disappoint the hungry crowd. We hoped for a modern filesystem, optimized for next generation hardware, rich with features that have become the norm for data centers and professionals. With APFS, Apple showed a path to meeting those expectations. Dominic Giampaolo and Eric Tamura, leaders of the APFS team, shared performance optimizations, data integrity design, volume management, efficient storage of copied data, and snapshots—arguably the feature of APFS most directly in the user’s control.</p>

<p>It’s 2017, and Apple already appears to be making good on its promise with the revelation that the forthcoming iOS 10.3 will use APFS. The number of APFS tinkerers using it for their personal data has instantly gone from a few hundred to a few million. Beta users of iOS 10.3 have already made the switch apparently without incident. They have even ascribed unscientifically-significant performance improvements to APFS.</p>
</blockquote>

<ul>
<li>Previously Adam had used DTrace to find a new syscall introduced in OS X, fs_snapshot, but he had not dug into how to use it. Now it seems, the time has come</li>
</ul>

<blockquote>
<p>Learning from XNU and making some educated guesses, I wrote my first C program to create an APFS snapshot. This section has a bit of code, which you can find in <a href="https://github.com/ahl/apfs" rel="nofollow">this Github repo</a></p>
</blockquote>

<ul>
<li>That just returned “fs_snapshot: Operation not permitted”</li>
<li>So, being Adam, he used DTrace to figure out what the problem was</li>
</ul>

<blockquote>
<p>Running this DTrace script in one terminal while running the snapshot program in another shows the code flow through the kernel as the program executes</p>

<p>In the code flow, the priv_check_cred() function jumps out as a good place to continue because of its name, the fact that fs_snapshot calls it directly, and the fact that it returns 1 which corresponds with EPERM, the error we were getting.</p>
</blockquote>

<ul>
<li>Turns out, it just requires some sudo</li>
</ul>

<blockquote>
<p>With a little more testing I wrote my own version of Apple&#39;s unreleased snapUtil command from the WWDC demo</p>

<p>We figured out the proper use of the fs_snapshot system call and reconstructed the WWDC snapUtil. But all this time an equivalent utility has been lurking on macOS Sierra. If you look in /System/Library/Filesystems/apfs.fs/Contents/Resources/, Apple has included a number of APFS-related utilities, including apfs_snapshot (and, tantalizingly, a tool called hfs_convert).</p>

<p>Snapshots let you preserve state to later peruse; we can also revert an APFS volume to a previous state to restore its contents. The current APFS semantics around rollback are a little odd. The revert operation succeeds, but it doesn&#39;t take effect until the APFS volume is next mounted</p>

<p>Another reason Apple may not have wanted people messing around with snapshots is that the feature appears to be incomplete. Winding yourself into a state where only a reboot can clear a mounted snapshot is easy, and using snapshots seems to break some of the diskutil APFS output</p>
</blockquote>

<ul>
<li>It is interesting to see what you can do with DTrace, as well as to see what a DTrace and ZFS developer things of APFS
***</li>
</ul>

<h2>Interview - Tom Jones - <a href="mailto:tj@enoti.me" rel="nofollow">tj@enoti.me</a></h2>

<ul>
<li>Replacing the BSD Sockets API
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/eborisch/ethname" rel="nofollow">FreeBSD rc.d script to map ethernet device names by MAC address</a></h3>

<blockquote>
<p>Self-contained FreeBSD rc.d script for re-naming devices based on their MAC address. I needed it due to USB Ethernet devices coming up in different orders across OS upgrades.</p>
</blockquote>

<ul>
<li>Copy ethname into /usr/local/etc/rc.d/</li>
<li><p>Add the following to rc.conf:</p>

<blockquote>
<p>ethname_enable=&quot;YES&quot;<br>
ethname_devices=&quot;em0 ue0 ue1&quot; # Replace with desired devices to rename</p>
</blockquote></li>
<li><p>Create /usr/local/etc/ifmap in the following format: <MAC address (in lower case)> <Desired name></p>

<blockquote>
<p>01:23:45:67:89:ab eth0<br>
01:23:45:67:89:ac eth1</p>
</blockquote></li>
</ul>

<p><br></p>

<blockquote>
<p>That&#39;s it. Use ifconfig_<name>=&quot;&quot; settings in rc.conf with the new names.</p>
</blockquote>

<ul>
<li>I know MFSBSD has something like this, but a polished up hybrid of the two should likely be part of the base system if something is not already available</li>
<li>This would be a great “Junior Job”, if say, a viewer wanted to get started with their first FreeBSD patch
***</li>
</ul>

<h3><a href="https://github.com/witchard/mog" rel="nofollow">Mog: A different take on the Unix tool cat</a></h3>

<ul>
<li>Do you abuse cat to view files?</li>
<li>Did you know cat is meant for con*cat*enating files, meaning: cat part1 part2 part3 &gt; wholething.txt</li>
<li>mog is a tool for actually viewing files, and it adds quite a few nice features

<ul>
<li>Syntax highlight scripts</li>
<li>Print a hex dump of binary files</li>
<li>Show details of image files</li>
<li>Perform objdump on executables</li>
<li>List a directory</li>
</ul></li>
</ul>

<blockquote>
<p>mog reads the $HOME/.mogrc config file which describes a series of operations it can do in an ordered manner. Each operation has a match command and an action command. For each file you give to mog it will test each match command in turn, when one matches it will perform the action. A reasonably useful config file is generated when you first run it.</p>

<hr>
</blockquote>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/HowUnixBackspaces" rel="nofollow">How Unix erases things when you type a backspace while entering text</a></h3>

<blockquote>
<p>Yesterday I mentioned in passing that printing a DEL character doesn&#39;t actually erase anything. This raises an interesting question, because when you&#39;re typing something into a Unix system and hit your backspace key, Unix sure erases the last character that you entered. So how is it doing that?</p>

<p>The answer turns out to be basically what you&#39;d expect, although the actual implementation rapidly gets complex. When you hit backspace, the kernel tty line discipline rubs out your previous character by printing (in the simple case) Ctrl-H, a space, and then another Ctrl-H.</p>

<p>Of course just backing up one character is not always the correct way of erasing input, and that&#39;s when it gets complicated for the kernel. To start with we have tabs, because when you (the user) backspace over a tab you want the cursor to jump all the way back, not just move back one space. The kernel has a certain amount of code to work out what column it thinks you&#39;re on and then back up an appropriate number of spaces with Ctrl-Hs.</p>

<p>Then we have the case when you quoted a control character while entering it, eg by typing Ctrl-V Ctrl-H; this causes the kernel to print the Ctrl-H instead of acting on it, and it prints it as the two character sequence <sup>H.</sup> When you hit backspace to erase that, of course you want both (printed) characters to be rubbed out, not just the &#39;H&#39;. So the kernel needs to keep track of that and rub out two characters instead of just one.</p>
</blockquote>

<ul>
<li>Chris then provides an example, from IllumOS, of the kernel trying to deal with multibyte characters</li>
</ul>

<blockquote>
<p>FreeBSD also handles backspacing a space specially, because you don&#39;t need to actually rub that out with a &#39;\b \b&#39; sequence; you can just print a plain \b. Other kernels don&#39;t seem to bother with this optimization. The FreeBSD code for this is in sys/kern/tty_ttydisc.c in the ttydisc_rubchar function</p>

<p>PS: If you want to see the kernel&#39;s handling of backspace in action, you usually can&#39;t test it at your shell prompt, because you&#39;re almost certainly using a shell that supports command line editing and readline and so on. Command line editing requires taking over input processing from the kernel, and so such shells are handling everything themselves. My usual way to see what the kernel is doing is to run &#39;cat &gt;/dev/null&#39; and then type away.</p>
</blockquote>

<ul>
<li>And you thought the backspace key would be simple...
***</li>
</ul>

<h3><a href="http://www.freshports.org/graphics/wayland/" rel="nofollow">FreeBSD ports now have Wayland</a></h3>

<ul>
<li>We’ve discussed the pending Wayland work, but we wanted to point you today to the ports which are in mainline FreeBSD ports tree now.</li>
<li>First of all, (And I was wondering how they would deal with this) it has landed in the “graphics” category, since Wayland is the Anti-X11, putting it in x11/ didn’t make a lot of sense.</li>
<li>Couple of notes before you start installing new packages and expecting wayland to “just work”</li>
<li>First, this does require that you have working DRM from the kernel side. You’ll want to grab TrueOS or build from Matt Macy’s FreeBSD branches on GitHub before testing on any kind of modern Intel GPU. Nvidia with modesetting should be supported.</li>
<li>Next, not all desktops will “just work”. You may need to grab experimental Weston for compositor. KDE / Gnome (And Lumina) and friends will grow Wayland support in the future, so don’t expect to just fire up $whatever and have it all work out of box.</li>
<li>Feedback is needed! This is brand new functionality for FreeBSD, and the maintainers will want to hear your results. For us on the TrueOS side we are interested as well, since we want to port Lumina over to Wayland soon(ish)</li>
<li>Happy Experimenting!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2017-joseph-kong/" rel="nofollow">Faces of FreeBSD 2017: Joseph Kong</a> </p></li>
<li><p><a href="https://opnsense.org/opnsense-17-1-released/" rel="nofollow">OPNsense 17.1  “Eclectic Eagle”, based on FreeBSD 11 Released</a> </p></li>
<li><p><a href="http://www.koszek.com/blog/2017/01/28/why-you-should-start-programming-on-unix/" rel="nofollow">Why you should start programming on UNIX</a> </p></li>
<li><p><a href="http://eradman.com/posts/opensmtpd-filtering.html" rel="nofollow">OpenSMTPD Mail Filtering</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/89AyGe5F" rel="nofollow"> Zane - Databases and Jails</a> </li>
<li><a href="http://pastebin.com/Te8sz9id" rel="nofollow"> Mohammad - USB Install</a> </li>
<li><a href="http://pastebin.com/G2SzahWL" rel="nofollow"> Chuck - Updating Jails</a> </li>
<li><a href="http://pastebin.com/71ExJLpL" rel="nofollow"> David - Lumina / LXQt</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>182: Bloaty McBloatface</title>
  <link>https://www.bsdnow.tv/182</link>
  <guid isPermaLink="false">03a41594-1715-4d90-9b5e-594a358caefd</guid>
  <pubDate>Wed, 22 Feb 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/03a41594-1715-4d90-9b5e-594a358caefd.mp3" length="48221716" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we’ve got FreeBSD quarterly Status reports to discuss, OpenBSD changes to the installer, EC2 and IPv6 and more. Stay</itunes:subtitle>
  <itunes:duration>1:06:58</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we’ve got FreeBSD quarterly Status reports to discuss, OpenBSD changes to the installer, EC2 and IPv6 and more. Stay&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/openbsd-changes-of-note-6" target="_blank" rel="nofollow noopener"&gt;OpenBSD changes of note 6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD can now be cross built with clang. Work on this continues&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Build ld.so with -fno-builtin because otherwise clang would optimize the local versions of functions like _dl_memset into a call to memset, which doesn’t exist.&lt;br&gt;
&amp;gt; Add connection timeout for ftp (http). Mostly for the installer so it can error out and try something else.&lt;br&gt;
&amp;gt; Complete https support for the installer.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I wonder how they handle certificate verification. I need to look into this as I’d like to switch the FreeBSD installer to this as well&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; New ocspcheck utility to validate a certificate against its ocsp responder.&lt;br&gt;
&amp;gt; net lock here, net lock there, net lock not quite everywhere but more than before.&lt;br&gt;
&amp;gt; More per cpu counters in networking code as well.&lt;br&gt;
&amp;gt; Disable and lock Silicon Debug feature on modern Intel CPUs. &lt;br&gt;
&amp;gt; Prevent wireless frame injection attack described at 33C3 in the talk titled “Predicting and Abusing WPA2/802.11 Group Keys” by Mathy Vanhoef.&lt;br&gt;
&amp;gt; Add support for multiple transmit ifqueues per network interface. Supported drivers include bge, bnx, em, myx, ix, hvn, xnf. &lt;br&gt;
&amp;gt; pledge now tracks when a file as opened and uses this to permit or deny ioctl. &lt;br&gt;
&amp;gt; Reimplement httpd’s support for byte ranges. Fixes a memory DOS. &lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2016-10-2016-12.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 2016Q4 Status Report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An overview of some of the work that happened in October - December 2016&lt;/li&gt;
&lt;li&gt;The ports tree saw many updates and surpassed 27,000 ports&lt;/li&gt;
&lt;li&gt;The core team was busy as usual, and the foundation attended and/or sponsored a record 24 events in 2016.&lt;/li&gt;
&lt;li&gt;CEPH on FreeBSD seems to be coming along nicely. For those that do not know, CEPH is a distributed filesystem that can sit on top of another filesystem. That is, you can use it to create a clustered filesystem out of a bunch of ZFS servers. Would love to have some viewers give it a try and report back.&lt;/li&gt;
&lt;li&gt;OpenBSM, the FreeBSD audit framework, got some updates&lt;/li&gt;
&lt;li&gt;Ed Schouten committed a front end to export sysctl data in a format usable by Prometheus, the open source monitoring system. This is useful for other monitoring software too.&lt;/li&gt;
&lt;li&gt;Lots of updates for various ARM boards&lt;/li&gt;
&lt;li&gt;There is an update on Reproducible Builds in FreeBSD, “ It is now possible to build the FreeBSD base system (kernel and userland) completely reproducibly, although it currently requires a few non-default settings”, and the ports tree is at 80% reproducible&lt;/li&gt;
&lt;li&gt;Lots of toolchain updates (gcc, lld, gdb)&lt;/li&gt;
&lt;li&gt;Various updates from major ports teams
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2017-01-26-IPv6-on-FreeBSD-EC2.html" target="_blank" rel="nofollow noopener"&gt;Amazon rolls out IPv6 support on EC2&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; A few hours ago Amazon announced that they had rolled out IPv6 support in EC2 to 15 regions — everywhere except the Beijing region, apparently. This seems as good a time as any to write about using IPv6 in EC2 on FreeBSD instances.&lt;br&gt;
&amp;gt; First, the good news: Future FreeBSD releases will support IPv6 "out of the box" on EC2. I committed changes to HEAD last week, and merged them to the stable/11 branch moments ago, to have FreeBSD automatically use whatever IPv6 addresses EC2 makes available to it.&lt;br&gt;
&amp;gt; Next, the annoying news: To get IPv6 support in EC2 from existing FreeBSD releases (10.3, 11.0) you'll need to run a few simple commands. I consider this unfortunate but inevitable: While Amazon has been unusually helpful recently, there's nothing they could have done to get support for their IPv6 networking configuration into FreeBSD a year before they launched it.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You need the dual-dhclient port:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; pkg install dual-dhclient&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;And the following lines in your /etc/rc.conf:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;    ifconfig_DEFAULT="SYNCDHCP accept_rtadv"&lt;br&gt;
&amp;gt;    ipv6_activate_all_interfaces="YES"&lt;br&gt;
&amp;gt;    dhclient_program="/usr/local/sbin/dual-dhclient"&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It is good to see FreeBSD being ready to use this feature on day 0, not something we would have had in the past&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Finally, one important caveat: While EC2 is clearly the most important place to have IPv6 support, and one which many of us have been waiting a long time to get, this is not the only service where IPv6 support is important. Of particular concern to me, Application Load Balancer support for IPv6 is still missing in many regions, and Elastic Load Balancers in VPC don't support IPv6 at all — which matters to those of us who run non-HTTP services. Make sure that IPv6 support has been rolled out for all the services you need before you start migrating.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Colin’s blog also has the details on how to actually activate IPv6 from the Amazon side, if only it was as easy as configuring it on the FreeBSD side
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=cofKxtIO3Is" target="_blank" rel="nofollow noopener"&gt;FreeBSD’s George Neville-Neil tries valiantly for over an hour to convince a Linux fan of the error of their ways &lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; In today's episode of the Lunduke Hour I talk to George Neville-Neil -- author and FreeBSD advocate. He tries to convince me, a Linux user, that FreeBSD is better.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;They cover quite a few topics, including:

&lt;ul&gt;
&lt;li&gt;licensing, and the motivations behind it&lt;/li&gt;
&lt;li&gt;vendor relations&lt;/li&gt;
&lt;li&gt;community&lt;/li&gt;
&lt;li&gt;development model&lt;/li&gt;
&lt;li&gt;drivers and hardware support&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;George also talks about his work with the FreeBSD Foundation, and the book he co-authored, “The Design and Implementation of the FreeBSD Operating System, 2nd Edition”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/rosedovell/unixdesktops" target="_blank" rel="nofollow noopener"&gt;An interactive script that makes it easy to install 50+ desktop environments following a base install of FreeBSD 11&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;And I thought I was doing good when I wrote a patch for the installer that enables your choice of 3 desktop environments...&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; This is a collection of scripts meant to install desktop environments on unix-like operating systems following a base install. I call one of these 'complete' when it meets the following requirements:&lt;br&gt;
&amp;gt;  + A graphical logon manager is presented without user intervention after powering on the machine&lt;br&gt;
&amp;gt;  + Logging into that graphical logon manager takes the user into the specified desktop environment&lt;br&gt;
&amp;gt;  + The user can open a terminal emulator&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I need to revive my patch, and add Lumina to it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/firefox_51_on_sparc64_we" target="_blank" rel="nofollow noopener"&gt;Firefox 51 on sparc64 - we did not hit the wall yet&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A NetBSD developers tells the story of getting Firefox 51 running on their sparc64 machine&lt;/li&gt;
&lt;li&gt;It turns out the bug impacted amd64 as well, so it was quickly fixed&lt;/li&gt;
&lt;li&gt;They are a bit less hopeful about the future, since Firefox will soon require rust to compile, and rust is not working on sparc64 yet&lt;/li&gt;
&lt;li&gt;Although there has been some activity on the rust on sparc64 front, so maybe there is hope&lt;/li&gt;
&lt;li&gt;The post also look at a few alternative browsers, but it not hopeful
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.reverberate.org/2016/11/07/introducing-bloaty-mcbloatface.html" target="_blank" rel="nofollow noopener"&gt;Introducing Bloaty McBloatface: a size profiler for binaries&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I’m very excited to announce that today I’m open-sourcing a tool I’ve been working on for several months at Google. It’s called Bloaty McBloatface, and it lets you explore what’s taking up space in your .o, .a, .so, and executable binary files.&lt;/p&gt;

&lt;p&gt;&amp;gt; Bloaty is available under the Apache 2 license. All of the code is available on GitHub: github.com/google/bloaty. It is quick and easy to build, though it does require a somewhat recent compiler since it uses C++11 extensively. Bloaty primarily supports ELF files (Linux, BSD, etc) but there is some support for Mach-O files on OS X too. I’m interested in expanding Bloaty’s capabilities to more platforms if there is interest!&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I need to try this one some of the boot code files, to see if there are places we can trim some fat&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; We’ve been using Bloaty a lot on the Protocol Buffers team at Google to evaluate the binary size impacts of our changes. If a change causes a size increase, where did it come from? What sections/symbols grew, and why? Bloaty has a diff mode for understanding changes in binary size&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The diff mode looks especially interesting. It might be worth setting up some kind of CI testing that alerts if a change results in a significant size increase in a binary or library
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/kristapsdz/mdnsd" target="_blank" rel="nofollow noopener"&gt;A BSD licensed mdns responder&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the things we just have to deal with in the modern world is service and system discovery. Many of us have fiddled with avahi or mdnsd and related “mdns” services.&lt;/li&gt;
&lt;li&gt;For various reasons those often haven’t been the best-fit on BSD systems. &lt;/li&gt;
&lt;li&gt;Today we have a github project to point you at, which while a bit older, has recently been updated with pledge() support for OpenBSD. &lt;/li&gt;
&lt;li&gt;First of all, why do we need an alternative? They list their reasons:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;This is an attempt to bring native mdns/dns-sd to OpenBSD. Mainly cause all the other options suck and proper network browsing is a nice feature these days.&lt;/p&gt;

&lt;p&gt;&amp;gt; Why not Apple's mdnsd ?&lt;br&gt;
&amp;gt;    1 - It sucks big time.&lt;br&gt;
&amp;gt;    2 - No BSD License (Apache-2).&lt;br&gt;
&amp;gt;    3 - Overcomplex API.&lt;br&gt;
&amp;gt;    4 - Not OpenBSD-like.&lt;/p&gt;

&lt;p&gt;&amp;gt; Why not Avahi ?&lt;br&gt;
&amp;gt;    1 - No BSD License (LGPL).&lt;br&gt;
&amp;gt;    2 - Overcomplex API.&lt;br&gt;
&amp;gt;    3 - Not OpenBSD-like&lt;br&gt;
&amp;gt;    4 - DBUS and lots of dependencies.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Those already sound like pretty compelling reasons. What makes this “new” information again is the pledge support, and perhaps it’s time for more BSD’s to start considering importing something like mdnsd into their base system to make system discovery more “automatic”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=Ib7tFvw34DM" target="_blank" rel="nofollow noopener"&gt;Benno Rice at Linux.Conf.Au: The Trouble with FreeBSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://vmssoftware.com/pdfs/State_of_Port_20170105.pdf" target="_blank" rel="nofollow noopener"&gt;State of the Port of VMS to x86 &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://thestack.com/cloud/2017/02/08/microsoft-azure-now-offers-patent-troll-ip-protection/" target="_blank" rel="nofollow noopener"&gt;Microsoft Azure now offers Patent Troll Protection&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/news-and-events/event-calendar/freebsd-storage-summit-2017/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Storage Summit 2017&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://bhyvecon.org/" target="_blank" rel="nofollow noopener"&gt;If you are going to be in Tokyo, make sure you come to&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/bVqsvM3r" target="_blank" rel="nofollow noopener"&gt; Farhan - Laptops&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/7KWYX2Mg" target="_blank" rel="nofollow noopener"&gt; Hjalti - rclone&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/U5XyzMDR" target="_blank" rel="nofollow noopener"&gt; Ivan - Jails&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/sK7uEDpn" target="_blank" rel="nofollow noopener"&gt; Jungle - Traffic Control&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we’ve got FreeBSD quarterly Status reports to discuss, OpenBSD changes to the installer, EC2 and IPv6 and more. Stay</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/openbsd-changes-of-note-6" rel="nofollow">OpenBSD changes of note 6</a></h3>

<ul>
<li>OpenBSD can now be cross built with clang. Work on this continues</li>
</ul>

<blockquote>
<p>Build ld.so with -fno-builtin because otherwise clang would optimize the local versions of functions like _dl_memset into a call to memset, which doesn’t exist.<br>
Add connection timeout for ftp (http). Mostly for the installer so it can error out and try something else.<br>
Complete https support for the installer.</p>
</blockquote>

<ul>
<li>I wonder how they handle certificate verification. I need to look into this as I’d like to switch the FreeBSD installer to this as well</li>
</ul>

<blockquote>
<p>New ocspcheck utility to validate a certificate against its ocsp responder.<br>
net lock here, net lock there, net lock not quite everywhere but more than before.<br>
More per cpu counters in networking code as well.<br>
Disable and lock Silicon Debug feature on modern Intel CPUs. <br>
Prevent wireless frame injection attack described at 33C3 in the talk titled “Predicting and Abusing WPA2/802.11 Group Keys” by Mathy Vanhoef.<br>
Add support for multiple transmit ifqueues per network interface. Supported drivers include bge, bnx, em, myx, ix, hvn, xnf. <br>
pledge now tracks when a file as opened and uses this to permit or deny ioctl. <br>
Reimplement httpd’s support for byte ranges. Fixes a memory DOS. </p>

<hr>
</blockquote>

<h3><a href="https://www.freebsd.org/news/status/report-2016-10-2016-12.html" rel="nofollow">FreeBSD 2016Q4 Status Report</a></h3>

<ul>
<li>An overview of some of the work that happened in October - December 2016</li>
<li>The ports tree saw many updates and surpassed 27,000 ports</li>
<li>The core team was busy as usual, and the foundation attended and/or sponsored a record 24 events in 2016.</li>
<li>CEPH on FreeBSD seems to be coming along nicely. For those that do not know, CEPH is a distributed filesystem that can sit on top of another filesystem. That is, you can use it to create a clustered filesystem out of a bunch of ZFS servers. Would love to have some viewers give it a try and report back.</li>
<li>OpenBSM, the FreeBSD audit framework, got some updates</li>
<li>Ed Schouten committed a front end to export sysctl data in a format usable by Prometheus, the open source monitoring system. This is useful for other monitoring software too.</li>
<li>Lots of updates for various ARM boards</li>
<li>There is an update on Reproducible Builds in FreeBSD, “ It is now possible to build the FreeBSD base system (kernel and userland) completely reproducibly, although it currently requires a few non-default settings”, and the ports tree is at 80% reproducible</li>
<li>Lots of toolchain updates (gcc, lld, gdb)</li>
<li>Various updates from major ports teams
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2017-01-26-IPv6-on-FreeBSD-EC2.html" rel="nofollow">Amazon rolls out IPv6 support on EC2</a></h3>

<blockquote>
<p>A few hours ago Amazon announced that they had rolled out IPv6 support in EC2 to 15 regions — everywhere except the Beijing region, apparently. This seems as good a time as any to write about using IPv6 in EC2 on FreeBSD instances.<br>
First, the good news: Future FreeBSD releases will support IPv6 &quot;out of the box&quot; on EC2. I committed changes to HEAD last week, and merged them to the stable/11 branch moments ago, to have FreeBSD automatically use whatever IPv6 addresses EC2 makes available to it.<br>
Next, the annoying news: To get IPv6 support in EC2 from existing FreeBSD releases (10.3, 11.0) you&#39;ll need to run a few simple commands. I consider this unfortunate but inevitable: While Amazon has been unusually helpful recently, there&#39;s nothing they could have done to get support for their IPv6 networking configuration into FreeBSD a year before they launched it.</p>
</blockquote>

<ul>
<li>You need the dual-dhclient port:</li>
</ul>

<blockquote>
<p>pkg install dual-dhclient</p>
</blockquote>

<ul>
<li>And the following lines in your /etc/rc.conf:</li>
</ul>

<blockquote>
<p>ifconfig_DEFAULT=&quot;SYNCDHCP accept_rtadv&quot;<br>
   ipv6_activate_all_interfaces=&quot;YES&quot;<br>
   dhclient_program=&quot;/usr/local/sbin/dual-dhclient&quot;</p>

<ul>
<li>It is good to see FreeBSD being ready to use this feature on day 0, not something we would have had in the past</li>
</ul>

<p>Finally, one important caveat: While EC2 is clearly the most important place to have IPv6 support, and one which many of us have been waiting a long time to get, this is not the only service where IPv6 support is important. Of particular concern to me, Application Load Balancer support for IPv6 is still missing in many regions, and Elastic Load Balancers in VPC don&#39;t support IPv6 at all — which matters to those of us who run non-HTTP services. Make sure that IPv6 support has been rolled out for all the services you need before you start migrating.</p>
</blockquote>

<ul>
<li>Colin’s blog also has the details on how to actually activate IPv6 from the Amazon side, if only it was as easy as configuring it on the FreeBSD side
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=cofKxtIO3Is" rel="nofollow">FreeBSD’s George Neville-Neil tries valiantly for over an hour to convince a Linux fan of the error of their ways </a></h3>

<blockquote>
<p>In today&#39;s episode of the Lunduke Hour I talk to George Neville-Neil -- author and FreeBSD advocate. He tries to convince me, a Linux user, that FreeBSD is better.</p>

<ul>
<li>They cover quite a few topics, including:

<ul>
<li>licensing, and the motivations behind it</li>
<li>vendor relations</li>
<li>community</li>
<li>development model</li>
<li>drivers and hardware support</li>
</ul></li>
<li>George also talks about his work with the FreeBSD Foundation, and the book he co-authored, “The Design and Implementation of the FreeBSD Operating System, 2nd Edition”
***</li>
</ul>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://github.com/rosedovell/unixdesktops" rel="nofollow">An interactive script that makes it easy to install 50+ desktop environments following a base install of FreeBSD 11</a></h3>

<ul>
<li>And I thought I was doing good when I wrote a patch for the installer that enables your choice of 3 desktop environments...</li>
</ul>

<blockquote>
<p>This is a collection of scripts meant to install desktop environments on unix-like operating systems following a base install. I call one of these &#39;complete&#39; when it meets the following requirements:</p>

<ul>
<li>A graphical logon manager is presented without user intervention after powering on the machine</li>
<li>Logging into that graphical logon manager takes the user into the specified desktop environment</li>
<li>The user can open a terminal emulator</li>
</ul>
</blockquote>

<ul>
<li>I need to revive my patch, and add Lumina to it
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/firefox_51_on_sparc64_we" rel="nofollow">Firefox 51 on sparc64 - we did not hit the wall yet</a></h3>

<ul>
<li>A NetBSD developers tells the story of getting Firefox 51 running on their sparc64 machine</li>
<li>It turns out the bug impacted amd64 as well, so it was quickly fixed</li>
<li>They are a bit less hopeful about the future, since Firefox will soon require rust to compile, and rust is not working on sparc64 yet</li>
<li>Although there has been some activity on the rust on sparc64 front, so maybe there is hope</li>
<li>The post also look at a few alternative browsers, but it not hopeful
***</li>
</ul>

<h3><a href="http://blog.reverberate.org/2016/11/07/introducing-bloaty-mcbloatface.html" rel="nofollow">Introducing Bloaty McBloatface: a size profiler for binaries</a></h3>

<blockquote>
<p>I’m very excited to announce that today I’m open-sourcing a tool I’ve been working on for several months at Google. It’s called Bloaty McBloatface, and it lets you explore what’s taking up space in your .o, .a, .so, and executable binary files.</p>

<p>Bloaty is available under the Apache 2 license. All of the code is available on GitHub: github.com/google/bloaty. It is quick and easy to build, though it does require a somewhat recent compiler since it uses C++11 extensively. Bloaty primarily supports ELF files (Linux, BSD, etc) but there is some support for Mach-O files on OS X too. I’m interested in expanding Bloaty’s capabilities to more platforms if there is interest!</p>
</blockquote>

<ul>
<li>I need to try this one some of the boot code files, to see if there are places we can trim some fat</li>
</ul>

<blockquote>
<p>We’ve been using Bloaty a lot on the Protocol Buffers team at Google to evaluate the binary size impacts of our changes. If a change causes a size increase, where did it come from? What sections/symbols grew, and why? Bloaty has a diff mode for understanding changes in binary size</p>
</blockquote>

<ul>
<li>The diff mode looks especially interesting. It might be worth setting up some kind of CI testing that alerts if a change results in a significant size increase in a binary or library
***</li>
</ul>

<h3><a href="https://github.com/kristapsdz/mdnsd" rel="nofollow">A BSD licensed mdns responder</a></h3>

<ul>
<li>One of the things we just have to deal with in the modern world is service and system discovery. Many of us have fiddled with avahi or mdnsd and related “mdns” services.</li>
<li>For various reasons those often haven’t been the best-fit on BSD systems. </li>
<li>Today we have a github project to point you at, which while a bit older, has recently been updated with pledge() support for OpenBSD. </li>
<li>First of all, why do we need an alternative? They list their reasons:</li>
</ul>

<blockquote>
<p>This is an attempt to bring native mdns/dns-sd to OpenBSD. Mainly cause all the other options suck and proper network browsing is a nice feature these days.</p>

<p>Why not Apple&#39;s mdnsd ?<br>
   1 - It sucks big time.<br>
   2 - No BSD License (Apache-2).<br>
   3 - Overcomplex API.<br>
   4 - Not OpenBSD-like.</p>

<p>Why not Avahi ?<br>
   1 - No BSD License (LGPL).<br>
   2 - Overcomplex API.<br>
   3 - Not OpenBSD-like<br>
   4 - DBUS and lots of dependencies.</p>
</blockquote>

<ul>
<li>Those already sound like pretty compelling reasons. What makes this “new” information again is the pledge support, and perhaps it’s time for more BSD’s to start considering importing something like mdnsd into their base system to make system discovery more “automatic”
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.youtube.com/watch?v=Ib7tFvw34DM" rel="nofollow">Benno Rice at Linux.Conf.Au: The Trouble with FreeBSD</a> </p></li>
<li><p><a href="http://vmssoftware.com/pdfs/State_of_Port_20170105.pdf" rel="nofollow">State of the Port of VMS to x86 </a> </p></li>
<li><p><a href="https://thestack.com/cloud/2017/02/08/microsoft-azure-now-offers-patent-troll-ip-protection/" rel="nofollow">Microsoft Azure now offers Patent Troll Protection</a> </p></li>
<li><p><a href="https://www.freebsdfoundation.org/news-and-events/event-calendar/freebsd-storage-summit-2017/" rel="nofollow">FreeBSD Storage Summit 2017</a></p></li>
<li><p><a href="http://bhyvecon.org/" rel="nofollow">If you are going to be in Tokyo, make sure you come to</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/bVqsvM3r" rel="nofollow"> Farhan - Laptops</a> </li>
<li><a href="http://pastebin.com/7KWYX2Mg" rel="nofollow"> Hjalti - rclone</a> </li>
<li><a href="http://pastebin.com/U5XyzMDR" rel="nofollow"> Ivan - Jails</a> </li>
<li><a href="http://pastebin.com/sK7uEDpn" rel="nofollow"> Jungle - Traffic Control</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we’ve got FreeBSD quarterly Status reports to discuss, OpenBSD changes to the installer, EC2 and IPv6 and more. Stay</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/openbsd-changes-of-note-6" rel="nofollow">OpenBSD changes of note 6</a></h3>

<ul>
<li>OpenBSD can now be cross built with clang. Work on this continues</li>
</ul>

<blockquote>
<p>Build ld.so with -fno-builtin because otherwise clang would optimize the local versions of functions like _dl_memset into a call to memset, which doesn’t exist.<br>
Add connection timeout for ftp (http). Mostly for the installer so it can error out and try something else.<br>
Complete https support for the installer.</p>
</blockquote>

<ul>
<li>I wonder how they handle certificate verification. I need to look into this as I’d like to switch the FreeBSD installer to this as well</li>
</ul>

<blockquote>
<p>New ocspcheck utility to validate a certificate against its ocsp responder.<br>
net lock here, net lock there, net lock not quite everywhere but more than before.<br>
More per cpu counters in networking code as well.<br>
Disable and lock Silicon Debug feature on modern Intel CPUs. <br>
Prevent wireless frame injection attack described at 33C3 in the talk titled “Predicting and Abusing WPA2/802.11 Group Keys” by Mathy Vanhoef.<br>
Add support for multiple transmit ifqueues per network interface. Supported drivers include bge, bnx, em, myx, ix, hvn, xnf. <br>
pledge now tracks when a file as opened and uses this to permit or deny ioctl. <br>
Reimplement httpd’s support for byte ranges. Fixes a memory DOS. </p>

<hr>
</blockquote>

<h3><a href="https://www.freebsd.org/news/status/report-2016-10-2016-12.html" rel="nofollow">FreeBSD 2016Q4 Status Report</a></h3>

<ul>
<li>An overview of some of the work that happened in October - December 2016</li>
<li>The ports tree saw many updates and surpassed 27,000 ports</li>
<li>The core team was busy as usual, and the foundation attended and/or sponsored a record 24 events in 2016.</li>
<li>CEPH on FreeBSD seems to be coming along nicely. For those that do not know, CEPH is a distributed filesystem that can sit on top of another filesystem. That is, you can use it to create a clustered filesystem out of a bunch of ZFS servers. Would love to have some viewers give it a try and report back.</li>
<li>OpenBSM, the FreeBSD audit framework, got some updates</li>
<li>Ed Schouten committed a front end to export sysctl data in a format usable by Prometheus, the open source monitoring system. This is useful for other monitoring software too.</li>
<li>Lots of updates for various ARM boards</li>
<li>There is an update on Reproducible Builds in FreeBSD, “ It is now possible to build the FreeBSD base system (kernel and userland) completely reproducibly, although it currently requires a few non-default settings”, and the ports tree is at 80% reproducible</li>
<li>Lots of toolchain updates (gcc, lld, gdb)</li>
<li>Various updates from major ports teams
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2017-01-26-IPv6-on-FreeBSD-EC2.html" rel="nofollow">Amazon rolls out IPv6 support on EC2</a></h3>

<blockquote>
<p>A few hours ago Amazon announced that they had rolled out IPv6 support in EC2 to 15 regions — everywhere except the Beijing region, apparently. This seems as good a time as any to write about using IPv6 in EC2 on FreeBSD instances.<br>
First, the good news: Future FreeBSD releases will support IPv6 &quot;out of the box&quot; on EC2. I committed changes to HEAD last week, and merged them to the stable/11 branch moments ago, to have FreeBSD automatically use whatever IPv6 addresses EC2 makes available to it.<br>
Next, the annoying news: To get IPv6 support in EC2 from existing FreeBSD releases (10.3, 11.0) you&#39;ll need to run a few simple commands. I consider this unfortunate but inevitable: While Amazon has been unusually helpful recently, there&#39;s nothing they could have done to get support for their IPv6 networking configuration into FreeBSD a year before they launched it.</p>
</blockquote>

<ul>
<li>You need the dual-dhclient port:</li>
</ul>

<blockquote>
<p>pkg install dual-dhclient</p>
</blockquote>

<ul>
<li>And the following lines in your /etc/rc.conf:</li>
</ul>

<blockquote>
<p>ifconfig_DEFAULT=&quot;SYNCDHCP accept_rtadv&quot;<br>
   ipv6_activate_all_interfaces=&quot;YES&quot;<br>
   dhclient_program=&quot;/usr/local/sbin/dual-dhclient&quot;</p>

<ul>
<li>It is good to see FreeBSD being ready to use this feature on day 0, not something we would have had in the past</li>
</ul>

<p>Finally, one important caveat: While EC2 is clearly the most important place to have IPv6 support, and one which many of us have been waiting a long time to get, this is not the only service where IPv6 support is important. Of particular concern to me, Application Load Balancer support for IPv6 is still missing in many regions, and Elastic Load Balancers in VPC don&#39;t support IPv6 at all — which matters to those of us who run non-HTTP services. Make sure that IPv6 support has been rolled out for all the services you need before you start migrating.</p>
</blockquote>

<ul>
<li>Colin’s blog also has the details on how to actually activate IPv6 from the Amazon side, if only it was as easy as configuring it on the FreeBSD side
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=cofKxtIO3Is" rel="nofollow">FreeBSD’s George Neville-Neil tries valiantly for over an hour to convince a Linux fan of the error of their ways </a></h3>

<blockquote>
<p>In today&#39;s episode of the Lunduke Hour I talk to George Neville-Neil -- author and FreeBSD advocate. He tries to convince me, a Linux user, that FreeBSD is better.</p>

<ul>
<li>They cover quite a few topics, including:

<ul>
<li>licensing, and the motivations behind it</li>
<li>vendor relations</li>
<li>community</li>
<li>development model</li>
<li>drivers and hardware support</li>
</ul></li>
<li>George also talks about his work with the FreeBSD Foundation, and the book he co-authored, “The Design and Implementation of the FreeBSD Operating System, 2nd Edition”
***</li>
</ul>
</blockquote>

<h2>News Roundup</h2>

<h3><a href="https://github.com/rosedovell/unixdesktops" rel="nofollow">An interactive script that makes it easy to install 50+ desktop environments following a base install of FreeBSD 11</a></h3>

<ul>
<li>And I thought I was doing good when I wrote a patch for the installer that enables your choice of 3 desktop environments...</li>
</ul>

<blockquote>
<p>This is a collection of scripts meant to install desktop environments on unix-like operating systems following a base install. I call one of these &#39;complete&#39; when it meets the following requirements:</p>

<ul>
<li>A graphical logon manager is presented without user intervention after powering on the machine</li>
<li>Logging into that graphical logon manager takes the user into the specified desktop environment</li>
<li>The user can open a terminal emulator</li>
</ul>
</blockquote>

<ul>
<li>I need to revive my patch, and add Lumina to it
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/firefox_51_on_sparc64_we" rel="nofollow">Firefox 51 on sparc64 - we did not hit the wall yet</a></h3>

<ul>
<li>A NetBSD developers tells the story of getting Firefox 51 running on their sparc64 machine</li>
<li>It turns out the bug impacted amd64 as well, so it was quickly fixed</li>
<li>They are a bit less hopeful about the future, since Firefox will soon require rust to compile, and rust is not working on sparc64 yet</li>
<li>Although there has been some activity on the rust on sparc64 front, so maybe there is hope</li>
<li>The post also look at a few alternative browsers, but it not hopeful
***</li>
</ul>

<h3><a href="http://blog.reverberate.org/2016/11/07/introducing-bloaty-mcbloatface.html" rel="nofollow">Introducing Bloaty McBloatface: a size profiler for binaries</a></h3>

<blockquote>
<p>I’m very excited to announce that today I’m open-sourcing a tool I’ve been working on for several months at Google. It’s called Bloaty McBloatface, and it lets you explore what’s taking up space in your .o, .a, .so, and executable binary files.</p>

<p>Bloaty is available under the Apache 2 license. All of the code is available on GitHub: github.com/google/bloaty. It is quick and easy to build, though it does require a somewhat recent compiler since it uses C++11 extensively. Bloaty primarily supports ELF files (Linux, BSD, etc) but there is some support for Mach-O files on OS X too. I’m interested in expanding Bloaty’s capabilities to more platforms if there is interest!</p>
</blockquote>

<ul>
<li>I need to try this one some of the boot code files, to see if there are places we can trim some fat</li>
</ul>

<blockquote>
<p>We’ve been using Bloaty a lot on the Protocol Buffers team at Google to evaluate the binary size impacts of our changes. If a change causes a size increase, where did it come from? What sections/symbols grew, and why? Bloaty has a diff mode for understanding changes in binary size</p>
</blockquote>

<ul>
<li>The diff mode looks especially interesting. It might be worth setting up some kind of CI testing that alerts if a change results in a significant size increase in a binary or library
***</li>
</ul>

<h3><a href="https://github.com/kristapsdz/mdnsd" rel="nofollow">A BSD licensed mdns responder</a></h3>

<ul>
<li>One of the things we just have to deal with in the modern world is service and system discovery. Many of us have fiddled with avahi or mdnsd and related “mdns” services.</li>
<li>For various reasons those often haven’t been the best-fit on BSD systems. </li>
<li>Today we have a github project to point you at, which while a bit older, has recently been updated with pledge() support for OpenBSD. </li>
<li>First of all, why do we need an alternative? They list their reasons:</li>
</ul>

<blockquote>
<p>This is an attempt to bring native mdns/dns-sd to OpenBSD. Mainly cause all the other options suck and proper network browsing is a nice feature these days.</p>

<p>Why not Apple&#39;s mdnsd ?<br>
   1 - It sucks big time.<br>
   2 - No BSD License (Apache-2).<br>
   3 - Overcomplex API.<br>
   4 - Not OpenBSD-like.</p>

<p>Why not Avahi ?<br>
   1 - No BSD License (LGPL).<br>
   2 - Overcomplex API.<br>
   3 - Not OpenBSD-like<br>
   4 - DBUS and lots of dependencies.</p>
</blockquote>

<ul>
<li>Those already sound like pretty compelling reasons. What makes this “new” information again is the pledge support, and perhaps it’s time for more BSD’s to start considering importing something like mdnsd into their base system to make system discovery more “automatic”
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.youtube.com/watch?v=Ib7tFvw34DM" rel="nofollow">Benno Rice at Linux.Conf.Au: The Trouble with FreeBSD</a> </p></li>
<li><p><a href="http://vmssoftware.com/pdfs/State_of_Port_20170105.pdf" rel="nofollow">State of the Port of VMS to x86 </a> </p></li>
<li><p><a href="https://thestack.com/cloud/2017/02/08/microsoft-azure-now-offers-patent-troll-ip-protection/" rel="nofollow">Microsoft Azure now offers Patent Troll Protection</a> </p></li>
<li><p><a href="https://www.freebsdfoundation.org/news-and-events/event-calendar/freebsd-storage-summit-2017/" rel="nofollow">FreeBSD Storage Summit 2017</a></p></li>
<li><p><a href="http://bhyvecon.org/" rel="nofollow">If you are going to be in Tokyo, make sure you come to</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/bVqsvM3r" rel="nofollow"> Farhan - Laptops</a> </li>
<li><a href="http://pastebin.com/7KWYX2Mg" rel="nofollow"> Hjalti - rclone</a> </li>
<li><a href="http://pastebin.com/U5XyzMDR" rel="nofollow"> Ivan - Jails</a> </li>
<li><a href="http://pastebin.com/sK7uEDpn" rel="nofollow"> Jungle - Traffic Control</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>181: The Cantrillogy (Not special edition)</title>
  <link>https://www.bsdnow.tv/181</link>
  <guid isPermaLink="false">6e425191-eb90-4cea-9104-7b4880f0c224</guid>
  <pubDate>Wed, 15 Feb 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6e425191-eb90-4cea-9104-7b4880f0c224.mp3" length="127909972" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow we have a cantrill special to bring you! All three interviews back to back in their original glory, you won’t want to miss</itunes:subtitle>
  <itunes:duration>4:26:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow we have a cantrill special to bring you! All three interviews back to back in their original glory, you won’t want to miss&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;/p&gt;&lt;h3&gt;– Show Notes: –&lt;/h3&gt;&lt;ul&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="https://fosdem.org/2017/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;FOSDEM 2017 BSD Dev Room Videos &lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/86662/ubuntu-slaughters-kittens-bsd-now-103/" target="_blank" rel="nofollow noopener"&gt;Ubuntu Slaughters Kittens | BSD Now 103&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/90811/the-cantrill-strikes-back-bsd-now-117/" target="_blank" rel="nofollow noopener"&gt;The Cantrill Strikes Back | BSD Now 117&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/103871/return-of-the-cantrill-bsd-now-163/" target="_blank" rel="nofollow noopener"&gt;Return of the Cantrill | BSD Now 163&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt; 
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow we have a cantrill special to bring you! All three interviews back to back in their original glory, you won’t want to miss</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<p><h3>– Show Notes: –</h3><ul><li><a href="https://fosdem.org/2017/schedule/track/bsd/">FOSDEM 2017 BSD Dev Room Videos </a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/86662/ubuntu-slaughters-kittens-bsd-now-103/">Ubuntu Slaughters Kittens | BSD Now 103</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/90811/the-cantrill-strikes-back-bsd-now-117/">The Cantrill Strikes Back | BSD Now 117</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/103871/return-of-the-cantrill-bsd-now-163/">Return of the Cantrill | BSD Now 163</a></li></ul></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow we have a cantrill special to bring you! All three interviews back to back in their original glory, you won’t want to miss</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<p><h3>– Show Notes: –</h3><ul><li><a href="https://fosdem.org/2017/schedule/track/bsd/">FOSDEM 2017 BSD Dev Room Videos </a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/86662/ubuntu-slaughters-kittens-bsd-now-103/">Ubuntu Slaughters Kittens | BSD Now 103</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/90811/the-cantrill-strikes-back-bsd-now-117/">The Cantrill Strikes Back | BSD Now 117</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/103871/return-of-the-cantrill-bsd-now-163/">Return of the Cantrill | BSD Now 163</a></li></ul></p>]]>
  </itunes:summary>
</item>
<item>
  <title>180: Illuminating the desktop</title>
  <link>https://www.bsdnow.tv/180</link>
  <guid isPermaLink="false">4ff28335-e7a4-434c-a0c3-3e17c4eaa5e8</guid>
  <pubDate>Wed, 08 Feb 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4ff28335-e7a4-434c-a0c3-3e17c4eaa5e8.mp3" length="37065748" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, I’m out of town but we have a great interview with Ken Moore (My brother) about the latest in BSD desktop computing and</itunes:subtitle>
  <itunes:duration>51:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, I’m out of town but we have a great interview with Ken Moore (My brother) about the latest in BSD desktop computing and&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Ken Moore - &lt;a href="mailto:ken@trueos.org" target="_blank" rel="nofollow noopener"&gt;ken@trueos.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;TrueOS, Lumina, Sys Admin, The BSD Desktop Ecosystem&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;KM: Thank you for joining us again, can you believe it has been an entire year?&lt;/li&gt;
&lt;li&gt;AJ: Let’s start by getting an update on Lumina, what has happened in the last year?&lt;/li&gt;
&lt;li&gt;KM: What is the change you are most proud of in that time?&lt;/li&gt;
&lt;li&gt;AJ: What do you think of the recent introduction of Wayland to the ports tree? Do you think this will impact Lumina? Do you have any plans?&lt;/li&gt;
&lt;li&gt;KM: &lt;/li&gt;
&lt;li&gt;AJ: What has changed with SysAdm after a year of development?&lt;/li&gt;
&lt;li&gt;KM: What plans do you have for the future of SysAdm?&lt;/li&gt;
&lt;li&gt;AJ: How has it been working with the drm-next branch? Does it feel like that is progressing?&lt;/li&gt;
&lt;li&gt;KM: Can you tell us about some of the other TrueOS work you have been doing?&lt;/li&gt;
&lt;li&gt;AJ: What are your thoughts on how the BSD Desktop Ecosystem has changed over the last year? Do you think the future looks better or worse now?&lt;/li&gt;
&lt;li&gt;KM: Do you think systemd is going to continue to make things work? Or does it seem like there is enough resistance to it that fewer projects are going to throw out support for anything not-systemd&lt;/li&gt;
&lt;li&gt;AJ: Anything else you want to add?
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, I’m out of town but we have a great interview with Ken Moore (My brother) about the latest in BSD desktop computing and</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Ken Moore - <a href="mailto:ken@trueos.org" rel="nofollow">ken@trueos.org</a></h2>

<p>TrueOS, Lumina, Sys Admin, The BSD Desktop Ecosystem</p>

<ul>
<li>KM: Thank you for joining us again, can you believe it has been an entire year?</li>
<li>AJ: Let’s start by getting an update on Lumina, what has happened in the last year?</li>
<li>KM: What is the change you are most proud of in that time?</li>
<li>AJ: What do you think of the recent introduction of Wayland to the ports tree? Do you think this will impact Lumina? Do you have any plans?</li>
<li>KM: <followup></li>
<li>AJ: What has changed with SysAdm after a year of development?</li>
<li>KM: What plans do you have for the future of SysAdm?</li>
<li>AJ: How has it been working with the drm-next branch? Does it feel like that is progressing?</li>
<li>KM: Can you tell us about some of the other TrueOS work you have been doing?</li>
<li>AJ: What are your thoughts on how the BSD Desktop Ecosystem has changed over the last year? Do you think the future looks better or worse now?</li>
<li>KM: Do you think systemd is going to continue to make things work? Or does it seem like there is enough resistance to it that fewer projects are going to throw out support for anything not-systemd</li>
<li>AJ: Anything else you want to add?
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, I’m out of town but we have a great interview with Ken Moore (My brother) about the latest in BSD desktop computing and</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Ken Moore - <a href="mailto:ken@trueos.org" rel="nofollow">ken@trueos.org</a></h2>

<p>TrueOS, Lumina, Sys Admin, The BSD Desktop Ecosystem</p>

<ul>
<li>KM: Thank you for joining us again, can you believe it has been an entire year?</li>
<li>AJ: Let’s start by getting an update on Lumina, what has happened in the last year?</li>
<li>KM: What is the change you are most proud of in that time?</li>
<li>AJ: What do you think of the recent introduction of Wayland to the ports tree? Do you think this will impact Lumina? Do you have any plans?</li>
<li>KM: <followup></li>
<li>AJ: What has changed with SysAdm after a year of development?</li>
<li>KM: What plans do you have for the future of SysAdm?</li>
<li>AJ: How has it been working with the drm-next branch? Does it feel like that is progressing?</li>
<li>KM: Can you tell us about some of the other TrueOS work you have been doing?</li>
<li>AJ: What are your thoughts on how the BSD Desktop Ecosystem has changed over the last year? Do you think the future looks better or worse now?</li>
<li>KM: Do you think systemd is going to continue to make things work? Or does it seem like there is enough resistance to it that fewer projects are going to throw out support for anything not-systemd</li>
<li>AJ: Anything else you want to add?
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>179: The Wayland Machine</title>
  <link>https://www.bsdnow.tv/179</link>
  <guid isPermaLink="false">06b91bc7-f848-44c2-a5f9-1d1d40f61714</guid>
  <pubDate>Wed, 01 Feb 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/06b91bc7-f848-44c2-a5f9-1d1d40f61714.mp3" length="40976212" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we’re going to be leading off with the latest news about Wayland and Xorg support on FreeBSD, then a look at OpenBSD ARM64</itunes:subtitle>
  <itunes:duration>56:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we’re going to be leading off with the latest news about Wayland and Xorg support on FreeBSD, then a look at OpenBSD ARM64&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=432406" target="_blank" rel="nofollow noopener"&gt;Wayland is now in the FreeBSD Ports tree&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This commit brings Wayland, the new windowing system, into the FreeBSD ports tree&lt;/li&gt;
&lt;li&gt;“This port was first created by Koop Mast (kwm@) then updated and improved by Johannes Lundberg”&lt;/li&gt;
&lt;li&gt;“Wayland is intended as a simpler replacement for X, easier to develop and maintain. GNOME and KDE are expected to be ported to it.”&lt;/li&gt;
&lt;li&gt;Wayland is designed for desktop and laptop use, rather than X, which was designed for use over the network, where clients were not powerful enough to run the applications locally.&lt;/li&gt;
&lt;li&gt;“Wayland is a protocol for a compositor to talk to its clients as well as a C library implementation of that protocol. The compositor can be a standalone display server running on Linux kernel modesetting and evdev input devices, an X application, or a wayland client itself. The clients can be traditional applications, X servers (rootless or fullscreen) or other display servers.”&lt;/li&gt;
&lt;li&gt;“Please report bugs to the FreeBSD bugtracker!”&lt;/li&gt;
&lt;li&gt;It is good to see this project progressing, as it seems in a few generations, high performance graphics drivers may only be actively developed for Wayland.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-x11/2017-January/018738.html" target="_blank" rel="nofollow noopener"&gt;Call For Testing: xorg 1.18.4 and newer intel/ati DDX &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Baptiste Daroussin, and the FreeBSD X11 team, have issued a call for testing for the upgrade to Xorg 1.18.4&lt;/li&gt;
&lt;li&gt;Along with it comes newer ATI/AMD and Intel drivers&lt;/li&gt;
&lt;li&gt;“Note that you will need to rebuild all the xf86-* packages to work with thatnewer xorg (hence the bump of the revision)”&lt;/li&gt;
&lt;li&gt;“Do not expect newer gpu supported as this is not the kernel part”, it only provides the newer Xorg driver, not the kernel mode setting driver (this is a separate project)&lt;/li&gt;
&lt;li&gt;“If you experience any issue with intel or radeon driver please try to use the new modesetting driver provided by xorg directly (note that fedora and debian recommend the use of the new driver instead of the ati/intel one)”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/to-errno-or-to-error" target="_blank" rel="nofollow noopener"&gt;Error handling in C &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“Unlike other languages which have one preferred means of signalling an error, C is a multi error paradigm language. Error handling styles in C can be organized into one of several distinct styles, such as popular or correct. Some examples of each.”

&lt;ul&gt;
&lt;li&gt;“One very popular option is the classic unix style. -1 is returned to indicate an error.”&lt;/li&gt;
&lt;li&gt;“Another option seen in the standard C library is NULL for errors.”&lt;/li&gt;
&lt;li&gt;“The latter has the advantage that NULL is a false value, which makes it easier to write logical conditions. File descriptor 0 is valid (stdin) but false, while -1 is invalid but true.”&lt;/li&gt;
&lt;li&gt;“And of course, there’s the worst of both worlds approach requiring a special sentinel that you’ll probably forget to use”&lt;/li&gt;
&lt;li&gt;“Other unix functions, those that don’t need to return a file descriptor, stick to just 0 and -1”&lt;/li&gt;
&lt;li&gt;“Of course, none of these functions reveal anything about the nature of the error. For that, you need to consult the errno on the side”&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The article goes on to describe different ways of dealing with the issue, and return values.&lt;/li&gt;
&lt;li&gt;There is also coverage of more complex examples and involve a context that might contain the error message&lt;/li&gt;
&lt;li&gt;It is really interesting to see the differences, and the pitfalls of each approach
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dwheeler.com/essays/fixing-unix-linux-filenames.html" target="_blank" rel="nofollow noopener"&gt;Fixing POSIX Filenames&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“Traditionally, Unix/Linux/POSIX pathnames and filenames can be almost any sequence of bytes. A pathname lets you select a particular file, and may 
include zero or more “/” characters. Each pathname component (separated by “/”) is a filename; filenames cannot contain “/”. Neither 
filenames nor pathnames can contain the ASCII NUL character (\0), because that is the terminator.”&lt;/li&gt;
&lt;li&gt;“This lack of limitations is flexible, but it also creates a legion of unnecessary problems. In particular, this lack of limitations makes it 
unnecessarily difficult to write correct programs (enabling many security flaws). It also makes it impossible to consistently and accurately display filenames, 
causes portability problems, and confuses users.”&lt;/li&gt;
&lt;li&gt;“This article will try to convince you that adding some tiny limitations on legal Unix/Linux/POSIX filenames would be an improvement. Many programs 
already presume these limitations, the POSIX standard already permits such limitations, and many Unix/Linux filesystems already embed such limitations — so 
it’d be better to make these (reasonable) assumptions true in the first place. This article will discuss, in particular, the three biggest problems: control 
characters in filenames (including newline, tab, and escape), leading dashes in filenames, and the lack of a standard character encoding scheme (instead of 
using UTF-8). These three problems impact programs written in any language on Unix/Linux/POSIX system. There are other problems, of course. Spaces in filenames 
can cause problems; it’s probably hopeless to ban them outright, but resolving some of the other issues will simplify handling spaces in filenames. For 
example, when using a Bourne shell, you can use an IFS trick (using IFS=&lt;code&gt;printf '\n\t'&lt;/code&gt;) to eliminate some problems with spaces. Similarly, special 
metacharacters in filenames cause some problems; I suspect few if any metacharacters could be forbidden on all POSIX systems, but it’d be great if 
administrators could locally configure systems so that they could prevent or escape such filenames when they want to. I then discuss some other tricks that can 
help.”&lt;/li&gt;
&lt;li&gt;“After limiting filenames slightly, creating completely-correct programs is much easier, and some vulnerabilities in existing programs disappear. This 
article then notes some others’ opinions; I knew that some people wouldn’t agree with me, but I’m heartened that many do agree that something should 
be done. Finally, I briefly discuss some methods for solving this long-term; these include forbidding creation of such names (hiding them if they already exist 
on the underlying filesystem), implementing escaping mechanisms, or changing how tools work so that these are no longer problems (e.g., when globbing/scanning, 
have the libraries prefix “./” to any filename beginning with “-”). Solving this is not easy, and I suspect that several solutions will be 
needed. In fact, this paper became long over time because I kept finding new problems that needed explaining (new “worms under the rocks”). If I’ve 
convinced you that this needs improving, I’d like your help in figuring out how to best do it!”&lt;/li&gt;
&lt;li&gt;“Filename problems affect programs written in any programming language. However, they can be especially tricky to deal with when using Bourne shells 
(including bash and dash). If you just want to write shell programs that can handle filenames correctly, you should see the short companion article &lt;a href="http://www.dwheeler.com/essays/filenames-in-shell.html" target="_blank" rel="nofollow noopener"&gt;Filenames 
and Pathnames in Shell: How to do it correctly&lt;/a&gt;.”&lt;/li&gt;
&lt;li&gt; Imagine that you don’t know Unix/Linux/POSIX (I presume you really do), and that you’re trying to do some simple tasks. For our purposes we will 
create simple scripts on the command line (using a Bourne shell) for these tasks, though many of the underlying problems affect any program. For example, 
let’s try to print out the contents of all files in the current directory, putting the contents into a file in the parent directory:

&lt;ul&gt;
&lt;li&gt;cat * &amp;gt; ../collection  # WRONG&lt;/li&gt;
&lt;li&gt;cat ./* &amp;gt; ../collection  # CORRECT&lt;/li&gt;
&lt;li&gt;cat &lt;code&gt;find . -type f&lt;/code&gt; &amp;gt; ../collection  # WRONG&lt;/li&gt;
&lt;li&gt;( set -f ; for file in &lt;code&gt;find . -type f&lt;/code&gt; ; do  # WRONG
cat "$file"
done ) &amp;gt; ../collection&lt;/li&gt;
&lt;li&gt;( find . -type f | xargs cat ) &amp;gt; ../collection # WRONG, WAY WRONG&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Just think about trying to remove a file named: -rf /
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.openbsd.org/arm64.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD ARM64&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new page has appeared on the OpenBSD website, offering images for ARM64&lt;/li&gt;
&lt;li&gt;“The current target platforms are the Pine64 and the Raspberry Pi 3.”&lt;/li&gt;
&lt;li&gt;“OpenBSD/arm64 bundles various platforms sharing the 64-bit ARM architecture. Due to the fact that there are many System on a Chips (SoC) around, OpenBSD/arm64 differentiates between various SoCs and may have a different level of support between them”&lt;/li&gt;
&lt;li&gt;The page contains a list of the devices that are supported, and which components have working drivers&lt;/li&gt;
&lt;li&gt;At the time of recording, the link to download the snapshots did not work yet, but by time this airs a week from now, it should be working.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://loup-vaillant.fr/tutorials/chacha20-design" target="_blank" rel="nofollow noopener"&gt;The design of Chacha20&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Seems like every few episodes we end up discussing Ciphers (With their o-so amusing naming) and today is no exception.&lt;/li&gt;
&lt;li&gt;We have a great writeup on the D &amp;amp; I of the ‘chacha20’ cipher written by “Loup Vaillant”&lt;/li&gt;
&lt;li&gt;First of all, is this story for you? Maybe the summary will help make that call:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;“Quick summary: Chacha20 is ARX-based hash function, keyed, running in counter mode. It embodies the idea that one can use a hash function to encrypt data.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If your eyes didn’t glaze over, then you are cleared to proceed. &lt;/li&gt;
&lt;li&gt;Chacha20 is built around stream ciphers:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; While Chacha20 is mainly used for encryption, its core is a pseudo-random number generator. The cipher text is obtained by XOR'ing the plain text with a pseudo-random stream:&lt;br&gt;
&amp;gt; cipher_text = plain_text XOR chacha_stream(key, nonce)&lt;/p&gt;

&lt;p&gt;&amp;gt; Provided you never use the same nonce with the same key twice, you can treat that stream as a one time pad. This makes it very simple: unlike block ciphers, you don't have to worry about padding, and decryption is the same operation as encryption:&lt;br&gt;
&amp;gt; plain_text = cipher_text XOR chacha_stream(key, nonce)&lt;/p&gt;

&lt;p&gt;&amp;gt;Now we just have to get that stream.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The idea that the streams can mimic the concept of a one-time pad does make chacha20 very attractive, even to a non-crypto guy such as myself.&lt;/li&gt;
&lt;li&gt;From here the article goes into depth on how the cipher scrambles 512bit blocks using the quarter-round method (A forth of a block or 4 32bit numbers)&lt;/li&gt;
&lt;li&gt;Some ascii art is used here to help visualize how this done, in the quarter round-phase, then to the complete block as the 4 quarters are run in parallel over the entire 512 bit block.&lt;/li&gt;
&lt;li&gt;From here the article goes more into depth, looking at the complete chacha block, and the importance of a seemingly unnecessary 32byte constant (Hint: it’s really important)&lt;/li&gt;
&lt;li&gt;If crypto is something you find fascinating, you’ll want to make sure you give this one a full read-through.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://twitter.com/DLangille/status/823915729430913025" target="_blank" rel="nofollow noopener"&gt;CyberChef - Coming to a FreeBSD Ports tree near you&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Dan Langille tweets that he will be creating a port of GCHQ’s CyberChef tool&lt;/li&gt;
&lt;li&gt;“CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include creating hexdumps, simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, data compression and decompression, calculating hashes and checksums, IPv6 and X.509 parsing, and much more.”&lt;/li&gt;
&lt;li&gt;“The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms. It was conceived, designed, built and incrementally improved by an analyst in their 10% innovation time over several years. Every effort has been made to structure the code in a readable and extendable format, however it should be noted that the analyst is not a professional developer and the code has not been peer-reviewed for compliance with a formal specification.”&lt;/li&gt;
&lt;li&gt;Some handy functions, beyond stuff like base64 encoding:&lt;/li&gt;
&lt;li&gt;&lt;a href="https://gchq.github.io/CyberChef/?recipe=%5B%7B%22op%22%3A%22Parse%20IP%20range%22%2C%22args%22%3A%5Btrue%2Ctrue%2Cfalse%5D%7D%5D&amp;amp;input=MTcyLjIxLjAuMzIvMjcK" target="_blank" rel="nofollow noopener"&gt;Network Enumeration (CIDR to list of IPS) &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Browser User Agent Parser (what browser is that, based on your HTTP logs)&lt;/li&gt;
&lt;li&gt;XOR Brute Force: enter some XOR’d text, and try every possible key to find plaintext. Optionally give it a regex of known plaintext to find the right key.&lt;/li&gt;
&lt;li&gt;Calculate the “Shannon Entropy” of the input (how random is this data)&lt;/li&gt;
&lt;li&gt;It also has a number of built in regular expressions for common things, very useful&lt;/li&gt;
&lt;li&gt;The project is up on github if you want to play with the code
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://gist.github.com/prash-wghats/89be1ee069d2acf23c289e9c606616e1" target="_blank" rel="nofollow noopener"&gt;Building Electron and VSCode in FreeBSD11&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A patch and set of instructions for building Electron and VSCode on FreeBSD&lt;/li&gt;
&lt;li&gt;“Visual Studio Code is a source code editor developed by Microsoft for Windows, Linux and macOS. It includes support for debugging, embedded Git control, syntax highlighting, intelligent code completion, snippets, and code refactoring. It is also customizable, so users can change the editor's theme, keyboard shortcuts, and preferences. It is free and open-source, although the official download is under a proprietary license.”&lt;/li&gt;
&lt;li&gt;“Visual Studio Code is based on Electron, a framework which is used to deploy Node.js applications for the desktop running on the Blink layout engine. Although it uses the Electron framework, the software is not a fork of Atom, it is actually based on Visual Studio Online's editor (codename "Monaco")”&lt;/li&gt;
&lt;li&gt;It would be interesting to see official support for VSCode on FreeBSD&lt;/li&gt;
&lt;li&gt;Has anyone tried VSCode on the FreeBSD Code base?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://roy.marples.name/blog/blog/soft-label-keys" target="_blank" rel="nofollow noopener"&gt;Soft Label Keys&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.mail-archive.com/source-changes@openbsd.org/msg84599.html" target="_blank" rel="nofollow noopener"&gt;WPA1 (TKIP) disabled by default (OpenBSD)&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://kkovacs.eu/cool-but-obscure-unix-tools" target="_blank" rel="nofollow noopener"&gt;Cool but obscure unix tools&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://euroquis.nl/bobulate/?p=1521" target="_blank" rel="nofollow noopener"&gt;KDE Frameworks and Plasma on FreeBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.mail-archive.com/source-changes@openbsd.org/msg84904.html" target="_blank" rel="nofollow noopener"&gt;Initiative to migrate OpenBSD mirrors to HTTPS&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://i.imgur.com/dC7c1y4.png" target="_blank" rel="nofollow noopener"&gt;That moment you realize FreeBSD has got some Star Wars fans&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://wiki.freebsd.org/PortsSubversionPrimer" target="_blank" rel="nofollow noopener"&gt;Pagelink&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we’re going to be leading off with the latest news about Wayland and Xorg support on FreeBSD, then a look at OpenBSD ARM64</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=432406" rel="nofollow">Wayland is now in the FreeBSD Ports tree</a></h3>

<ul>
<li>This commit brings Wayland, the new windowing system, into the FreeBSD ports tree</li>
<li>“This port was first created by Koop Mast (kwm@) then updated and improved by Johannes Lundberg”</li>
<li>“Wayland is intended as a simpler replacement for X, easier to develop and maintain. GNOME and KDE are expected to be ported to it.”</li>
<li>Wayland is designed for desktop and laptop use, rather than X, which was designed for use over the network, where clients were not powerful enough to run the applications locally.</li>
<li>“Wayland is a protocol for a compositor to talk to its clients as well as a C library implementation of that protocol. The compositor can be a standalone display server running on Linux kernel modesetting and evdev input devices, an X application, or a wayland client itself. The clients can be traditional applications, X servers (rootless or fullscreen) or other display servers.”</li>
<li>“Please report bugs to the FreeBSD bugtracker!”</li>
<li>It is good to see this project progressing, as it seems in a few generations, high performance graphics drivers may only be actively developed for Wayland.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-x11/2017-January/018738.html" rel="nofollow">Call For Testing: xorg 1.18.4 and newer intel/ati DDX </a></h3>

<ul>
<li>Baptiste Daroussin, and the FreeBSD X11 team, have issued a call for testing for the upgrade to Xorg 1.18.4</li>
<li>Along with it comes newer ATI/AMD and Intel drivers</li>
<li>“Note that you will need to rebuild all the xf86-* packages to work with thatnewer xorg (hence the bump of the revision)”</li>
<li>“Do not expect newer gpu supported as this is not the kernel part”, it only provides the newer Xorg driver, not the kernel mode setting driver (this is a separate project)</li>
<li>“If you experience any issue with intel or radeon driver please try to use the new modesetting driver provided by xorg directly (note that fedora and debian recommend the use of the new driver instead of the ati/intel one)”
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/to-errno-or-to-error" rel="nofollow">Error handling in C </a></h3>

<ul>
<li>“Unlike other languages which have one preferred means of signalling an error, C is a multi error paradigm language. Error handling styles in C can be organized into one of several distinct styles, such as popular or correct. Some examples of each.”

<ul>
<li>“One very popular option is the classic unix style. -1 is returned to indicate an error.”</li>
<li>“Another option seen in the standard C library is NULL for errors.”</li>
<li>“The latter has the advantage that NULL is a false value, which makes it easier to write logical conditions. File descriptor 0 is valid (stdin) but false, while -1 is invalid but true.”</li>
<li>“And of course, there’s the worst of both worlds approach requiring a special sentinel that you’ll probably forget to use”</li>
<li>“Other unix functions, those that don’t need to return a file descriptor, stick to just 0 and -1”</li>
<li>“Of course, none of these functions reveal anything about the nature of the error. For that, you need to consult the errno on the side”</li>
</ul></li>
<li>The article goes on to describe different ways of dealing with the issue, and return values.</li>
<li>There is also coverage of more complex examples and involve a context that might contain the error message</li>
<li>It is really interesting to see the differences, and the pitfalls of each approach
***</li>
</ul>

<h3><a href="http://www.dwheeler.com/essays/fixing-unix-linux-filenames.html" rel="nofollow">Fixing POSIX Filenames</a></h3>

<ul>
<li>“Traditionally, Unix/Linux/POSIX pathnames and filenames can be almost any sequence of bytes. A pathname lets you select a particular file, and may 
include zero or more “/” characters. Each pathname component (separated by “/”) is a filename; filenames cannot contain “/”. Neither 
filenames nor pathnames can contain the ASCII NUL character (\0), because that is the terminator.”</li>
<li>“This lack of limitations is flexible, but it also creates a legion of unnecessary problems. In particular, this lack of limitations makes it 
unnecessarily difficult to write correct programs (enabling many security flaws). It also makes it impossible to consistently and accurately display filenames, 
causes portability problems, and confuses users.”</li>
<li>“This article will try to convince you that adding some tiny limitations on legal Unix/Linux/POSIX filenames would be an improvement. Many programs 
already presume these limitations, the POSIX standard already permits such limitations, and many Unix/Linux filesystems already embed such limitations — so 
it’d be better to make these (reasonable) assumptions true in the first place. This article will discuss, in particular, the three biggest problems: control 
characters in filenames (including newline, tab, and escape), leading dashes in filenames, and the lack of a standard character encoding scheme (instead of 
using UTF-8). These three problems impact programs written in any language on Unix/Linux/POSIX system. There are other problems, of course. Spaces in filenames 
can cause problems; it’s probably hopeless to ban them outright, but resolving some of the other issues will simplify handling spaces in filenames. For 
example, when using a Bourne shell, you can use an IFS trick (using IFS=<code>printf &#39;\n\t&#39;</code>) to eliminate some problems with spaces. Similarly, special 
metacharacters in filenames cause some problems; I suspect few if any metacharacters could be forbidden on all POSIX systems, but it’d be great if 
administrators could locally configure systems so that they could prevent or escape such filenames when they want to. I then discuss some other tricks that can 
help.”</li>
<li>“After limiting filenames slightly, creating completely-correct programs is much easier, and some vulnerabilities in existing programs disappear. This 
article then notes some others’ opinions; I knew that some people wouldn’t agree with me, but I’m heartened that many do agree that something should 
be done. Finally, I briefly discuss some methods for solving this long-term; these include forbidding creation of such names (hiding them if they already exist 
on the underlying filesystem), implementing escaping mechanisms, or changing how tools work so that these are no longer problems (e.g., when globbing/scanning, 
have the libraries prefix “./” to any filename beginning with “-”). Solving this is not easy, and I suspect that several solutions will be 
needed. In fact, this paper became long over time because I kept finding new problems that needed explaining (new “worms under the rocks”). If I’ve 
convinced you that this needs improving, I’d like your help in figuring out how to best do it!”</li>
<li>“Filename problems affect programs written in any programming language. However, they can be especially tricky to deal with when using Bourne shells 
(including bash and dash). If you just want to write shell programs that can handle filenames correctly, you should see the short companion article <a href="http://www.dwheeler.com/essays/filenames-in-shell.html" rel="nofollow">Filenames 
and Pathnames in Shell: How to do it correctly</a>.”</li>
<li> Imagine that you don’t know Unix/Linux/POSIX (I presume you really do), and that you’re trying to do some simple tasks. For our purposes we will 
create simple scripts on the command line (using a Bourne shell) for these tasks, though many of the underlying problems affect any program. For example, 
let’s try to print out the contents of all files in the current directory, putting the contents into a file in the parent directory:

<ul>
<li>cat * &gt; ../collection  # WRONG</li>
<li>cat ./* &gt; ../collection  # CORRECT</li>
<li>cat <code>find . -type f</code> &gt; ../collection  # WRONG</li>
<li>( set -f ; for file in <code>find . -type f</code> ; do  # WRONG
cat &quot;$file&quot;
done ) &gt; ../collection</li>
<li>( find . -type f | xargs cat ) &gt; ../collection # WRONG, WAY WRONG</li>
</ul></li>
<li>Just think about trying to remove a file named: -rf /
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.openbsd.org/arm64.html" rel="nofollow">OpenBSD ARM64</a></h3>

<ul>
<li>A new page has appeared on the OpenBSD website, offering images for ARM64</li>
<li>“The current target platforms are the Pine64 and the Raspberry Pi 3.”</li>
<li>“OpenBSD/arm64 bundles various platforms sharing the 64-bit ARM architecture. Due to the fact that there are many System on a Chips (SoC) around, OpenBSD/arm64 differentiates between various SoCs and may have a different level of support between them”</li>
<li>The page contains a list of the devices that are supported, and which components have working drivers</li>
<li>At the time of recording, the link to download the snapshots did not work yet, but by time this airs a week from now, it should be working.
***</li>
</ul>

<h3><a href="http://loup-vaillant.fr/tutorials/chacha20-design" rel="nofollow">The design of Chacha20</a></h3>

<ul>
<li>Seems like every few episodes we end up discussing Ciphers (With their o-so amusing naming) and today is no exception.</li>
<li>We have a great writeup on the D &amp; I of the ‘chacha20’ cipher written by “Loup Vaillant”</li>
<li>First of all, is this story for you? Maybe the summary will help make that call:</li>
</ul>

<p>“Quick summary: Chacha20 is ARX-based hash function, keyed, running in counter mode. It embodies the idea that one can use a hash function to encrypt data.”</p>

<ul>
<li>If your eyes didn’t glaze over, then you are cleared to proceed. </li>
<li>Chacha20 is built around stream ciphers:</li>
</ul>

<blockquote>
<p>While Chacha20 is mainly used for encryption, its core is a pseudo-random number generator. The cipher text is obtained by XOR&#39;ing the plain text with a pseudo-random stream:<br>
cipher_text = plain_text XOR chacha_stream(key, nonce)</p>

<p>Provided you never use the same nonce with the same key twice, you can treat that stream as a one time pad. This makes it very simple: unlike block ciphers, you don&#39;t have to worry about padding, and decryption is the same operation as encryption:<br>
plain_text = cipher_text XOR chacha_stream(key, nonce)</p>

<p>Now we just have to get that stream.</p>
</blockquote>

<ul>
<li>The idea that the streams can mimic the concept of a one-time pad does make chacha20 very attractive, even to a non-crypto guy such as myself.</li>
<li>From here the article goes into depth on how the cipher scrambles 512bit blocks using the quarter-round method (A forth of a block or 4 32bit numbers)</li>
<li>Some ascii art is used here to help visualize how this done, in the quarter round-phase, then to the complete block as the 4 quarters are run in parallel over the entire 512 bit block.</li>
<li>From here the article goes more into depth, looking at the complete chacha block, and the importance of a seemingly unnecessary 32byte constant (Hint: it’s really important)</li>
<li>If crypto is something you find fascinating, you’ll want to make sure you give this one a full read-through.
***</li>
</ul>

<h3><a href="https://twitter.com/DLangille/status/823915729430913025" rel="nofollow">CyberChef - Coming to a FreeBSD Ports tree near you</a></h3>

<ul>
<li>Dan Langille tweets that he will be creating a port of GCHQ’s CyberChef tool</li>
<li>“CyberChef is a simple, intuitive web app for carrying out all manner of &quot;cyber&quot; operations within a web browser. These operations include creating hexdumps, simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, data compression and decompression, calculating hashes and checksums, IPv6 and X.509 parsing, and much more.”</li>
<li>“The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms. It was conceived, designed, built and incrementally improved by an analyst in their 10% innovation time over several years. Every effort has been made to structure the code in a readable and extendable format, however it should be noted that the analyst is not a professional developer and the code has not been peer-reviewed for compliance with a formal specification.”</li>
<li>Some handy functions, beyond stuff like base64 encoding:</li>
<li><a href="https://gchq.github.io/CyberChef/?recipe=%5B%7B%22op%22%3A%22Parse%20IP%20range%22%2C%22args%22%3A%5Btrue%2Ctrue%2Cfalse%5D%7D%5D&input=MTcyLjIxLjAuMzIvMjcK" rel="nofollow">Network Enumeration (CIDR to list of IPS) </a></li>
<li>Browser User Agent Parser (what browser is that, based on your HTTP logs)</li>
<li>XOR Brute Force: enter some XOR’d text, and try every possible key to find plaintext. Optionally give it a regex of known plaintext to find the right key.</li>
<li>Calculate the “Shannon Entropy” of the input (how random is this data)</li>
<li>It also has a number of built in regular expressions for common things, very useful</li>
<li>The project is up on github if you want to play with the code
***</li>
</ul>

<h3><a href="https://gist.github.com/prash-wghats/89be1ee069d2acf23c289e9c606616e1" rel="nofollow">Building Electron and VSCode in FreeBSD11</a></h3>

<ul>
<li>A patch and set of instructions for building Electron and VSCode on FreeBSD</li>
<li>“Visual Studio Code is a source code editor developed by Microsoft for Windows, Linux and macOS. It includes support for debugging, embedded Git control, syntax highlighting, intelligent code completion, snippets, and code refactoring. It is also customizable, so users can change the editor&#39;s theme, keyboard shortcuts, and preferences. It is free and open-source, although the official download is under a proprietary license.”</li>
<li>“Visual Studio Code is based on Electron, a framework which is used to deploy Node.js applications for the desktop running on the Blink layout engine. Although it uses the Electron framework, the software is not a fork of Atom, it is actually based on Visual Studio Online&#39;s editor (codename &quot;Monaco&quot;)”</li>
<li>It would be interesting to see official support for VSCode on FreeBSD</li>
<li>Has anyone tried VSCode on the FreeBSD Code base?
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://roy.marples.name/blog/blog/soft-label-keys" rel="nofollow">Soft Label Keys</a> </p></li>
<li><p><a href="https://www.mail-archive.com/source-changes@openbsd.org/msg84599.html" rel="nofollow">WPA1 (TKIP) disabled by default (OpenBSD)</a></p></li>
<li><p><a href="https://kkovacs.eu/cool-but-obscure-unix-tools" rel="nofollow">Cool but obscure unix tools</a> </p></li>
<li><p><a href="http://euroquis.nl/bobulate/?p=1521" rel="nofollow">KDE Frameworks and Plasma on FreeBSD</a></p></li>
<li><p><a href="https://www.mail-archive.com/source-changes@openbsd.org/msg84904.html" rel="nofollow">Initiative to migrate OpenBSD mirrors to HTTPS</a></p></li>
<li><p><a href="http://i.imgur.com/dC7c1y4.png" rel="nofollow">That moment you realize FreeBSD has got some Star Wars fans</a></p></li>
<li><p><a href="https://wiki.freebsd.org/PortsSubversionPrimer" rel="nofollow">Pagelink</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we’re going to be leading off with the latest news about Wayland and Xorg support on FreeBSD, then a look at OpenBSD ARM64</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=432406" rel="nofollow">Wayland is now in the FreeBSD Ports tree</a></h3>

<ul>
<li>This commit brings Wayland, the new windowing system, into the FreeBSD ports tree</li>
<li>“This port was first created by Koop Mast (kwm@) then updated and improved by Johannes Lundberg”</li>
<li>“Wayland is intended as a simpler replacement for X, easier to develop and maintain. GNOME and KDE are expected to be ported to it.”</li>
<li>Wayland is designed for desktop and laptop use, rather than X, which was designed for use over the network, where clients were not powerful enough to run the applications locally.</li>
<li>“Wayland is a protocol for a compositor to talk to its clients as well as a C library implementation of that protocol. The compositor can be a standalone display server running on Linux kernel modesetting and evdev input devices, an X application, or a wayland client itself. The clients can be traditional applications, X servers (rootless or fullscreen) or other display servers.”</li>
<li>“Please report bugs to the FreeBSD bugtracker!”</li>
<li>It is good to see this project progressing, as it seems in a few generations, high performance graphics drivers may only be actively developed for Wayland.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-x11/2017-January/018738.html" rel="nofollow">Call For Testing: xorg 1.18.4 and newer intel/ati DDX </a></h3>

<ul>
<li>Baptiste Daroussin, and the FreeBSD X11 team, have issued a call for testing for the upgrade to Xorg 1.18.4</li>
<li>Along with it comes newer ATI/AMD and Intel drivers</li>
<li>“Note that you will need to rebuild all the xf86-* packages to work with thatnewer xorg (hence the bump of the revision)”</li>
<li>“Do not expect newer gpu supported as this is not the kernel part”, it only provides the newer Xorg driver, not the kernel mode setting driver (this is a separate project)</li>
<li>“If you experience any issue with intel or radeon driver please try to use the new modesetting driver provided by xorg directly (note that fedora and debian recommend the use of the new driver instead of the ati/intel one)”
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/to-errno-or-to-error" rel="nofollow">Error handling in C </a></h3>

<ul>
<li>“Unlike other languages which have one preferred means of signalling an error, C is a multi error paradigm language. Error handling styles in C can be organized into one of several distinct styles, such as popular or correct. Some examples of each.”

<ul>
<li>“One very popular option is the classic unix style. -1 is returned to indicate an error.”</li>
<li>“Another option seen in the standard C library is NULL for errors.”</li>
<li>“The latter has the advantage that NULL is a false value, which makes it easier to write logical conditions. File descriptor 0 is valid (stdin) but false, while -1 is invalid but true.”</li>
<li>“And of course, there’s the worst of both worlds approach requiring a special sentinel that you’ll probably forget to use”</li>
<li>“Other unix functions, those that don’t need to return a file descriptor, stick to just 0 and -1”</li>
<li>“Of course, none of these functions reveal anything about the nature of the error. For that, you need to consult the errno on the side”</li>
</ul></li>
<li>The article goes on to describe different ways of dealing with the issue, and return values.</li>
<li>There is also coverage of more complex examples and involve a context that might contain the error message</li>
<li>It is really interesting to see the differences, and the pitfalls of each approach
***</li>
</ul>

<h3><a href="http://www.dwheeler.com/essays/fixing-unix-linux-filenames.html" rel="nofollow">Fixing POSIX Filenames</a></h3>

<ul>
<li>“Traditionally, Unix/Linux/POSIX pathnames and filenames can be almost any sequence of bytes. A pathname lets you select a particular file, and may 
include zero or more “/” characters. Each pathname component (separated by “/”) is a filename; filenames cannot contain “/”. Neither 
filenames nor pathnames can contain the ASCII NUL character (\0), because that is the terminator.”</li>
<li>“This lack of limitations is flexible, but it also creates a legion of unnecessary problems. In particular, this lack of limitations makes it 
unnecessarily difficult to write correct programs (enabling many security flaws). It also makes it impossible to consistently and accurately display filenames, 
causes portability problems, and confuses users.”</li>
<li>“This article will try to convince you that adding some tiny limitations on legal Unix/Linux/POSIX filenames would be an improvement. Many programs 
already presume these limitations, the POSIX standard already permits such limitations, and many Unix/Linux filesystems already embed such limitations — so 
it’d be better to make these (reasonable) assumptions true in the first place. This article will discuss, in particular, the three biggest problems: control 
characters in filenames (including newline, tab, and escape), leading dashes in filenames, and the lack of a standard character encoding scheme (instead of 
using UTF-8). These three problems impact programs written in any language on Unix/Linux/POSIX system. There are other problems, of course. Spaces in filenames 
can cause problems; it’s probably hopeless to ban them outright, but resolving some of the other issues will simplify handling spaces in filenames. For 
example, when using a Bourne shell, you can use an IFS trick (using IFS=<code>printf &#39;\n\t&#39;</code>) to eliminate some problems with spaces. Similarly, special 
metacharacters in filenames cause some problems; I suspect few if any metacharacters could be forbidden on all POSIX systems, but it’d be great if 
administrators could locally configure systems so that they could prevent or escape such filenames when they want to. I then discuss some other tricks that can 
help.”</li>
<li>“After limiting filenames slightly, creating completely-correct programs is much easier, and some vulnerabilities in existing programs disappear. This 
article then notes some others’ opinions; I knew that some people wouldn’t agree with me, but I’m heartened that many do agree that something should 
be done. Finally, I briefly discuss some methods for solving this long-term; these include forbidding creation of such names (hiding them if they already exist 
on the underlying filesystem), implementing escaping mechanisms, or changing how tools work so that these are no longer problems (e.g., when globbing/scanning, 
have the libraries prefix “./” to any filename beginning with “-”). Solving this is not easy, and I suspect that several solutions will be 
needed. In fact, this paper became long over time because I kept finding new problems that needed explaining (new “worms under the rocks”). If I’ve 
convinced you that this needs improving, I’d like your help in figuring out how to best do it!”</li>
<li>“Filename problems affect programs written in any programming language. However, they can be especially tricky to deal with when using Bourne shells 
(including bash and dash). If you just want to write shell programs that can handle filenames correctly, you should see the short companion article <a href="http://www.dwheeler.com/essays/filenames-in-shell.html" rel="nofollow">Filenames 
and Pathnames in Shell: How to do it correctly</a>.”</li>
<li> Imagine that you don’t know Unix/Linux/POSIX (I presume you really do), and that you’re trying to do some simple tasks. For our purposes we will 
create simple scripts on the command line (using a Bourne shell) for these tasks, though many of the underlying problems affect any program. For example, 
let’s try to print out the contents of all files in the current directory, putting the contents into a file in the parent directory:

<ul>
<li>cat * &gt; ../collection  # WRONG</li>
<li>cat ./* &gt; ../collection  # CORRECT</li>
<li>cat <code>find . -type f</code> &gt; ../collection  # WRONG</li>
<li>( set -f ; for file in <code>find . -type f</code> ; do  # WRONG
cat &quot;$file&quot;
done ) &gt; ../collection</li>
<li>( find . -type f | xargs cat ) &gt; ../collection # WRONG, WAY WRONG</li>
</ul></li>
<li>Just think about trying to remove a file named: -rf /
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.openbsd.org/arm64.html" rel="nofollow">OpenBSD ARM64</a></h3>

<ul>
<li>A new page has appeared on the OpenBSD website, offering images for ARM64</li>
<li>“The current target platforms are the Pine64 and the Raspberry Pi 3.”</li>
<li>“OpenBSD/arm64 bundles various platforms sharing the 64-bit ARM architecture. Due to the fact that there are many System on a Chips (SoC) around, OpenBSD/arm64 differentiates between various SoCs and may have a different level of support between them”</li>
<li>The page contains a list of the devices that are supported, and which components have working drivers</li>
<li>At the time of recording, the link to download the snapshots did not work yet, but by time this airs a week from now, it should be working.
***</li>
</ul>

<h3><a href="http://loup-vaillant.fr/tutorials/chacha20-design" rel="nofollow">The design of Chacha20</a></h3>

<ul>
<li>Seems like every few episodes we end up discussing Ciphers (With their o-so amusing naming) and today is no exception.</li>
<li>We have a great writeup on the D &amp; I of the ‘chacha20’ cipher written by “Loup Vaillant”</li>
<li>First of all, is this story for you? Maybe the summary will help make that call:</li>
</ul>

<p>“Quick summary: Chacha20 is ARX-based hash function, keyed, running in counter mode. It embodies the idea that one can use a hash function to encrypt data.”</p>

<ul>
<li>If your eyes didn’t glaze over, then you are cleared to proceed. </li>
<li>Chacha20 is built around stream ciphers:</li>
</ul>

<blockquote>
<p>While Chacha20 is mainly used for encryption, its core is a pseudo-random number generator. The cipher text is obtained by XOR&#39;ing the plain text with a pseudo-random stream:<br>
cipher_text = plain_text XOR chacha_stream(key, nonce)</p>

<p>Provided you never use the same nonce with the same key twice, you can treat that stream as a one time pad. This makes it very simple: unlike block ciphers, you don&#39;t have to worry about padding, and decryption is the same operation as encryption:<br>
plain_text = cipher_text XOR chacha_stream(key, nonce)</p>

<p>Now we just have to get that stream.</p>
</blockquote>

<ul>
<li>The idea that the streams can mimic the concept of a one-time pad does make chacha20 very attractive, even to a non-crypto guy such as myself.</li>
<li>From here the article goes into depth on how the cipher scrambles 512bit blocks using the quarter-round method (A forth of a block or 4 32bit numbers)</li>
<li>Some ascii art is used here to help visualize how this done, in the quarter round-phase, then to the complete block as the 4 quarters are run in parallel over the entire 512 bit block.</li>
<li>From here the article goes more into depth, looking at the complete chacha block, and the importance of a seemingly unnecessary 32byte constant (Hint: it’s really important)</li>
<li>If crypto is something you find fascinating, you’ll want to make sure you give this one a full read-through.
***</li>
</ul>

<h3><a href="https://twitter.com/DLangille/status/823915729430913025" rel="nofollow">CyberChef - Coming to a FreeBSD Ports tree near you</a></h3>

<ul>
<li>Dan Langille tweets that he will be creating a port of GCHQ’s CyberChef tool</li>
<li>“CyberChef is a simple, intuitive web app for carrying out all manner of &quot;cyber&quot; operations within a web browser. These operations include creating hexdumps, simple encoding like XOR or Base64, more complex encryption like AES, DES and Blowfish, data compression and decompression, calculating hashes and checksums, IPv6 and X.509 parsing, and much more.”</li>
<li>“The tool is designed to enable both technical and non-technical analysts to manipulate data in complex ways without having to deal with complex tools or algorithms. It was conceived, designed, built and incrementally improved by an analyst in their 10% innovation time over several years. Every effort has been made to structure the code in a readable and extendable format, however it should be noted that the analyst is not a professional developer and the code has not been peer-reviewed for compliance with a formal specification.”</li>
<li>Some handy functions, beyond stuff like base64 encoding:</li>
<li><a href="https://gchq.github.io/CyberChef/?recipe=%5B%7B%22op%22%3A%22Parse%20IP%20range%22%2C%22args%22%3A%5Btrue%2Ctrue%2Cfalse%5D%7D%5D&input=MTcyLjIxLjAuMzIvMjcK" rel="nofollow">Network Enumeration (CIDR to list of IPS) </a></li>
<li>Browser User Agent Parser (what browser is that, based on your HTTP logs)</li>
<li>XOR Brute Force: enter some XOR’d text, and try every possible key to find plaintext. Optionally give it a regex of known plaintext to find the right key.</li>
<li>Calculate the “Shannon Entropy” of the input (how random is this data)</li>
<li>It also has a number of built in regular expressions for common things, very useful</li>
<li>The project is up on github if you want to play with the code
***</li>
</ul>

<h3><a href="https://gist.github.com/prash-wghats/89be1ee069d2acf23c289e9c606616e1" rel="nofollow">Building Electron and VSCode in FreeBSD11</a></h3>

<ul>
<li>A patch and set of instructions for building Electron and VSCode on FreeBSD</li>
<li>“Visual Studio Code is a source code editor developed by Microsoft for Windows, Linux and macOS. It includes support for debugging, embedded Git control, syntax highlighting, intelligent code completion, snippets, and code refactoring. It is also customizable, so users can change the editor&#39;s theme, keyboard shortcuts, and preferences. It is free and open-source, although the official download is under a proprietary license.”</li>
<li>“Visual Studio Code is based on Electron, a framework which is used to deploy Node.js applications for the desktop running on the Blink layout engine. Although it uses the Electron framework, the software is not a fork of Atom, it is actually based on Visual Studio Online&#39;s editor (codename &quot;Monaco&quot;)”</li>
<li>It would be interesting to see official support for VSCode on FreeBSD</li>
<li>Has anyone tried VSCode on the FreeBSD Code base?
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://roy.marples.name/blog/blog/soft-label-keys" rel="nofollow">Soft Label Keys</a> </p></li>
<li><p><a href="https://www.mail-archive.com/source-changes@openbsd.org/msg84599.html" rel="nofollow">WPA1 (TKIP) disabled by default (OpenBSD)</a></p></li>
<li><p><a href="https://kkovacs.eu/cool-but-obscure-unix-tools" rel="nofollow">Cool but obscure unix tools</a> </p></li>
<li><p><a href="http://euroquis.nl/bobulate/?p=1521" rel="nofollow">KDE Frameworks and Plasma on FreeBSD</a></p></li>
<li><p><a href="https://www.mail-archive.com/source-changes@openbsd.org/msg84904.html" rel="nofollow">Initiative to migrate OpenBSD mirrors to HTTPS</a></p></li>
<li><p><a href="http://i.imgur.com/dC7c1y4.png" rel="nofollow">That moment you realize FreeBSD has got some Star Wars fans</a></p></li>
<li><p><a href="https://wiki.freebsd.org/PortsSubversionPrimer" rel="nofollow">Pagelink</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>178: Enjoy the Silence</title>
  <link>https://www.bsdnow.tv/178</link>
  <guid isPermaLink="false">432eecad-cec1-4297-a8eb-87d5b5b088fd</guid>
  <pubDate>Wed, 25 Jan 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/432eecad-cec1-4297-a8eb-87d5b5b088fd.mp3" length="57001684" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now, we will be discussing a wide variety of topics including Routers, Run-Controls, the “Rule” of silence and some</itunes:subtitle>
  <itunes:duration>1:19:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSD Now, we will be discussing a wide variety of topics including Routers, Run-Controls, the “Rule” of silence and some&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/freebsd/comments/5ouvmp/ports_no_longer_build_on_eol_freebsd_versions/" target="_blank" rel="nofollow noopener"&gt;Ports no longer build on EOL FreeBSD versions&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD ports tree has been updated to automatically fail if you try to compile ports on EOL versions of FreeBSD (any version of 9.x or earlier, 10.0 - 10.2, or 11 from before 11.0)&lt;/li&gt;
&lt;li&gt;This is to prevent shooting yourself in the food, as the compatibility code for those older OSes has been removed now that they are no longer supported.&lt;/li&gt;
&lt;li&gt;If you use pkg, you will also run into problems on old releases. Packages are always built on the oldest supported release in a branch. Until recently, this meant packages for 10.1, 10.2, and 10.3 were compiled on 10.1. Now that 10.1 and 10.2 are EOL, packages for 10.x are compiled on 10.3.&lt;/li&gt;
&lt;li&gt;This matters because 10.3 supports the new openat() and various other *at() functions used by capsicum. Now that pkg and packages are built on a version that supports this new feature, they will not run on systems that do not support it. So pkg will exit with an error as soon as it tries to open a file.&lt;/li&gt;
&lt;li&gt;You can work around this temporarily by using the pkg-static command, but you should upgrade to a supported release immediately.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.trueos.org/blog/improving-trueos-openrc/" target="_blank" rel="nofollow noopener"&gt;Improving TrueOS: OpenRC&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With TrueOS moving to a rolling-release model, we’ve decided to be a bit more proactive in sharing news about new features that are landing. &lt;/li&gt;
&lt;li&gt;This week we’ve posted an article talking about the transition to OpenRC&lt;/li&gt;
&lt;li&gt;In past episodes you’ve heard me mention OpenRC, but hopefully today we can help answer any of those lingering questions you may still have about it&lt;/li&gt;
&lt;li&gt;The first thing always asked, is “What is OpenRC?”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; OpenRC is a dependency-based init system working with the system provided init program. It is used with several Linux distributions, including Gentoo and Alpine Linux. However, OpenRC was created by the NetBSD developer Roy Marples in one of those interesting intersections of Linux and BSD development. OpenRC’s development history, portability, and 2-clause BSD license make its integration into TrueOS an easy decision.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Now that we know a bit about what it is, how does it behave differently than traditional RC?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; TrueOS now uses OpenRC to manage all system services, as opposed to FreeBSD’s RC. Instead of using rc.d for base system rc scripts, OpenRC uses init.d. Also, every service in OpenRC has its own user configuration file, located in /etc/conf.d/ for the base system and /usr/local/etc.conf.d/ for ports. Finally, OpenRC uses runlevels, as opposed to the FreeBSD single- or multi- user modes. You can view the services and their runlevels by typing $ rc-update show -v in a CLI. Also, TrueOS integrates OpenRC service management into SysAdm with the Service Manager tool&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;One of the prime benefits of OpenRC is much faster boot-times, which is important in a portable world of laptops (and desktops as well). But service monitoring and crash detection are also important parts of what make OpenRC a substantial upgrade for TrueOS.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Lastly people have asked us about migration, what is done, what isn’t? As of now almost all FreeBSD base system services have been migrated over. In addition most desktop-facing services required to run Lumina and the like are also ported. We are still going through the ports tree and converting legacy rc.d scripts to init.d, but the process takes time. Several new folks have begun contributing OpenRC scripts and we hope to have all the roughly 1k ports converted over this year. &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.70/" target="_blank" rel="nofollow noopener"&gt;BSDRP Releases 1.70  &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new release of the BSD Router Project&lt;/li&gt;
&lt;li&gt;This distro is designed to replace high end routers, like those from Cisco and Juniper, with FreeBSD running on regular off-the-shelf server.&lt;/li&gt;
&lt;li&gt;Highlights:

&lt;ul&gt;
&lt;li&gt;Upgraded to FreeBSD 11.0-STABLE r312663 (skip 11.0 for massive performance improvement)&lt;/li&gt;
&lt;li&gt;Re-Added: netmap-fwd (&lt;a href="https://github.com/Netgate/netmap-fwd" target="_blank" rel="nofollow noopener"&gt;https://github.com/Netgate/netmap-fwd&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Add FIBsync patch to netmap-fwd from Zollner Robert &lt;/li&gt;
&lt;li&gt;netmap pkt-gen supports IPv6, thanks to Andrey V. Elsukov (&lt;a href="mailto:ae@freebsd.org" target="_blank" rel="nofollow noopener"&gt;ae@freebsd.org&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;bird 1.6.3 (add BGP Large communities support)&lt;/li&gt;
&lt;li&gt;OpenVPN 2.4.0 (adds the high speed AEAD GCM cipher)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;All of the other packages have also been upgraded&lt;/li&gt;
&lt;li&gt;A lot of great work has been done on BSDRP, and it has also generated a lot of great benchmarks and testing that have resulted in performance increases and improved understanding of how FreeBSD networking scales across different CPU types and speeds
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/7b1aa074fcd99442a1345fb8a695b62d01d9c7fd" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD gets UEFI support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This commit adds support for UEFI to the Dragonfly Installer, allowing new systems to be installed to boot from UEFI&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/9d53bd00e9be53d6b893afd79111370ee0c053b0" target="_blank" rel="nofollow noopener"&gt;This script&lt;/a&gt; provides a way to build a HAMMER filesystem that works with UEFI&lt;/li&gt;
&lt;li&gt;There is also a &lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/d195d5099328849c500d4a1b94d6915d3c72c71e" target="_blank" rel="nofollow noopener"&gt;UEFI man page&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The &lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/5fa778d7b36ab0981ff9dcbd96c71ebf653a6a19" target="_blank" rel="nofollow noopener"&gt;install media&lt;/a&gt; has also been updated to support booting from either UEFI or MBR, in the same way that the FreeBSD images work
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.linfo.org/rule_of_silence.html" target="_blank" rel="nofollow noopener"&gt;The Rule of Silence&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“The rule of silence, also referred to as the silence is golden rule, is an important part of the Unix philosophy that states that when a program has nothing surprising, interesting or useful to say, it should say nothing. It means that well-behaved programs should treat their users' attention and concentration as being valuable and thus perform their tasks as unobtrusively as possible. That is, silence in itself is a virtue.”&lt;/li&gt;
&lt;li&gt;This doesn’t mean a program cannot be verbose, it just means you have to ask it for the additional output, rather than having it by default&lt;/li&gt;
&lt;li&gt;“There is no single, standardized statement of the Unix philosophy, but perhaps the simplest description would be: "Write programs that are small, simple and transparent. Write them so that they do only one thing, but do it well and can work together with other programs." That is, the philosophy centers around the concepts of smallness, simplicity, modularity, craftsmanship, transparency, economy, diversity, portability, flexibility and extensibility.”&lt;/li&gt;
&lt;li&gt;“This philosophy has been fundamental to the the fact that Unix-like operating systems have been thriving for more than three decades, far longer than any other family of operating systems, and can be expected to see continued expansion of use in the years to come”&lt;/li&gt;
&lt;li&gt;“The rule of silence is one of the oldest and most persistent design rules of such operating systems. As intuitive as this rule might seem to experienced users of such systems, it is frequently ignored by the developers of other types of operating systems and application programs for them. The result is often distraction, annoyance and frustration for users.”&lt;/li&gt;
&lt;li&gt;“There are several very good reasons for the rule of silence: (1) One is to avoid cluttering the user's mind with information that might not be necessary or might not even be desired. That is, unnecessary information can be a distraction. Moreover, unnecessary messages generated by some operating systems and application programs are sometimes poorly worded, and can cause confusion or needless worry on the part of users.”&lt;/li&gt;
&lt;li&gt;No news is good news. When there is bad news, error messages should be descriptive, and ideally tell the user what they might do about the error.&lt;/li&gt;
&lt;li&gt;“A third reason is that command line programs (i.e., all-text mode programs) on Unix-like operating systems are designed to work together with pipes, i.e., the output from one program becomes the input of another program. This is a major feature of such systems, and it accounts for much of their power and flexibility. Consequently, it is important to have only the truly important information included in the output of each program, and thus in the input of the next program.”&lt;/li&gt;
&lt;li&gt;Have you ever had to try to strip out useless output so you could feed that data into another program?&lt;/li&gt;
&lt;li&gt;“The rule of silence originally applied to command line programs, because all programs were originally command line programs. However, it is just as applicable to GUI (graphical user interfaces) programs. That is, unnecessary and annoying information should be avoided regardless of the type of user interface.”&lt;/li&gt;
&lt;li&gt;“A example is the useless and annoying dialog boxes (i.e., small windows) that pop up on the display screen with with surprising frequency on some operating systems and programs. These dialog boxes contain some obvious, cryptic or unnecessary message and require the user to click on them in order to close them and proceed with work. This is an interruption of concentration and a waste of time for most users. Such dialog boxes should be employed only in situations in which some unexpected result might occur or to protect important data.”&lt;/li&gt;
&lt;li&gt;It goes on to make an analogy about Public Address systems. If too many unimportant messages, like advertisements, are sent over the PA system, people will start to ignore them, and miss the important announcements.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://leanpub.com/the-tao-of-tmux/read" target="_blank" rel="nofollow noopener"&gt;The Tao of tmux&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An interesting article floated across my news feed a few weeks back. It’s what essentially boils down to a book called the “Tao of tmux”, which immediately piqued my interest.&lt;/li&gt;
&lt;li&gt;My story may be similar to many of yours. I was initially raised on using screen, and screen only for my terminal session and multiplexing needs.&lt;/li&gt;
&lt;li&gt;Since then I’ve only had a passing interest in tmux, but its always been one of those utilities I felt was worthy of investing some more time into. (Especially when seeing some of the neat setups some of my peers have with it)&lt;/li&gt;
&lt;li&gt;Needless to say, this article has been bookmarked, and I’ve started digesting some of it, but thought it would be good to share with anybody else who finds them-self in a similar situation.&lt;/li&gt;
&lt;li&gt;The book starts off well, explaining in the simplest terms possible what Tmux really is, by comparing and contrasting it to something we are all familiar with, GUIS!&lt;/li&gt;
&lt;li&gt;Helpfully they also include a chart which explains some of the terms we will be using frequently when discussing tmux (&lt;a href="https://leanpub.com/the-tao-of-tmux/read#leanpub-auto-window-manager-for-the-terminal" target="_blank" rel="nofollow noopener"&gt;https://leanpub.com/the-tao-of-tmux/read#leanpub-auto-window-manager-for-the-terminal&lt;/a&gt;) &lt;/li&gt;
&lt;li&gt;One of the things the author does recommend is also making sure you are up to speed on your Terminal knowledge.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Before getting into tmux, a few fundamentals of the command line should be reviewed. Often, we’re so used to using these out of street smarts and muscle memory a great deal of us never see the relation of where these tools stand next to each other.&lt;/p&gt;

&lt;p&gt;&amp;gt; Seasoned developers are familiar with zsh, Bash, iTerm2, konsole, /dev/tty, shell scripting, and so on. If you use tmux, you’ll be around these all the time, regardless of whether you’re in a GUI on a local machine or SSH’ing into a remote server.&lt;/p&gt;

&lt;p&gt;&amp;gt; If you want to learn more about how processes and TTY’s work at the kernel level (data structures and all) the book The Design and Implementation of the FreeBSD Operating System (2nd Edition) by Marshall Kirk McKusick is nice. In particular, Chapter 4, Process Management and Section 8.6, Terminal Handling. The TTY demystified by Linus Åkesson (available online) dives into the TTY and is a good read as well.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We had to get that shout-out of Kirk’s book in here ;)&lt;/li&gt;
&lt;li&gt;From here the boot/article takes us on a whirlwind journey of Sessions, Windows, Panes and more. Every control- command is covered, information on how to customize your statusbar, tips, tricks and the like. There’s far more here than we can cover in a single segment, but you are highly encouraged to bookmark this one and start your own adventure into the world of tmux.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://sdf.org/" target="_blank" rel="nofollow noopener"&gt;SDF Celebrates 30 years of service in 2017&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://news.ycombinator.com/item?id=13453774" target="_blank" rel="nofollow noopener"&gt;HackerNews thread on SDF &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;“Super Dimension Fortress (SDF, also known as freeshell.org) is a non-profit public access UNIX shell provider on the Internet. It has been in continual operation since 1987 as a non-profit social club. The name is derived from the Japanese anime series The Super Dimension Fortress Macross; the original SDF server was a BBS for anime fans[1]. From its BBS roots, which have been well documented as part of the BBS: The Documentary project, SDF has grown into a feature-rich provider serving members around the world.”&lt;/li&gt;
&lt;li&gt;A public access UNIX system, it was many people’s first access to a UNIX shell.&lt;/li&gt;
&lt;li&gt;In the 90s, Virtual Machines were rare, the software to run them usually cost a lot of money and no one had very much memory to try to run two operating systems at the same time.&lt;/li&gt;
&lt;li&gt;So for many people, these type of shell accounts were the only way they could access UNIX without having to replace the OS on their only computer&lt;/li&gt;
&lt;li&gt;This is how I first started with UNIX, eventually moving to paying for access to bigger machines, and then buying my own servers and renting out shell accounts to host IRC servers and channel protection bots.&lt;/li&gt;
&lt;li&gt;“On June 16th, 1987 Ted Uhlemann (handle: charmin, later iczer) connected his Apple ][e's 300 baud modem to the phone line his mother had just given him for his birthday. He had published the number the night before on as many BBSes around the Dallas Ft. Worth area that he could and he waited for the first caller. He had a copy of Magic Micro BBS which was written in Applesoft BASIC and he named the BBS "SDF-1" after his favorite Japanimation series ROBOTECH (Macross). He hoped to draw users who were interested in anime, industrial music and the Church of the Subgenius.”&lt;/li&gt;
&lt;li&gt;I too started out in the world of BBSes before I had access to the internet. My parents got my a dedicated phone line for my birthday, so I wouldn’t tie up their line all the time. I quickly ended up running my own BBS, the Sudden Death BBS (&lt;a href="https://en.wikipedia.org/wiki/Renegade_(BBS)" target="_blank" rel="nofollow noopener"&gt;Renegade&lt;/a&gt; on MS DOS)&lt;/li&gt;
&lt;li&gt;I credit this early experience for my discovery of a passion for Systems Administration, that lead me to my current career&lt;/li&gt;
&lt;li&gt;“Slowly, SDF has grown over all these years, never forgetting our past and unlike many sites on the internet, we actually have a past. Some people today may come here and see us as outdated and "retro". But if you get involved, you'll see it is quite alive with new ideas and a platform for opportunity to try many new things. The machines are often refreshed, the quotas are gone, the disk space is expanding as are the features (and user driven features at that) and our cabinets have plenty of space for expansion here in the USA and in Europe (Germany).”&lt;/li&gt;
&lt;li&gt;“Think about ways you'd like to celebrate SDF's 30th and join us on the 'bboard' to discuss what we could do. I realize many of you have likely moved on yourselves, but I just wanted you to know we're still here and we'll keep doing new and exciting things with a foundation in the UNIX shell.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/NetBSD/comments/5mtsy1/getting_minecraft_to_run_on_netbsd/" target="_blank" rel="nofollow noopener"&gt;Getting Minecraft to Run on NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One thing that doesn’t come up often on BSDNow is the idea of gaming. I realize most of us are server folks, or perhaps don’t play games (The PC is for work, use your fancy-smanzy PS4 and get off my lawn you kids)&lt;/li&gt;
&lt;li&gt;Today I thought it would be fun to highlight this post over at Reddit talking about running MineCraft on NetBSD&lt;/li&gt;
&lt;li&gt;Now I realize this may not be news to some of you, but perhaps it is to others. For the record my kids have been playing Minecraft on PC-BSD / TrueOS for years. It's the primary reason they are more often booted into that instead of Windows. (Funny story behind that - Got sick of all the 3rd party mods, which more often than not came helpfully bundled with viruses and malware)&lt;/li&gt;
&lt;li&gt;On NetBSD the process looks a bit different than on FreeBSD. First up, you’ll need to enable Linux Emulation and install Oracle JRE (Not OpenJDK, that path leads to sadness here)&lt;/li&gt;
&lt;li&gt;The guide will then walk us through the process of fetching the Linux runtime packages, extracting and then enabling bits such as ‘procfs’ that is required to run the Linux binaries. &lt;/li&gt;
&lt;li&gt;Once that's done, minecraft is only a simple “oracle8-jre /path/to/minecraft.jar” command away from starting up, and you’ll be “crafting” in no time. (Does anybody even play survival anymore?)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://youtu.be/g7P16mYDIJw" target="_blank" rel="nofollow noopener"&gt;UNIX on the Computer Chronicals &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/erikarn/status/823298416939659264" target="_blank" rel="nofollow noopener"&gt;FreeBSD: Atheros AR9380 and later, maximum UDP TX goes from 250mbit to 355mbit. &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://reviews.freebsd.org/D9303" target="_blank" rel="nofollow noopener"&gt;Capsicumizing traceroute with casper &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Sr1BTzVN" target="_blank" rel="nofollow noopener"&gt; Jason - TarSnap on Windows&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/zpHyhHQG" target="_blank" rel="nofollow noopener"&gt; Mike - OpenRC &amp;amp; DO&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/YnjkrDmk" target="_blank" rel="nofollow noopener"&gt; Anonymous - Old Machines&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/pBUXtFak" target="_blank" rel="nofollow noopener"&gt; Matt - Iocage&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/zNkK3epM" target="_blank" rel="nofollow noopener"&gt; Hjalti - Rclone &amp;amp; FreeNAS&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*** &lt;/p&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now, we will be discussing a wide variety of topics including Routers, Run-Controls, the “Rule” of silence and some</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/5ouvmp/ports_no_longer_build_on_eol_freebsd_versions/" rel="nofollow">Ports no longer build on EOL FreeBSD versions</a></h3>

<ul>
<li>The FreeBSD ports tree has been updated to automatically fail if you try to compile ports on EOL versions of FreeBSD (any version of 9.x or earlier, 10.0 - 10.2, or 11 from before 11.0)</li>
<li>This is to prevent shooting yourself in the food, as the compatibility code for those older OSes has been removed now that they are no longer supported.</li>
<li>If you use pkg, you will also run into problems on old releases. Packages are always built on the oldest supported release in a branch. Until recently, this meant packages for 10.1, 10.2, and 10.3 were compiled on 10.1. Now that 10.1 and 10.2 are EOL, packages for 10.x are compiled on 10.3.</li>
<li>This matters because 10.3 supports the new openat() and various other *at() functions used by capsicum. Now that pkg and packages are built on a version that supports this new feature, they will not run on systems that do not support it. So pkg will exit with an error as soon as it tries to open a file.</li>
<li>You can work around this temporarily by using the pkg-static command, but you should upgrade to a supported release immediately.
***</li>
</ul>

<h3><a href="https://www.trueos.org/blog/improving-trueos-openrc/" rel="nofollow">Improving TrueOS: OpenRC</a></h3>

<ul>
<li>With TrueOS moving to a rolling-release model, we’ve decided to be a bit more proactive in sharing news about new features that are landing. </li>
<li>This week we’ve posted an article talking about the transition to OpenRC</li>
<li>In past episodes you’ve heard me mention OpenRC, but hopefully today we can help answer any of those lingering questions you may still have about it</li>
<li>The first thing always asked, is “What is OpenRC?”</li>
</ul>

<blockquote>
<p>OpenRC is a dependency-based init system working with the system provided init program. It is used with several Linux distributions, including Gentoo and Alpine Linux. However, OpenRC was created by the NetBSD developer Roy Marples in one of those interesting intersections of Linux and BSD development. OpenRC’s development history, portability, and 2-clause BSD license make its integration into TrueOS an easy decision.</p>
</blockquote>

<ul>
<li>Now that we know a bit about what it is, how does it behave differently than traditional RC?</li>
</ul>

<blockquote>
<p>TrueOS now uses OpenRC to manage all system services, as opposed to FreeBSD’s RC. Instead of using rc.d for base system rc scripts, OpenRC uses init.d. Also, every service in OpenRC has its own user configuration file, located in /etc/conf.d/ for the base system and /usr/local/etc.conf.d/ for ports. Finally, OpenRC uses runlevels, as opposed to the FreeBSD single- or multi- user modes. You can view the services and their runlevels by typing $ rc-update show -v in a CLI. Also, TrueOS integrates OpenRC service management into SysAdm with the Service Manager tool</p>
</blockquote>

<ul>
<li><p>One of the prime benefits of OpenRC is much faster boot-times, which is important in a portable world of laptops (and desktops as well). But service monitoring and crash detection are also important parts of what make OpenRC a substantial upgrade for TrueOS.</p></li>
<li><p>Lastly people have asked us about migration, what is done, what isn’t? As of now almost all FreeBSD base system services have been migrated over. In addition most desktop-facing services required to run Lumina and the like are also ported. We are still going through the ports tree and converting legacy rc.d scripts to init.d, but the process takes time. Several new folks have begun contributing OpenRC scripts and we hope to have all the roughly 1k ports converted over this year. </p>

<hr></li>
</ul>

<h3><a href="https://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.70/" rel="nofollow">BSDRP Releases 1.70  </a></h3>

<ul>
<li>A new release of the BSD Router Project</li>
<li>This distro is designed to replace high end routers, like those from Cisco and Juniper, with FreeBSD running on regular off-the-shelf server.</li>
<li>Highlights:

<ul>
<li>Upgraded to FreeBSD 11.0-STABLE r312663 (skip 11.0 for massive performance improvement)</li>
<li>Re-Added: netmap-fwd (<a href="https://github.com/Netgate/netmap-fwd" rel="nofollow">https://github.com/Netgate/netmap-fwd</a>)</li>
<li>Add FIBsync patch to netmap-fwd from Zollner Robert <wolfit_ro@yahoo.com></li>
<li>netmap pkt-gen supports IPv6, thanks to Andrey V. Elsukov (<a href="mailto:ae@freebsd.org" rel="nofollow">ae@freebsd.org</a>)</li>
<li>bird 1.6.3 (add BGP Large communities support)</li>
<li>OpenVPN 2.4.0 (adds the high speed AEAD GCM cipher)</li>
</ul></li>
<li>All of the other packages have also been upgraded</li>
<li>A lot of great work has been done on BSDRP, and it has also generated a lot of great benchmarks and testing that have resulted in performance increases and improved understanding of how FreeBSD networking scales across different CPU types and speeds
***</li>
</ul>

<h3><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/7b1aa074fcd99442a1345fb8a695b62d01d9c7fd" rel="nofollow">DragonFlyBSD gets UEFI support</a></h3>

<ul>
<li>This commit adds support for UEFI to the Dragonfly Installer, allowing new systems to be installed to boot from UEFI</li>
<li><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/9d53bd00e9be53d6b893afd79111370ee0c053b0" rel="nofollow">This script</a> provides a way to build a HAMMER filesystem that works with UEFI</li>
<li>There is also a <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/d195d5099328849c500d4a1b94d6915d3c72c71e" rel="nofollow">UEFI man page</a> </li>
<li>The <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/5fa778d7b36ab0981ff9dcbd96c71ebf653a6a19" rel="nofollow">install media</a> has also been updated to support booting from either UEFI or MBR, in the same way that the FreeBSD images work
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.linfo.org/rule_of_silence.html" rel="nofollow">The Rule of Silence</a></h3>

<ul>
<li>“The rule of silence, also referred to as the silence is golden rule, is an important part of the Unix philosophy that states that when a program has nothing surprising, interesting or useful to say, it should say nothing. It means that well-behaved programs should treat their users&#39; attention and concentration as being valuable and thus perform their tasks as unobtrusively as possible. That is, silence in itself is a virtue.”</li>
<li>This doesn’t mean a program cannot be verbose, it just means you have to ask it for the additional output, rather than having it by default</li>
<li>“There is no single, standardized statement of the Unix philosophy, but perhaps the simplest description would be: &quot;Write programs that are small, simple and transparent. Write them so that they do only one thing, but do it well and can work together with other programs.&quot; That is, the philosophy centers around the concepts of smallness, simplicity, modularity, craftsmanship, transparency, economy, diversity, portability, flexibility and extensibility.”</li>
<li>“This philosophy has been fundamental to the the fact that Unix-like operating systems have been thriving for more than three decades, far longer than any other family of operating systems, and can be expected to see continued expansion of use in the years to come”</li>
<li>“The rule of silence is one of the oldest and most persistent design rules of such operating systems. As intuitive as this rule might seem to experienced users of such systems, it is frequently ignored by the developers of other types of operating systems and application programs for them. The result is often distraction, annoyance and frustration for users.”</li>
<li>“There are several very good reasons for the rule of silence: (1) One is to avoid cluttering the user&#39;s mind with information that might not be necessary or might not even be desired. That is, unnecessary information can be a distraction. Moreover, unnecessary messages generated by some operating systems and application programs are sometimes poorly worded, and can cause confusion or needless worry on the part of users.”</li>
<li>No news is good news. When there is bad news, error messages should be descriptive, and ideally tell the user what they might do about the error.</li>
<li>“A third reason is that command line programs (i.e., all-text mode programs) on Unix-like operating systems are designed to work together with pipes, i.e., the output from one program becomes the input of another program. This is a major feature of such systems, and it accounts for much of their power and flexibility. Consequently, it is important to have only the truly important information included in the output of each program, and thus in the input of the next program.”</li>
<li>Have you ever had to try to strip out useless output so you could feed that data into another program?</li>
<li>“The rule of silence originally applied to command line programs, because all programs were originally command line programs. However, it is just as applicable to GUI (graphical user interfaces) programs. That is, unnecessary and annoying information should be avoided regardless of the type of user interface.”</li>
<li>“A example is the useless and annoying dialog boxes (i.e., small windows) that pop up on the display screen with with surprising frequency on some operating systems and programs. These dialog boxes contain some obvious, cryptic or unnecessary message and require the user to click on them in order to close them and proceed with work. This is an interruption of concentration and a waste of time for most users. Such dialog boxes should be employed only in situations in which some unexpected result might occur or to protect important data.”</li>
<li>It goes on to make an analogy about Public Address systems. If too many unimportant messages, like advertisements, are sent over the PA system, people will start to ignore them, and miss the important announcements.
***</li>
</ul>

<h3><a href="https://leanpub.com/the-tao-of-tmux/read" rel="nofollow">The Tao of tmux</a></h3>

<ul>
<li>An interesting article floated across my news feed a few weeks back. It’s what essentially boils down to a book called the “Tao of tmux”, which immediately piqued my interest.</li>
<li>My story may be similar to many of yours. I was initially raised on using screen, and screen only for my terminal session and multiplexing needs.</li>
<li>Since then I’ve only had a passing interest in tmux, but its always been one of those utilities I felt was worthy of investing some more time into. (Especially when seeing some of the neat setups some of my peers have with it)</li>
<li>Needless to say, this article has been bookmarked, and I’ve started digesting some of it, but thought it would be good to share with anybody else who finds them-self in a similar situation.</li>
<li>The book starts off well, explaining in the simplest terms possible what Tmux really is, by comparing and contrasting it to something we are all familiar with, GUIS!</li>
<li>Helpfully they also include a chart which explains some of the terms we will be using frequently when discussing tmux (<a href="https://leanpub.com/the-tao-of-tmux/read#leanpub-auto-window-manager-for-the-terminal" rel="nofollow">https://leanpub.com/the-tao-of-tmux/read#leanpub-auto-window-manager-for-the-terminal</a>) </li>
<li>One of the things the author does recommend is also making sure you are up to speed on your Terminal knowledge.</li>
</ul>

<blockquote>
<p>Before getting into tmux, a few fundamentals of the command line should be reviewed. Often, we’re so used to using these out of street smarts and muscle memory a great deal of us never see the relation of where these tools stand next to each other.</p>

<p>Seasoned developers are familiar with zsh, Bash, iTerm2, konsole, /dev/tty, shell scripting, and so on. If you use tmux, you’ll be around these all the time, regardless of whether you’re in a GUI on a local machine or SSH’ing into a remote server.</p>

<p>If you want to learn more about how processes and TTY’s work at the kernel level (data structures and all) the book The Design and Implementation of the FreeBSD Operating System (2nd Edition) by Marshall Kirk McKusick is nice. In particular, Chapter 4, Process Management and Section 8.6, Terminal Handling. The TTY demystified by Linus Åkesson (available online) dives into the TTY and is a good read as well.</p>
</blockquote>

<ul>
<li>We had to get that shout-out of Kirk’s book in here ;)</li>
<li>From here the boot/article takes us on a whirlwind journey of Sessions, Windows, Panes and more. Every control-<X> command is covered, information on how to customize your statusbar, tips, tricks and the like. There’s far more here than we can cover in a single segment, but you are highly encouraged to bookmark this one and start your own adventure into the world of tmux.
***</li>
</ul>

<h3><a href="https://sdf.org/" rel="nofollow">SDF Celebrates 30 years of service in 2017</a></h3>

<ul>
<li><a href="https://news.ycombinator.com/item?id=13453774" rel="nofollow">HackerNews thread on SDF </a></li>
<li>“Super Dimension Fortress (SDF, also known as freeshell.org) is a non-profit public access UNIX shell provider on the Internet. It has been in continual operation since 1987 as a non-profit social club. The name is derived from the Japanese anime series The Super Dimension Fortress Macross; the original SDF server was a BBS for anime fans[1]. From its BBS roots, which have been well documented as part of the BBS: The Documentary project, SDF has grown into a feature-rich provider serving members around the world.”</li>
<li>A public access UNIX system, it was many people’s first access to a UNIX shell.</li>
<li>In the 90s, Virtual Machines were rare, the software to run them usually cost a lot of money and no one had very much memory to try to run two operating systems at the same time.</li>
<li>So for many people, these type of shell accounts were the only way they could access UNIX without having to replace the OS on their only computer</li>
<li>This is how I first started with UNIX, eventually moving to paying for access to bigger machines, and then buying my own servers and renting out shell accounts to host IRC servers and channel protection bots.</li>
<li>“On June 16th, 1987 Ted Uhlemann (handle: charmin, later iczer) connected his Apple ][e&#39;s 300 baud modem to the phone line his mother had just given him for his birthday. He had published the number the night before on as many BBSes around the Dallas Ft. Worth area that he could and he waited for the first caller. He had a copy of Magic Micro BBS which was written in Applesoft BASIC and he named the BBS &quot;SDF-1&quot; after his favorite Japanimation series ROBOTECH (Macross). He hoped to draw users who were interested in anime, industrial music and the Church of the Subgenius.”</li>
<li>I too started out in the world of BBSes before I had access to the internet. My parents got my a dedicated phone line for my birthday, so I wouldn’t tie up their line all the time. I quickly ended up running my own BBS, the Sudden Death BBS (<a href="https://en.wikipedia.org/wiki/Renegade_(BBS)" rel="nofollow">Renegade</a> on MS DOS)</li>
<li>I credit this early experience for my discovery of a passion for Systems Administration, that lead me to my current career</li>
<li>“Slowly, SDF has grown over all these years, never forgetting our past and unlike many sites on the internet, we actually have a past. Some people today may come here and see us as outdated and &quot;retro&quot;. But if you get involved, you&#39;ll see it is quite alive with new ideas and a platform for opportunity to try many new things. The machines are often refreshed, the quotas are gone, the disk space is expanding as are the features (and user driven features at that) and our cabinets have plenty of space for expansion here in the USA and in Europe (Germany).”</li>
<li>“Think about ways you&#39;d like to celebrate SDF&#39;s 30th and join us on the &#39;bboard&#39; to discuss what we could do. I realize many of you have likely moved on yourselves, but I just wanted you to know we&#39;re still here and we&#39;ll keep doing new and exciting things with a foundation in the UNIX shell.”
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/NetBSD/comments/5mtsy1/getting_minecraft_to_run_on_netbsd/" rel="nofollow">Getting Minecraft to Run on NetBSD</a></h3>

<ul>
<li>One thing that doesn’t come up often on BSDNow is the idea of gaming. I realize most of us are server folks, or perhaps don’t play games (The PC is for work, use your fancy-smanzy PS4 and get off my lawn you kids)</li>
<li>Today I thought it would be fun to highlight this post over at Reddit talking about running MineCraft on NetBSD</li>
<li>Now I realize this may not be news to some of you, but perhaps it is to others. For the record my kids have been playing Minecraft on PC-BSD / TrueOS for years. It&#39;s the primary reason they are more often booted into that instead of Windows. (Funny story behind that - Got sick of all the 3rd party mods, which more often than not came helpfully bundled with viruses and malware)</li>
<li>On NetBSD the process looks a bit different than on FreeBSD. First up, you’ll need to enable Linux Emulation and install Oracle JRE (Not OpenJDK, that path leads to sadness here)</li>
<li>The guide will then walk us through the process of fetching the Linux runtime packages, extracting and then enabling bits such as ‘procfs’ that is required to run the Linux binaries. </li>
<li>Once that&#39;s done, minecraft is only a simple “oracle8-jre /path/to/minecraft.jar” command away from starting up, and you’ll be “crafting” in no time. (Does anybody even play survival anymore?)
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://youtu.be/g7P16mYDIJw" rel="nofollow">UNIX on the Computer Chronicals </a> </p></li>
<li><p><a href="https://twitter.com/erikarn/status/823298416939659264" rel="nofollow">FreeBSD: Atheros AR9380 and later, maximum UDP TX goes from 250mbit to 355mbit. </a> </p></li>
<li><p><a href="https://reviews.freebsd.org/D9303" rel="nofollow">Capsicumizing traceroute with casper </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/Sr1BTzVN" rel="nofollow"> Jason - TarSnap on Windows</a> </li>
<li><a href="http://pastebin.com/zpHyhHQG" rel="nofollow"> Mike - OpenRC &amp; DO</a> </li>
<li><a href="http://pastebin.com/YnjkrDmk" rel="nofollow"> Anonymous - Old Machines</a> </li>
<li><a href="http://pastebin.com/pBUXtFak" rel="nofollow"> Matt - Iocage</a> </li>
<li><a href="http://pastebin.com/zNkK3epM" rel="nofollow"> Hjalti - Rclone &amp; FreeNAS</a> </li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now, we will be discussing a wide variety of topics including Routers, Run-Controls, the “Rule” of silence and some</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/5ouvmp/ports_no_longer_build_on_eol_freebsd_versions/" rel="nofollow">Ports no longer build on EOL FreeBSD versions</a></h3>

<ul>
<li>The FreeBSD ports tree has been updated to automatically fail if you try to compile ports on EOL versions of FreeBSD (any version of 9.x or earlier, 10.0 - 10.2, or 11 from before 11.0)</li>
<li>This is to prevent shooting yourself in the food, as the compatibility code for those older OSes has been removed now that they are no longer supported.</li>
<li>If you use pkg, you will also run into problems on old releases. Packages are always built on the oldest supported release in a branch. Until recently, this meant packages for 10.1, 10.2, and 10.3 were compiled on 10.1. Now that 10.1 and 10.2 are EOL, packages for 10.x are compiled on 10.3.</li>
<li>This matters because 10.3 supports the new openat() and various other *at() functions used by capsicum. Now that pkg and packages are built on a version that supports this new feature, they will not run on systems that do not support it. So pkg will exit with an error as soon as it tries to open a file.</li>
<li>You can work around this temporarily by using the pkg-static command, but you should upgrade to a supported release immediately.
***</li>
</ul>

<h3><a href="https://www.trueos.org/blog/improving-trueos-openrc/" rel="nofollow">Improving TrueOS: OpenRC</a></h3>

<ul>
<li>With TrueOS moving to a rolling-release model, we’ve decided to be a bit more proactive in sharing news about new features that are landing. </li>
<li>This week we’ve posted an article talking about the transition to OpenRC</li>
<li>In past episodes you’ve heard me mention OpenRC, but hopefully today we can help answer any of those lingering questions you may still have about it</li>
<li>The first thing always asked, is “What is OpenRC?”</li>
</ul>

<blockquote>
<p>OpenRC is a dependency-based init system working with the system provided init program. It is used with several Linux distributions, including Gentoo and Alpine Linux. However, OpenRC was created by the NetBSD developer Roy Marples in one of those interesting intersections of Linux and BSD development. OpenRC’s development history, portability, and 2-clause BSD license make its integration into TrueOS an easy decision.</p>
</blockquote>

<ul>
<li>Now that we know a bit about what it is, how does it behave differently than traditional RC?</li>
</ul>

<blockquote>
<p>TrueOS now uses OpenRC to manage all system services, as opposed to FreeBSD’s RC. Instead of using rc.d for base system rc scripts, OpenRC uses init.d. Also, every service in OpenRC has its own user configuration file, located in /etc/conf.d/ for the base system and /usr/local/etc.conf.d/ for ports. Finally, OpenRC uses runlevels, as opposed to the FreeBSD single- or multi- user modes. You can view the services and their runlevels by typing $ rc-update show -v in a CLI. Also, TrueOS integrates OpenRC service management into SysAdm with the Service Manager tool</p>
</blockquote>

<ul>
<li><p>One of the prime benefits of OpenRC is much faster boot-times, which is important in a portable world of laptops (and desktops as well). But service monitoring and crash detection are also important parts of what make OpenRC a substantial upgrade for TrueOS.</p></li>
<li><p>Lastly people have asked us about migration, what is done, what isn’t? As of now almost all FreeBSD base system services have been migrated over. In addition most desktop-facing services required to run Lumina and the like are also ported. We are still going through the ports tree and converting legacy rc.d scripts to init.d, but the process takes time. Several new folks have begun contributing OpenRC scripts and we hope to have all the roughly 1k ports converted over this year. </p>

<hr></li>
</ul>

<h3><a href="https://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.70/" rel="nofollow">BSDRP Releases 1.70  </a></h3>

<ul>
<li>A new release of the BSD Router Project</li>
<li>This distro is designed to replace high end routers, like those from Cisco and Juniper, with FreeBSD running on regular off-the-shelf server.</li>
<li>Highlights:

<ul>
<li>Upgraded to FreeBSD 11.0-STABLE r312663 (skip 11.0 for massive performance improvement)</li>
<li>Re-Added: netmap-fwd (<a href="https://github.com/Netgate/netmap-fwd" rel="nofollow">https://github.com/Netgate/netmap-fwd</a>)</li>
<li>Add FIBsync patch to netmap-fwd from Zollner Robert <wolfit_ro@yahoo.com></li>
<li>netmap pkt-gen supports IPv6, thanks to Andrey V. Elsukov (<a href="mailto:ae@freebsd.org" rel="nofollow">ae@freebsd.org</a>)</li>
<li>bird 1.6.3 (add BGP Large communities support)</li>
<li>OpenVPN 2.4.0 (adds the high speed AEAD GCM cipher)</li>
</ul></li>
<li>All of the other packages have also been upgraded</li>
<li>A lot of great work has been done on BSDRP, and it has also generated a lot of great benchmarks and testing that have resulted in performance increases and improved understanding of how FreeBSD networking scales across different CPU types and speeds
***</li>
</ul>

<h3><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/7b1aa074fcd99442a1345fb8a695b62d01d9c7fd" rel="nofollow">DragonFlyBSD gets UEFI support</a></h3>

<ul>
<li>This commit adds support for UEFI to the Dragonfly Installer, allowing new systems to be installed to boot from UEFI</li>
<li><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/9d53bd00e9be53d6b893afd79111370ee0c053b0" rel="nofollow">This script</a> provides a way to build a HAMMER filesystem that works with UEFI</li>
<li>There is also a <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/d195d5099328849c500d4a1b94d6915d3c72c71e" rel="nofollow">UEFI man page</a> </li>
<li>The <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/5fa778d7b36ab0981ff9dcbd96c71ebf653a6a19" rel="nofollow">install media</a> has also been updated to support booting from either UEFI or MBR, in the same way that the FreeBSD images work
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.linfo.org/rule_of_silence.html" rel="nofollow">The Rule of Silence</a></h3>

<ul>
<li>“The rule of silence, also referred to as the silence is golden rule, is an important part of the Unix philosophy that states that when a program has nothing surprising, interesting or useful to say, it should say nothing. It means that well-behaved programs should treat their users&#39; attention and concentration as being valuable and thus perform their tasks as unobtrusively as possible. That is, silence in itself is a virtue.”</li>
<li>This doesn’t mean a program cannot be verbose, it just means you have to ask it for the additional output, rather than having it by default</li>
<li>“There is no single, standardized statement of the Unix philosophy, but perhaps the simplest description would be: &quot;Write programs that are small, simple and transparent. Write them so that they do only one thing, but do it well and can work together with other programs.&quot; That is, the philosophy centers around the concepts of smallness, simplicity, modularity, craftsmanship, transparency, economy, diversity, portability, flexibility and extensibility.”</li>
<li>“This philosophy has been fundamental to the the fact that Unix-like operating systems have been thriving for more than three decades, far longer than any other family of operating systems, and can be expected to see continued expansion of use in the years to come”</li>
<li>“The rule of silence is one of the oldest and most persistent design rules of such operating systems. As intuitive as this rule might seem to experienced users of such systems, it is frequently ignored by the developers of other types of operating systems and application programs for them. The result is often distraction, annoyance and frustration for users.”</li>
<li>“There are several very good reasons for the rule of silence: (1) One is to avoid cluttering the user&#39;s mind with information that might not be necessary or might not even be desired. That is, unnecessary information can be a distraction. Moreover, unnecessary messages generated by some operating systems and application programs are sometimes poorly worded, and can cause confusion or needless worry on the part of users.”</li>
<li>No news is good news. When there is bad news, error messages should be descriptive, and ideally tell the user what they might do about the error.</li>
<li>“A third reason is that command line programs (i.e., all-text mode programs) on Unix-like operating systems are designed to work together with pipes, i.e., the output from one program becomes the input of another program. This is a major feature of such systems, and it accounts for much of their power and flexibility. Consequently, it is important to have only the truly important information included in the output of each program, and thus in the input of the next program.”</li>
<li>Have you ever had to try to strip out useless output so you could feed that data into another program?</li>
<li>“The rule of silence originally applied to command line programs, because all programs were originally command line programs. However, it is just as applicable to GUI (graphical user interfaces) programs. That is, unnecessary and annoying information should be avoided regardless of the type of user interface.”</li>
<li>“A example is the useless and annoying dialog boxes (i.e., small windows) that pop up on the display screen with with surprising frequency on some operating systems and programs. These dialog boxes contain some obvious, cryptic or unnecessary message and require the user to click on them in order to close them and proceed with work. This is an interruption of concentration and a waste of time for most users. Such dialog boxes should be employed only in situations in which some unexpected result might occur or to protect important data.”</li>
<li>It goes on to make an analogy about Public Address systems. If too many unimportant messages, like advertisements, are sent over the PA system, people will start to ignore them, and miss the important announcements.
***</li>
</ul>

<h3><a href="https://leanpub.com/the-tao-of-tmux/read" rel="nofollow">The Tao of tmux</a></h3>

<ul>
<li>An interesting article floated across my news feed a few weeks back. It’s what essentially boils down to a book called the “Tao of tmux”, which immediately piqued my interest.</li>
<li>My story may be similar to many of yours. I was initially raised on using screen, and screen only for my terminal session and multiplexing needs.</li>
<li>Since then I’ve only had a passing interest in tmux, but its always been one of those utilities I felt was worthy of investing some more time into. (Especially when seeing some of the neat setups some of my peers have with it)</li>
<li>Needless to say, this article has been bookmarked, and I’ve started digesting some of it, but thought it would be good to share with anybody else who finds them-self in a similar situation.</li>
<li>The book starts off well, explaining in the simplest terms possible what Tmux really is, by comparing and contrasting it to something we are all familiar with, GUIS!</li>
<li>Helpfully they also include a chart which explains some of the terms we will be using frequently when discussing tmux (<a href="https://leanpub.com/the-tao-of-tmux/read#leanpub-auto-window-manager-for-the-terminal" rel="nofollow">https://leanpub.com/the-tao-of-tmux/read#leanpub-auto-window-manager-for-the-terminal</a>) </li>
<li>One of the things the author does recommend is also making sure you are up to speed on your Terminal knowledge.</li>
</ul>

<blockquote>
<p>Before getting into tmux, a few fundamentals of the command line should be reviewed. Often, we’re so used to using these out of street smarts and muscle memory a great deal of us never see the relation of where these tools stand next to each other.</p>

<p>Seasoned developers are familiar with zsh, Bash, iTerm2, konsole, /dev/tty, shell scripting, and so on. If you use tmux, you’ll be around these all the time, regardless of whether you’re in a GUI on a local machine or SSH’ing into a remote server.</p>

<p>If you want to learn more about how processes and TTY’s work at the kernel level (data structures and all) the book The Design and Implementation of the FreeBSD Operating System (2nd Edition) by Marshall Kirk McKusick is nice. In particular, Chapter 4, Process Management and Section 8.6, Terminal Handling. The TTY demystified by Linus Åkesson (available online) dives into the TTY and is a good read as well.</p>
</blockquote>

<ul>
<li>We had to get that shout-out of Kirk’s book in here ;)</li>
<li>From here the boot/article takes us on a whirlwind journey of Sessions, Windows, Panes and more. Every control-<X> command is covered, information on how to customize your statusbar, tips, tricks and the like. There’s far more here than we can cover in a single segment, but you are highly encouraged to bookmark this one and start your own adventure into the world of tmux.
***</li>
</ul>

<h3><a href="https://sdf.org/" rel="nofollow">SDF Celebrates 30 years of service in 2017</a></h3>

<ul>
<li><a href="https://news.ycombinator.com/item?id=13453774" rel="nofollow">HackerNews thread on SDF </a></li>
<li>“Super Dimension Fortress (SDF, also known as freeshell.org) is a non-profit public access UNIX shell provider on the Internet. It has been in continual operation since 1987 as a non-profit social club. The name is derived from the Japanese anime series The Super Dimension Fortress Macross; the original SDF server was a BBS for anime fans[1]. From its BBS roots, which have been well documented as part of the BBS: The Documentary project, SDF has grown into a feature-rich provider serving members around the world.”</li>
<li>A public access UNIX system, it was many people’s first access to a UNIX shell.</li>
<li>In the 90s, Virtual Machines were rare, the software to run them usually cost a lot of money and no one had very much memory to try to run two operating systems at the same time.</li>
<li>So for many people, these type of shell accounts were the only way they could access UNIX without having to replace the OS on their only computer</li>
<li>This is how I first started with UNIX, eventually moving to paying for access to bigger machines, and then buying my own servers and renting out shell accounts to host IRC servers and channel protection bots.</li>
<li>“On June 16th, 1987 Ted Uhlemann (handle: charmin, later iczer) connected his Apple ][e&#39;s 300 baud modem to the phone line his mother had just given him for his birthday. He had published the number the night before on as many BBSes around the Dallas Ft. Worth area that he could and he waited for the first caller. He had a copy of Magic Micro BBS which was written in Applesoft BASIC and he named the BBS &quot;SDF-1&quot; after his favorite Japanimation series ROBOTECH (Macross). He hoped to draw users who were interested in anime, industrial music and the Church of the Subgenius.”</li>
<li>I too started out in the world of BBSes before I had access to the internet. My parents got my a dedicated phone line for my birthday, so I wouldn’t tie up their line all the time. I quickly ended up running my own BBS, the Sudden Death BBS (<a href="https://en.wikipedia.org/wiki/Renegade_(BBS)" rel="nofollow">Renegade</a> on MS DOS)</li>
<li>I credit this early experience for my discovery of a passion for Systems Administration, that lead me to my current career</li>
<li>“Slowly, SDF has grown over all these years, never forgetting our past and unlike many sites on the internet, we actually have a past. Some people today may come here and see us as outdated and &quot;retro&quot;. But if you get involved, you&#39;ll see it is quite alive with new ideas and a platform for opportunity to try many new things. The machines are often refreshed, the quotas are gone, the disk space is expanding as are the features (and user driven features at that) and our cabinets have plenty of space for expansion here in the USA and in Europe (Germany).”</li>
<li>“Think about ways you&#39;d like to celebrate SDF&#39;s 30th and join us on the &#39;bboard&#39; to discuss what we could do. I realize many of you have likely moved on yourselves, but I just wanted you to know we&#39;re still here and we&#39;ll keep doing new and exciting things with a foundation in the UNIX shell.”
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/NetBSD/comments/5mtsy1/getting_minecraft_to_run_on_netbsd/" rel="nofollow">Getting Minecraft to Run on NetBSD</a></h3>

<ul>
<li>One thing that doesn’t come up often on BSDNow is the idea of gaming. I realize most of us are server folks, or perhaps don’t play games (The PC is for work, use your fancy-smanzy PS4 and get off my lawn you kids)</li>
<li>Today I thought it would be fun to highlight this post over at Reddit talking about running MineCraft on NetBSD</li>
<li>Now I realize this may not be news to some of you, but perhaps it is to others. For the record my kids have been playing Minecraft on PC-BSD / TrueOS for years. It&#39;s the primary reason they are more often booted into that instead of Windows. (Funny story behind that - Got sick of all the 3rd party mods, which more often than not came helpfully bundled with viruses and malware)</li>
<li>On NetBSD the process looks a bit different than on FreeBSD. First up, you’ll need to enable Linux Emulation and install Oracle JRE (Not OpenJDK, that path leads to sadness here)</li>
<li>The guide will then walk us through the process of fetching the Linux runtime packages, extracting and then enabling bits such as ‘procfs’ that is required to run the Linux binaries. </li>
<li>Once that&#39;s done, minecraft is only a simple “oracle8-jre /path/to/minecraft.jar” command away from starting up, and you’ll be “crafting” in no time. (Does anybody even play survival anymore?)
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://youtu.be/g7P16mYDIJw" rel="nofollow">UNIX on the Computer Chronicals </a> </p></li>
<li><p><a href="https://twitter.com/erikarn/status/823298416939659264" rel="nofollow">FreeBSD: Atheros AR9380 and later, maximum UDP TX goes from 250mbit to 355mbit. </a> </p></li>
<li><p><a href="https://reviews.freebsd.org/D9303" rel="nofollow">Capsicumizing traceroute with casper </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/Sr1BTzVN" rel="nofollow"> Jason - TarSnap on Windows</a> </li>
<li><a href="http://pastebin.com/zpHyhHQG" rel="nofollow"> Mike - OpenRC &amp; DO</a> </li>
<li><a href="http://pastebin.com/YnjkrDmk" rel="nofollow"> Anonymous - Old Machines</a> </li>
<li><a href="http://pastebin.com/pBUXtFak" rel="nofollow"> Matt - Iocage</a> </li>
<li><a href="http://pastebin.com/zNkK3epM" rel="nofollow"> Hjalti - Rclone &amp; FreeNAS</a> </li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>177: Getting Pi on my Wifi</title>
  <link>https://www.bsdnow.tv/177</link>
  <guid isPermaLink="false">5a206fe8-bd5f-49b2-9eb2-31a50cafedc3</guid>
  <pubDate>Wed, 18 Jan 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5a206fe8-bd5f-49b2-9eb2-31a50cafedc3.mp3" length="56667604" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we’ve got Wifi galore, a new iocage and some RPi3 news and guides to share. Stay tuned for your place to B...SD!</itunes:subtitle>
  <itunes:duration>1:18:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we’ve got Wifi galore, a new iocage and some RPi3 news and guides to share. Stay tuned for your place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20170109213803" target="_blank" rel="nofollow noopener"&gt;WiFi: 11n hostap mode added to athn(4) driver, testers wanted&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“OpenBSD as WiFi access points look set to be making a comeback in the near future”&lt;/li&gt;
&lt;li&gt;“Stefan Sperling added 802.11n hostap mode, with full support initially for the Atheros chips supported by the athn(4) driver.”&lt;/li&gt;
&lt;li&gt; “Hostap performance is not perfect yet but should be no worse than 11a/b/g modes in the same environment.”&lt;/li&gt;
&lt;li&gt;“For Linux clients a fix for WME params is needed which I also posted to tech@”&lt;/li&gt;
&lt;li&gt;“This diff does not modify the known-broken and disabled ar9003 code, apart from making sure it still builds.”&lt;/li&gt;
&lt;li&gt;&lt;p&gt;“I'm looking for both tests and OKs.”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There has also been a &lt;a href="http://svnweb.freebsd.org/base/head/sys/net80211/?view=log" target="_blank" rel="nofollow noopener"&gt;flurry of work&lt;/a&gt;  in FreeBSD on the ath10k driver, which supports 802.11ac&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Like &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=310147" target="_blank" rel="nofollow noopener"&gt;this one&lt;/a&gt; and &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=311579" target="_blank" rel="nofollow noopener"&gt;this one&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/iocage/iocage" target="_blank" rel="nofollow noopener"&gt;The long-awaited iocage update has landed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve hinted at the new things happening behind the scenes with iocage, and this last week the code has made its first public debut. &lt;/li&gt;
&lt;li&gt;So what’s changed you may ask. The biggest is that iocage has undergone a complete overhaul, moving from its original shell-base to python.&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;The story behind that is that the author (Brandon) works at iXsystems, and the plan is to move away from the legacy warden-based jail management which was also shell-based.&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;This new python re-write will allow it to integrate into FreeNAS (and other projects) better by exposing an API for all jail management tasks. Thats right, no more ugly CLI output parsing just to wrangle jail options either at creation or runtime. &lt;/li&gt;
&lt;li&gt;But what about users who just run iocage manually from the CLI? No worries, the new iocage is almost identical to the original CLI usage, making the switch over very simple.&lt;/li&gt;
&lt;li&gt;Just to re-cap, lets look at the new features list:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;“FEATURES:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ease of use&lt;/li&gt;
&lt;li&gt;Rapid jail creation within seconds&lt;/li&gt;
&lt;li&gt;Automatic package installation&lt;/li&gt;
&lt;li&gt;Virtual networking stacks (vnet)&lt;/li&gt;
&lt;li&gt;Shared IP based jails (non vnet)&lt;/li&gt;
&lt;li&gt;Transparent ZFS snapshot management&lt;/li&gt;
&lt;li&gt;Export and import
“&lt;/li&gt;
&lt;li&gt;The new iocage is available now via ports and packages under sysutils/py-iocage, give it a spin and be sure to report issues back to the developer(s).
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://smallhacks.wordpress.com/2017/01/14/reading-dht11-temperature-sensor-on-raspberry-pi-under-freebsd/" target="_blank" rel="nofollow noopener"&gt;Reading DHT11 temperature sensors on a Raspberry Pi under FreeBSD &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“DHT-11 is a very cheap temperature/humidity sensor which is commonly used in the IoT devices. It is not very accurate, so for the accurate measurement i would recommend to use DHT21 instead. Anyway, i had DHT-11 in my tool box, so decided to start with it. DHT-11 using very simple 1 wire protocol – host is turning on chip by sending 18ms low signal to the data output and then reading 40 bytes of data.”&lt;/li&gt;
&lt;li&gt;“To read data from the chip it should be connected to the power (5v) and gpio pin. I used pin 2 as VCC, 6 as GND and 11 as GPIO”&lt;/li&gt;
&lt;li&gt;“There is no support for this device out of the box on FreeBSD. I found some sample code on the github, see &lt;a href="https://github.com/lex/freebsd-gpio-dht11" target="_blank" rel="nofollow noopener"&gt;lex/freebsd-gpio-dht11&lt;/a&gt; repository. This code was a good starting point, but soon i found 2 issues with it:

&lt;ul&gt;
&lt;li&gt;Results are very unreliable, probably due to gpio decoding algorithm.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Checksum is not validated, so sometime values are bogus.&lt;/li&gt;
&lt;li&gt;“Initially i was thinking to fix this myself, but later found kernel module for this purpose, &lt;a href="http://www.my-tour.ru/FreeBSD/1-wire_over_gpio/" target="_blank" rel="nofollow noopener"&gt;1 wire over gpio&lt;/a&gt;. This module contains DHT11 kernel driver (gpio_sw) which implements DHT-11 protocol in the kernel space and exporting /dev/sw0 for the userland. Driver compiles on FreeBSD11/ARM without any changes. Use make install to install the driver.”&lt;/li&gt;
&lt;li&gt;The articles goes into how to install and configure the driver, including a set of devfs rules to allow non-root users to read from the sensor&lt;/li&gt;
&lt;li&gt;“Final goal was to add this sensor to the domoticz software. It is using LUA scripting to extend it functionality, e.g. to obtain data from non-supported or non standard devices. So, i decided to read /dev/sw0 from the LUA.”&lt;/li&gt;
&lt;li&gt;They ran into some trouble with LUA trying to read too much data at once, and had to work around it&lt;/li&gt;
&lt;li&gt;In the end, they got the results and were able to use them in the monitoring tool
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/lattera/articles/blob/master/infosec/tor/2017-01-14_torified_home/article.md" target="_blank" rel="nofollow noopener"&gt;Tor-ified Home Network using HardenedBSD and a RPi3&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Shawn from HardendBSD has posted an article up on GitHub talking about his deployment of a new Tor relay on a RPi3&lt;/li&gt;
&lt;li&gt;This particular method was attractive, since it allows running a Relay, but without it being on a machine which may have personal data, such as SSH keys, files, etc&lt;/li&gt;
&lt;li&gt;While his setup is done on HardendBSD, the same applies to a traditional FreeBSD setup as well. &lt;/li&gt;
&lt;li&gt;First up, is the list of things needed for this project:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Raspberry Pi 3 Model B Rev 1.2 (aka, RPI3)&lt;br&gt;
Serial console cable for the RPI3&lt;br&gt;
Belkin F4U047 USB Ethernet Dongle&lt;br&gt;
Insignia NS-CR2021 USB 2.0 SD/MMC Memory Card Reader&lt;br&gt;
32GB SanDisk Ultra PLUS MicroSDHC&lt;br&gt;
A separate system, running FreeBSD or HardenedBSD&lt;br&gt;
HardenedBSD clang 4.0.0 image for the RPI3&lt;br&gt;
An external drive to be formatted&lt;br&gt;
A MicroUSB cable to power the RPI3&lt;br&gt;
Two network cables&lt;br&gt;
Optional: Edimax N150 EW-7811Un Wireless USB&lt;br&gt;
Basic knowledge of vi&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After getting HBSD running on the RPi3 and serial connection established, he then takes us through the process of installing and enabling the various services needed. (Don’t forget to growfs your sdcard first!)&lt;/li&gt;
&lt;li&gt;Now the tricky part is that some of the packages needed to be compiled from ports, which is somewhat time-consuming on a RPi. He strongly recommends not compiling on the sdcard (it sounds like personal experience has taught him well) and to use iscsi or some external USB drive. &lt;/li&gt;
&lt;li&gt;With the compiling done, our package / software setup is nearly complete. Next up is firewalling the box, which he helpfully provides a full PF config setup that we can copy-n-paste here.&lt;/li&gt;
&lt;li&gt;The last bits will be enabling the torrc configuration knobs, which if you follow his example again, will result in a tor public relay, and a local transparent proxy for you.&lt;/li&gt;
&lt;li&gt;Bonus! Shawn helpfully provides DHCPD configurations, and even Wireless AP configurations, if you want to setup your RPi3 to proxy for devices that connect to 
it.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www-uxsup.csx.cam.ac.uk/misc/horror.txt" target="_blank" rel="nofollow noopener"&gt;Unix Admin. Horror Story Summary, version 1.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A great collection of stories, many of which will ring true with our viewers&lt;/li&gt;
&lt;li&gt;The very first one, is about a user changing root’s shell to /usr/local/bin/tcsh but forgetting to make it executable, resulting in not being able to login as root.&lt;/li&gt;
&lt;li&gt;I too have run into this issue, in a slightly different way. I had tcsh as my user shell (back before tcsh was in base), and after a major OS upgrade, but before I had a chance to recompile all of my ports. Now I couldn’t ssh in to the remote machine in order to recompile my shell. Now I always use a shell included in the base system, and test it before rebooting after an upgrade.&lt;/li&gt;
&lt;li&gt;“Our operations group, a VMS group but trying to learn UNIX, was assigned account administration. They were cleaning up a few non-used accounts like they do on VMS - backup and purge. When they came across the account "sccs", which had never been accessed, away it went. The "deleteuser" utility from DEC asks if you would like to delete all the files in the account. Seems reasonable, huh? Well, the home directory for "sccs" is "/". Enough said :-(“&lt;/li&gt;
&lt;li&gt;“I was working on a line printer spooler, which lived in /etc.  I wanted to remove it, and so issued the command "rm /etc/lpspl."  There was only one problem.  Out of habit, I typed "passwd" after "/etc/" and removed the password file.  Oops.”&lt;/li&gt;
&lt;li&gt;I’ve done things like this as well. Finger memory can be dangerous&lt;/li&gt;
&lt;li&gt;“I was happily churning along developing something on a Sun workstation, and was getting a number of annoying permission denieds from trying to write into a directory heirarchy that I didn't own.  Getting tired of that, I decided to set the permissions on that subtree to 777 while I was working, so I wouldn't have to worry about it.  Someone had recently told me that rather than using plain "su", it was good to use "su -", but the implications had not yet sunk in.  (You can probably see where this is going already, but I'll go to the bitter end.)  Anyway, I cd'd to where I wanted to be, the top of my subtree, and did su -.  Then I did chmod -R 777.  I then started to wonder why it was taking so damn long when there were only about 45 files in 20 directories under where I (thought) I was.  Well, needless to say, su - simulates a real login, and had put me into root's home directory, /, so I was proceeding to set file permissions for the whole system to wide open. I aborted it before it finished, realizing that something was wrong, but this took quite a while to straighten out.”&lt;/li&gt;
&lt;li&gt;Where is a ZFS snapshot when you need it?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://medium.com/@skamille/how-do-individual-contributors-get-stuck-63102ba43516" target="_blank" rel="nofollow noopener"&gt;How individual contributors get stuck&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An interesting post looking at the common causes of people getting stuck when trying to create or contribute new code

&lt;ul&gt;
&lt;li&gt;Brainstorming/architecture: “I must have thought through all edge cases of all parts of everything before I can begin this project”&lt;/li&gt;
&lt;li&gt;Researching possible solutions forever (often accompanied by desire to do a “bakeoff” where they build prototypes in different platforms/languages/etc)&lt;/li&gt;
&lt;li&gt;Refactoring: “this code could be cleaner and everything would be just so much easier if we cleaned this up… and this up… and…”&lt;/li&gt;
&lt;li&gt;Helping other people instead of doing their assigned tasks (this one isn’t a bad thing in an open source community)&lt;/li&gt;
&lt;li&gt;Working on side projects instead of the main project (it is your time, it is up to you how to spend it)&lt;/li&gt;
&lt;li&gt;Excessive testing (rare)&lt;/li&gt;
&lt;li&gt;Excessive automation (rare)&lt;/li&gt;
&lt;li&gt;Finish the last 10–20% of a project&lt;/li&gt;
&lt;li&gt;Start a project completely from scratch&lt;/li&gt;
&lt;li&gt;Do project planning (You need me to write what now? A roadmap?) (this is why FreeBSD has devsummits, some things you just need to whiteboard)&lt;/li&gt;
&lt;li&gt;Work with unfamiliar code/libraries/systems&lt;/li&gt;
&lt;li&gt;Work with other teams (please don’t make me go sit with data engineering!!)&lt;/li&gt;
&lt;li&gt;Talk to other people&lt;/li&gt;
&lt;li&gt;Ask for help (far beyond the point they realized they were stuck and needed help)&lt;/li&gt;
&lt;li&gt;Deal with surprises or unexpected setbacks&lt;/li&gt;
&lt;li&gt;Deal with vendors/external partners&lt;/li&gt;
&lt;li&gt;Say no, because they can’t seem to just say no (instead of saying no they just go into avoidance mode, or worse, always say yes)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;“Noticing how people get stuck is a super power, and one that many great tech leads (and yes, managers) rely on to get big things done. When you know how people get stuck, you can plan your projects to rely on people for their strengths and provide them help or even completely side-step their weaknesses. You know who is good to ask for which kinds of help, and who hates that particular challenge just as much as you do.”&lt;/li&gt;
&lt;li&gt;“The secret is that all of us get stuck and sidetracked sometimes. There’s actually nothing particularly “bad” about this. Knowing the ways that you get hung up is good because you can choose to either a) get over the fears that are sticking you (lack of knowledge, skills, or confidence), b) avoid such tasks as much as possible, and/or c) be aware of your habits and use extra diligence when faced with tackling these areas.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.mkdocs.org/" target="_blank" rel="nofollow noopener"&gt;Make Docs!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“MkDocs is a fast, simple and downright gorgeous static site generator that's geared towards building project documentation. Documentation source files are written in Markdown, and configured with a single YAML configuration file.”&lt;/li&gt;
&lt;li&gt;“MkDocs builds completely static HTML sites that you can host on GitHub pages, Amazon S3, or anywhere else you choose”&lt;/li&gt;
&lt;li&gt;It is an easy to install python package&lt;/li&gt;
&lt;li&gt;It includes a server mode that auto-refreshes the page as you write the docs, making it easy to preview your work before you post it online&lt;/li&gt;
&lt;li&gt;Everything needs docs, and writing docs should be as simple as possible, so that more of them will get written&lt;/li&gt;
&lt;li&gt;Go write some docs!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forums.freenas.org/index.php?threads/new-freenas-9-10-with-freebsd-11-12-for-testing.49696/#post-341941" target="_blank" rel="nofollow noopener"&gt;Experimental FreeNAS 11/12 builds&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We know there’s a lot of FreeNAS users who listen to BSDNow, so I felt it was important to share this little tidbit.&lt;/li&gt;
&lt;li&gt;I’ve posted something to the forums last night which includes links to brand-new spins of FreeNAS 9.10 based upon FreeBSD 11/stable and 12/current. &lt;/li&gt;
&lt;li&gt;These builds are updated nightly via our Jenkins infrastructure and hopefully will provide a new playground for technical folks and developers to experiment with FreeBSD features in their FreeNAS environment, long before they make it into a -STABLE release. &lt;/li&gt;
&lt;li&gt;As usual, the notes of caution do apply, these are nightlies, and as such bugs will abound. Do NOT use these with your production data, unless you are crazy, or just want an excuse to test your backup strategy&lt;/li&gt;
&lt;li&gt;If you do run these builds, of course feedback is welcome via the usual channels, such as the bug tracker. &lt;/li&gt;
&lt;li&gt;The hope is that by testing FreeBSD code earlier, we can vet and determine what is safe / ready to go into mainline FreeNAS sooner rather than later.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://thenewstack.io/not-expected-understand-explainer/" target="_blank" rel="nofollow noopener"&gt;An Explainer on Unix’s Most Notorious Code Comment&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.tedunangst.com/flak/post/turn-your-network-inside-out-with-one-pfconf-trick" target="_blank" rel="nofollow noopener"&gt;turn your network inside out with one pf.conf trick&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.grenadille.net/post/2017/01/13/A-story-of-if_get%289%29" target="_blank" rel="nofollow noopener"&gt;A story of if_get(9)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.llvm.org/pipermail/llvm-dev/2017-January/108953.html" target="_blank" rel="nofollow noopener"&gt;Apple re-affirms its commitment to LLVM/Clang &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.tedunangst.com/flak/post/python-3k17" target="_blank" rel="nofollow noopener"&gt;python 3k17&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blather.michaelwlucas.com/archives/2848" target="_blank" rel="nofollow noopener"&gt;2017 presentation proposals&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-announce/2017/01/09/msg000259.html" target="_blank" rel="nofollow noopener"&gt;NetBSD 7.1_RC1 available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;#define FS_UFS2_MAGIC 0x19540119 (Happy Birthday to Kirk McKusick tomorrow)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/nnQ9ZgyN" target="_blank" rel="nofollow noopener"&gt; J - LetsEncrypt&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/EZ4tRiVb" target="_blank" rel="nofollow noopener"&gt; Mike - OpenRC&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ZqDFTsnR" target="_blank" rel="nofollow noopener"&gt; Timothy - ZFS Horror&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/dhZEnREM" target="_blank" rel="nofollow noopener"&gt; Troels&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/q4F95S6h" target="_blank" rel="nofollow noopener"&gt; Jason - Disk Label&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we’ve got Wifi galore, a new iocage and some RPi3 news and guides to share. Stay tuned for your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170109213803" rel="nofollow">WiFi: 11n hostap mode added to athn(4) driver, testers wanted</a></h3>

<ul>
<li>“OpenBSD as WiFi access points look set to be making a comeback in the near future”</li>
<li>“Stefan Sperling added 802.11n hostap mode, with full support initially for the Atheros chips supported by the athn(4) driver.”</li>
<li> “Hostap performance is not perfect yet but should be no worse than 11a/b/g modes in the same environment.”</li>
<li>“For Linux clients a fix for WME params is needed which I also posted to tech@”</li>
<li>“This diff does not modify the known-broken and disabled ar9003 code, apart from making sure it still builds.”</li>
<li><p>“I&#39;m looking for both tests and OKs.”</p></li>
<li><p>There has also been a <a href="http://svnweb.freebsd.org/base/head/sys/net80211/?view=log" rel="nofollow">flurry of work</a>  in FreeBSD on the ath10k driver, which supports 802.11ac</p></li>
<li><p>Like <a href="https://svnweb.freebsd.org/base?view=revision&revision=310147" rel="nofollow">this one</a> and <a href="https://svnweb.freebsd.org/base?view=revision&revision=311579" rel="nofollow">this one</a></p>

<hr></li>
</ul>

<h3><a href="https://github.com/iocage/iocage" rel="nofollow">The long-awaited iocage update has landed</a></h3>

<ul>
<li>We’ve hinted at the new things happening behind the scenes with iocage, and this last week the code has made its first public debut. </li>
<li>So what’s changed you may ask. The biggest is that iocage has undergone a complete overhaul, moving from its original shell-base to python.<br></li>
<li>The story behind that is that the author (Brandon) works at iXsystems, and the plan is to move away from the legacy warden-based jail management which was also shell-based.<br></li>
<li>This new python re-write will allow it to integrate into FreeNAS (and other projects) better by exposing an API for all jail management tasks. Thats right, no more ugly CLI output parsing just to wrangle jail options either at creation or runtime. </li>
<li>But what about users who just run iocage manually from the CLI? No worries, the new iocage is almost identical to the original CLI usage, making the switch over very simple.</li>
<li>Just to re-cap, lets look at the new features list:</li>
</ul>

<p>“FEATURES:</p>

<ul>
<li>Ease of use</li>
<li>Rapid jail creation within seconds</li>
<li>Automatic package installation</li>
<li>Virtual networking stacks (vnet)</li>
<li>Shared IP based jails (non vnet)</li>
<li>Transparent ZFS snapshot management</li>
<li>Export and import
“</li>
<li>The new iocage is available now via ports and packages under sysutils/py-iocage, give it a spin and be sure to report issues back to the developer(s).
***</li>
</ul>

<h3><a href="https://smallhacks.wordpress.com/2017/01/14/reading-dht11-temperature-sensor-on-raspberry-pi-under-freebsd/" rel="nofollow">Reading DHT11 temperature sensors on a Raspberry Pi under FreeBSD </a></h3>

<ul>
<li>“DHT-11 is a very cheap temperature/humidity sensor which is commonly used in the IoT devices. It is not very accurate, so for the accurate measurement i would recommend to use DHT21 instead. Anyway, i had DHT-11 in my tool box, so decided to start with it. DHT-11 using very simple 1 wire protocol – host is turning on chip by sending 18ms low signal to the data output and then reading 40 bytes of data.”</li>
<li>“To read data from the chip it should be connected to the power (5v) and gpio pin. I used pin 2 as VCC, 6 as GND and 11 as GPIO”</li>
<li>“There is no support for this device out of the box on FreeBSD. I found some sample code on the github, see <a href="https://github.com/lex/freebsd-gpio-dht11" rel="nofollow">lex/freebsd-gpio-dht11</a> repository. This code was a good starting point, but soon i found 2 issues with it:

<ul>
<li>Results are very unreliable, probably due to gpio decoding algorithm.</li>
</ul></li>
<li>Checksum is not validated, so sometime values are bogus.</li>
<li>“Initially i was thinking to fix this myself, but later found kernel module for this purpose, <a href="http://www.my-tour.ru/FreeBSD/1-wire_over_gpio/" rel="nofollow">1 wire over gpio</a>. This module contains DHT11 kernel driver (gpio_sw) which implements DHT-11 protocol in the kernel space and exporting /dev/sw0 for the userland. Driver compiles on FreeBSD11/ARM without any changes. Use make install to install the driver.”</li>
<li>The articles goes into how to install and configure the driver, including a set of devfs rules to allow non-root users to read from the sensor</li>
<li>“Final goal was to add this sensor to the domoticz software. It is using LUA scripting to extend it functionality, e.g. to obtain data from non-supported or non standard devices. So, i decided to read /dev/sw0 from the LUA.”</li>
<li>They ran into some trouble with LUA trying to read too much data at once, and had to work around it</li>
<li>In the end, they got the results and were able to use them in the monitoring tool
***</li>
</ul>

<h3><a href="https://github.com/lattera/articles/blob/master/infosec/tor/2017-01-14_torified_home/article.md" rel="nofollow">Tor-ified Home Network using HardenedBSD and a RPi3</a></h3>

<ul>
<li>Shawn from HardendBSD has posted an article up on GitHub talking about his deployment of a new Tor relay on a RPi3</li>
<li>This particular method was attractive, since it allows running a Relay, but without it being on a machine which may have personal data, such as SSH keys, files, etc</li>
<li>While his setup is done on HardendBSD, the same applies to a traditional FreeBSD setup as well. </li>
<li>First up, is the list of things needed for this project:</li>
</ul>

<p>Raspberry Pi 3 Model B Rev 1.2 (aka, RPI3)<br>
Serial console cable for the RPI3<br>
Belkin F4U047 USB Ethernet Dongle<br>
Insignia NS-CR2021 USB 2.0 SD/MMC Memory Card Reader<br>
32GB SanDisk Ultra PLUS MicroSDHC<br>
A separate system, running FreeBSD or HardenedBSD<br>
HardenedBSD clang 4.0.0 image for the RPI3<br>
An external drive to be formatted<br>
A MicroUSB cable to power the RPI3<br>
Two network cables<br>
Optional: Edimax N150 EW-7811Un Wireless USB<br>
Basic knowledge of vi</p>

<ul>
<li>After getting HBSD running on the RPi3 and serial connection established, he then takes us through the process of installing and enabling the various services needed. (Don’t forget to growfs your sdcard first!)</li>
<li>Now the tricky part is that some of the packages needed to be compiled from ports, which is somewhat time-consuming on a RPi. He strongly recommends not compiling on the sdcard (it sounds like personal experience has taught him well) and to use iscsi or some external USB drive. </li>
<li>With the compiling done, our package / software setup is nearly complete. Next up is firewalling the box, which he helpfully provides a full PF config setup that we can copy-n-paste here.</li>
<li>The last bits will be enabling the torrc configuration knobs, which if you follow his example again, will result in a tor public relay, and a local transparent proxy for you.</li>
<li>Bonus! Shawn helpfully provides DHCPD configurations, and even Wireless AP configurations, if you want to setup your RPi3 to proxy for devices that connect to 
it.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www-uxsup.csx.cam.ac.uk/misc/horror.txt" rel="nofollow">Unix Admin. Horror Story Summary, version 1.0</a></h3>

<ul>
<li>A great collection of stories, many of which will ring true with our viewers</li>
<li>The very first one, is about a user changing root’s shell to /usr/local/bin/tcsh but forgetting to make it executable, resulting in not being able to login as root.</li>
<li>I too have run into this issue, in a slightly different way. I had tcsh as my user shell (back before tcsh was in base), and after a major OS upgrade, but before I had a chance to recompile all of my ports. Now I couldn’t ssh in to the remote machine in order to recompile my shell. Now I always use a shell included in the base system, and test it before rebooting after an upgrade.</li>
<li>“Our operations group, a VMS group but trying to learn UNIX, was assigned account administration. They were cleaning up a few non-used accounts like they do on VMS - backup and purge. When they came across the account &quot;sccs&quot;, which had never been accessed, away it went. The &quot;deleteuser&quot; utility from DEC asks if you would like to delete all the files in the account. Seems reasonable, huh? Well, the home directory for &quot;sccs&quot; is &quot;/&quot;. Enough said :-(“</li>
<li>“I was working on a line printer spooler, which lived in /etc.  I wanted to remove it, and so issued the command &quot;rm /etc/lpspl.&quot;  There was only one problem.  Out of habit, I typed &quot;passwd&quot; after &quot;/etc/&quot; and removed the password file.  Oops.”</li>
<li>I’ve done things like this as well. Finger memory can be dangerous</li>
<li>“I was happily churning along developing something on a Sun workstation, and was getting a number of annoying permission denieds from trying to write into a directory heirarchy that I didn&#39;t own.  Getting tired of that, I decided to set the permissions on that subtree to 777 while I was working, so I wouldn&#39;t have to worry about it.  Someone had recently told me that rather than using plain &quot;su&quot;, it was good to use &quot;su -&quot;, but the implications had not yet sunk in.  (You can probably see where this is going already, but I&#39;ll go to the bitter end.)  Anyway, I cd&#39;d to where I wanted to be, the top of my subtree, and did su -.  Then I did chmod -R 777.  I then started to wonder why it was taking so damn long when there were only about 45 files in 20 directories under where I (thought) I was.  Well, needless to say, su - simulates a real login, and had put me into root&#39;s home directory, /, so I was proceeding to set file permissions for the whole system to wide open. I aborted it before it finished, realizing that something was wrong, but this took quite a while to straighten out.”</li>
<li>Where is a ZFS snapshot when you need it?
***</li>
</ul>

<h3><a href="https://medium.com/@skamille/how-do-individual-contributors-get-stuck-63102ba43516" rel="nofollow">How individual contributors get stuck</a></h3>

<ul>
<li>An interesting post looking at the common causes of people getting stuck when trying to create or contribute new code

<ul>
<li>Brainstorming/architecture: “I must have thought through all edge cases of all parts of everything before I can begin this project”</li>
<li>Researching possible solutions forever (often accompanied by desire to do a “bakeoff” where they build prototypes in different platforms/languages/etc)</li>
<li>Refactoring: “this code could be cleaner and everything would be just so much easier if we cleaned this up… and this up… and…”</li>
<li>Helping other people instead of doing their assigned tasks (this one isn’t a bad thing in an open source community)</li>
<li>Working on side projects instead of the main project (it is your time, it is up to you how to spend it)</li>
<li>Excessive testing (rare)</li>
<li>Excessive automation (rare)</li>
<li>Finish the last 10–20% of a project</li>
<li>Start a project completely from scratch</li>
<li>Do project planning (You need me to write what now? A roadmap?) (this is why FreeBSD has devsummits, some things you just need to whiteboard)</li>
<li>Work with unfamiliar code/libraries/systems</li>
<li>Work with other teams (please don’t make me go sit with data engineering!!)</li>
<li>Talk to other people</li>
<li>Ask for help (far beyond the point they realized they were stuck and needed help)</li>
<li>Deal with surprises or unexpected setbacks</li>
<li>Deal with vendors/external partners</li>
<li>Say no, because they can’t seem to just say no (instead of saying no they just go into avoidance mode, or worse, always say yes)</li>
</ul></li>
<li>“Noticing how people get stuck is a super power, and one that many great tech leads (and yes, managers) rely on to get big things done. When you know how people get stuck, you can plan your projects to rely on people for their strengths and provide them help or even completely side-step their weaknesses. You know who is good to ask for which kinds of help, and who hates that particular challenge just as much as you do.”</li>
<li>“The secret is that all of us get stuck and sidetracked sometimes. There’s actually nothing particularly “bad” about this. Knowing the ways that you get hung up is good because you can choose to either a) get over the fears that are sticking you (lack of knowledge, skills, or confidence), b) avoid such tasks as much as possible, and/or c) be aware of your habits and use extra diligence when faced with tackling these areas.”
***</li>
</ul>

<h3><a href="http://www.mkdocs.org/" rel="nofollow">Make Docs!</a></h3>

<ul>
<li>“MkDocs is a fast, simple and downright gorgeous static site generator that&#39;s geared towards building project documentation. Documentation source files are written in Markdown, and configured with a single YAML configuration file.”</li>
<li>“MkDocs builds completely static HTML sites that you can host on GitHub pages, Amazon S3, or anywhere else you choose”</li>
<li>It is an easy to install python package</li>
<li>It includes a server mode that auto-refreshes the page as you write the docs, making it easy to preview your work before you post it online</li>
<li>Everything needs docs, and writing docs should be as simple as possible, so that more of them will get written</li>
<li>Go write some docs!
***</li>
</ul>

<h3><a href="https://forums.freenas.org/index.php?threads/new-freenas-9-10-with-freebsd-11-12-for-testing.49696/#post-341941" rel="nofollow">Experimental FreeNAS 11/12 builds</a></h3>

<ul>
<li>We know there’s a lot of FreeNAS users who listen to BSDNow, so I felt it was important to share this little tidbit.</li>
<li>I’ve posted something to the forums last night which includes links to brand-new spins of FreeNAS 9.10 based upon FreeBSD 11/stable and 12/current. </li>
<li>These builds are updated nightly via our Jenkins infrastructure and hopefully will provide a new playground for technical folks and developers to experiment with FreeBSD features in their FreeNAS environment, long before they make it into a -STABLE release. </li>
<li>As usual, the notes of caution do apply, these are nightlies, and as such bugs will abound. Do NOT use these with your production data, unless you are crazy, or just want an excuse to test your backup strategy</li>
<li>If you do run these builds, of course feedback is welcome via the usual channels, such as the bug tracker. </li>
<li>The hope is that by testing FreeBSD code earlier, we can vet and determine what is safe / ready to go into mainline FreeNAS sooner rather than later.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://thenewstack.io/not-expected-understand-explainer/" rel="nofollow">An Explainer on Unix’s Most Notorious Code Comment</a> </li>
<li><a href="http://www.tedunangst.com/flak/post/turn-your-network-inside-out-with-one-pfconf-trick" rel="nofollow">turn your network inside out with one pf.conf trick</a></li>
<li><a href="http://www.grenadille.net/post/2017/01/13/A-story-of-if_get%289%29" rel="nofollow">A story of if_get(9)</a></li>
<li><a href="http://lists.llvm.org/pipermail/llvm-dev/2017-January/108953.html" rel="nofollow">Apple re-affirms its commitment to LLVM/Clang </a> </li>
<li><a href="http://www.tedunangst.com/flak/post/python-3k17" rel="nofollow">python 3k17</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2848" rel="nofollow">2017 presentation proposals</a> </li>
<li><a href="http://mail-index.netbsd.org/netbsd-announce/2017/01/09/msg000259.html" rel="nofollow">NetBSD 7.1_RC1 available</a></li>
<li>#define FS_UFS2_MAGIC 0x19540119 (Happy Birthday to Kirk McKusick tomorrow)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/nnQ9ZgyN" rel="nofollow"> J - LetsEncrypt</a> </li>
<li><a href="http://pastebin.com/EZ4tRiVb" rel="nofollow"> Mike - OpenRC</a> </li>
<li><a href="http://pastebin.com/ZqDFTsnR" rel="nofollow"> Timothy - ZFS Horror</a> </li>
<li><a href="http://pastebin.com/dhZEnREM" rel="nofollow"> Troels</a> </li>
<li><a href="http://pastebin.com/q4F95S6h" rel="nofollow"> Jason - Disk Label</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we’ve got Wifi galore, a new iocage and some RPi3 news and guides to share. Stay tuned for your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20170109213803" rel="nofollow">WiFi: 11n hostap mode added to athn(4) driver, testers wanted</a></h3>

<ul>
<li>“OpenBSD as WiFi access points look set to be making a comeback in the near future”</li>
<li>“Stefan Sperling added 802.11n hostap mode, with full support initially for the Atheros chips supported by the athn(4) driver.”</li>
<li> “Hostap performance is not perfect yet but should be no worse than 11a/b/g modes in the same environment.”</li>
<li>“For Linux clients a fix for WME params is needed which I also posted to tech@”</li>
<li>“This diff does not modify the known-broken and disabled ar9003 code, apart from making sure it still builds.”</li>
<li><p>“I&#39;m looking for both tests and OKs.”</p></li>
<li><p>There has also been a <a href="http://svnweb.freebsd.org/base/head/sys/net80211/?view=log" rel="nofollow">flurry of work</a>  in FreeBSD on the ath10k driver, which supports 802.11ac</p></li>
<li><p>Like <a href="https://svnweb.freebsd.org/base?view=revision&revision=310147" rel="nofollow">this one</a> and <a href="https://svnweb.freebsd.org/base?view=revision&revision=311579" rel="nofollow">this one</a></p>

<hr></li>
</ul>

<h3><a href="https://github.com/iocage/iocage" rel="nofollow">The long-awaited iocage update has landed</a></h3>

<ul>
<li>We’ve hinted at the new things happening behind the scenes with iocage, and this last week the code has made its first public debut. </li>
<li>So what’s changed you may ask. The biggest is that iocage has undergone a complete overhaul, moving from its original shell-base to python.<br></li>
<li>The story behind that is that the author (Brandon) works at iXsystems, and the plan is to move away from the legacy warden-based jail management which was also shell-based.<br></li>
<li>This new python re-write will allow it to integrate into FreeNAS (and other projects) better by exposing an API for all jail management tasks. Thats right, no more ugly CLI output parsing just to wrangle jail options either at creation or runtime. </li>
<li>But what about users who just run iocage manually from the CLI? No worries, the new iocage is almost identical to the original CLI usage, making the switch over very simple.</li>
<li>Just to re-cap, lets look at the new features list:</li>
</ul>

<p>“FEATURES:</p>

<ul>
<li>Ease of use</li>
<li>Rapid jail creation within seconds</li>
<li>Automatic package installation</li>
<li>Virtual networking stacks (vnet)</li>
<li>Shared IP based jails (non vnet)</li>
<li>Transparent ZFS snapshot management</li>
<li>Export and import
“</li>
<li>The new iocage is available now via ports and packages under sysutils/py-iocage, give it a spin and be sure to report issues back to the developer(s).
***</li>
</ul>

<h3><a href="https://smallhacks.wordpress.com/2017/01/14/reading-dht11-temperature-sensor-on-raspberry-pi-under-freebsd/" rel="nofollow">Reading DHT11 temperature sensors on a Raspberry Pi under FreeBSD </a></h3>

<ul>
<li>“DHT-11 is a very cheap temperature/humidity sensor which is commonly used in the IoT devices. It is not very accurate, so for the accurate measurement i would recommend to use DHT21 instead. Anyway, i had DHT-11 in my tool box, so decided to start with it. DHT-11 using very simple 1 wire protocol – host is turning on chip by sending 18ms low signal to the data output and then reading 40 bytes of data.”</li>
<li>“To read data from the chip it should be connected to the power (5v) and gpio pin. I used pin 2 as VCC, 6 as GND and 11 as GPIO”</li>
<li>“There is no support for this device out of the box on FreeBSD. I found some sample code on the github, see <a href="https://github.com/lex/freebsd-gpio-dht11" rel="nofollow">lex/freebsd-gpio-dht11</a> repository. This code was a good starting point, but soon i found 2 issues with it:

<ul>
<li>Results are very unreliable, probably due to gpio decoding algorithm.</li>
</ul></li>
<li>Checksum is not validated, so sometime values are bogus.</li>
<li>“Initially i was thinking to fix this myself, but later found kernel module for this purpose, <a href="http://www.my-tour.ru/FreeBSD/1-wire_over_gpio/" rel="nofollow">1 wire over gpio</a>. This module contains DHT11 kernel driver (gpio_sw) which implements DHT-11 protocol in the kernel space and exporting /dev/sw0 for the userland. Driver compiles on FreeBSD11/ARM without any changes. Use make install to install the driver.”</li>
<li>The articles goes into how to install and configure the driver, including a set of devfs rules to allow non-root users to read from the sensor</li>
<li>“Final goal was to add this sensor to the domoticz software. It is using LUA scripting to extend it functionality, e.g. to obtain data from non-supported or non standard devices. So, i decided to read /dev/sw0 from the LUA.”</li>
<li>They ran into some trouble with LUA trying to read too much data at once, and had to work around it</li>
<li>In the end, they got the results and were able to use them in the monitoring tool
***</li>
</ul>

<h3><a href="https://github.com/lattera/articles/blob/master/infosec/tor/2017-01-14_torified_home/article.md" rel="nofollow">Tor-ified Home Network using HardenedBSD and a RPi3</a></h3>

<ul>
<li>Shawn from HardendBSD has posted an article up on GitHub talking about his deployment of a new Tor relay on a RPi3</li>
<li>This particular method was attractive, since it allows running a Relay, but without it being on a machine which may have personal data, such as SSH keys, files, etc</li>
<li>While his setup is done on HardendBSD, the same applies to a traditional FreeBSD setup as well. </li>
<li>First up, is the list of things needed for this project:</li>
</ul>

<p>Raspberry Pi 3 Model B Rev 1.2 (aka, RPI3)<br>
Serial console cable for the RPI3<br>
Belkin F4U047 USB Ethernet Dongle<br>
Insignia NS-CR2021 USB 2.0 SD/MMC Memory Card Reader<br>
32GB SanDisk Ultra PLUS MicroSDHC<br>
A separate system, running FreeBSD or HardenedBSD<br>
HardenedBSD clang 4.0.0 image for the RPI3<br>
An external drive to be formatted<br>
A MicroUSB cable to power the RPI3<br>
Two network cables<br>
Optional: Edimax N150 EW-7811Un Wireless USB<br>
Basic knowledge of vi</p>

<ul>
<li>After getting HBSD running on the RPi3 and serial connection established, he then takes us through the process of installing and enabling the various services needed. (Don’t forget to growfs your sdcard first!)</li>
<li>Now the tricky part is that some of the packages needed to be compiled from ports, which is somewhat time-consuming on a RPi. He strongly recommends not compiling on the sdcard (it sounds like personal experience has taught him well) and to use iscsi or some external USB drive. </li>
<li>With the compiling done, our package / software setup is nearly complete. Next up is firewalling the box, which he helpfully provides a full PF config setup that we can copy-n-paste here.</li>
<li>The last bits will be enabling the torrc configuration knobs, which if you follow his example again, will result in a tor public relay, and a local transparent proxy for you.</li>
<li>Bonus! Shawn helpfully provides DHCPD configurations, and even Wireless AP configurations, if you want to setup your RPi3 to proxy for devices that connect to 
it.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www-uxsup.csx.cam.ac.uk/misc/horror.txt" rel="nofollow">Unix Admin. Horror Story Summary, version 1.0</a></h3>

<ul>
<li>A great collection of stories, many of which will ring true with our viewers</li>
<li>The very first one, is about a user changing root’s shell to /usr/local/bin/tcsh but forgetting to make it executable, resulting in not being able to login as root.</li>
<li>I too have run into this issue, in a slightly different way. I had tcsh as my user shell (back before tcsh was in base), and after a major OS upgrade, but before I had a chance to recompile all of my ports. Now I couldn’t ssh in to the remote machine in order to recompile my shell. Now I always use a shell included in the base system, and test it before rebooting after an upgrade.</li>
<li>“Our operations group, a VMS group but trying to learn UNIX, was assigned account administration. They were cleaning up a few non-used accounts like they do on VMS - backup and purge. When they came across the account &quot;sccs&quot;, which had never been accessed, away it went. The &quot;deleteuser&quot; utility from DEC asks if you would like to delete all the files in the account. Seems reasonable, huh? Well, the home directory for &quot;sccs&quot; is &quot;/&quot;. Enough said :-(“</li>
<li>“I was working on a line printer spooler, which lived in /etc.  I wanted to remove it, and so issued the command &quot;rm /etc/lpspl.&quot;  There was only one problem.  Out of habit, I typed &quot;passwd&quot; after &quot;/etc/&quot; and removed the password file.  Oops.”</li>
<li>I’ve done things like this as well. Finger memory can be dangerous</li>
<li>“I was happily churning along developing something on a Sun workstation, and was getting a number of annoying permission denieds from trying to write into a directory heirarchy that I didn&#39;t own.  Getting tired of that, I decided to set the permissions on that subtree to 777 while I was working, so I wouldn&#39;t have to worry about it.  Someone had recently told me that rather than using plain &quot;su&quot;, it was good to use &quot;su -&quot;, but the implications had not yet sunk in.  (You can probably see where this is going already, but I&#39;ll go to the bitter end.)  Anyway, I cd&#39;d to where I wanted to be, the top of my subtree, and did su -.  Then I did chmod -R 777.  I then started to wonder why it was taking so damn long when there were only about 45 files in 20 directories under where I (thought) I was.  Well, needless to say, su - simulates a real login, and had put me into root&#39;s home directory, /, so I was proceeding to set file permissions for the whole system to wide open. I aborted it before it finished, realizing that something was wrong, but this took quite a while to straighten out.”</li>
<li>Where is a ZFS snapshot when you need it?
***</li>
</ul>

<h3><a href="https://medium.com/@skamille/how-do-individual-contributors-get-stuck-63102ba43516" rel="nofollow">How individual contributors get stuck</a></h3>

<ul>
<li>An interesting post looking at the common causes of people getting stuck when trying to create or contribute new code

<ul>
<li>Brainstorming/architecture: “I must have thought through all edge cases of all parts of everything before I can begin this project”</li>
<li>Researching possible solutions forever (often accompanied by desire to do a “bakeoff” where they build prototypes in different platforms/languages/etc)</li>
<li>Refactoring: “this code could be cleaner and everything would be just so much easier if we cleaned this up… and this up… and…”</li>
<li>Helping other people instead of doing their assigned tasks (this one isn’t a bad thing in an open source community)</li>
<li>Working on side projects instead of the main project (it is your time, it is up to you how to spend it)</li>
<li>Excessive testing (rare)</li>
<li>Excessive automation (rare)</li>
<li>Finish the last 10–20% of a project</li>
<li>Start a project completely from scratch</li>
<li>Do project planning (You need me to write what now? A roadmap?) (this is why FreeBSD has devsummits, some things you just need to whiteboard)</li>
<li>Work with unfamiliar code/libraries/systems</li>
<li>Work with other teams (please don’t make me go sit with data engineering!!)</li>
<li>Talk to other people</li>
<li>Ask for help (far beyond the point they realized they were stuck and needed help)</li>
<li>Deal with surprises or unexpected setbacks</li>
<li>Deal with vendors/external partners</li>
<li>Say no, because they can’t seem to just say no (instead of saying no they just go into avoidance mode, or worse, always say yes)</li>
</ul></li>
<li>“Noticing how people get stuck is a super power, and one that many great tech leads (and yes, managers) rely on to get big things done. When you know how people get stuck, you can plan your projects to rely on people for their strengths and provide them help or even completely side-step their weaknesses. You know who is good to ask for which kinds of help, and who hates that particular challenge just as much as you do.”</li>
<li>“The secret is that all of us get stuck and sidetracked sometimes. There’s actually nothing particularly “bad” about this. Knowing the ways that you get hung up is good because you can choose to either a) get over the fears that are sticking you (lack of knowledge, skills, or confidence), b) avoid such tasks as much as possible, and/or c) be aware of your habits and use extra diligence when faced with tackling these areas.”
***</li>
</ul>

<h3><a href="http://www.mkdocs.org/" rel="nofollow">Make Docs!</a></h3>

<ul>
<li>“MkDocs is a fast, simple and downright gorgeous static site generator that&#39;s geared towards building project documentation. Documentation source files are written in Markdown, and configured with a single YAML configuration file.”</li>
<li>“MkDocs builds completely static HTML sites that you can host on GitHub pages, Amazon S3, or anywhere else you choose”</li>
<li>It is an easy to install python package</li>
<li>It includes a server mode that auto-refreshes the page as you write the docs, making it easy to preview your work before you post it online</li>
<li>Everything needs docs, and writing docs should be as simple as possible, so that more of them will get written</li>
<li>Go write some docs!
***</li>
</ul>

<h3><a href="https://forums.freenas.org/index.php?threads/new-freenas-9-10-with-freebsd-11-12-for-testing.49696/#post-341941" rel="nofollow">Experimental FreeNAS 11/12 builds</a></h3>

<ul>
<li>We know there’s a lot of FreeNAS users who listen to BSDNow, so I felt it was important to share this little tidbit.</li>
<li>I’ve posted something to the forums last night which includes links to brand-new spins of FreeNAS 9.10 based upon FreeBSD 11/stable and 12/current. </li>
<li>These builds are updated nightly via our Jenkins infrastructure and hopefully will provide a new playground for technical folks and developers to experiment with FreeBSD features in their FreeNAS environment, long before they make it into a -STABLE release. </li>
<li>As usual, the notes of caution do apply, these are nightlies, and as such bugs will abound. Do NOT use these with your production data, unless you are crazy, or just want an excuse to test your backup strategy</li>
<li>If you do run these builds, of course feedback is welcome via the usual channels, such as the bug tracker. </li>
<li>The hope is that by testing FreeBSD code earlier, we can vet and determine what is safe / ready to go into mainline FreeNAS sooner rather than later.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://thenewstack.io/not-expected-understand-explainer/" rel="nofollow">An Explainer on Unix’s Most Notorious Code Comment</a> </li>
<li><a href="http://www.tedunangst.com/flak/post/turn-your-network-inside-out-with-one-pfconf-trick" rel="nofollow">turn your network inside out with one pf.conf trick</a></li>
<li><a href="http://www.grenadille.net/post/2017/01/13/A-story-of-if_get%289%29" rel="nofollow">A story of if_get(9)</a></li>
<li><a href="http://lists.llvm.org/pipermail/llvm-dev/2017-January/108953.html" rel="nofollow">Apple re-affirms its commitment to LLVM/Clang </a> </li>
<li><a href="http://www.tedunangst.com/flak/post/python-3k17" rel="nofollow">python 3k17</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2848" rel="nofollow">2017 presentation proposals</a> </li>
<li><a href="http://mail-index.netbsd.org/netbsd-announce/2017/01/09/msg000259.html" rel="nofollow">NetBSD 7.1_RC1 available</a></li>
<li>#define FS_UFS2_MAGIC 0x19540119 (Happy Birthday to Kirk McKusick tomorrow)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/nnQ9ZgyN" rel="nofollow"> J - LetsEncrypt</a> </li>
<li><a href="http://pastebin.com/EZ4tRiVb" rel="nofollow"> Mike - OpenRC</a> </li>
<li><a href="http://pastebin.com/ZqDFTsnR" rel="nofollow"> Timothy - ZFS Horror</a> </li>
<li><a href="http://pastebin.com/dhZEnREM" rel="nofollow"> Troels</a> </li>
<li><a href="http://pastebin.com/q4F95S6h" rel="nofollow"> Jason - Disk Label</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>176: Linking your world</title>
  <link>https://www.bsdnow.tv/176</link>
  <guid isPermaLink="false">5b103268-94e0-4140-8458-0c79f17e135e</guid>
  <pubDate>Wed, 11 Jan 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5b103268-94e0-4140-8458-0c79f17e135e.mp3" length="66539956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Another exciting week on BSDNow, we are queued up with LLVM / Linking news, a look at NetBSD’s scheduler,</itunes:subtitle>
  <itunes:duration>1:32:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Another exciting week on BSDNow, we are queued up with LLVM / Linking news, a look at NetBSD’s scheduler,&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and &amp;lt;br&amp;gt;
Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://llvm.org/bugs/show_bug.cgi?id=23214#c40" target="_blank" rel="nofollow noopener"&gt;FreeBSD Kernel and World, and many Ports, can now be linked with lld&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“With this change applied I can link the entirety of the FreeBSD/amd64 base system (userland world and kernel) with LLD.”&lt;/li&gt;
&lt;li&gt;“Rafael's done an initial experimental Poudriere FreeBSD package build with lld head, and found almost 20K out of 26K ports built successfully. I'm now looking at getting CI running to test this on an ongoing basis. But, I think we're at the point where an experimental build makes sense.”&lt;/li&gt;
&lt;li&gt;Such testing will become much easier once llvm 4.0 is imported into -current&lt;/li&gt;
&lt;li&gt;“I suggest that during development we collect patches in a local git repo -- for example, I've started here for my Poudriere run &lt;a href="https://github.com/emaste/freebsd-ports/commits/ports-lld%E2%80%9D" target="_blank" rel="nofollow noopener"&gt;https://github.com/emaste/freebsd-ports/commits/ports-lld”&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;“It now looks like libtool is responsible for the majority of my failed / skipped ports. Unless we really think we'll add "not GNU" and other hacks to lld we're going to have to address libtool limitations upstream and in the FreeBSD tree. I did look into libtool a few weeks ago, but unfortunately haven't yet managed to produce a patch suitable for sending upstream.”&lt;/li&gt;
&lt;li&gt;If you are interested in LLVM/Clang/LLD/LLDB etc, check out: &lt;a href="http://blog.regehr.org/archives/1453" target="_blank" rel="nofollow noopener"&gt;A Tourist’s Guide to the LLVM Source Code &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20170109_2108.html" target="_blank" rel="nofollow noopener"&gt;Documenting NetBSD's scheduler tweaks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A followup to our previous coverage of improvements to the scheduler in NetBSD&lt;/li&gt;
&lt;li&gt;“NetBSD's scheduler was recently changed to better distribute load of long-running processes on multiple CPUs. So far, the associated sysctl tweaks were not documented, and this was changed now, documenting the kern.sched sysctls.”&lt;/li&gt;
&lt;li&gt;kern.sched.cacheht_time (dynamic): Cache hotness time in which a LWP is kept on one particular CPU and not moved to another CPU. This reduces the overhead of flushing and reloading caches.  Defaults to 3ms.  Needs to be given in ``hz'' units, see mstohz(9).&lt;/li&gt;
&lt;li&gt;kern.sched.balance_period (dynamic): Interval at which the CPU queues are checked for re-balancing.  Defaults to 300ms.&lt;/li&gt;
&lt;li&gt;kern.sched.min_catch (dynamic): Minimum count of migratable (runable) threads for catching (stealing) from another CPU.  Defaults to 1 but can be increased to decrease chance of thread migration between CPUs.&lt;/li&gt;
&lt;li&gt;It is important to have good documentation for these tunables, so that users can understand what it is they are adjusting
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://codeghar.com/blog/freebsd-network-gateway-on-edgerouter-lite.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Network Gateway on EdgeRouter Lite&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“EdgeRouter Lite is a great device to run at the edge of a home network. It becomes even better when it's running FreeBSD. This guide documents how to setup such a gateway. There are accompanying git repos to somewhat automate the process as well.”&lt;/li&gt;
&lt;li&gt;“Colin Percival has written a great blog post on the subject, titled &lt;a href="http://www.daemonology.net/blog/2016-01-10-FreeBSD-EdgeRouter-Lite.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD on EdgeRouter Lite - no serial port required&lt;/a&gt; . In it he provides and describes a shell script to build a bootable image of FreeBSD to be run on ERL, available from GitHub in the &lt;a href="https://github.com/cperciva/freebsd-ERL-build/" target="_blank" rel="nofollow noopener"&gt;freebsd-ERL-build&lt;/a&gt;  repo. I have built a Vagrant-based workflow to automate the building of the drive image. It's available on GitHub in the &lt;a href="https://github.com/hamzasheikh/freebsd-edgerouterlite-ansible" target="_blank" rel="nofollow noopener"&gt;freebsd-edgerouterlite-ansible&lt;/a&gt;  repo. It uses the build script Percival wrote.”&lt;/li&gt;
&lt;li&gt;“Once you've built the disk image it's time to write it to a USB drive. There are two options: overwrite the original drive in the ERL or buy a new drive. I tried the second option first and wrote to a new Sandrive Ultra Fit 32GB USB 3.0 Flash Drive (SDCZ43-032G-GAM46). It did not work and I later found on some blog that those drives do not work. I have not tried another third party drive since.”&lt;/li&gt;
&lt;li&gt;The tutorial covers all of the steps, and the configuration files, including rc.conf, IP configuration, DHCP (and v6), pf, and DNS (unbound)&lt;/li&gt;
&lt;li&gt;“I'm pretty happy with ERL and FreeBSD. There is great community documentation on how to configure all the pieces of software that make a FreeBSD-based home network gateway possible. I can tweak things as needed and upgrade when newer versions become available.”&lt;/li&gt;
&lt;li&gt;“My plan on upgrading the base OS is to get a third party USB drive that works, write a newer FreeBSD image to it, and replace the drive in the ERL enclosure. This way I can keep a bunch of drives in rotation. Upgrades to newer builds or reverts to last known good version are as easy as swapping USB drives.”&lt;/li&gt;
&lt;li&gt;Although something more nanobsd style with 2 partitions on the one drive might be easier.&lt;/li&gt;
&lt;li&gt;“Configuration with Ansible means I don't have to manually do things again and again. As the configs change they'll be tracked in git so I get version control as well. ERL is simply a great piece of network hardware. I'm tempted to try Ubiquiti's WiFi products instead of a mixture of DD-WRT and OpenWRT devices I have now. But that is for another day and perhaps another blog post.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/michipili/bsdowl" target="_blank" rel="nofollow noopener"&gt;A highly portable build system targeting modern UNIX systems&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An exciting new/old project is up on GitHub that we wanted to bring your attention to.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;BSD Owl is a highly portable build-system based around BSD Make that supports a variety of popular (and not so popular) languages, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;C programs, compiled for several targets&lt;/li&gt;
&lt;li&gt;C libraries, static and shared, compiled for several targets&lt;/li&gt;
&lt;li&gt;Shell scripts&lt;/li&gt;
&lt;li&gt;Python scripts&lt;/li&gt;
&lt;li&gt;OCaml programs&lt;/li&gt;
&lt;li&gt;OCaml libraries, with ocamldoc documentation&lt;/li&gt;
&lt;li&gt;OCaml plugins&lt;/li&gt;
&lt;li&gt;TeX documents, prepared for several printing devices&lt;/li&gt;
&lt;li&gt;METAPOST figures, with output as PDF, PS, SVG or PNG, either as part of a TeX document or as standalone documents&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;What about features you may ask? Well BSD Owl has plenty of those to go around:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Support of compilation profiles&lt;/li&gt;
&lt;li&gt;Support of the parallel mode (at the directory level)&lt;/li&gt;
&lt;li&gt;Support of separate trees for sources and objects&lt;/li&gt;
&lt;li&gt;Support of architecture-dependant compilation options&lt;/li&gt;
&lt;li&gt;Support GNU autoconf&lt;/li&gt;
&lt;li&gt;Production of GPG-signed tarballs&lt;/li&gt;
&lt;li&gt;Developer subshell, empowered with project-specific scripts&lt;/li&gt;
&lt;li&gt;Literate programming using noweb&lt;/li&gt;
&lt;li&gt;Preprocessing with m4&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;As far as platform support goes, BSD Owl is tested on OSX / Debian Jesse and FreeBSD &amp;gt; 9. Future support for OpenBSD and NetBSD is planned, once they update their respective BSD Make binaries to more modern versions&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=148342051832692&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;find -delete in OpenBSD. Thanks to tedu@ OpenBSD will have this very handy flag to in the future.&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD’s find(1) utility will now support the -delete operation&lt;/li&gt;
&lt;li&gt;“This option is not posix (not like that's stopped find accumulating a dozen extensions), but it is in gnu and freebsd (for 20 years). it's also somewhat popular among sysadmins and blogs, etc. and perhaps most importantly, it nicely solves one of the more troublesome caveats of find (which the man page actually covers twice because it's so common and easy to screw up). So I think it makes a good addition.”&lt;/li&gt;
&lt;li&gt;The actual code was borrowed from FreeBSD&lt;/li&gt;
&lt;li&gt;Using the -delete option is much more performant than forking rm once for each file, and safer because there is no risk of mangling path names&lt;/li&gt;
&lt;li&gt;If you encounter a system without a -delete option, your best bet is to use the -print0 option of find, which will print each filename terminated by a null byte, and pipe that into xargs -0 rm&lt;/li&gt;
&lt;li&gt;This avoids any ambiguity caused by files with spaces in the names
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lumina-desktop.org/version-1-2-0-released/" target="_blank" rel="nofollow noopener"&gt;New version of the Lumina desktop released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Just in time to kickoff 2017 we have a new release of Lumina Desktop (1.2.0)&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some of the notable changes include fixes to make it easier to port to other platforms, and some features:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;New Panel Plugins:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;“audioplayer” (panel version of the desktop plugin with the same name): Allows the user to load/play audio files directly through the desktop itself.&lt;/li&gt;
&lt;li&gt;“jsonmenu” (panel version of the menu plugin with the same name): Allows an external utility/script to be used to generate a menu/contents on demand.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;New Menu Plugins:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;“lockdesktop”: Menu option for instantly locking the desktop session.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;New Utilities:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;code&gt;lumina-archiver&lt;/code&gt;: This is a pure Qt5 front-end to the “tar” utility for managing/creating archives. This can also use the &lt;code&gt;dd&lt;/code&gt; utility to burn a “*.img” file to a USB device for booting.“&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Looks like the news already made its rounds to a few different sites, with Phoronix and Softpedia picking it up as well&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.phoronix.com/scan.php?page=news_item&amp;amp;px=Lumina-1.2-Released" target="_blank" rel="nofollow noopener"&gt;Phoronix&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://news.softpedia.com/news/lumina-1-2-desktop-environments-launches-for-trueos-with-various-enhancements-511495.shtml" target="_blank" rel="nofollow noopener"&gt;Softpedia &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;TrueOS users running the latest updates are already on the pre-release version of 1.2.1, so nothing has to be done there to get the latest and greatest.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.vidarholen.net/contents/blog/?p=479" target="_blank" rel="nofollow noopener"&gt;dd is not a disk writing tool&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“If you’ve ever used dd, you’ve probably used it to read or write disk images:”
&amp;gt; # Write myfile.iso to a USB drive
&amp;gt; dd if=myfile.iso of=/dev/sdb bs=1M&lt;/li&gt;
&lt;li&gt;“Usage of dd in this context is so pervasive that it’s being hailed as the magic gatekeeper of raw devices. Want to read from a raw device? Use dd. Want to write to a raw device? Use dd. This belief can make simple tasks complicated. How do you combine dd with gzip? How do you use pv if the source is raw device? How do you dd over ssh?”&lt;/li&gt;
&lt;li&gt;“The fact of the matter is, dd is not a disk writing tool. Neither “d” is for “disk”, “drive” or “device”. It does not support “low level” reading or writing. It has no special dominion over any kind of device whatsoever.”&lt;/li&gt;
&lt;li&gt;Then a number of alternatives are discussed&lt;/li&gt;
&lt;li&gt;“However, this does not mean that dd is useless! The reason why people started using it in the first place is that it does exactly what it’s told, no more and no less. If an alias specifies -a, cp might try to create a new block device rather than a copy of the file data. If using gzip without redirection, it may try to be helpful and skip the file for not being regular. Neither of them will write out a reassuring status during or after a copy.”&lt;/li&gt;
&lt;li&gt;“dd, meanwhile, has one job*: copy data from one place to another. It doesn’t care about files, safeguards or user convenience. It will not try to second guess your intent, based on trailing slashes or types of files. When this is no longer a convenience, like when combining it with other tools that already read and write files, one should not feel guilty for leaving dd out entirely.”&lt;/li&gt;
&lt;li&gt;“dd is the swiss army knife of the open, read, write and seek syscalls. It’s unique in its ability to issue seeks and reads of specific lengths, which enables a whole world of shell scripts that have no business being shell scripts. Want to simulate a lseek+execve? Use dd! Want to open a file with O_SYNC? Use dd! Want to read groups of three byte pixels from a PPM file? Use dd!”&lt;/li&gt;
&lt;li&gt;“It’s a flexible, unique and useful tool, and I love it. My only issue is that, far too often, this great tool is being relegated to and inappropriately hailed for its most generic and least interesting capability: simply copying a file from start to finish.”&lt;/li&gt;
&lt;li&gt;“dd actually has two jobs: Convert and Copy. Legend has it that the intended name, “cc”, was taken by the C compiler, so the letters were shifted by one to give “dd”. This is also why we ended up with a Window system called X.”&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://eriknstr.github.io/utils/dd-countdown.htm" target="_blank" rel="nofollow noopener"&gt;dd countdown&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.strugglingcoder.info/index.php/bhyve-setup-for-tcp-testing/" target="_blank" rel="nofollow noopener"&gt;Bhyve setup for tcp testing &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD Developer Hiren Panchasara writes about his setup to use bhyve to test changes to the TCP stack in FreeBSD&lt;/li&gt;
&lt;li&gt;“Here is how I test simple FreeBSD tcp changes with dummynet on bhyve. I’ve already wrote down &lt;a href="https://www.strugglingcoder.info/index.php/drop-a-packet/" target="_blank" rel="nofollow noopener"&gt;how I do dummynet&lt;/a&gt; so I’ll focus on bhyve part.”&lt;/li&gt;
&lt;li&gt;“A few months back when I started looking into improving FreeBSD TCP’s response to packet loss, I looked around for traffic simulators which can do deterministic packet drop for me.”&lt;/li&gt;
&lt;li&gt;“I had used dummynet(4) before so I thought of using it but the problem is that it only provided probabilistic drops. You can specify dropping 10% of the total packets”&lt;/li&gt;
&lt;li&gt;So he wrote a quick hack, hopefully he’ll polish it up and get it committed&lt;/li&gt;
&lt;li&gt;“Setup: I’ll create 3 bhyve guests: client, router and server” &lt;/li&gt;
&lt;li&gt;“Both client and server need their routing tables setup correctly so that they can reach each other. The Dummynet node is the router / traffic shaping node here. We need to enable forwarding between interfaces: sysctl net.inet.ip.forwarding=1”&lt;/li&gt;
&lt;li&gt;“We need to setup links (called ‘pipes’) and their parameters on dummynet node”&lt;/li&gt;
&lt;li&gt;“For simulations, I run a lighttpd web-server on the server which serves different sized objects and I request them via curl or wget from the client. I have tcpdump running on any/all of four interfaces involved to observe traffic and I can see specified packets getting dropped by dummynet. sysctl net.inet.ip.dummynet.io_pkt_drop is incremented with each packet that dummynet drops.”&lt;/li&gt;
&lt;li&gt;“Here, 192.* addresses are for ssh and 10.* are for guests to be able to communicate within themselves.”&lt;/li&gt;
&lt;li&gt;Create 2 tap interfaces for each end point, and 3 from the router. One each for SSH/control, and the others for the test flows. Then create 3 bridges, the first includes all of the control tap interfaces, and your hosts’ real interface. This allows the guests to reach the internet to download packages etc. The other two bridges form the connections between the three VMs&lt;/li&gt;
&lt;li&gt;The creation and configuration of the VMs is documented in detail&lt;/li&gt;
&lt;li&gt;I used a setup very similar to this for teaching the basics of how TCP works when I was teaching at a local community college
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/pr1ntf/status/817895393824382976" target="_blank" rel="nofollow noopener"&gt;Plan9 on Bhyve&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2832" target="_blank" rel="nofollow noopener"&gt;Get your name in the relayd book&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.tedunangst.com/flak/post/2016-computer-review" target="_blank" rel="nofollow noopener"&gt;Ted Unangst’s 2016 Computer Reviews &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://developeronfire.com/episode-198-bryan-cantrill-persistence-and-action" target="_blank" rel="nofollow noopener"&gt;Bryan Cantrill on Developer On Fire podcast &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://dev.bsdrp.net/benchs/2016.SM5018A-FTN4-Chelsio.png" target="_blank" rel="nofollow noopener"&gt;2016 in review: pf/ipfw's impact on forwarding performance over time, on 8 core Atom &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/johalun/status/819039940914778112" target="_blank" rel="nofollow noopener"&gt;#Wayland Weston with X and EGL clients, running on #FreeBSD in VBox with new scfb backend. More coming soon! &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/A0LSipCj" target="_blank" rel="nofollow noopener"&gt; Eddy - TRIM Partitioning&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/UE1k4Q99" target="_blank" rel="nofollow noopener"&gt; Matt - Why FreeBSD?&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/TjTkqHA4" target="_blank" rel="nofollow noopener"&gt; Shawn - ZFS Horror?&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Baxd6Pjy" target="_blank" rel="nofollow noopener"&gt; Andrew - Bootloaders&lt;/a&gt; 

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://allanjude.com/talks/AsiaBSDCon2016_geliboot_pdf1a.pdf" target="_blank" rel="nofollow noopener"&gt;GELIBoot Paper &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/arch-handbook/boot.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Architecture Handbook&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/NygwchFD" target="_blank" rel="nofollow noopener"&gt; Bryan - ZFS Error&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Another exciting week on BSDNow, we are queued up with LLVM / Linking news, a look at NetBSD’s scheduler,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" <br>
title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://llvm.org/bugs/show_bug.cgi?id=23214#c40" rel="nofollow">FreeBSD Kernel and World, and many Ports, can now be linked with lld</a></h3>

<ul>
<li>“With this change applied I can link the entirety of the FreeBSD/amd64 base system (userland world and kernel) with LLD.”</li>
<li>“Rafael&#39;s done an initial experimental Poudriere FreeBSD package build with lld head, and found almost 20K out of 26K ports built successfully. I&#39;m now looking at getting CI running to test this on an ongoing basis. But, I think we&#39;re at the point where an experimental build makes sense.”</li>
<li>Such testing will become much easier once llvm 4.0 is imported into -current</li>
<li>“I suggest that during development we collect patches in a local git repo -- for example, I&#39;ve started here for my Poudriere run <a href="https://github.com/emaste/freebsd-ports/commits/ports-lld%E2%80%9D" rel="nofollow">https://github.com/emaste/freebsd-ports/commits/ports-lld”</a> </li>
<li>“It now looks like libtool is responsible for the majority of my failed / skipped ports. Unless we really think we&#39;ll add &quot;not GNU&quot; and other hacks to lld we&#39;re going to have to address libtool limitations upstream and in the FreeBSD tree. I did look into libtool a few weeks ago, but unfortunately haven&#39;t yet managed to produce a patch suitable for sending upstream.”</li>
<li>If you are interested in LLVM/Clang/LLD/LLDB etc, check out: <a href="http://blog.regehr.org/archives/1453" rel="nofollow">A Tourist’s Guide to the LLVM Source Code </a> 
***</li>
</ul>

<h3><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20170109_2108.html" rel="nofollow">Documenting NetBSD&#39;s scheduler tweaks</a></h3>

<ul>
<li>A followup to our previous coverage of improvements to the scheduler in NetBSD</li>
<li>“NetBSD&#39;s scheduler was recently changed to better distribute load of long-running processes on multiple CPUs. So far, the associated sysctl tweaks were not documented, and this was changed now, documenting the kern.sched sysctls.”</li>
<li>kern.sched.cacheht_time (dynamic): Cache hotness time in which a LWP is kept on one particular CPU and not moved to another CPU. This reduces the overhead of flushing and reloading caches.  Defaults to 3ms.  Needs to be given in ``hz&#39;&#39; units, see mstohz(9).</li>
<li>kern.sched.balance_period (dynamic): Interval at which the CPU queues are checked for re-balancing.  Defaults to 300ms.</li>
<li>kern.sched.min_catch (dynamic): Minimum count of migratable (runable) threads for catching (stealing) from another CPU.  Defaults to 1 but can be increased to decrease chance of thread migration between CPUs.</li>
<li>It is important to have good documentation for these tunables, so that users can understand what it is they are adjusting
***</li>
</ul>

<h3><a href="http://codeghar.com/blog/freebsd-network-gateway-on-edgerouter-lite.html" rel="nofollow">FreeBSD Network Gateway on EdgeRouter Lite</a></h3>

<ul>
<li>“EdgeRouter Lite is a great device to run at the edge of a home network. It becomes even better when it&#39;s running FreeBSD. This guide documents how to setup such a gateway. There are accompanying git repos to somewhat automate the process as well.”</li>
<li>“Colin Percival has written a great blog post on the subject, titled <a href="http://www.daemonology.net/blog/2016-01-10-FreeBSD-EdgeRouter-Lite.html" rel="nofollow">FreeBSD on EdgeRouter Lite - no serial port required</a> . In it he provides and describes a shell script to build a bootable image of FreeBSD to be run on ERL, available from GitHub in the <a href="https://github.com/cperciva/freebsd-ERL-build/" rel="nofollow">freebsd-ERL-build</a>  repo. I have built a Vagrant-based workflow to automate the building of the drive image. It&#39;s available on GitHub in the <a href="https://github.com/hamzasheikh/freebsd-edgerouterlite-ansible" rel="nofollow">freebsd-edgerouterlite-ansible</a>  repo. It uses the build script Percival wrote.”</li>
<li>“Once you&#39;ve built the disk image it&#39;s time to write it to a USB drive. There are two options: overwrite the original drive in the ERL or buy a new drive. I tried the second option first and wrote to a new Sandrive Ultra Fit 32GB USB 3.0 Flash Drive (SDCZ43-032G-GAM46). It did not work and I later found on some blog that those drives do not work. I have not tried another third party drive since.”</li>
<li>The tutorial covers all of the steps, and the configuration files, including rc.conf, IP configuration, DHCP (and v6), pf, and DNS (unbound)</li>
<li>“I&#39;m pretty happy with ERL and FreeBSD. There is great community documentation on how to configure all the pieces of software that make a FreeBSD-based home network gateway possible. I can tweak things as needed and upgrade when newer versions become available.”</li>
<li>“My plan on upgrading the base OS is to get a third party USB drive that works, write a newer FreeBSD image to it, and replace the drive in the ERL enclosure. This way I can keep a bunch of drives in rotation. Upgrades to newer builds or reverts to last known good version are as easy as swapping USB drives.”</li>
<li>Although something more nanobsd style with 2 partitions on the one drive might be easier.</li>
<li>“Configuration with Ansible means I don&#39;t have to manually do things again and again. As the configs change they&#39;ll be tracked in git so I get version control as well. ERL is simply a great piece of network hardware. I&#39;m tempted to try Ubiquiti&#39;s WiFi products instead of a mixture of DD-WRT and OpenWRT devices I have now. But that is for another day and perhaps another blog post.”
***</li>
</ul>

<h3><a href="https://github.com/michipili/bsdowl" rel="nofollow">A highly portable build system targeting modern UNIX systems</a></h3>

<ul>
<li>An exciting new/old project is up on GitHub that we wanted to bring your attention to.</li>
<li><p>BSD Owl is a highly portable build-system based around BSD Make that supports a variety of popular (and not so popular) languages, such as:</p>

<ul>
<li>C programs, compiled for several targets</li>
<li>C libraries, static and shared, compiled for several targets</li>
<li>Shell scripts</li>
<li>Python scripts</li>
<li>OCaml programs</li>
<li>OCaml libraries, with ocamldoc documentation</li>
<li>OCaml plugins</li>
<li>TeX documents, prepared for several printing devices</li>
<li>METAPOST figures, with output as PDF, PS, SVG or PNG, either as part of a TeX document or as standalone documents</li>
</ul></li>
<li><p>What about features you may ask? Well BSD Owl has plenty of those to go around:</p>

<ul>
<li>Support of compilation profiles</li>
<li>Support of the parallel mode (at the directory level)</li>
<li>Support of separate trees for sources and objects</li>
<li>Support of architecture-dependant compilation options</li>
<li>Support GNU autoconf</li>
<li>Production of GPG-signed tarballs</li>
<li>Developer subshell, empowered with project-specific scripts</li>
<li>Literate programming using noweb</li>
<li>Preprocessing with m4</li>
</ul></li>
<li><p>As far as platform support goes, BSD Owl is tested on OSX / Debian Jesse and FreeBSD &gt; 9. Future support for OpenBSD and NetBSD is planned, once they update their respective BSD Make binaries to more modern versions</p>

<hr></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://marc.info/?l=openbsd-tech&m=148342051832692&w=2" rel="nofollow">find -delete in OpenBSD. Thanks to tedu@ OpenBSD will have this very handy flag to in the future.</a></h3>

<ul>
<li>OpenBSD’s find(1) utility will now support the -delete operation</li>
<li>“This option is not posix (not like that&#39;s stopped find accumulating a dozen extensions), but it is in gnu and freebsd (for 20 years). it&#39;s also somewhat popular among sysadmins and blogs, etc. and perhaps most importantly, it nicely solves one of the more troublesome caveats of find (which the man page actually covers twice because it&#39;s so common and easy to screw up). So I think it makes a good addition.”</li>
<li>The actual code was borrowed from FreeBSD</li>
<li>Using the -delete option is much more performant than forking rm once for each file, and safer because there is no risk of mangling path names</li>
<li>If you encounter a system without a -delete option, your best bet is to use the -print0 option of find, which will print each filename terminated by a null byte, and pipe that into xargs -0 rm</li>
<li>This avoids any ambiguity caused by files with spaces in the names
***</li>
</ul>

<h3><a href="https://lumina-desktop.org/version-1-2-0-released/" rel="nofollow">New version of the Lumina desktop released</a></h3>

<ul>
<li>Just in time to kickoff 2017 we have a new release of Lumina Desktop (1.2.0)</li>
<li><p>Some of the notable changes include fixes to make it easier to port to other platforms, and some features:</p></li>
<li><p>New Panel Plugins:</p>

<ul>
<li>“audioplayer” (panel version of the desktop plugin with the same name): Allows the user to load/play audio files directly through the desktop itself.</li>
<li>“jsonmenu” (panel version of the menu plugin with the same name): Allows an external utility/script to be used to generate a menu/contents on demand.</li>
</ul></li>
<li><p>New Menu Plugins:</p>

<ul>
<li>“lockdesktop”: Menu option for instantly locking the desktop session.</li>
</ul></li>
<li><p>New Utilities:</p>

<ul>
<li><code>lumina-archiver</code>: This is a pure Qt5 front-end to the “tar” utility for managing/creating archives. This can also use the <code>dd</code> utility to burn a “*.img” file to a USB device for booting.“</li>
</ul></li>
<li><p>Looks like the news already made its rounds to a few different sites, with Phoronix and Softpedia picking it up as well</p></li>
<li><p><a href="http://www.phoronix.com/scan.php?page=news_item&px=Lumina-1.2-Released" rel="nofollow">Phoronix</a></p></li>
<li><p><a href="http://news.softpedia.com/news/lumina-1-2-desktop-environments-launches-for-trueos-with-various-enhancements-511495.shtml" rel="nofollow">Softpedia </a></p></li>
<li><p>TrueOS users running the latest updates are already on the pre-release version of 1.2.1, so nothing has to be done there to get the latest and greatest.</p>

<hr></li>
</ul>

<h3><a href="http://www.vidarholen.net/contents/blog/?p=479" rel="nofollow">dd is not a disk writing tool</a></h3>

<ul>
<li>“If you’ve ever used dd, you’ve probably used it to read or write disk images:”
&gt; # Write myfile.iso to a USB drive
&gt; dd if=myfile.iso of=/dev/sdb bs=1M</li>
<li>“Usage of dd in this context is so pervasive that it’s being hailed as the magic gatekeeper of raw devices. Want to read from a raw device? Use dd. Want to write to a raw device? Use dd. This belief can make simple tasks complicated. How do you combine dd with gzip? How do you use pv if the source is raw device? How do you dd over ssh?”</li>
<li>“The fact of the matter is, dd is not a disk writing tool. Neither “d” is for “disk”, “drive” or “device”. It does not support “low level” reading or writing. It has no special dominion over any kind of device whatsoever.”</li>
<li>Then a number of alternatives are discussed</li>
<li>“However, this does not mean that dd is useless! The reason why people started using it in the first place is that it does exactly what it’s told, no more and no less. If an alias specifies -a, cp might try to create a new block device rather than a copy of the file data. If using gzip without redirection, it may try to be helpful and skip the file for not being regular. Neither of them will write out a reassuring status during or after a copy.”</li>
<li>“dd, meanwhile, has one job*: copy data from one place to another. It doesn’t care about files, safeguards or user convenience. It will not try to second guess your intent, based on trailing slashes or types of files. When this is no longer a convenience, like when combining it with other tools that already read and write files, one should not feel guilty for leaving dd out entirely.”</li>
<li>“dd is the swiss army knife of the open, read, write and seek syscalls. It’s unique in its ability to issue seeks and reads of specific lengths, which enables a whole world of shell scripts that have no business being shell scripts. Want to simulate a lseek+execve? Use dd! Want to open a file with O_SYNC? Use dd! Want to read groups of three byte pixels from a PPM file? Use dd!”</li>
<li>“It’s a flexible, unique and useful tool, and I love it. My only issue is that, far too often, this great tool is being relegated to and inappropriately hailed for its most generic and least interesting capability: simply copying a file from start to finish.”</li>
<li>“dd actually has two jobs: Convert and Copy. Legend has it that the intended name, “cc”, was taken by the C compiler, so the letters were shifted by one to give “dd”. This is also why we ended up with a Window system called X.”</li>
<li><a href="https://eriknstr.github.io/utils/dd-countdown.htm" rel="nofollow">dd countdown</a> 
***</li>
</ul>

<h3><a href="https://www.strugglingcoder.info/index.php/bhyve-setup-for-tcp-testing/" rel="nofollow">Bhyve setup for tcp testing </a></h3>

<ul>
<li>FreeBSD Developer Hiren Panchasara writes about his setup to use bhyve to test changes to the TCP stack in FreeBSD</li>
<li>“Here is how I test simple FreeBSD tcp changes with dummynet on bhyve. I’ve already wrote down <a href="https://www.strugglingcoder.info/index.php/drop-a-packet/" rel="nofollow">how I do dummynet</a> so I’ll focus on bhyve part.”</li>
<li>“A few months back when I started looking into improving FreeBSD TCP’s response to packet loss, I looked around for traffic simulators which can do deterministic packet drop for me.”</li>
<li>“I had used dummynet(4) before so I thought of using it but the problem is that it only provided probabilistic drops. You can specify dropping 10% of the total packets”</li>
<li>So he wrote a quick hack, hopefully he’ll polish it up and get it committed</li>
<li>“Setup: I’ll create 3 bhyve guests: client, router and server” </li>
<li>“Both client and server need their routing tables setup correctly so that they can reach each other. The Dummynet node is the router / traffic shaping node here. We need to enable forwarding between interfaces: sysctl net.inet.ip.forwarding=1”</li>
<li>“We need to setup links (called ‘pipes’) and their parameters on dummynet node”</li>
<li>“For simulations, I run a lighttpd web-server on the server which serves different sized objects and I request them via curl or wget from the client. I have tcpdump running on any/all of four interfaces involved to observe traffic and I can see specified packets getting dropped by dummynet. sysctl net.inet.ip.dummynet.io_pkt_drop is incremented with each packet that dummynet drops.”</li>
<li>“Here, 192.* addresses are for ssh and 10.* are for guests to be able to communicate within themselves.”</li>
<li>Create 2 tap interfaces for each end point, and 3 from the router. One each for SSH/control, and the others for the test flows. Then create 3 bridges, the first includes all of the control tap interfaces, and your hosts’ real interface. This allows the guests to reach the internet to download packages etc. The other two bridges form the connections between the three VMs</li>
<li>The creation and configuration of the VMs is documented in detail</li>
<li>I used a setup very similar to this for teaching the basics of how TCP works when I was teaching at a local community college
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://twitter.com/pr1ntf/status/817895393824382976" rel="nofollow">Plan9 on Bhyve</a></p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2832" rel="nofollow">Get your name in the relayd book</a> </p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/2016-computer-review" rel="nofollow">Ted Unangst’s 2016 Computer Reviews </a> </p></li>
<li><p><a href="http://developeronfire.com/episode-198-bryan-cantrill-persistence-and-action" rel="nofollow">Bryan Cantrill on Developer On Fire podcast </a> </p></li>
<li><p><a href="http://dev.bsdrp.net/benchs/2016.SM5018A-FTN4-Chelsio.png" rel="nofollow">2016 in review: pf/ipfw&#39;s impact on forwarding performance over time, on 8 core Atom </a> </p></li>
<li><p><a href="https://twitter.com/johalun/status/819039940914778112" rel="nofollow">#Wayland Weston with X and EGL clients, running on #FreeBSD in VBox with new scfb backend. More coming soon! </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/A0LSipCj" rel="nofollow"> Eddy - TRIM Partitioning</a> </li>
<li><a href="http://pastebin.com/UE1k4Q99" rel="nofollow"> Matt - Why FreeBSD?</a> </li>
<li><a href="http://pastebin.com/TjTkqHA4" rel="nofollow"> Shawn - ZFS Horror?</a> </li>
<li><a href="http://pastebin.com/Baxd6Pjy" rel="nofollow"> Andrew - Bootloaders</a> 

<ul>
<li><a href="http://allanjude.com/talks/AsiaBSDCon2016_geliboot_pdf1a.pdf" rel="nofollow">GELIBoot Paper </a></li>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/arch-handbook/boot.html" rel="nofollow">FreeBSD Architecture Handbook</a></li>
</ul></li>
<li><a href="http://pastebin.com/NygwchFD" rel="nofollow"> Bryan - ZFS Error</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Another exciting week on BSDNow, we are queued up with LLVM / Linking news, a look at NetBSD’s scheduler,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" <br>
title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://llvm.org/bugs/show_bug.cgi?id=23214#c40" rel="nofollow">FreeBSD Kernel and World, and many Ports, can now be linked with lld</a></h3>

<ul>
<li>“With this change applied I can link the entirety of the FreeBSD/amd64 base system (userland world and kernel) with LLD.”</li>
<li>“Rafael&#39;s done an initial experimental Poudriere FreeBSD package build with lld head, and found almost 20K out of 26K ports built successfully. I&#39;m now looking at getting CI running to test this on an ongoing basis. But, I think we&#39;re at the point where an experimental build makes sense.”</li>
<li>Such testing will become much easier once llvm 4.0 is imported into -current</li>
<li>“I suggest that during development we collect patches in a local git repo -- for example, I&#39;ve started here for my Poudriere run <a href="https://github.com/emaste/freebsd-ports/commits/ports-lld%E2%80%9D" rel="nofollow">https://github.com/emaste/freebsd-ports/commits/ports-lld”</a> </li>
<li>“It now looks like libtool is responsible for the majority of my failed / skipped ports. Unless we really think we&#39;ll add &quot;not GNU&quot; and other hacks to lld we&#39;re going to have to address libtool limitations upstream and in the FreeBSD tree. I did look into libtool a few weeks ago, but unfortunately haven&#39;t yet managed to produce a patch suitable for sending upstream.”</li>
<li>If you are interested in LLVM/Clang/LLD/LLDB etc, check out: <a href="http://blog.regehr.org/archives/1453" rel="nofollow">A Tourist’s Guide to the LLVM Source Code </a> 
***</li>
</ul>

<h3><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20170109_2108.html" rel="nofollow">Documenting NetBSD&#39;s scheduler tweaks</a></h3>

<ul>
<li>A followup to our previous coverage of improvements to the scheduler in NetBSD</li>
<li>“NetBSD&#39;s scheduler was recently changed to better distribute load of long-running processes on multiple CPUs. So far, the associated sysctl tweaks were not documented, and this was changed now, documenting the kern.sched sysctls.”</li>
<li>kern.sched.cacheht_time (dynamic): Cache hotness time in which a LWP is kept on one particular CPU and not moved to another CPU. This reduces the overhead of flushing and reloading caches.  Defaults to 3ms.  Needs to be given in ``hz&#39;&#39; units, see mstohz(9).</li>
<li>kern.sched.balance_period (dynamic): Interval at which the CPU queues are checked for re-balancing.  Defaults to 300ms.</li>
<li>kern.sched.min_catch (dynamic): Minimum count of migratable (runable) threads for catching (stealing) from another CPU.  Defaults to 1 but can be increased to decrease chance of thread migration between CPUs.</li>
<li>It is important to have good documentation for these tunables, so that users can understand what it is they are adjusting
***</li>
</ul>

<h3><a href="http://codeghar.com/blog/freebsd-network-gateway-on-edgerouter-lite.html" rel="nofollow">FreeBSD Network Gateway on EdgeRouter Lite</a></h3>

<ul>
<li>“EdgeRouter Lite is a great device to run at the edge of a home network. It becomes even better when it&#39;s running FreeBSD. This guide documents how to setup such a gateway. There are accompanying git repos to somewhat automate the process as well.”</li>
<li>“Colin Percival has written a great blog post on the subject, titled <a href="http://www.daemonology.net/blog/2016-01-10-FreeBSD-EdgeRouter-Lite.html" rel="nofollow">FreeBSD on EdgeRouter Lite - no serial port required</a> . In it he provides and describes a shell script to build a bootable image of FreeBSD to be run on ERL, available from GitHub in the <a href="https://github.com/cperciva/freebsd-ERL-build/" rel="nofollow">freebsd-ERL-build</a>  repo. I have built a Vagrant-based workflow to automate the building of the drive image. It&#39;s available on GitHub in the <a href="https://github.com/hamzasheikh/freebsd-edgerouterlite-ansible" rel="nofollow">freebsd-edgerouterlite-ansible</a>  repo. It uses the build script Percival wrote.”</li>
<li>“Once you&#39;ve built the disk image it&#39;s time to write it to a USB drive. There are two options: overwrite the original drive in the ERL or buy a new drive. I tried the second option first and wrote to a new Sandrive Ultra Fit 32GB USB 3.0 Flash Drive (SDCZ43-032G-GAM46). It did not work and I later found on some blog that those drives do not work. I have not tried another third party drive since.”</li>
<li>The tutorial covers all of the steps, and the configuration files, including rc.conf, IP configuration, DHCP (and v6), pf, and DNS (unbound)</li>
<li>“I&#39;m pretty happy with ERL and FreeBSD. There is great community documentation on how to configure all the pieces of software that make a FreeBSD-based home network gateway possible. I can tweak things as needed and upgrade when newer versions become available.”</li>
<li>“My plan on upgrading the base OS is to get a third party USB drive that works, write a newer FreeBSD image to it, and replace the drive in the ERL enclosure. This way I can keep a bunch of drives in rotation. Upgrades to newer builds or reverts to last known good version are as easy as swapping USB drives.”</li>
<li>Although something more nanobsd style with 2 partitions on the one drive might be easier.</li>
<li>“Configuration with Ansible means I don&#39;t have to manually do things again and again. As the configs change they&#39;ll be tracked in git so I get version control as well. ERL is simply a great piece of network hardware. I&#39;m tempted to try Ubiquiti&#39;s WiFi products instead of a mixture of DD-WRT and OpenWRT devices I have now. But that is for another day and perhaps another blog post.”
***</li>
</ul>

<h3><a href="https://github.com/michipili/bsdowl" rel="nofollow">A highly portable build system targeting modern UNIX systems</a></h3>

<ul>
<li>An exciting new/old project is up on GitHub that we wanted to bring your attention to.</li>
<li><p>BSD Owl is a highly portable build-system based around BSD Make that supports a variety of popular (and not so popular) languages, such as:</p>

<ul>
<li>C programs, compiled for several targets</li>
<li>C libraries, static and shared, compiled for several targets</li>
<li>Shell scripts</li>
<li>Python scripts</li>
<li>OCaml programs</li>
<li>OCaml libraries, with ocamldoc documentation</li>
<li>OCaml plugins</li>
<li>TeX documents, prepared for several printing devices</li>
<li>METAPOST figures, with output as PDF, PS, SVG or PNG, either as part of a TeX document or as standalone documents</li>
</ul></li>
<li><p>What about features you may ask? Well BSD Owl has plenty of those to go around:</p>

<ul>
<li>Support of compilation profiles</li>
<li>Support of the parallel mode (at the directory level)</li>
<li>Support of separate trees for sources and objects</li>
<li>Support of architecture-dependant compilation options</li>
<li>Support GNU autoconf</li>
<li>Production of GPG-signed tarballs</li>
<li>Developer subshell, empowered with project-specific scripts</li>
<li>Literate programming using noweb</li>
<li>Preprocessing with m4</li>
</ul></li>
<li><p>As far as platform support goes, BSD Owl is tested on OSX / Debian Jesse and FreeBSD &gt; 9. Future support for OpenBSD and NetBSD is planned, once they update their respective BSD Make binaries to more modern versions</p>

<hr></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://marc.info/?l=openbsd-tech&m=148342051832692&w=2" rel="nofollow">find -delete in OpenBSD. Thanks to tedu@ OpenBSD will have this very handy flag to in the future.</a></h3>

<ul>
<li>OpenBSD’s find(1) utility will now support the -delete operation</li>
<li>“This option is not posix (not like that&#39;s stopped find accumulating a dozen extensions), but it is in gnu and freebsd (for 20 years). it&#39;s also somewhat popular among sysadmins and blogs, etc. and perhaps most importantly, it nicely solves one of the more troublesome caveats of find (which the man page actually covers twice because it&#39;s so common and easy to screw up). So I think it makes a good addition.”</li>
<li>The actual code was borrowed from FreeBSD</li>
<li>Using the -delete option is much more performant than forking rm once for each file, and safer because there is no risk of mangling path names</li>
<li>If you encounter a system without a -delete option, your best bet is to use the -print0 option of find, which will print each filename terminated by a null byte, and pipe that into xargs -0 rm</li>
<li>This avoids any ambiguity caused by files with spaces in the names
***</li>
</ul>

<h3><a href="https://lumina-desktop.org/version-1-2-0-released/" rel="nofollow">New version of the Lumina desktop released</a></h3>

<ul>
<li>Just in time to kickoff 2017 we have a new release of Lumina Desktop (1.2.0)</li>
<li><p>Some of the notable changes include fixes to make it easier to port to other platforms, and some features:</p></li>
<li><p>New Panel Plugins:</p>

<ul>
<li>“audioplayer” (panel version of the desktop plugin with the same name): Allows the user to load/play audio files directly through the desktop itself.</li>
<li>“jsonmenu” (panel version of the menu plugin with the same name): Allows an external utility/script to be used to generate a menu/contents on demand.</li>
</ul></li>
<li><p>New Menu Plugins:</p>

<ul>
<li>“lockdesktop”: Menu option for instantly locking the desktop session.</li>
</ul></li>
<li><p>New Utilities:</p>

<ul>
<li><code>lumina-archiver</code>: This is a pure Qt5 front-end to the “tar” utility for managing/creating archives. This can also use the <code>dd</code> utility to burn a “*.img” file to a USB device for booting.“</li>
</ul></li>
<li><p>Looks like the news already made its rounds to a few different sites, with Phoronix and Softpedia picking it up as well</p></li>
<li><p><a href="http://www.phoronix.com/scan.php?page=news_item&px=Lumina-1.2-Released" rel="nofollow">Phoronix</a></p></li>
<li><p><a href="http://news.softpedia.com/news/lumina-1-2-desktop-environments-launches-for-trueos-with-various-enhancements-511495.shtml" rel="nofollow">Softpedia </a></p></li>
<li><p>TrueOS users running the latest updates are already on the pre-release version of 1.2.1, so nothing has to be done there to get the latest and greatest.</p>

<hr></li>
</ul>

<h3><a href="http://www.vidarholen.net/contents/blog/?p=479" rel="nofollow">dd is not a disk writing tool</a></h3>

<ul>
<li>“If you’ve ever used dd, you’ve probably used it to read or write disk images:”
&gt; # Write myfile.iso to a USB drive
&gt; dd if=myfile.iso of=/dev/sdb bs=1M</li>
<li>“Usage of dd in this context is so pervasive that it’s being hailed as the magic gatekeeper of raw devices. Want to read from a raw device? Use dd. Want to write to a raw device? Use dd. This belief can make simple tasks complicated. How do you combine dd with gzip? How do you use pv if the source is raw device? How do you dd over ssh?”</li>
<li>“The fact of the matter is, dd is not a disk writing tool. Neither “d” is for “disk”, “drive” or “device”. It does not support “low level” reading or writing. It has no special dominion over any kind of device whatsoever.”</li>
<li>Then a number of alternatives are discussed</li>
<li>“However, this does not mean that dd is useless! The reason why people started using it in the first place is that it does exactly what it’s told, no more and no less. If an alias specifies -a, cp might try to create a new block device rather than a copy of the file data. If using gzip without redirection, it may try to be helpful and skip the file for not being regular. Neither of them will write out a reassuring status during or after a copy.”</li>
<li>“dd, meanwhile, has one job*: copy data from one place to another. It doesn’t care about files, safeguards or user convenience. It will not try to second guess your intent, based on trailing slashes or types of files. When this is no longer a convenience, like when combining it with other tools that already read and write files, one should not feel guilty for leaving dd out entirely.”</li>
<li>“dd is the swiss army knife of the open, read, write and seek syscalls. It’s unique in its ability to issue seeks and reads of specific lengths, which enables a whole world of shell scripts that have no business being shell scripts. Want to simulate a lseek+execve? Use dd! Want to open a file with O_SYNC? Use dd! Want to read groups of three byte pixels from a PPM file? Use dd!”</li>
<li>“It’s a flexible, unique and useful tool, and I love it. My only issue is that, far too often, this great tool is being relegated to and inappropriately hailed for its most generic and least interesting capability: simply copying a file from start to finish.”</li>
<li>“dd actually has two jobs: Convert and Copy. Legend has it that the intended name, “cc”, was taken by the C compiler, so the letters were shifted by one to give “dd”. This is also why we ended up with a Window system called X.”</li>
<li><a href="https://eriknstr.github.io/utils/dd-countdown.htm" rel="nofollow">dd countdown</a> 
***</li>
</ul>

<h3><a href="https://www.strugglingcoder.info/index.php/bhyve-setup-for-tcp-testing/" rel="nofollow">Bhyve setup for tcp testing </a></h3>

<ul>
<li>FreeBSD Developer Hiren Panchasara writes about his setup to use bhyve to test changes to the TCP stack in FreeBSD</li>
<li>“Here is how I test simple FreeBSD tcp changes with dummynet on bhyve. I’ve already wrote down <a href="https://www.strugglingcoder.info/index.php/drop-a-packet/" rel="nofollow">how I do dummynet</a> so I’ll focus on bhyve part.”</li>
<li>“A few months back when I started looking into improving FreeBSD TCP’s response to packet loss, I looked around for traffic simulators which can do deterministic packet drop for me.”</li>
<li>“I had used dummynet(4) before so I thought of using it but the problem is that it only provided probabilistic drops. You can specify dropping 10% of the total packets”</li>
<li>So he wrote a quick hack, hopefully he’ll polish it up and get it committed</li>
<li>“Setup: I’ll create 3 bhyve guests: client, router and server” </li>
<li>“Both client and server need their routing tables setup correctly so that they can reach each other. The Dummynet node is the router / traffic shaping node here. We need to enable forwarding between interfaces: sysctl net.inet.ip.forwarding=1”</li>
<li>“We need to setup links (called ‘pipes’) and their parameters on dummynet node”</li>
<li>“For simulations, I run a lighttpd web-server on the server which serves different sized objects and I request them via curl or wget from the client. I have tcpdump running on any/all of four interfaces involved to observe traffic and I can see specified packets getting dropped by dummynet. sysctl net.inet.ip.dummynet.io_pkt_drop is incremented with each packet that dummynet drops.”</li>
<li>“Here, 192.* addresses are for ssh and 10.* are for guests to be able to communicate within themselves.”</li>
<li>Create 2 tap interfaces for each end point, and 3 from the router. One each for SSH/control, and the others for the test flows. Then create 3 bridges, the first includes all of the control tap interfaces, and your hosts’ real interface. This allows the guests to reach the internet to download packages etc. The other two bridges form the connections between the three VMs</li>
<li>The creation and configuration of the VMs is documented in detail</li>
<li>I used a setup very similar to this for teaching the basics of how TCP works when I was teaching at a local community college
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://twitter.com/pr1ntf/status/817895393824382976" rel="nofollow">Plan9 on Bhyve</a></p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2832" rel="nofollow">Get your name in the relayd book</a> </p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/2016-computer-review" rel="nofollow">Ted Unangst’s 2016 Computer Reviews </a> </p></li>
<li><p><a href="http://developeronfire.com/episode-198-bryan-cantrill-persistence-and-action" rel="nofollow">Bryan Cantrill on Developer On Fire podcast </a> </p></li>
<li><p><a href="http://dev.bsdrp.net/benchs/2016.SM5018A-FTN4-Chelsio.png" rel="nofollow">2016 in review: pf/ipfw&#39;s impact on forwarding performance over time, on 8 core Atom </a> </p></li>
<li><p><a href="https://twitter.com/johalun/status/819039940914778112" rel="nofollow">#Wayland Weston with X and EGL clients, running on #FreeBSD in VBox with new scfb backend. More coming soon! </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/A0LSipCj" rel="nofollow"> Eddy - TRIM Partitioning</a> </li>
<li><a href="http://pastebin.com/UE1k4Q99" rel="nofollow"> Matt - Why FreeBSD?</a> </li>
<li><a href="http://pastebin.com/TjTkqHA4" rel="nofollow"> Shawn - ZFS Horror?</a> </li>
<li><a href="http://pastebin.com/Baxd6Pjy" rel="nofollow"> Andrew - Bootloaders</a> 

<ul>
<li><a href="http://allanjude.com/talks/AsiaBSDCon2016_geliboot_pdf1a.pdf" rel="nofollow">GELIBoot Paper </a></li>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/arch-handbook/boot.html" rel="nofollow">FreeBSD Architecture Handbook</a></li>
</ul></li>
<li><a href="http://pastebin.com/NygwchFD" rel="nofollow"> Bryan - ZFS Error</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>175: How the Dtrace saved Christmas</title>
  <link>https://www.bsdnow.tv/175</link>
  <guid isPermaLink="false">4c57b68b-aac0-41b5-b068-d8172ea3bfb7</guid>
  <pubDate>Wed, 04 Jan 2017 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4c57b68b-aac0-41b5-b068-d8172ea3bfb7.mp3" length="70191796" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we’ve got all sorts of post-holiday goodies to share. New OpenSSL APIs, Dtrace, OpenBSD</itunes:subtitle>
  <itunes:duration>1:37:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we’ve got all sorts of post-holiday goodies to share. New OpenSSL APIs, Dtrace, OpenBSD&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/tech@openbsd.org/msg36437.html" target="_blank" rel="nofollow noopener"&gt;OpenSSL 1.1 API migration path, or the lack thereof&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; As many of you will already be aware, the OpenSSL 1.1.0 release intentionally introduced significant API changes from the previous release. In summary, a large number of data structures that were previously publically visible have been made opaque, with accessor functions being added in order to get and set some of the fields within these now opaque structs. It is worth noting that the use of opaque data structures is generally beneficial for libraries, since changes can be made to these data structures without breaking the ABI. As such, the overall direction of these changes is largely reasonable.&lt;/p&gt;

&lt;p&gt;&amp;gt; However, while API change is generally necessary for progression, in this case it would appear that there is NO transition plan and a complete disregard for the impact that these changes would have on the overall open source ecosystem.&lt;/p&gt;

&lt;p&gt;&amp;gt; So far it seems that the only approach is to place the migration burden onto each and every software project that uses OpenSSL, pushing significant code changes to each project that migrates to OpenSSL 1.1, while maintaining compatibility with the previous API. This is forcing each project to provide their own backwards compatibility shims, which is practically guaranteeing that there will be a proliferation of variable quality implementations; it is almost a certainty that some of these will contain bugs, potentially introducing security issues or memory leaks.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I think this will be a bigger issue for other operating systems that do not have the flexibility of the ports tree to deliver a newer version of OpenSSL. If a project switches from the old API to the new API, and the OS only provides the older branch of OpenSSL, how can the application work?&lt;/li&gt;
&lt;li&gt;Of course, this leaves the issue, if application A wants OpenSSL 1.0, and application B only works with OpenSSL 1.1, how does that work?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Due to a number of factors, software projects that make use of OpenSSL cannot simply migrate to the 1.1 API and drop support for the 1.0 API - in most cases they will need to continue to support both. Firstly, I am not aware of any platform that has shipped a production release with OpenSSL 1.1 - any software that supported OpenSSL 1.1 only, would effectively be unusable on every platform for the time being. Secondly, the OpenSSL 1.0.2 release is supported until the 31st of December 2019, while OpenSSL 1.1.0 is only supported until the 31st of August 2018 - any LTS style release is clearly going to consider shipping with 1.0.2 as a result.&lt;/p&gt;

&lt;p&gt;&amp;gt; Platforms that are attempting to ship with OpenSSL 1.1 are already encountering significant challenges - for example, Debian currently has 257 packages (out of 518) that do not build against OpenSSL 1.1. There are also hidden gotchas for situations where different libraries are linked against different OpenSSL versions and then share OpenSSL data structures between them - many of these problems will be difficult to detect since they only fail at runtime.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;It will be interesting to see what happens with OpenSSL, and LibreSSL&lt;/li&gt;
&lt;li&gt;Hopefully, most projects will decide to switch to the cleaner APIs provided by s2n or libtls, although they do not provide the entire functionality of the OpenSSL API.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://news.ycombinator.com/item?id=13284648" target="_blank" rel="nofollow noopener"&gt;Hacker News comments&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/exfiltration-via-receive-timing" target="_blank" rel="nofollow noopener"&gt;exfiltration via receive timing&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Another similar way to create a backchannel but without transmitting anything is to introduce delays in the receiver and measure throughput as observed by the sender. All we need is a protocol with transmission control. Hmmm. Actually, it’s easier (and more reliable) to code this up using a plain pipe, but the same principle applies to networked transmissions.&lt;/p&gt;

&lt;p&gt;&amp;gt; For every digit we want to “send” back, we sleep a few seconds, then drain the pipe. We don’t care about the data, although if this were a video file or an OS update, we could probably do something useful with it.&lt;/p&gt;

&lt;p&gt;&amp;gt; Continuously fill the pipe with junk data. If (when) we block, calculate the difference between before and after. This is a our secret backchannel data. (The reader and writer use different buffer sizes because on OpenBSD at least, a writer will stay blocked even after a read depending on the space that opens up. Even simple demos have real world considerations.)&lt;/p&gt;

&lt;p&gt;&amp;gt; In this simple example, the secret data (argv) is shared by the processes, but we can see that the writer isn’t printing them from its own address space. Nevertheless, it works.&lt;/p&gt;

&lt;p&gt;&amp;gt; Time to add random delays and buffering to firewalls? Probably not.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An interesting thought experiment that shows just how many ways there are to covertly convey a message
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://news.ycombinator.com/item?id=13223351" target="_blank" rel="nofollow noopener"&gt;OpenBSD Desktop in about 30 Minutes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over at hackernews we have a very non-verbose, but handy guide to getting to a OpenBSD desktop in about 30 minutes!&lt;/li&gt;
&lt;li&gt;First, the guide will assume you’ve already installed OpenBSD 6.0, so you’ll need to at least be at the shell prompt of your freshly installed system to begin.&lt;/li&gt;
&lt;li&gt;With that, now its time to do some tuning. Editing some resource limits in login.conf will be our initial task, upping some datasize tunables to 2GB&lt;/li&gt;
&lt;li&gt;Next up, we will edit some of the default “doas” settings to something a bit more workable for desktop computing&lt;/li&gt;
&lt;li&gt;Another handy trick, editing your .profile to have your PKG_PATH variables set automatically will make&lt;/li&gt;
&lt;li&gt;One thing some folks may overlook, but disabling atime can speed disk performance (which you probably don’t care about atime on your desktop anyway), so this guide will show you what knobs to tweak in /etc/fstab to do so&lt;/li&gt;
&lt;li&gt;After some final WPA / Wifi configuration, we then drop to “mere mortal” mode and begin our package installations. In this particular guide, he will be setting up Lumina Desktop (Which yes, it is on OpenBSD)&lt;/li&gt;
&lt;li&gt;A few small tweaks later for xscreensaver and your xinitrc file, then you are ready to run “startx” and begin your desktop session!&lt;/li&gt;
&lt;li&gt;All in all, great guide which if you are fast can probably be done in even less than 30 minutes and will result in a rock-solid OpenBSD desktop rocking Lumina none-the-less.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://hackernoon.com/dtrace-at-home-145ba773371e" target="_blank" rel="nofollow noopener"&gt;How DTrace saved Christmas&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adam Leventhal, one of the co-creators of DTrace, wrote up this post about how he uses DTrace at home, to save Christmas&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I had been procrastinating making the family holiday card. It was a combination of having a lot on my plate and dreading the formulation of our annual note recapping the year; there were some great moments, but I’m glad I don’t have to do 2016 again. It was just before midnight and either I’d make the card that night or leave an empty space on our friends’ refrigerators.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Adobe Illustrator had other ideas: “Unable to set maximum number of files to be opened”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I’m not the first person to hit this. The problem seems to have existed since CS6 was released in 2016. None of the solutions were working for me, and — inspired by &lt;a href="https://medium.com/startup-grind/how-to-start-a-company-with-no-free-time-b70fbe7b918a#.uujdblxc6" target="_blank" rel="nofollow noopener"&gt;Sara Mauskopf’s excellent post&lt;/a&gt; — I was rapidly running out of the time bounds for the project. Enough; I’d just DTrace it.&lt;/p&gt;

&lt;p&gt;&amp;gt; A colleague scoffed the other day, “I mean, how often do you actually use DTrace?” In his mind DTrace was for big systems, critical system, when dollars and lives were at stake. My reply: I use DTrace every day. I can’t imagine developing software without DTrace, and I use it when my laptop (not infrequently) does something inexplicable (I’m forever grateful to the Apple team that ported it to Mac OS X)&lt;/p&gt;

&lt;p&gt;&amp;gt; Illustrator is failing on setrlimit(2) and blowing up as result. Let’s confirm that it is in fact returning -1:$ sudo dtrace -n 'syscall::setrlimit:return/execname == "Adobe Illustrato"/{ printf("%d %d", arg1, errno); }'&lt;br&gt;
&amp;gt;    dtrace: description 'syscall::setrlimit:return' matched 1 probe&lt;br&gt;
&amp;gt;    CPU     ID                    FUNCTION:NAME&lt;br&gt;
&amp;gt;      0    532                 setrlimit:return -1 1&lt;/p&gt;

&lt;p&gt;&amp;gt; There it is. And setrlimit(2) is failing with errno 1 which is EPERM (value too high for non-root user). I already tuned up the files limit pretty high. Let’s confirm that it is in fact setting the files limit and check the value to which it’s being set. To write this script I looked at the documentation for setrlimit(2) (hooray for man pages!) to determine that the position of the resource parameter (arg0) and the type of the value parameter (struct rlimit). I needed the DTrace copyin() subroutine to grab the structure from the process’s address space:&lt;br&gt;
&amp;gt; $ sudo dtrace -n 'syscall::setrlimit:entry/execname == "Adobe Illustrato"/{ this-&amp;gt;r = *(struct rlimit *)copyin(arg1, sizeof (struct rlimit)); printf("%x %x %x", arg0, this-&amp;gt;r.rlim_cur, this-&amp;gt;r.rlim_max);  }'&lt;br&gt;
&amp;gt;&lt;br&gt;
&amp;gt;    dtrace: description 'syscall::setrlimit:entry' matched 1 probe&lt;br&gt;
&amp;gt;    CPU     ID                FUNCTION:NAME&lt;br&gt;
&amp;gt;      0    531              setrlimit:entry 1008 2800 7fffffffffffffff&lt;br&gt;
&amp;gt; Looking through /usr/include/sys/resource.h we can see that 1008 corresponds to the number of files (RLIMIT_NOFILE | &lt;br&gt;
_RLIMIT_POSIX_FLAG)&lt;/p&gt;

&lt;p&gt;&amp;gt; The quickest solution was to use DTrace again to whack a smaller number into that struct rlimit. Easy:&lt;br&gt;
&amp;gt; $ sudo dtrace -w -n 'syscall::setrlimit:entry/execname == "Adobe Illustrato"/{ this-&amp;gt;i = (rlim_t *)alloca(sizeof (rlim_t)); *this-&amp;gt;i = 10000; copyout(this-&amp;gt;i, arg1 + sizeof (rlim_t), sizeof (rlim_t)); }'&lt;/p&gt;

&lt;p&gt;&amp;gt;    dtrace: description 'syscall::setrlimit:entry' matched 1 probe&lt;br&gt;
&amp;gt;    dtrace: could not enable tracing: Permission denied&lt;/p&gt;

&lt;p&gt;&amp;gt; Oh right. Thank you SIP (System Integrity Protection). This is a new laptop (at least a new motherboard due to some bizarre issue) which probably contributed to Illustrator not working when once it did. Because it’s new I haven’t yet disabled the part of SIP that prevents you from using DTrace on the kernel or in destructive mode (e.g. copyout()). It’s easy enough to disable, but I’m reboot-phobic — I hate having to restart my terminals — so I went to plan B: lldb&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After using DTrace to get the address of the setrlimit function, Adam used lldb to change the result before it got back to the application:
&amp;gt;    (lldb) break set -n _init
&amp;gt;    Breakpoint 1: 47 locations.
&amp;gt;    (lldb) run
&amp;gt;    …
&amp;gt;    (lldb) di -s 0x1006e5b72 -c 1
&amp;gt;    0x1006e5b72: callq  0x1011628e0     ; symbol stub for: setrlimit
&amp;gt;    (lldb) memory write 0x1006e5b72 0x31 0xc0 0x90 0x90 0x90
&amp;gt;    (lldb) di -s 0x1006e5b72 -c 4
&amp;gt;    0x1006e5b72: xorl   %eax, %eax
&amp;gt;    0x1006e5b74: nop
&amp;gt;    0x1006e5b75: nop
&amp;gt;    0x1006e5b76: nop&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Next I just did a process detach and got on with making that holiday card…&lt;/p&gt;

&lt;p&gt;&amp;gt; DTrace was designed for solving hard problems on critical systems, but the need to understand how systems behave exists in development and on consumer systems. Just because you didn’t write a program doesn’t mean you can’t fix it.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://functionallyparanoid.com/2016/12/22/say-my-blogs-name/" target="_blank" rel="nofollow noopener"&gt;Say my Blog's name!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Brian Everly over at functionally paranoid has a treat for us today. Let us give you a moment to get the tin-foil hats on… Ok, done? Let’s begin!&lt;/li&gt;
&lt;li&gt;&lt;p&gt;He starts off with a look at physical security. He begins by listing your options:&lt;br&gt;
&amp;gt; 1. BIOS passwords – Not something I’m typically impressed with.  Most can be avoided by opening up the machine, closing a jumper and powering it up to reset the NVRAM to factory defaults.  I don’t even bother with them.&lt;br&gt;
&amp;gt; 2. Full disk encryption – This one really rings my bell in a positive way.  If you can kill power to the box (either because the bad actor has to physically steal it and they aren’t carrying around a pile of car batteries and an inverter or because you can interrupt power to it some other way), then the disk will be encrypted.  The other beauty of this is that if a drive fails (and they all do eventually) you don’t have to have any privacy concerns about chucking it into an electronics recycler (or if you are a bad, bad person, into a landfill) because that data is effectively gibberish without the key (or without a long time to brute force it).&lt;br&gt;
&amp;gt; 3. Two factor auth for logins – I like this one as well.  I’m not a fan of biometrics because if your fingerprint is compromised (yes, it can happen – &lt;a href="https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/" target="_blank" rel="nofollow noopener"&gt;read&lt;/a&gt; about the department of defense background checks that were extracted by a bad agent – they included fingerprint images) you can’t exactly send off for a new finger.  Things like the &lt;a href="https://www.yubico.com/" target="_blank" rel="nofollow noopener"&gt;YubiKey&lt;/a&gt; are pretty slick.  They require that you have the physical hardware key as well as the password so unless the bad actor lifted your physical key, they would have a much harder time with physical access to your hardware.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Out of those options, Brian mentions that he uses disk encryption and yubi-key for all his secure network systems.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Next up is network segmentation, in this case the first thing to do is change your admin password for any ISP supplied modem &lt;br&gt;
/ router. He goes on to scare us of javascript attacks being used not against your local machine, but instead non WAN exposed router admin interface. Scary Stuff!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;For added security, naturally he firewalls the router by plugging in the LAN port to a OpenBSD box which does the 2nd layer of firewall / router protection.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;What about privacy and browsing? Here’s some more of his tips:&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I use Unbound as my DNS resolver on my local network (with all UDP port 53 traffic redirected to it by pf so I don’t have to configure anything on the clients) and then forward the traffic to DNSCrypt Proxy, caching the results in Unbound.  I notice ZERO performance penalty for this and it greatly enhances privacy.  This combination of Unbound and DNSCrypt Proxy works very well together.  You can even have redundancy by having multiple upstream resolvers running on different ports (basically run the DNSCrypt Proxy daemon multiple times pointing to different public resolvers).&lt;/p&gt;

&lt;p&gt;&amp;gt; I also use Firefox exclusively for my web browsing.  By leveraging the tips on &lt;a href="https://www.privacytools.io/" target="_blank" rel="nofollow noopener"&gt;this page&lt;/a&gt;, you can lock it down to do a great job of privacy protection.  The fact that your laptop’s battery drain rate can be used to fingerprint your browser completely trips me out but hey – that’s the world we live in.’&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What about the cloud you may ask? Well Brian has a nice solution for that as well:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I recently decided I would try to live a cloud-free life and I’ll give you a bit of a synopsis on it.  I discovered a wonderful Open Source project called &lt;a href="http://www.freenas.org/" target="_blank" rel="nofollow noopener"&gt;FreeNAS&lt;/a&gt;.  What this little gem does is allow you to install a FreeBSD/zfs file server appliance on amd64 hardware and have a slick administrative web interface for managing it.  I picked up a nice SuperMicro motherboard and chassis that has 4 hot swap drive bays (and two internal bays that I used to mirror the boot volume on) and am rocking the zfs lifestyle!  (Thanks Alan Jude!)&lt;/p&gt;

&lt;p&gt;&amp;gt; One of the nicest features of the FreeNAS is that it provides the ability to leverage the FreeBSD jail functionality in an easy to use way.  It also has plugins but the security on those is a bit sketchy (old versions of libraries, etc.) so I decided to roll my own.  I created two jails – one to run OwnCloud (yeah, I know about NextCloud and might switch at some point) and the other to run a full SMTP/IMAP email server stack.  I used &lt;a href="https://letsencrypt.org/" target="_blank" rel="nofollow noopener"&gt;Lets Encrypt&lt;/a&gt; to generate the SSL certificates and made sure I hit an A on &lt;a href="https://www.ssllabs.com/" target="_blank" rel="nofollow noopener"&gt;SSLLabs&lt;/a&gt; before I did anything else.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;His post then goes in to talk about Backups and IoT devices, something else you need to consider in this truely paranoid world we are forced to live in. We even get a nice shout-out near the end!&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Enter &lt;a href="http://www.tarsnap.com/" target="_blank" rel="nofollow noopener"&gt;TarSnap&lt;/a&gt; – a company that advertises itself as “Online Backups for the Truly Paranoid”.  It brings a tear to my eye – a kindred spirit!  :-)  Thanks again to Alan Jude and Kris Moore from the &lt;a href="http://www.bsdnow.tv/" target="_blank" rel="nofollow noopener"&gt;BSD Now podcast&lt;/a&gt; for turning me onto this company.  It has a very easy command syntax (yes, it isn’t a GUI tool – suck it up buttercup, you wanted to learn the shell didn’t you?) and even allows you to compile the thing from source if you want to.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We’ve only covered some of the highlights here, but you really should take a few moments of your time today and read this top to bottom. Lots of good tips here, already thinking how I can secure my home network better.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://producingoss.com/en/producingoss.pdf" target="_blank" rel="nofollow noopener"&gt;The open source book: “Producing Open Source Software”&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“How to Run a Successful Free Software Project” by Karl Fogel&lt;/li&gt;
&lt;li&gt;9 chapters and over 200 pages of content, plus many appendices&lt;/li&gt;
&lt;li&gt;Some interesting topics include:

&lt;ul&gt;
&lt;li&gt;Choosing a good name&lt;/li&gt;
&lt;li&gt;version control&lt;/li&gt;
&lt;li&gt;bug tracking&lt;/li&gt;
&lt;li&gt;creating developer guidelines&lt;/li&gt;
&lt;li&gt;setting up communications channels&lt;/li&gt;
&lt;li&gt;choosing a license (although this guide leans heavily towards the GPL)&lt;/li&gt;
&lt;li&gt;setting the tone of the project&lt;/li&gt;
&lt;li&gt;joining or creating a Non-Profit Organization&lt;/li&gt;
&lt;li&gt;the economics of open source&lt;/li&gt;
&lt;li&gt;release engineering, packaging, nightly builds, etc&lt;/li&gt;
&lt;li&gt;how to deal with forks&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A lot of good information packaged into this ebook&lt;/li&gt;
&lt;li&gt;This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.venshare.com/dtrace-flamegraphs-for-freebsd-and-node-js-2/" target="_blank" rel="nofollow noopener"&gt;DTrace Flamegraphs for node.js on FreeBSD &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the coolest tools built on top of DTrace is flamegraphs&lt;/li&gt;
&lt;li&gt;They are a very accurate, and visual way to see where a program is spending its time, which can tell you why it is slow, or where it could be improved. Further enhancements include off-cpu flame graphs, which tell you when the program is doing nothing, which can also be very useful
&amp;gt; Recently BSD UNIXes are being acknowledged by the application development community as an interesting operating system to deploy to. This is not surprising given that FreeBSD had jails, the original container system, about 17 years ago and a lot of network focused businesses such as netflix see it as the best way to deliver content. This developer interest has led to hosting providers supporting FreeBSD. e.g. Amazon, Azure, Joyent and you can get a 2 months free instance at Digital Ocean.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; DTrace is another vital feature for anyone who has had to deal with production issues and has been in FreeBSD since version 9. As of FreeBSD 11 the operating system now contains some great work by Fedor Indutny so you can profile node applications and create flamegraphs of node.js processes without any additional runtime flags or restarting of processes.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This is one of the most important things about DTrace. Many applications include some debugging functionality, but they require that you stop the application, and start it again in debugging mode. Some even require that you recompile the application in debugging mode.&lt;/li&gt;
&lt;li&gt;Being able to attach DTrace to an application, while it is under load, while the problem is actively happening, can be critical to figuring out what is going on.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In order to configure your FreeBSD instance to utilize this feature make the following changes to the configuration of the server.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Load the DTrace module at boot&lt;/li&gt;
&lt;li&gt;Increase some DTrace limits&lt;/li&gt;
&lt;li&gt;Install node with the optional DTrace feature compiled in&lt;/li&gt;
&lt;li&gt;Follow the generic &lt;a href="https://nodejs.org/en/blog/uncategorized/profiling-node-js/" target="_blank" rel="nofollow noopener"&gt;node.js flamegraph tutorial&lt;/a&gt;
&amp;gt; I hope you find this article useful. The ability to look at a runtime in this manor has saved me twice this year and I hope it will save you in the future too. My next post on freeBSD and node.js will be looking at some scenarios on utilising the ZFS features.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Also check out Brendan Gregg’s &lt;a href="http://queue.acm.org/detail.cfm?id=2927301" target="_blank" rel="nofollow noopener"&gt;ACM Queue Article&lt;/a&gt; “The Flame Graph: This visualization of software execution is a new necessity for performance profiling and debugging”&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://sourceforge.net/p/sshguard/mailman/message/35580961/" target="_blank" rel="nofollow noopener"&gt;SSHGuard 2.0 Call for Testing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;SSHGuard is a tool for monitoring brute force attempts and blocking them&lt;/li&gt;
&lt;li&gt;It has been a favourite of mine for a while because it runs as a pipe from syslogd, rather than reading the log files from the disk&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; A lot of work to get SSHGuard working with new log sources (journalctl, macOS log) and backends (firewalld, ipset) has happened in 2.0. The new version also uses a configuration file.&lt;/p&gt;

&lt;p&gt;&amp;gt; Most importantly, SSHGuard has been split into several processes piped into one another (sshg-logmon | sshg-parser | sshg-blocker | sshg-fw). sshg-parser can run with capsicum(4) and pledge(2). sshg-blocker can be sandboxed in its default configuration (without pid file, whitelist, blacklisting) and has not been tested sandboxed in other configurations.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Breaking the processes up so that the sensitive bits can be sandboxes is very nice to see
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://2007.asiabsdcon.org/papers/P16-paper.pdf" target="_blank" rel="nofollow noopener"&gt;pjd’s 2007 paper from AsiaBSDCon: “Porting the ZFS file system to the FreeBSD operating system”&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://vimeo.com/user60888329" target="_blank" rel="nofollow noopener"&gt;A Message From the FreeBSD Foundation&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://thenewstack.io/remembering-roger-faulkner/" target="_blank" rel="nofollow noopener"&gt;Remembering Roger Faulkner, Unix Champion&lt;/a&gt; and &lt;a href="https://news.ycombinator.com/item?id=13293596" target="_blank" rel="nofollow noopener"&gt;A few HN comments (including Bryan Cantrill)&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/QtyJeHMk" target="_blank" rel="nofollow noopener"&gt; Peter - TrueOS Network&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ru726VTV" target="_blank" rel="nofollow noopener"&gt; Chris - Remote Desktop&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/LQZPgF5g" target="_blank" rel="nofollow noopener"&gt; Goetz - Geli on Serial&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/jFeL8zKX" target="_blank" rel="nofollow noopener"&gt; Joe - BGP&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Xq9cbmfn" target="_blank" rel="nofollow noopener"&gt; Alejandro - BSD Router&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we’ve got all sorts of post-holiday goodies to share. New OpenSSL APIs, Dtrace, OpenBSD</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg36437.html" rel="nofollow">OpenSSL 1.1 API migration path, or the lack thereof</a></h3>

<blockquote>
<p>As many of you will already be aware, the OpenSSL 1.1.0 release intentionally introduced significant API changes from the previous release. In summary, a large number of data structures that were previously publically visible have been made opaque, with accessor functions being added in order to get and set some of the fields within these now opaque structs. It is worth noting that the use of opaque data structures is generally beneficial for libraries, since changes can be made to these data structures without breaking the ABI. As such, the overall direction of these changes is largely reasonable.</p>

<p>However, while API change is generally necessary for progression, in this case it would appear that there is NO transition plan and a complete disregard for the impact that these changes would have on the overall open source ecosystem.</p>

<p>So far it seems that the only approach is to place the migration burden onto each and every software project that uses OpenSSL, pushing significant code changes to each project that migrates to OpenSSL 1.1, while maintaining compatibility with the previous API. This is forcing each project to provide their own backwards compatibility shims, which is practically guaranteeing that there will be a proliferation of variable quality implementations; it is almost a certainty that some of these will contain bugs, potentially introducing security issues or memory leaks.</p>
</blockquote>

<ul>
<li>I think this will be a bigger issue for other operating systems that do not have the flexibility of the ports tree to deliver a newer version of OpenSSL. If a project switches from the old API to the new API, and the OS only provides the older branch of OpenSSL, how can the application work?</li>
<li>Of course, this leaves the issue, if application A wants OpenSSL 1.0, and application B only works with OpenSSL 1.1, how does that work?</li>
</ul>

<blockquote>
<p>Due to a number of factors, software projects that make use of OpenSSL cannot simply migrate to the 1.1 API and drop support for the 1.0 API - in most cases they will need to continue to support both. Firstly, I am not aware of any platform that has shipped a production release with OpenSSL 1.1 - any software that supported OpenSSL 1.1 only, would effectively be unusable on every platform for the time being. Secondly, the OpenSSL 1.0.2 release is supported until the 31st of December 2019, while OpenSSL 1.1.0 is only supported until the 31st of August 2018 - any LTS style release is clearly going to consider shipping with 1.0.2 as a result.</p>

<p>Platforms that are attempting to ship with OpenSSL 1.1 are already encountering significant challenges - for example, Debian currently has 257 packages (out of 518) that do not build against OpenSSL 1.1. There are also hidden gotchas for situations where different libraries are linked against different OpenSSL versions and then share OpenSSL data structures between them - many of these problems will be difficult to detect since they only fail at runtime.</p>
</blockquote>

<ul>
<li>It will be interesting to see what happens with OpenSSL, and LibreSSL</li>
<li>Hopefully, most projects will decide to switch to the cleaner APIs provided by s2n or libtls, although they do not provide the entire functionality of the OpenSSL API.</li>
<li><a href="https://news.ycombinator.com/item?id=13284648" rel="nofollow">Hacker News comments</a>
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/exfiltration-via-receive-timing" rel="nofollow">exfiltration via receive timing</a></h3>

<blockquote>
<p>Another similar way to create a backchannel but without transmitting anything is to introduce delays in the receiver and measure throughput as observed by the sender. All we need is a protocol with transmission control. Hmmm. Actually, it’s easier (and more reliable) to code this up using a plain pipe, but the same principle applies to networked transmissions.</p>

<p>For every digit we want to “send” back, we sleep a few seconds, then drain the pipe. We don’t care about the data, although if this were a video file or an OS update, we could probably do something useful with it.</p>

<p>Continuously fill the pipe with junk data. If (when) we block, calculate the difference between before and after. This is a our secret backchannel data. (The reader and writer use different buffer sizes because on OpenBSD at least, a writer will stay blocked even after a read depending on the space that opens up. Even simple demos have real world considerations.)</p>

<p>In this simple example, the secret data (argv) is shared by the processes, but we can see that the writer isn’t printing them from its own address space. Nevertheless, it works.</p>

<p>Time to add random delays and buffering to firewalls? Probably not.</p>
</blockquote>

<ul>
<li>An interesting thought experiment that shows just how many ways there are to covertly convey a message
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=13223351" rel="nofollow">OpenBSD Desktop in about 30 Minutes</a></h3>

<ul>
<li>Over at hackernews we have a very non-verbose, but handy guide to getting to a OpenBSD desktop in about 30 minutes!</li>
<li>First, the guide will assume you’ve already installed OpenBSD 6.0, so you’ll need to at least be at the shell prompt of your freshly installed system to begin.</li>
<li>With that, now its time to do some tuning. Editing some resource limits in login.conf will be our initial task, upping some datasize tunables to 2GB</li>
<li>Next up, we will edit some of the default “doas” settings to something a bit more workable for desktop computing</li>
<li>Another handy trick, editing your .profile to have your PKG_PATH variables set automatically will make</li>
<li>One thing some folks may overlook, but disabling atime can speed disk performance (which you probably don’t care about atime on your desktop anyway), so this guide will show you what knobs to tweak in /etc/fstab to do so</li>
<li>After some final WPA / Wifi configuration, we then drop to “mere mortal” mode and begin our package installations. In this particular guide, he will be setting up Lumina Desktop (Which yes, it is on OpenBSD)</li>
<li>A few small tweaks later for xscreensaver and your xinitrc file, then you are ready to run “startx” and begin your desktop session!</li>
<li>All in all, great guide which if you are fast can probably be done in even less than 30 minutes and will result in a rock-solid OpenBSD desktop rocking Lumina none-the-less.
***</li>
</ul>

<h3><a href="https://hackernoon.com/dtrace-at-home-145ba773371e" rel="nofollow">How DTrace saved Christmas</a></h3>

<ul>
<li>Adam Leventhal, one of the co-creators of DTrace, wrote up this post about how he uses DTrace at home, to save Christmas</li>
</ul>

<blockquote>
<p>I had been procrastinating making the family holiday card. It was a combination of having a lot on my plate and dreading the formulation of our annual note recapping the year; there were some great moments, but I’m glad I don’t have to do 2016 again. It was just before midnight and either I’d make the card that night or leave an empty space on our friends’ refrigerators.</p>
</blockquote>

<ul>
<li>Adobe Illustrator had other ideas: “Unable to set maximum number of files to be opened”</li>
</ul>

<blockquote>
<p>I’m not the first person to hit this. The problem seems to have existed since CS6 was released in 2016. None of the solutions were working for me, and — inspired by <a href="https://medium.com/startup-grind/how-to-start-a-company-with-no-free-time-b70fbe7b918a#.uujdblxc6" rel="nofollow">Sara Mauskopf’s excellent post</a> — I was rapidly running out of the time bounds for the project. Enough; I’d just DTrace it.</p>

<p>A colleague scoffed the other day, “I mean, how often do you actually use DTrace?” In his mind DTrace was for big systems, critical system, when dollars and lives were at stake. My reply: I use DTrace every day. I can’t imagine developing software without DTrace, and I use it when my laptop (not infrequently) does something inexplicable (I’m forever grateful to the Apple team that ported it to Mac OS X)</p>

<p>Illustrator is failing on setrlimit(2) and blowing up as result. Let’s confirm that it is in fact returning -1:$ sudo dtrace -n &#39;syscall::setrlimit:return/execname == &quot;Adobe Illustrato&quot;/{ printf(&quot;%d %d&quot;, arg1, errno); }&#39;<br>
   dtrace: description &#39;syscall::setrlimit:return&#39; matched 1 probe<br>
   CPU     ID                    FUNCTION:NAME<br>
     0    532                 setrlimit:return -1 1</p>

<p>There it is. And setrlimit(2) is failing with errno 1 which is EPERM (value too high for non-root user). I already tuned up the files limit pretty high. Let’s confirm that it is in fact setting the files limit and check the value to which it’s being set. To write this script I looked at the documentation for setrlimit(2) (hooray for man pages!) to determine that the position of the resource parameter (arg0) and the type of the value parameter (struct rlimit). I needed the DTrace copyin() subroutine to grab the structure from the process’s address space:<br>
$ sudo dtrace -n &#39;syscall::setrlimit:entry/execname == &quot;Adobe Illustrato&quot;/{ this-&gt;r = *(struct rlimit *)copyin(arg1, sizeof (struct rlimit)); printf(&quot;%x %x %x&quot;, arg0, this-&gt;r.rlim_cur, this-&gt;r.rlim_max);  }&#39;</p>

<p>dtrace: description &#39;syscall::setrlimit:entry&#39; matched 1 probe<br>
   CPU     ID                FUNCTION:NAME<br>
     0    531              setrlimit:entry 1008 2800 7fffffffffffffff<br>
Looking through /usr/include/sys/resource.h we can see that 1008 corresponds to the number of files (RLIMIT_NOFILE | <br>
_RLIMIT_POSIX_FLAG)</p>

<p>The quickest solution was to use DTrace again to whack a smaller number into that struct rlimit. Easy:<br>
$ sudo dtrace -w -n &#39;syscall::setrlimit:entry/execname == &quot;Adobe Illustrato&quot;/{ this-&gt;i = (rlim_t *)alloca(sizeof (rlim_t)); *this-&gt;i = 10000; copyout(this-&gt;i, arg1 + sizeof (rlim_t), sizeof (rlim_t)); }&#39;</p>

<p>dtrace: description &#39;syscall::setrlimit:entry&#39; matched 1 probe<br>
   dtrace: could not enable tracing: Permission denied</p>

<p>Oh right. Thank you SIP (System Integrity Protection). This is a new laptop (at least a new motherboard due to some bizarre issue) which probably contributed to Illustrator not working when once it did. Because it’s new I haven’t yet disabled the part of SIP that prevents you from using DTrace on the kernel or in destructive mode (e.g. copyout()). It’s easy enough to disable, but I’m reboot-phobic — I hate having to restart my terminals — so I went to plan B: lldb</p>

<ul>
<li>After using DTrace to get the address of the setrlimit function, Adam used lldb to change the result before it got back to the application:
(lldb) break set -n _init
Breakpoint 1: 47 locations.
(lldb) run
…
(lldb) di -s 0x1006e5b72 -c 1
0x1006e5b72: callq  0x1011628e0     ; symbol stub for: setrlimit
(lldb) memory write 0x1006e5b72 0x31 0xc0 0x90 0x90 0x90
(lldb) di -s 0x1006e5b72 -c 4
0x1006e5b72: xorl   %eax, %eax
0x1006e5b74: nop
0x1006e5b75: nop
0x1006e5b76: nop</li>
</ul>

<p>Next I just did a process detach and got on with making that holiday card…</p>

<p>DTrace was designed for solving hard problems on critical systems, but the need to understand how systems behave exists in development and on consumer systems. Just because you didn’t write a program doesn’t mean you can’t fix it.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://functionallyparanoid.com/2016/12/22/say-my-blogs-name/" rel="nofollow">Say my Blog&#39;s name!</a></h3>

<ul>
<li>Brian Everly over at functionally paranoid has a treat for us today. Let us give you a moment to get the tin-foil hats on… Ok, done? Let’s begin!</li>
<li><p>He starts off with a look at physical security. He begins by listing your options:</p>

<blockquote>
<ol>
<li>BIOS passwords – Not something I’m typically impressed with.  Most can be avoided by opening up the machine, closing a jumper and powering it up to reset the NVRAM to factory defaults.  I don’t even bother with them.</li>
<li>Full disk encryption – This one really rings my bell in a positive way.  If you can kill power to the box (either because the bad actor has to physically steal it and they aren’t carrying around a pile of car batteries and an inverter or because you can interrupt power to it some other way), then the disk will be encrypted.  The other beauty of this is that if a drive fails (and they all do eventually) you don’t have to have any privacy concerns about chucking it into an electronics recycler (or if you are a bad, bad person, into a landfill) because that data is effectively gibberish without the key (or without a long time to brute force it).</li>
<li>Two factor auth for logins – I like this one as well.  I’m not a fan of biometrics because if your fingerprint is compromised (yes, it can happen – <a href="https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/" rel="nofollow">read</a> about the department of defense background checks that were extracted by a bad agent – they included fingerprint images) you can’t exactly send off for a new finger.  Things like the <a href="https://www.yubico.com/" rel="nofollow">YubiKey</a> are pretty slick.  They require that you have the physical hardware key as well as the password so unless the bad actor lifted your physical key, they would have a much harder time with physical access to your hardware.</li>
</ol>
</blockquote></li>
<li><p>Out of those options, Brian mentions that he uses disk encryption and yubi-key for all his secure network systems.</p></li>
<li><p>Next up is network segmentation, in this case the first thing to do is change your admin password for any ISP supplied modem <br>
/ router. He goes on to scare us of javascript attacks being used not against your local machine, but instead non WAN exposed router admin interface. Scary Stuff!</p></li>
<li><p>For added security, naturally he firewalls the router by plugging in the LAN port to a OpenBSD box which does the 2nd layer of firewall / router protection.</p></li>
<li><p>What about privacy and browsing? Here’s some more of his tips:</p></li>
</ul>

<blockquote>
<p>I use Unbound as my DNS resolver on my local network (with all UDP port 53 traffic redirected to it by pf so I don’t have to configure anything on the clients) and then forward the traffic to DNSCrypt Proxy, caching the results in Unbound.  I notice ZERO performance penalty for this and it greatly enhances privacy.  This combination of Unbound and DNSCrypt Proxy works very well together.  You can even have redundancy by having multiple upstream resolvers running on different ports (basically run the DNSCrypt Proxy daemon multiple times pointing to different public resolvers).</p>

<p>I also use Firefox exclusively for my web browsing.  By leveraging the tips on <a href="https://www.privacytools.io/" rel="nofollow">this page</a>, you can lock it down to do a great job of privacy protection.  The fact that your laptop’s battery drain rate can be used to fingerprint your browser completely trips me out but hey – that’s the world we live in.’</p>
</blockquote>

<ul>
<li>What about the cloud you may ask? Well Brian has a nice solution for that as well:</li>
</ul>

<blockquote>
<p>I recently decided I would try to live a cloud-free life and I’ll give you a bit of a synopsis on it.  I discovered a wonderful Open Source project called <a href="http://www.freenas.org/" rel="nofollow">FreeNAS</a>.  What this little gem does is allow you to install a FreeBSD/zfs file server appliance on amd64 hardware and have a slick administrative web interface for managing it.  I picked up a nice SuperMicro motherboard and chassis that has 4 hot swap drive bays (and two internal bays that I used to mirror the boot volume on) and am rocking the zfs lifestyle!  (Thanks Alan Jude!)</p>

<p>One of the nicest features of the FreeNAS is that it provides the ability to leverage the FreeBSD jail functionality in an easy to use way.  It also has plugins but the security on those is a bit sketchy (old versions of libraries, etc.) so I decided to roll my own.  I created two jails – one to run OwnCloud (yeah, I know about NextCloud and might switch at some point) and the other to run a full SMTP/IMAP email server stack.  I used <a href="https://letsencrypt.org/" rel="nofollow">Lets Encrypt</a> to generate the SSL certificates and made sure I hit an A on <a href="https://www.ssllabs.com/" rel="nofollow">SSLLabs</a> before I did anything else.</p>
</blockquote>

<ul>
<li>His post then goes in to talk about Backups and IoT devices, something else you need to consider in this truely paranoid world we are forced to live in. We even get a nice shout-out near the end!</li>
</ul>

<blockquote>
<p>Enter <a href="http://www.tarsnap.com/" rel="nofollow">TarSnap</a> – a company that advertises itself as “Online Backups for the Truly Paranoid”.  It brings a tear to my eye – a kindred spirit!  :-)  Thanks again to Alan Jude and Kris Moore from the <a href="http://www.bsdnow.tv/" rel="nofollow">BSD Now podcast</a> for turning me onto this company.  It has a very easy command syntax (yes, it isn’t a GUI tool – suck it up buttercup, you wanted to learn the shell didn’t you?) and even allows you to compile the thing from source if you want to.”</p>
</blockquote>

<ul>
<li>We’ve only covered some of the highlights here, but you really should take a few moments of your time today and read this top to bottom. Lots of good tips here, already thinking how I can secure my home network better.</li>
</ul>

<hr>

<h3><a href="http://producingoss.com/en/producingoss.pdf" rel="nofollow">The open source book: “Producing Open Source Software”</a></h3>

<ul>
<li>“How to Run a Successful Free Software Project” by Karl Fogel</li>
<li>9 chapters and over 200 pages of content, plus many appendices</li>
<li>Some interesting topics include:

<ul>
<li>Choosing a good name</li>
<li>version control</li>
<li>bug tracking</li>
<li>creating developer guidelines</li>
<li>setting up communications channels</li>
<li>choosing a license (although this guide leans heavily towards the GPL)</li>
<li>setting the tone of the project</li>
<li>joining or creating a Non-Profit Organization</li>
<li>the economics of open source</li>
<li>release engineering, packaging, nightly builds, etc</li>
<li>how to deal with forks</li>
</ul></li>
<li>A lot of good information packaged into this ebook</li>
<li>This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License
***</li>
</ul>

<h3><a href="http://www.venshare.com/dtrace-flamegraphs-for-freebsd-and-node-js-2/" rel="nofollow">DTrace Flamegraphs for node.js on FreeBSD </a></h3>

<ul>
<li>One of the coolest tools built on top of DTrace is flamegraphs</li>
<li>They are a very accurate, and visual way to see where a program is spending its time, which can tell you why it is slow, or where it could be improved. Further enhancements include off-cpu flame graphs, which tell you when the program is doing nothing, which can also be very useful
&gt; Recently BSD UNIXes are being acknowledged by the application development community as an interesting operating system to deploy to. This is not surprising given that FreeBSD had jails, the original container system, about 17 years ago and a lot of network focused businesses such as netflix see it as the best way to deliver content. This developer interest has led to hosting providers supporting FreeBSD. e.g. Amazon, Azure, Joyent and you can get a 2 months free instance at Digital Ocean.</li>
</ul>

<blockquote>
<p>DTrace is another vital feature for anyone who has had to deal with production issues and has been in FreeBSD since version 9. As of FreeBSD 11 the operating system now contains some great work by Fedor Indutny so you can profile node applications and create flamegraphs of node.js processes without any additional runtime flags or restarting of processes.</p>
</blockquote>

<ul>
<li>This is one of the most important things about DTrace. Many applications include some debugging functionality, but they require that you stop the application, and start it again in debugging mode. Some even require that you recompile the application in debugging mode.</li>
<li>Being able to attach DTrace to an application, while it is under load, while the problem is actively happening, can be critical to figuring out what is going on.</li>
<li><p>In order to configure your FreeBSD instance to utilize this feature make the following changes to the configuration of the server.</p>

<ul>
<li>Load the DTrace module at boot</li>
<li>Increase some DTrace limits</li>
<li>Install node with the optional DTrace feature compiled in</li>
<li>Follow the generic <a href="https://nodejs.org/en/blog/uncategorized/profiling-node-js/" rel="nofollow">node.js flamegraph tutorial</a>
&gt; I hope you find this article useful. The ability to look at a runtime in this manor has saved me twice this year and I hope it will save you in the future too. My next post on freeBSD and node.js will be looking at some scenarios on utilising the ZFS features.</li>
</ul></li>
<li><p>Also check out Brendan Gregg’s <a href="http://queue.acm.org/detail.cfm?id=2927301" rel="nofollow">ACM Queue Article</a> “The Flame Graph: This visualization of software execution is a new necessity for performance profiling and debugging”</p>

<hr></li>
</ul>

<h3><a href="https://sourceforge.net/p/sshguard/mailman/message/35580961/" rel="nofollow">SSHGuard 2.0 Call for Testing</a></h3>

<ul>
<li>SSHGuard is a tool for monitoring brute force attempts and blocking them</li>
<li>It has been a favourite of mine for a while because it runs as a pipe from syslogd, rather than reading the log files from the disk</li>
</ul>

<blockquote>
<p>A lot of work to get SSHGuard working with new log sources (journalctl, macOS log) and backends (firewalld, ipset) has happened in 2.0. The new version also uses a configuration file.</p>

<p>Most importantly, SSHGuard has been split into several processes piped into one another (sshg-logmon | sshg-parser | sshg-blocker | sshg-fw). sshg-parser can run with capsicum(4) and pledge(2). sshg-blocker can be sandboxed in its default configuration (without pid file, whitelist, blacklisting) and has not been tested sandboxed in other configurations.</p>
</blockquote>

<ul>
<li>Breaking the processes up so that the sensitive bits can be sandboxes is very nice to see
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://2007.asiabsdcon.org/papers/P16-paper.pdf" rel="nofollow">pjd’s 2007 paper from AsiaBSDCon: “Porting the ZFS file system to the FreeBSD operating system”</a> </p></li>
<li><p><a href="https://vimeo.com/user60888329" rel="nofollow">A Message From the FreeBSD Foundation</a> </p></li>
<li><p><a href="http://thenewstack.io/remembering-roger-faulkner/" rel="nofollow">Remembering Roger Faulkner, Unix Champion</a> and <a href="https://news.ycombinator.com/item?id=13293596" rel="nofollow">A few HN comments (including Bryan Cantrill)</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/QtyJeHMk" rel="nofollow"> Peter - TrueOS Network</a> </li>
<li><a href="http://pastebin.com/ru726VTV" rel="nofollow"> Chris - Remote Desktop</a> </li>
<li><a href="http://pastebin.com/LQZPgF5g" rel="nofollow"> Goetz - Geli on Serial</a> </li>
<li><a href="http://pastebin.com/jFeL8zKX" rel="nofollow"> Joe - BGP</a> </li>
<li><a href="http://pastebin.com/Xq9cbmfn" rel="nofollow"> Alejandro - BSD Router</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we’ve got all sorts of post-holiday goodies to share. New OpenSSL APIs, Dtrace, OpenBSD</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg36437.html" rel="nofollow">OpenSSL 1.1 API migration path, or the lack thereof</a></h3>

<blockquote>
<p>As many of you will already be aware, the OpenSSL 1.1.0 release intentionally introduced significant API changes from the previous release. In summary, a large number of data structures that were previously publically visible have been made opaque, with accessor functions being added in order to get and set some of the fields within these now opaque structs. It is worth noting that the use of opaque data structures is generally beneficial for libraries, since changes can be made to these data structures without breaking the ABI. As such, the overall direction of these changes is largely reasonable.</p>

<p>However, while API change is generally necessary for progression, in this case it would appear that there is NO transition plan and a complete disregard for the impact that these changes would have on the overall open source ecosystem.</p>

<p>So far it seems that the only approach is to place the migration burden onto each and every software project that uses OpenSSL, pushing significant code changes to each project that migrates to OpenSSL 1.1, while maintaining compatibility with the previous API. This is forcing each project to provide their own backwards compatibility shims, which is practically guaranteeing that there will be a proliferation of variable quality implementations; it is almost a certainty that some of these will contain bugs, potentially introducing security issues or memory leaks.</p>
</blockquote>

<ul>
<li>I think this will be a bigger issue for other operating systems that do not have the flexibility of the ports tree to deliver a newer version of OpenSSL. If a project switches from the old API to the new API, and the OS only provides the older branch of OpenSSL, how can the application work?</li>
<li>Of course, this leaves the issue, if application A wants OpenSSL 1.0, and application B only works with OpenSSL 1.1, how does that work?</li>
</ul>

<blockquote>
<p>Due to a number of factors, software projects that make use of OpenSSL cannot simply migrate to the 1.1 API and drop support for the 1.0 API - in most cases they will need to continue to support both. Firstly, I am not aware of any platform that has shipped a production release with OpenSSL 1.1 - any software that supported OpenSSL 1.1 only, would effectively be unusable on every platform for the time being. Secondly, the OpenSSL 1.0.2 release is supported until the 31st of December 2019, while OpenSSL 1.1.0 is only supported until the 31st of August 2018 - any LTS style release is clearly going to consider shipping with 1.0.2 as a result.</p>

<p>Platforms that are attempting to ship with OpenSSL 1.1 are already encountering significant challenges - for example, Debian currently has 257 packages (out of 518) that do not build against OpenSSL 1.1. There are also hidden gotchas for situations where different libraries are linked against different OpenSSL versions and then share OpenSSL data structures between them - many of these problems will be difficult to detect since they only fail at runtime.</p>
</blockquote>

<ul>
<li>It will be interesting to see what happens with OpenSSL, and LibreSSL</li>
<li>Hopefully, most projects will decide to switch to the cleaner APIs provided by s2n or libtls, although they do not provide the entire functionality of the OpenSSL API.</li>
<li><a href="https://news.ycombinator.com/item?id=13284648" rel="nofollow">Hacker News comments</a>
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/exfiltration-via-receive-timing" rel="nofollow">exfiltration via receive timing</a></h3>

<blockquote>
<p>Another similar way to create a backchannel but without transmitting anything is to introduce delays in the receiver and measure throughput as observed by the sender. All we need is a protocol with transmission control. Hmmm. Actually, it’s easier (and more reliable) to code this up using a plain pipe, but the same principle applies to networked transmissions.</p>

<p>For every digit we want to “send” back, we sleep a few seconds, then drain the pipe. We don’t care about the data, although if this were a video file or an OS update, we could probably do something useful with it.</p>

<p>Continuously fill the pipe with junk data. If (when) we block, calculate the difference between before and after. This is a our secret backchannel data. (The reader and writer use different buffer sizes because on OpenBSD at least, a writer will stay blocked even after a read depending on the space that opens up. Even simple demos have real world considerations.)</p>

<p>In this simple example, the secret data (argv) is shared by the processes, but we can see that the writer isn’t printing them from its own address space. Nevertheless, it works.</p>

<p>Time to add random delays and buffering to firewalls? Probably not.</p>
</blockquote>

<ul>
<li>An interesting thought experiment that shows just how many ways there are to covertly convey a message
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=13223351" rel="nofollow">OpenBSD Desktop in about 30 Minutes</a></h3>

<ul>
<li>Over at hackernews we have a very non-verbose, but handy guide to getting to a OpenBSD desktop in about 30 minutes!</li>
<li>First, the guide will assume you’ve already installed OpenBSD 6.0, so you’ll need to at least be at the shell prompt of your freshly installed system to begin.</li>
<li>With that, now its time to do some tuning. Editing some resource limits in login.conf will be our initial task, upping some datasize tunables to 2GB</li>
<li>Next up, we will edit some of the default “doas” settings to something a bit more workable for desktop computing</li>
<li>Another handy trick, editing your .profile to have your PKG_PATH variables set automatically will make</li>
<li>One thing some folks may overlook, but disabling atime can speed disk performance (which you probably don’t care about atime on your desktop anyway), so this guide will show you what knobs to tweak in /etc/fstab to do so</li>
<li>After some final WPA / Wifi configuration, we then drop to “mere mortal” mode and begin our package installations. In this particular guide, he will be setting up Lumina Desktop (Which yes, it is on OpenBSD)</li>
<li>A few small tweaks later for xscreensaver and your xinitrc file, then you are ready to run “startx” and begin your desktop session!</li>
<li>All in all, great guide which if you are fast can probably be done in even less than 30 minutes and will result in a rock-solid OpenBSD desktop rocking Lumina none-the-less.
***</li>
</ul>

<h3><a href="https://hackernoon.com/dtrace-at-home-145ba773371e" rel="nofollow">How DTrace saved Christmas</a></h3>

<ul>
<li>Adam Leventhal, one of the co-creators of DTrace, wrote up this post about how he uses DTrace at home, to save Christmas</li>
</ul>

<blockquote>
<p>I had been procrastinating making the family holiday card. It was a combination of having a lot on my plate and dreading the formulation of our annual note recapping the year; there were some great moments, but I’m glad I don’t have to do 2016 again. It was just before midnight and either I’d make the card that night or leave an empty space on our friends’ refrigerators.</p>
</blockquote>

<ul>
<li>Adobe Illustrator had other ideas: “Unable to set maximum number of files to be opened”</li>
</ul>

<blockquote>
<p>I’m not the first person to hit this. The problem seems to have existed since CS6 was released in 2016. None of the solutions were working for me, and — inspired by <a href="https://medium.com/startup-grind/how-to-start-a-company-with-no-free-time-b70fbe7b918a#.uujdblxc6" rel="nofollow">Sara Mauskopf’s excellent post</a> — I was rapidly running out of the time bounds for the project. Enough; I’d just DTrace it.</p>

<p>A colleague scoffed the other day, “I mean, how often do you actually use DTrace?” In his mind DTrace was for big systems, critical system, when dollars and lives were at stake. My reply: I use DTrace every day. I can’t imagine developing software without DTrace, and I use it when my laptop (not infrequently) does something inexplicable (I’m forever grateful to the Apple team that ported it to Mac OS X)</p>

<p>Illustrator is failing on setrlimit(2) and blowing up as result. Let’s confirm that it is in fact returning -1:$ sudo dtrace -n &#39;syscall::setrlimit:return/execname == &quot;Adobe Illustrato&quot;/{ printf(&quot;%d %d&quot;, arg1, errno); }&#39;<br>
   dtrace: description &#39;syscall::setrlimit:return&#39; matched 1 probe<br>
   CPU     ID                    FUNCTION:NAME<br>
     0    532                 setrlimit:return -1 1</p>

<p>There it is. And setrlimit(2) is failing with errno 1 which is EPERM (value too high for non-root user). I already tuned up the files limit pretty high. Let’s confirm that it is in fact setting the files limit and check the value to which it’s being set. To write this script I looked at the documentation for setrlimit(2) (hooray for man pages!) to determine that the position of the resource parameter (arg0) and the type of the value parameter (struct rlimit). I needed the DTrace copyin() subroutine to grab the structure from the process’s address space:<br>
$ sudo dtrace -n &#39;syscall::setrlimit:entry/execname == &quot;Adobe Illustrato&quot;/{ this-&gt;r = *(struct rlimit *)copyin(arg1, sizeof (struct rlimit)); printf(&quot;%x %x %x&quot;, arg0, this-&gt;r.rlim_cur, this-&gt;r.rlim_max);  }&#39;</p>

<p>dtrace: description &#39;syscall::setrlimit:entry&#39; matched 1 probe<br>
   CPU     ID                FUNCTION:NAME<br>
     0    531              setrlimit:entry 1008 2800 7fffffffffffffff<br>
Looking through /usr/include/sys/resource.h we can see that 1008 corresponds to the number of files (RLIMIT_NOFILE | <br>
_RLIMIT_POSIX_FLAG)</p>

<p>The quickest solution was to use DTrace again to whack a smaller number into that struct rlimit. Easy:<br>
$ sudo dtrace -w -n &#39;syscall::setrlimit:entry/execname == &quot;Adobe Illustrato&quot;/{ this-&gt;i = (rlim_t *)alloca(sizeof (rlim_t)); *this-&gt;i = 10000; copyout(this-&gt;i, arg1 + sizeof (rlim_t), sizeof (rlim_t)); }&#39;</p>

<p>dtrace: description &#39;syscall::setrlimit:entry&#39; matched 1 probe<br>
   dtrace: could not enable tracing: Permission denied</p>

<p>Oh right. Thank you SIP (System Integrity Protection). This is a new laptop (at least a new motherboard due to some bizarre issue) which probably contributed to Illustrator not working when once it did. Because it’s new I haven’t yet disabled the part of SIP that prevents you from using DTrace on the kernel or in destructive mode (e.g. copyout()). It’s easy enough to disable, but I’m reboot-phobic — I hate having to restart my terminals — so I went to plan B: lldb</p>

<ul>
<li>After using DTrace to get the address of the setrlimit function, Adam used lldb to change the result before it got back to the application:
(lldb) break set -n _init
Breakpoint 1: 47 locations.
(lldb) run
…
(lldb) di -s 0x1006e5b72 -c 1
0x1006e5b72: callq  0x1011628e0     ; symbol stub for: setrlimit
(lldb) memory write 0x1006e5b72 0x31 0xc0 0x90 0x90 0x90
(lldb) di -s 0x1006e5b72 -c 4
0x1006e5b72: xorl   %eax, %eax
0x1006e5b74: nop
0x1006e5b75: nop
0x1006e5b76: nop</li>
</ul>

<p>Next I just did a process detach and got on with making that holiday card…</p>

<p>DTrace was designed for solving hard problems on critical systems, but the need to understand how systems behave exists in development and on consumer systems. Just because you didn’t write a program doesn’t mean you can’t fix it.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://functionallyparanoid.com/2016/12/22/say-my-blogs-name/" rel="nofollow">Say my Blog&#39;s name!</a></h3>

<ul>
<li>Brian Everly over at functionally paranoid has a treat for us today. Let us give you a moment to get the tin-foil hats on… Ok, done? Let’s begin!</li>
<li><p>He starts off with a look at physical security. He begins by listing your options:</p>

<blockquote>
<ol>
<li>BIOS passwords – Not something I’m typically impressed with.  Most can be avoided by opening up the machine, closing a jumper and powering it up to reset the NVRAM to factory defaults.  I don’t even bother with them.</li>
<li>Full disk encryption – This one really rings my bell in a positive way.  If you can kill power to the box (either because the bad actor has to physically steal it and they aren’t carrying around a pile of car batteries and an inverter or because you can interrupt power to it some other way), then the disk will be encrypted.  The other beauty of this is that if a drive fails (and they all do eventually) you don’t have to have any privacy concerns about chucking it into an electronics recycler (or if you are a bad, bad person, into a landfill) because that data is effectively gibberish without the key (or without a long time to brute force it).</li>
<li>Two factor auth for logins – I like this one as well.  I’m not a fan of biometrics because if your fingerprint is compromised (yes, it can happen – <a href="https://www.washingtonpost.com/news/federal-eye/wp/2015/07/09/hack-of-security-clearance-system-affected-21-5-million-people-federal-authorities-say/" rel="nofollow">read</a> about the department of defense background checks that were extracted by a bad agent – they included fingerprint images) you can’t exactly send off for a new finger.  Things like the <a href="https://www.yubico.com/" rel="nofollow">YubiKey</a> are pretty slick.  They require that you have the physical hardware key as well as the password so unless the bad actor lifted your physical key, they would have a much harder time with physical access to your hardware.</li>
</ol>
</blockquote></li>
<li><p>Out of those options, Brian mentions that he uses disk encryption and yubi-key for all his secure network systems.</p></li>
<li><p>Next up is network segmentation, in this case the first thing to do is change your admin password for any ISP supplied modem <br>
/ router. He goes on to scare us of javascript attacks being used not against your local machine, but instead non WAN exposed router admin interface. Scary Stuff!</p></li>
<li><p>For added security, naturally he firewalls the router by plugging in the LAN port to a OpenBSD box which does the 2nd layer of firewall / router protection.</p></li>
<li><p>What about privacy and browsing? Here’s some more of his tips:</p></li>
</ul>

<blockquote>
<p>I use Unbound as my DNS resolver on my local network (with all UDP port 53 traffic redirected to it by pf so I don’t have to configure anything on the clients) and then forward the traffic to DNSCrypt Proxy, caching the results in Unbound.  I notice ZERO performance penalty for this and it greatly enhances privacy.  This combination of Unbound and DNSCrypt Proxy works very well together.  You can even have redundancy by having multiple upstream resolvers running on different ports (basically run the DNSCrypt Proxy daemon multiple times pointing to different public resolvers).</p>

<p>I also use Firefox exclusively for my web browsing.  By leveraging the tips on <a href="https://www.privacytools.io/" rel="nofollow">this page</a>, you can lock it down to do a great job of privacy protection.  The fact that your laptop’s battery drain rate can be used to fingerprint your browser completely trips me out but hey – that’s the world we live in.’</p>
</blockquote>

<ul>
<li>What about the cloud you may ask? Well Brian has a nice solution for that as well:</li>
</ul>

<blockquote>
<p>I recently decided I would try to live a cloud-free life and I’ll give you a bit of a synopsis on it.  I discovered a wonderful Open Source project called <a href="http://www.freenas.org/" rel="nofollow">FreeNAS</a>.  What this little gem does is allow you to install a FreeBSD/zfs file server appliance on amd64 hardware and have a slick administrative web interface for managing it.  I picked up a nice SuperMicro motherboard and chassis that has 4 hot swap drive bays (and two internal bays that I used to mirror the boot volume on) and am rocking the zfs lifestyle!  (Thanks Alan Jude!)</p>

<p>One of the nicest features of the FreeNAS is that it provides the ability to leverage the FreeBSD jail functionality in an easy to use way.  It also has plugins but the security on those is a bit sketchy (old versions of libraries, etc.) so I decided to roll my own.  I created two jails – one to run OwnCloud (yeah, I know about NextCloud and might switch at some point) and the other to run a full SMTP/IMAP email server stack.  I used <a href="https://letsencrypt.org/" rel="nofollow">Lets Encrypt</a> to generate the SSL certificates and made sure I hit an A on <a href="https://www.ssllabs.com/" rel="nofollow">SSLLabs</a> before I did anything else.</p>
</blockquote>

<ul>
<li>His post then goes in to talk about Backups and IoT devices, something else you need to consider in this truely paranoid world we are forced to live in. We even get a nice shout-out near the end!</li>
</ul>

<blockquote>
<p>Enter <a href="http://www.tarsnap.com/" rel="nofollow">TarSnap</a> – a company that advertises itself as “Online Backups for the Truly Paranoid”.  It brings a tear to my eye – a kindred spirit!  :-)  Thanks again to Alan Jude and Kris Moore from the <a href="http://www.bsdnow.tv/" rel="nofollow">BSD Now podcast</a> for turning me onto this company.  It has a very easy command syntax (yes, it isn’t a GUI tool – suck it up buttercup, you wanted to learn the shell didn’t you?) and even allows you to compile the thing from source if you want to.”</p>
</blockquote>

<ul>
<li>We’ve only covered some of the highlights here, but you really should take a few moments of your time today and read this top to bottom. Lots of good tips here, already thinking how I can secure my home network better.</li>
</ul>

<hr>

<h3><a href="http://producingoss.com/en/producingoss.pdf" rel="nofollow">The open source book: “Producing Open Source Software”</a></h3>

<ul>
<li>“How to Run a Successful Free Software Project” by Karl Fogel</li>
<li>9 chapters and over 200 pages of content, plus many appendices</li>
<li>Some interesting topics include:

<ul>
<li>Choosing a good name</li>
<li>version control</li>
<li>bug tracking</li>
<li>creating developer guidelines</li>
<li>setting up communications channels</li>
<li>choosing a license (although this guide leans heavily towards the GPL)</li>
<li>setting the tone of the project</li>
<li>joining or creating a Non-Profit Organization</li>
<li>the economics of open source</li>
<li>release engineering, packaging, nightly builds, etc</li>
<li>how to deal with forks</li>
</ul></li>
<li>A lot of good information packaged into this ebook</li>
<li>This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License
***</li>
</ul>

<h3><a href="http://www.venshare.com/dtrace-flamegraphs-for-freebsd-and-node-js-2/" rel="nofollow">DTrace Flamegraphs for node.js on FreeBSD </a></h3>

<ul>
<li>One of the coolest tools built on top of DTrace is flamegraphs</li>
<li>They are a very accurate, and visual way to see where a program is spending its time, which can tell you why it is slow, or where it could be improved. Further enhancements include off-cpu flame graphs, which tell you when the program is doing nothing, which can also be very useful
&gt; Recently BSD UNIXes are being acknowledged by the application development community as an interesting operating system to deploy to. This is not surprising given that FreeBSD had jails, the original container system, about 17 years ago and a lot of network focused businesses such as netflix see it as the best way to deliver content. This developer interest has led to hosting providers supporting FreeBSD. e.g. Amazon, Azure, Joyent and you can get a 2 months free instance at Digital Ocean.</li>
</ul>

<blockquote>
<p>DTrace is another vital feature for anyone who has had to deal with production issues and has been in FreeBSD since version 9. As of FreeBSD 11 the operating system now contains some great work by Fedor Indutny so you can profile node applications and create flamegraphs of node.js processes without any additional runtime flags or restarting of processes.</p>
</blockquote>

<ul>
<li>This is one of the most important things about DTrace. Many applications include some debugging functionality, but they require that you stop the application, and start it again in debugging mode. Some even require that you recompile the application in debugging mode.</li>
<li>Being able to attach DTrace to an application, while it is under load, while the problem is actively happening, can be critical to figuring out what is going on.</li>
<li><p>In order to configure your FreeBSD instance to utilize this feature make the following changes to the configuration of the server.</p>

<ul>
<li>Load the DTrace module at boot</li>
<li>Increase some DTrace limits</li>
<li>Install node with the optional DTrace feature compiled in</li>
<li>Follow the generic <a href="https://nodejs.org/en/blog/uncategorized/profiling-node-js/" rel="nofollow">node.js flamegraph tutorial</a>
&gt; I hope you find this article useful. The ability to look at a runtime in this manor has saved me twice this year and I hope it will save you in the future too. My next post on freeBSD and node.js will be looking at some scenarios on utilising the ZFS features.</li>
</ul></li>
<li><p>Also check out Brendan Gregg’s <a href="http://queue.acm.org/detail.cfm?id=2927301" rel="nofollow">ACM Queue Article</a> “The Flame Graph: This visualization of software execution is a new necessity for performance profiling and debugging”</p>

<hr></li>
</ul>

<h3><a href="https://sourceforge.net/p/sshguard/mailman/message/35580961/" rel="nofollow">SSHGuard 2.0 Call for Testing</a></h3>

<ul>
<li>SSHGuard is a tool for monitoring brute force attempts and blocking them</li>
<li>It has been a favourite of mine for a while because it runs as a pipe from syslogd, rather than reading the log files from the disk</li>
</ul>

<blockquote>
<p>A lot of work to get SSHGuard working with new log sources (journalctl, macOS log) and backends (firewalld, ipset) has happened in 2.0. The new version also uses a configuration file.</p>

<p>Most importantly, SSHGuard has been split into several processes piped into one another (sshg-logmon | sshg-parser | sshg-blocker | sshg-fw). sshg-parser can run with capsicum(4) and pledge(2). sshg-blocker can be sandboxed in its default configuration (without pid file, whitelist, blacklisting) and has not been tested sandboxed in other configurations.</p>
</blockquote>

<ul>
<li>Breaking the processes up so that the sensitive bits can be sandboxes is very nice to see
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://2007.asiabsdcon.org/papers/P16-paper.pdf" rel="nofollow">pjd’s 2007 paper from AsiaBSDCon: “Porting the ZFS file system to the FreeBSD operating system”</a> </p></li>
<li><p><a href="https://vimeo.com/user60888329" rel="nofollow">A Message From the FreeBSD Foundation</a> </p></li>
<li><p><a href="http://thenewstack.io/remembering-roger-faulkner/" rel="nofollow">Remembering Roger Faulkner, Unix Champion</a> and <a href="https://news.ycombinator.com/item?id=13293596" rel="nofollow">A few HN comments (including Bryan Cantrill)</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/QtyJeHMk" rel="nofollow"> Peter - TrueOS Network</a> </li>
<li><a href="http://pastebin.com/ru726VTV" rel="nofollow"> Chris - Remote Desktop</a> </li>
<li><a href="http://pastebin.com/LQZPgF5g" rel="nofollow"> Goetz - Geli on Serial</a> </li>
<li><a href="http://pastebin.com/jFeL8zKX" rel="nofollow"> Joe - BGP</a> </li>
<li><a href="http://pastebin.com/Xq9cbmfn" rel="nofollow"> Alejandro - BSD Router</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>174: 2016 Highlights</title>
  <link>https://www.bsdnow.tv/174</link>
  <guid isPermaLink="false">129f9ebc-cd7f-4fc5-b50f-51b8d71f7504</guid>
  <pubDate>Thu, 29 Dec 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/129f9ebc-cd7f-4fc5-b50f-51b8d71f7504.mp3" length="84274708" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>A look back at 2016</itunes:subtitle>
  <itunes:duration>2:55:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;A look back at 2016&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and &amp;lt;br&amp;gt;
Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;&lt;/p&gt;&lt;h3&gt;Links&lt;/h3&gt;&lt;ul&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/92416/zfs-in-the-trenches-bsd-now-123/" target="_blank" rel="nofollow noopener"&gt;ZFS in the trenches &lt;br&gt;
| BSD Now 123&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/99991/one-small-step-for-drm-one-giant-leap-for-bsd-bsd-now-143/" target="_blank" rel="nofollow noopener"&gt;One small step for &lt;br&gt;
DRM, one giant leap for BSD | BSD Now 143&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/101501/the-laporte-has-landed-bsd-now-152/" target="_blank" rel="nofollow noopener"&gt;The Laporte has landed! | BSD Now &lt;br&gt;
152&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/102941/ham-radio-pie-oh-my-bsd-now-158/" target="_blank" rel="nofollow noopener"&gt;Ham, Radio &amp;amp; Pie, Oh &lt;br&gt;
My! | BSD Now 158&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;&lt;a href="http://www.jupiterbroadcasting.com/103626/the-foundation-of-netbsd-bsd-now-162/" target="_blank" rel="nofollow noopener"&gt;The &lt;br&gt;
Foundation of NetBSD | BSD Now 162&lt;/a&gt;&lt;/li&gt;
&lt;br&gt;
&lt;li&gt;
&lt;br&gt;
&lt;a href="http://www.jupiterbroadcasting.com/103871/return-of-the-cantrill-bsd-now-163/" target="_blank" rel="nofollow noopener"&gt;Return of the Cantrill | BSD Now 163&lt;/a&gt;

&lt;p&gt;*** &lt;/p&gt;
&lt;/li&gt;
&lt;br&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>A look back at 2016</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" <br>
title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<p><h3>Links</h3><ul><li><a href="http://www.jupiterbroadcasting.com/92416/zfs-in-the-trenches-bsd-now-123/">ZFS in the trenches <br>
| BSD Now 123</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/99991/one-small-step-for-drm-one-giant-leap-for-bsd-bsd-now-143/">One small step for <br>
DRM, one giant leap for BSD | BSD Now 143</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/101501/the-laporte-has-landed-bsd-now-152/">The Laporte has landed! | BSD Now <br>
152</a></li><li><a href="http://www.jupiterbroadcasting.com/102941/ham-radio-pie-oh-my-bsd-now-158/">Ham, Radio &amp; Pie, Oh <br>
My! | BSD Now 158</a></li><li><a href="http://www.jupiterbroadcasting.com/103626/the-foundation-of-netbsd-bsd-now-162/">The <br>
Foundation of NetBSD | BSD Now 162</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/103871/return-of-the-cantrill-bsd-now-163/">Return of the Cantrill | BSD Now 163</a></p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>A look back at 2016</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" <br>
title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<p><h3>Links</h3><ul><li><a href="http://www.jupiterbroadcasting.com/92416/zfs-in-the-trenches-bsd-now-123/">ZFS in the trenches <br>
| BSD Now 123</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/99991/one-small-step-for-drm-one-giant-leap-for-bsd-bsd-now-143/">One small step for <br>
DRM, one giant leap for BSD | BSD Now 143</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/101501/the-laporte-has-landed-bsd-now-152/">The Laporte has landed! | BSD Now <br>
152</a></li><li><a href="http://www.jupiterbroadcasting.com/102941/ham-radio-pie-oh-my-bsd-now-158/">Ham, Radio &amp; Pie, Oh <br>
My! | BSD Now 158</a></li><li><a href="http://www.jupiterbroadcasting.com/103626/the-foundation-of-netbsd-bsd-now-162/">The <br>
Foundation of NetBSD | BSD Now 162</a></li><li><a <br>
href="http://www.jupiterbroadcasting.com/103871/return-of-the-cantrill-bsd-now-163/">Return of the Cantrill | BSD Now 163</a></p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>173: Carry on my Wayland son</title>
  <link>https://www.bsdnow.tv/173</link>
  <guid isPermaLink="false">2a58c833-1f45-4da6-a9b8-fe475b5f00ea</guid>
  <pubDate>Wed, 21 Dec 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2a58c833-1f45-4da6-a9b8-fe475b5f00ea.mp3" length="53736628" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we’ve got some great stories to bring you, a look at the odder side of UNIX history</itunes:subtitle>
  <itunes:duration>1:14:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we’ve got some great stories to bring you, a look at the odder side of UNIX history&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and &amp;lt;br&amp;gt;
Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=148058309126053&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;syspatch in testing state&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Antoine Jacoutot ajacoutot@ openbsd has posted a call for testing for OpenBSD’s new syspatch tool&lt;/li&gt;
&lt;li&gt;“syspatch(8), a "binary" patch system for -release is now ready for early testing. This does not use binary diffing to update the system, but regular signed tarballs containing the updated files (ala installer).”&lt;/li&gt;
&lt;li&gt;“I would appreciate feedback on the tool. But please send it directly to &lt;em&gt;me&lt;/em&gt;, there's no need to pollute the list. This is obviously WIP and the tool may or may not change in drastic ways.”&lt;/li&gt;
&lt;li&gt;“These test binary patches are &lt;em&gt;not&lt;/em&gt; endorsed by the OpenBSD project and should not be trusted, I am only providing them to get early feedback on the tool. If all goes as planned, I am hoping that syspatch will make it into the 6.1 release; but for it to happen, I need to know how it breaks your systems :-)”&lt;/li&gt;
&lt;li&gt;&lt;a href="http://syspatch.openbsd.org/pub/OpenBSD/6.0/syspatch/amd64/README.txt" target="_blank" rel="nofollow noopener"&gt;Instructions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;If you test it, report back and let us know how it went
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2016-December/064198.html" target="_blank" rel="nofollow noopener"&gt;Weston working&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over the past few years we’ve had some user-interest in the state of Wayland / Weston on FreeBSD. In the past day or so, Johannes Lundberg has sent in a progress report to the FreeBSD mailing lists.&lt;/li&gt;
&lt;li&gt;Without further ADO:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; We had some progress with Wayland that we'd like to share.&lt;/p&gt;

&lt;p&gt;&amp;gt; Wayland (v1.12.0)&lt;br&gt;
&amp;gt;   Working&lt;/p&gt;

&lt;p&gt;&amp;gt; Weston (v1.12.0)&lt;br&gt;
&amp;gt;   Working (Porting WIP)&lt;/p&gt;

&lt;p&gt;&amp;gt; Weston-clients (installed with wayland/weston port)&lt;br&gt;
&amp;gt;   Working&lt;/p&gt;

&lt;p&gt;&amp;gt; XWayland (run X11 apps in Wayland compositor)&lt;br&gt;
&amp;gt;   Works (maximized window only) if started manually but not when&lt;br&gt;
&amp;gt;   launching X11 app from Weston.  Most likely problem with Weston IPC.&lt;/p&gt;

&lt;p&gt;&amp;gt; Sway (i3-compatible Wayland compositor)&lt;br&gt;
&amp;gt;   Working&lt;/p&gt;

&lt;p&gt;&amp;gt; SDL20 (Wayland backend)&lt;br&gt;
&amp;gt;   games/stonesoup-sdl briefly tested.&lt;br&gt;
&amp;gt;   &lt;a href="https://twitter.com/johalun/status/811334203358867456" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/johalun/status/811334203358867456&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&amp;gt; GDM (with Wayland)&lt;br&gt;
&amp;gt;   Halted - depends on logind.&lt;/p&gt;

&lt;p&gt;&amp;gt; GTK3&lt;br&gt;
&amp;gt;   gtk3-demo runs fine on Weston (might have to set GDK_BACKEND=wayland&lt;br&gt;
&amp;gt; first.&lt;br&gt;
&amp;gt;   GTK3 apps working (gedit, gnumeric, xfce4-terminal tested, xfce desktop&lt;br&gt;
&amp;gt; (4.12) does not yet support GTK3)“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Johannes goes on to give instructions on how / where you can fetch their WiP and do your own testing. At the moment you’ll need Matt Macy’s newer Intel video work, as well as their ports tree which includes all the necessary software bits.&lt;/li&gt;
&lt;li&gt;Before anybody asks, yes we are watching this for TrueOS!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://functionallyparanoid.com/2016/12/15/where-the-rubber-meets-the-road-part-two/" target="_blank" rel="nofollow noopener"&gt;Where the rubber meets the road (part two)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Continuing with our story from Brian Everly from a week ago, we have an update today on the process to dual-boot OpenBSD with Arch Linux.&lt;/li&gt;
&lt;li&gt;As we last left off, Arch was up and running on the laptop, but some quirks in the hardware meant OpenBSD would take a bit longer. &lt;/li&gt;
&lt;li&gt;With those issues resolved and the HD seen again, the next issue that reared its head was OpenBSD not seeing the partition tables on the disk. After much frustration, it was time to nuke and pave, starting with OpenBSD first this time.&lt;/li&gt;
&lt;li&gt;After a successful GPT partitioning and install of OpenBSD, he went back to installing Arch, and then the story got more interesting. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “I installed Arch as I detailed in my last post; however, when I fired up gdisk I got a weird error message:&lt;/p&gt;

&lt;p&gt;&amp;gt; “Warning! Disk size is smaller than the main header indicates! Loading secondary header from the last sector of the disk! You should use ‘v’ to verify disk integrity, and perhaps options on the expert’s menu to repair the disk.”&lt;/p&gt;

&lt;p&gt;&amp;gt; Immediately after this, I saw a second warning:&lt;/p&gt;

&lt;p&gt;&amp;gt; “Caution: Invalid backup GPT header, but valid main header; regenerating backup header from main header.”&lt;/p&gt;

&lt;p&gt;&amp;gt; And, not to be outdone, there was a third:&lt;/p&gt;

&lt;p&gt;&amp;gt; “Warning! Main and backup partition tables differ! Use the ‘c’ and ‘e’ options on the recovery &amp;amp; transformation menu to examine the two tables.”&lt;/p&gt;

&lt;p&gt;&amp;gt; Finally (not kidding), there was a fourth:&lt;/p&gt;

&lt;p&gt;&amp;gt; “Warning! One or more CRCs don’t match. You should repair the disk!”&lt;/p&gt;

&lt;p&gt;&amp;gt; Given all of that, I thought to myself, “This is probably why I couldn’t see the disk properly when I partitioned it under Linux on the OpenBSD side.  I’ll let it repair things and I should be good to go.”  I then followed the recommendation and repaired things, using the primary GPT table to recreate the backup one.  I then installed Arch and figured I was good to go.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After confirming through several additional re-installs that the behavior was reproducible, he then decided to go full on crazy,and partition with MBR. That in and of itself was a challenge, since as he mentions, not many people dual-boot OpenBSD with Linux on MBR, especially using luks and lvm!&lt;/li&gt;
&lt;li&gt;If you want to see the details on how that was done, check it out.&lt;/li&gt;
&lt;li&gt;The story ends in success though! And better yet:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Now that I have everything working, I’ll restore my config and data to Arch, configure OpenBSD the way I like it and get moving.  I’ll take some time and drop a note on the tech@ mailing list for OpenBSD to see if they can figure out what the GPT problem was I was running into.  Hopefully it will make that part of the code stronger to get an edge-case bug report like this.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Take note here, if you run into issues like this with any OS, be sure to document in detail what happened so developers can explore solutions to the issue. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.feld.me/posts/2016/12/using-freebsd-as-a-time-capsule-for-osx/" target="_blank" rel="nofollow noopener"&gt;FreeBSD and ZFS as a time capsule for OS X &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Do you have any Apple users in your life? Perhaps you run FreeBSD for ZFS somewhere else in the house or office. Well today we have a blog post from Mark Felder which shows how you can use FreeBSD as a time-capsule for your OSX systems.&lt;/li&gt;
&lt;li&gt;The setup is quite simple, to get started you’ll need packages for netatalk3 and avahi-app for service discovery.&lt;/li&gt;
&lt;li&gt;Next up will be your AFP configuration. He helpfully provides a nice example that you should be able to just cut-n-paste. Be sure to check the hosts allow lines and adjust to fit your network. Also of note will be the backup location and valid users to adjust.&lt;/li&gt;
&lt;li&gt;A little easier should be the avahi setup, which can be a straight copy-n-paste from the site, which will perform the service advertisements.&lt;/li&gt;
&lt;li&gt;The final piece is just enabling specific services in /etc/rc.conf and either starting them by hand, or rebooting. At this point your OSX systems should be able to discover the new time-capsule provider on the network and DTRT.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/ocochard/netbenches" target="_blank" rel="nofollow noopener"&gt;netbenches - FreeBSD network forwarding performance benchmark results&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Olivier Cochard-Labbé, original creator of FreeNAS, and leader of the BSD Router Project, has a github repo of network benchmarks&lt;/li&gt;
&lt;li&gt;There are many interesting results, and all of the scripts, documentation, and configuration files to run the tests yourself&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/ocochard/netbenches/tree/master/Atom_C2558_4Cores-Intel_i350/ipsec/results/fbsd12.projects-ipsec.equilibrium" target="_blank" rel="nofollow noopener"&gt;IPSec Performance on an Atom C2558, 12-head vs IPSec Performance Branch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Compared to: &lt;a href="https://github.com/ocochard/netbenches/tree/2f3bb1b3c51e454736f1fcc650c3328071834f8d/Xeon_L5630-4Cores-Intel_82599EB/ipsec/results/fbsd11.0" target="_blank" rel="nofollow noopener"&gt;Xeon L5630 2.13GHz &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;and &lt;a href="https://github.com/ocochard/netbenches/tree/305235114ba8a3748ad9681c629333f87f82613a/Atom_C2558_4Cores-Intel_i350/ipsec.ah/results/fbsd12.projects-ipsec.equilibrium" target="_blank" rel="nofollow noopener"&gt;IPSec with Authentication &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;I look forward to seeing tests on even more hardware, as people with access to different configurations try out these benchmarks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://danielmiessler.com/study/tcpdump/" target="_blank" rel="nofollow noopener"&gt;A tcpdump Tutorial and Primer with Examples&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Most users will be familiar with the basics of using tcpdump, but this tutorial/primer is likely to fill in a lot of blanks, and advance many users understanding of tcpdump&lt;/li&gt;
&lt;li&gt;“tcpdump is the premier network analysis tool for information security professionals. Having a solid grasp of this über-powerful application is mandatory for anyone desiring a thorough understanding of TCP/IP. Many prefer to use higher level analysis tools such as Wireshark, but I believe this to usually be a mistake.”&lt;/li&gt;
&lt;li&gt;tcpdump is an important tool for any system or network administrator, it is not just for security. It is often the best way to figure out why the network is not behaving as expected.&lt;/li&gt;
&lt;li&gt;“In a discipline so dependent on a true understanding of concepts vs. rote learning, it’s important to stay fluent in the underlying mechanics of the TCP/IP suite. A thorough grasp of these protocols allows one to troubleshoot at a level far beyond the average analyst, but mastery of the protocols is only possible through continued exposure to them.”&lt;/li&gt;
&lt;li&gt;Not just that, but TCP/IP is a very interesting protocol, considering how little it has changed in its 40+ year history&lt;/li&gt;
&lt;li&gt;“First off, I like to add a few options to the tcpdump command itself, depending on what I’m looking at. The first of these is -n, which requests that names are not resolved, resulting in the IPs themselves always being displayed. The second is -X, which displays both hex and ascii content within the packet.”&lt;/li&gt;
&lt;li&gt;“It’s also important to note that tcpdump only takes the first 96 bytes of data from a packet by default. If you would like to look at more, add the -s number option to the mix, where number is the number of bytes you want to capture. I recommend using 0 (zero) for a snaplength, which gets everything.”&lt;/li&gt;
&lt;li&gt;The page has a nice table of the most useful options&lt;/li&gt;
&lt;li&gt;It also has a great primer on doing basic filtering&lt;/li&gt;
&lt;li&gt;If you are relatively new to using tcpdump, I highly recommend you spend a few minutes reading through this article
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://minnie.tuhs.org/pipermail/tuhs/2016-December/007519.html" target="_blank" rel="nofollow noopener"&gt;How Unix made it to the top&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Doug McIlroy gives us a nice background post on how “Unix made it to the top”&lt;/li&gt;
&lt;li&gt;It’s fairly short / concise, so I felt it would be good to read in its entirety. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “It has often been told how the Bell Labs law department became the first non-research department to use Unix, displacing a newly acquired stand-alone word-processing system that fell short of the department's hopes because it couldn't number the lines on patent applications, as USPTO required. When Joe Ossanna heard of this, he told them about roff and promised to give it line-numbering capability the next day. They tried it and were hooked. Patent secretaries became remote members of the fellowship of the Unix lab. In due time the law department got its own machine.&lt;/p&gt;

&lt;p&gt;&amp;gt; Less well known is how Unix made it into the head office of AT&amp;amp;T. It seems that the CEO, Charlie Brown, did not like to be seen wearing glasses when he read speeches. Somehow his PR assistant learned of the CAT phototypesetter in the Unix lab and asked whether it might be possible to use it to produce scripts in large type. Of course it was. As connections to the top never hurt, the CEO's office was welcomed as another ouside user. The cost--occasionally having to develop film for the final copy of a speech--was not onerous.&lt;/p&gt;

&lt;p&gt;&amp;gt; Having teethed on speeches, the head office realized that Unix could also be useful for things that didn't need phototypesetting. Other documents began to accumulate in their directory. By the time we became aware of it, the hoard came to include minutes of AT&amp;amp;T board meetings. It didn't seem like a very good idea for us to be keeping records from the inner sanctum of the corporation on a computer where most everybody had super-user privileges. A call to the PR guy convinced him of the wisdom of keeping such things on their own premises. And so the CEO's office bought a Unix system.&lt;/p&gt;

&lt;p&gt;&amp;gt; Just as one hears of cars chosen for their cupholders, so were theseusers converted to Unix for trivial reasons: line numbers and vanity.“&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://orkinos.cmpe.boun.edu.tr/%7Ekosar/odd.html" target="_blank" rel="nofollow noopener"&gt;Odd Comments and Strange Doings in Unix&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Everybody loves easter-eggs, and today we have some fun odd ones from the history throughout UNIX told by Dennis Ritchie.&lt;/li&gt;
&lt;li&gt;First up, was a fun one where the “mv” command could sometimes print the following “values of b may give rise to dom!”&lt;/li&gt;
&lt;li&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Like most of the messages recorded in these compilations, this one was produced in some situation that we considered unlikely or as result of abuse; the details don't matter. I'm recording why the phrase was selected.&lt;/p&gt;

&lt;p&gt;&amp;gt; The very first use of Unix in the "real business" of Bell Labs was to type and produce patent applications, and for a while in the early 1970s we had three typists busily typing away in the grotty lab on the sixth floor. One day someone came in and observed on the paper sticking out of one of the Teletypes, displayed in magnificent isolation, this ominous phrase:    values of b may give rise to dom!&lt;/p&gt;

&lt;p&gt;&amp;gt; It was of course obvious that the typist had interrupted a printout (generating the "!" from the ed editor) and moved up the paper, and that the context must have been something like "varying values of beta may give rise to domain wall movement" or some other fragment of a physically plausible patent application.But the phrase itself was just so striking! Utterly meaningless, but it looks like what... a warning? What is "dom?"&lt;/p&gt;

&lt;p&gt;&amp;gt; At the same time, we were experimenting with text-to-voice software by Doug McIlroy and others, and of course the phrase was tried out with it. For whatever reason, its rendition of "give rise to dom!" accented the last word in a way that emphasized the phonetic similarity between "doom" and the first syllable of "dominance." It pronounced "beta" in the British style, "beeta." The entire occurrence became a small, shared treasure.The phrase had to be recorded somewhere, and it was, in the v6 source. Most likely it was Bob Morris who did the deed, but it could just as easily have been Ken. I hope that your browser reproduces the b as a Greek beta.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Next up is one you might have heard before: &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; /* You are not expected to understand this */&amp;gt; Every now and then on Usenet or elsewhere I run across a reference to a certain comment in the source code of the Sixth &lt;br&gt;
Edition Unix operating system.&lt;/p&gt;

&lt;p&gt;&amp;gt; I've even been given two sweatshirts that quote it.&lt;/p&gt;

&lt;p&gt;&amp;gt; Most probably just heard about it, but those who saw it in the flesh either had Sixth Edition Unix (ca. 1975) or read the annotated version of this system by John Lions (which was republished in 1996: ISBN 1-57298-013-7, Peer-to-Peer Communications).It's often quoted as a slur on the quantity or quality of the comments in the Bell Labs research releases of Unix. Not an unfair observation in general, I fear, but in this case unjustified. &lt;/p&gt;

&lt;p&gt;&amp;gt; So we tried to explain what was going on. "You are not expected to understand this" was intended as a remark in the spirit of "This won't be on the exam," rather than as an impudent challenge. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There’s a few other interesting stories as well, if the odd/fun side of UNIX history at all interests you, I would recommend checking it out.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/ed_maste/status/811289279611682816" target="_blank" rel="nofollow noopener"&gt;With patches in review the #FreeBSD base system builds 100% reproducibly&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/news-and-events/call-for-papers/bsdcan-2017/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2017 Call for Participation&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/bartekrutkowski/iocell/releases" target="_blank" rel="nofollow noopener"&gt;ioCell 2.0 released &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.tedunangst.com/flak/post/who-even-calls-link-ntoa" target="_blank" rel="nofollow noopener"&gt;who even calls link_ntoa?&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/pr1ntf/status/809528845673996288" target="_blank" rel="nofollow noopener"&gt;Booting Androidx86 under bhyve&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/016BfvU9" target="_blank" rel="nofollow noopener"&gt; Chris - VNET&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/8JJeHuRT" target="_blank" rel="nofollow noopener"&gt; Brian - Package Base&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/VC0DPQUF" target="_blank" rel="nofollow noopener"&gt; Wim - TrueOS Desktop All-n-one&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/q7pFu7pR" target="_blank" rel="nofollow noopener"&gt; Daniel - Long Boots&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/xgUnbzr7" target="_blank" rel="nofollow noopener"&gt; Bryan - ZFS / FreeNAS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/qqCvVTLB" target="_blank" rel="nofollow noopener"&gt; Bryan - FreeNAS Security&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we’ve got some great stories to bring you, a look at the odder side of UNIX history</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" <br>
title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://marc.info/?l=openbsd-tech&m=148058309126053&w=2" rel="nofollow">syspatch in testing state</a></h3>

<ul>
<li>Antoine Jacoutot ajacoutot@ openbsd has posted a call for testing for OpenBSD’s new syspatch tool</li>
<li>“syspatch(8), a &quot;binary&quot; patch system for -release is now ready for early testing. This does not use binary diffing to update the system, but regular signed tarballs containing the updated files (ala installer).”</li>
<li>“I would appreciate feedback on the tool. But please send it directly to <em>me</em>, there&#39;s no need to pollute the list. This is obviously WIP and the tool may or may not change in drastic ways.”</li>
<li>“These test binary patches are <em>not</em> endorsed by the OpenBSD project and should not be trusted, I am only providing them to get early feedback on the tool. If all goes as planned, I am hoping that syspatch will make it into the 6.1 release; but for it to happen, I need to know how it breaks your systems :-)”</li>
<li><a href="http://syspatch.openbsd.org/pub/OpenBSD/6.0/syspatch/amd64/README.txt" rel="nofollow">Instructions</a></li>
<li>If you test it, report back and let us know how it went
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2016-December/064198.html" rel="nofollow">Weston working</a></h3>

<ul>
<li>Over the past few years we’ve had some user-interest in the state of Wayland / Weston on FreeBSD. In the past day or so, Johannes Lundberg has sent in a progress report to the FreeBSD mailing lists.</li>
<li>Without further ADO:</li>
</ul>

<blockquote>
<p>We had some progress with Wayland that we&#39;d like to share.</p>

<p>Wayland (v1.12.0)<br>
  Working</p>

<p>Weston (v1.12.0)<br>
  Working (Porting WIP)</p>

<p>Weston-clients (installed with wayland/weston port)<br>
  Working</p>

<p>XWayland (run X11 apps in Wayland compositor)<br>
  Works (maximized window only) if started manually but not when<br>
  launching X11 app from Weston.  Most likely problem with Weston IPC.</p>

<p>Sway (i3-compatible Wayland compositor)<br>
  Working</p>

<p>SDL20 (Wayland backend)<br>
  games/stonesoup-sdl briefly tested.<br>
  <a href="https://twitter.com/johalun/status/811334203358867456" rel="nofollow">https://twitter.com/johalun/status/811334203358867456</a></p>

<p>GDM (with Wayland)<br>
  Halted - depends on logind.</p>

<p>GTK3<br>
  gtk3-demo runs fine on Weston (might have to set GDK_BACKEND=wayland<br>
first.<br>
  GTK3 apps working (gedit, gnumeric, xfce4-terminal tested, xfce desktop<br>
(4.12) does not yet support GTK3)“</p>
</blockquote>

<ul>
<li>Johannes goes on to give instructions on how / where you can fetch their WiP and do your own testing. At the moment you’ll need Matt Macy’s newer Intel video work, as well as their ports tree which includes all the necessary software bits.</li>
<li>Before anybody asks, yes we are watching this for TrueOS!
***</li>
</ul>

<h3><a href="https://functionallyparanoid.com/2016/12/15/where-the-rubber-meets-the-road-part-two/" rel="nofollow">Where the rubber meets the road (part two)</a></h3>

<ul>
<li>Continuing with our story from Brian Everly from a week ago, we have an update today on the process to dual-boot OpenBSD with Arch Linux.</li>
<li>As we last left off, Arch was up and running on the laptop, but some quirks in the hardware meant OpenBSD would take a bit longer. </li>
<li>With those issues resolved and the HD seen again, the next issue that reared its head was OpenBSD not seeing the partition tables on the disk. After much frustration, it was time to nuke and pave, starting with OpenBSD first this time.</li>
<li>After a successful GPT partitioning and install of OpenBSD, he went back to installing Arch, and then the story got more interesting. </li>
</ul>

<blockquote>
<p>“I installed Arch as I detailed in my last post; however, when I fired up gdisk I got a weird error message:</p>

<p>“Warning! Disk size is smaller than the main header indicates! Loading secondary header from the last sector of the disk! You should use ‘v’ to verify disk integrity, and perhaps options on the expert’s menu to repair the disk.”</p>

<p>Immediately after this, I saw a second warning:</p>

<p>“Caution: Invalid backup GPT header, but valid main header; regenerating backup header from main header.”</p>

<p>And, not to be outdone, there was a third:</p>

<p>“Warning! Main and backup partition tables differ! Use the ‘c’ and ‘e’ options on the recovery &amp; transformation menu to examine the two tables.”</p>

<p>Finally (not kidding), there was a fourth:</p>

<p>“Warning! One or more CRCs don’t match. You should repair the disk!”</p>

<p>Given all of that, I thought to myself, “This is probably why I couldn’t see the disk properly when I partitioned it under Linux on the OpenBSD side.  I’ll let it repair things and I should be good to go.”  I then followed the recommendation and repaired things, using the primary GPT table to recreate the backup one.  I then installed Arch and figured I was good to go.“</p>
</blockquote>

<ul>
<li>After confirming through several additional re-installs that the behavior was reproducible, he then decided to go full on crazy,and partition with MBR. That in and of itself was a challenge, since as he mentions, not many people dual-boot OpenBSD with Linux on MBR, especially using luks and lvm!</li>
<li>If you want to see the details on how that was done, check it out.</li>
<li>The story ends in success though! And better yet:</li>
</ul>

<blockquote>
<p>“Now that I have everything working, I’ll restore my config and data to Arch, configure OpenBSD the way I like it and get moving.  I’ll take some time and drop a note on the tech@ mailing list for OpenBSD to see if they can figure out what the GPT problem was I was running into.  Hopefully it will make that part of the code stronger to get an edge-case bug report like this.”</p>
</blockquote>

<ul>
<li>Take note here, if you run into issues like this with any OS, be sure to document in detail what happened so developers can explore solutions to the issue. 
***</li>
</ul>

<h3><a href="https://blog.feld.me/posts/2016/12/using-freebsd-as-a-time-capsule-for-osx/" rel="nofollow">FreeBSD and ZFS as a time capsule for OS X </a></h3>

<ul>
<li>Do you have any Apple users in your life? Perhaps you run FreeBSD for ZFS somewhere else in the house or office. Well today we have a blog post from Mark Felder which shows how you can use FreeBSD as a time-capsule for your OSX systems.</li>
<li>The setup is quite simple, to get started you’ll need packages for netatalk3 and avahi-app for service discovery.</li>
<li>Next up will be your AFP configuration. He helpfully provides a nice example that you should be able to just cut-n-paste. Be sure to check the hosts allow lines and adjust to fit your network. Also of note will be the backup location and valid users to adjust.</li>
<li>A little easier should be the avahi setup, which can be a straight copy-n-paste from the site, which will perform the service advertisements.</li>
<li>The final piece is just enabling specific services in /etc/rc.conf and either starting them by hand, or rebooting. At this point your OSX systems should be able to discover the new time-capsule provider on the network and DTRT.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/ocochard/netbenches" rel="nofollow">netbenches - FreeBSD network forwarding performance benchmark results</a></h3>

<ul>
<li>Olivier Cochard-Labbé, original creator of FreeNAS, and leader of the BSD Router Project, has a github repo of network benchmarks</li>
<li>There are many interesting results, and all of the scripts, documentation, and configuration files to run the tests yourself</li>
<li><a href="https://github.com/ocochard/netbenches/tree/master/Atom_C2558_4Cores-Intel_i350/ipsec/results/fbsd12.projects-ipsec.equilibrium" rel="nofollow">IPSec Performance on an Atom C2558, 12-head vs IPSec Performance Branch </a> </li>
<li>Compared to: <a href="https://github.com/ocochard/netbenches/tree/2f3bb1b3c51e454736f1fcc650c3328071834f8d/Xeon_L5630-4Cores-Intel_82599EB/ipsec/results/fbsd11.0" rel="nofollow">Xeon L5630 2.13GHz </a> </li>
<li>and <a href="https://github.com/ocochard/netbenches/tree/305235114ba8a3748ad9681c629333f87f82613a/Atom_C2558_4Cores-Intel_i350/ipsec.ah/results/fbsd12.projects-ipsec.equilibrium" rel="nofollow">IPSec with Authentication </a> </li>
<li>I look forward to seeing tests on even more hardware, as people with access to different configurations try out these benchmarks
***</li>
</ul>

<h3><a href="https://danielmiessler.com/study/tcpdump/" rel="nofollow">A tcpdump Tutorial and Primer with Examples</a></h3>

<ul>
<li>Most users will be familiar with the basics of using tcpdump, but this tutorial/primer is likely to fill in a lot of blanks, and advance many users understanding of tcpdump</li>
<li>“tcpdump is the premier network analysis tool for information security professionals. Having a solid grasp of this über-powerful application is mandatory for anyone desiring a thorough understanding of TCP/IP. Many prefer to use higher level analysis tools such as Wireshark, but I believe this to usually be a mistake.”</li>
<li>tcpdump is an important tool for any system or network administrator, it is not just for security. It is often the best way to figure out why the network is not behaving as expected.</li>
<li>“In a discipline so dependent on a true understanding of concepts vs. rote learning, it’s important to stay fluent in the underlying mechanics of the TCP/IP suite. A thorough grasp of these protocols allows one to troubleshoot at a level far beyond the average analyst, but mastery of the protocols is only possible through continued exposure to them.”</li>
<li>Not just that, but TCP/IP is a very interesting protocol, considering how little it has changed in its 40+ year history</li>
<li>“First off, I like to add a few options to the tcpdump command itself, depending on what I’m looking at. The first of these is -n, which requests that names are not resolved, resulting in the IPs themselves always being displayed. The second is -X, which displays both hex and ascii content within the packet.”</li>
<li>“It’s also important to note that tcpdump only takes the first 96 bytes of data from a packet by default. If you would like to look at more, add the -s number option to the mix, where number is the number of bytes you want to capture. I recommend using 0 (zero) for a snaplength, which gets everything.”</li>
<li>The page has a nice table of the most useful options</li>
<li>It also has a great primer on doing basic filtering</li>
<li>If you are relatively new to using tcpdump, I highly recommend you spend a few minutes reading through this article
***</li>
</ul>

<h3><a href="http://minnie.tuhs.org/pipermail/tuhs/2016-December/007519.html" rel="nofollow">How Unix made it to the top</a></h3>

<ul>
<li>Doug McIlroy gives us a nice background post on how “Unix made it to the top”</li>
<li>It’s fairly short / concise, so I felt it would be good to read in its entirety. </li>
</ul>

<blockquote>
<p>“It has often been told how the Bell Labs law department became the first non-research department to use Unix, displacing a newly acquired stand-alone word-processing system that fell short of the department&#39;s hopes because it couldn&#39;t number the lines on patent applications, as USPTO required. When Joe Ossanna heard of this, he told them about roff and promised to give it line-numbering capability the next day. They tried it and were hooked. Patent secretaries became remote members of the fellowship of the Unix lab. In due time the law department got its own machine.</p>

<p>Less well known is how Unix made it into the head office of AT&amp;T. It seems that the CEO, Charlie Brown, did not like to be seen wearing glasses when he read speeches. Somehow his PR assistant learned of the CAT phototypesetter in the Unix lab and asked whether it might be possible to use it to produce scripts in large type. Of course it was. As connections to the top never hurt, the CEO&#39;s office was welcomed as another ouside user. The cost--occasionally having to develop film for the final copy of a speech--was not onerous.</p>

<p>Having teethed on speeches, the head office realized that Unix could also be useful for things that didn&#39;t need phototypesetting. Other documents began to accumulate in their directory. By the time we became aware of it, the hoard came to include minutes of AT&amp;T board meetings. It didn&#39;t seem like a very good idea for us to be keeping records from the inner sanctum of the corporation on a computer where most everybody had super-user privileges. A call to the PR guy convinced him of the wisdom of keeping such things on their own premises. And so the CEO&#39;s office bought a Unix system.</p>

<p>Just as one hears of cars chosen for their cupholders, so were theseusers converted to Unix for trivial reasons: line numbers and vanity.“</p>
</blockquote>

<hr>

<h3><a href="http://orkinos.cmpe.boun.edu.tr/%7Ekosar/odd.html" rel="nofollow">Odd Comments and Strange Doings in Unix</a></h3>

<ul>
<li>Everybody loves easter-eggs, and today we have some fun odd ones from the history throughout UNIX told by Dennis Ritchie.</li>
<li>First up, was a fun one where the “mv” command could sometimes print the following “values of b may give rise to dom!”</li>
<li></li>
</ul>

<blockquote>
<p>“Like most of the messages recorded in these compilations, this one was produced in some situation that we considered unlikely or as result of abuse; the details don&#39;t matter. I&#39;m recording why the phrase was selected.</p>

<p>The very first use of Unix in the &quot;real business&quot; of Bell Labs was to type and produce patent applications, and for a while in the early 1970s we had three typists busily typing away in the grotty lab on the sixth floor. One day someone came in and observed on the paper sticking out of one of the Teletypes, displayed in magnificent isolation, this ominous phrase:    values of b may give rise to dom!</p>

<p>It was of course obvious that the typist had interrupted a printout (generating the &quot;!&quot; from the ed editor) and moved up the paper, and that the context must have been something like &quot;varying values of beta may give rise to domain wall movement&quot; or some other fragment of a physically plausible patent application.But the phrase itself was just so striking! Utterly meaningless, but it looks like what... a warning? What is &quot;dom?&quot;</p>

<p>At the same time, we were experimenting with text-to-voice software by Doug McIlroy and others, and of course the phrase was tried out with it. For whatever reason, its rendition of &quot;give rise to dom!&quot; accented the last word in a way that emphasized the phonetic similarity between &quot;doom&quot; and the first syllable of &quot;dominance.&quot; It pronounced &quot;beta&quot; in the British style, &quot;beeta.&quot; The entire occurrence became a small, shared treasure.The phrase had to be recorded somewhere, and it was, in the v6 source. Most likely it was Bob Morris who did the deed, but it could just as easily have been Ken. I hope that your browser reproduces the b as a Greek beta.“</p>
</blockquote>

<ul>
<li>Next up is one you might have heard before: </li>
</ul>

<blockquote>
<p>/* You are not expected to understand this */&gt; Every now and then on Usenet or elsewhere I run across a reference to a certain comment in the source code of the Sixth <br>
Edition Unix operating system.</p>

<p>I&#39;ve even been given two sweatshirts that quote it.</p>

<p>Most probably just heard about it, but those who saw it in the flesh either had Sixth Edition Unix (ca. 1975) or read the annotated version of this system by John Lions (which was republished in 1996: ISBN 1-57298-013-7, Peer-to-Peer Communications).It&#39;s often quoted as a slur on the quantity or quality of the comments in the Bell Labs research releases of Unix. Not an unfair observation in general, I fear, but in this case unjustified. </p>

<p>So we tried to explain what was going on. &quot;You are not expected to understand this&quot; was intended as a remark in the spirit of &quot;This won&#39;t be on the exam,&quot; rather than as an impudent challenge. </p>
</blockquote>

<ul>
<li>There’s a few other interesting stories as well, if the odd/fun side of UNIX history at all interests you, I would recommend checking it out.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://twitter.com/ed_maste/status/811289279611682816" rel="nofollow">With patches in review the #FreeBSD base system builds 100% reproducibly</a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/news-and-events/call-for-papers/bsdcan-2017/" rel="nofollow">BSDCan 2017 Call for Participation</a></p></li>
<li><p><a href="https://github.com/bartekrutkowski/iocell/releases" rel="nofollow">ioCell 2.0 released </a> </p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/who-even-calls-link-ntoa" rel="nofollow">who even calls link_ntoa?</a></p></li>
<li><p><a href="https://twitter.com/pr1ntf/status/809528845673996288" rel="nofollow">Booting Androidx86 under bhyve</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/016BfvU9" rel="nofollow"> Chris - VNET</a> </li>
<li><a href="http://pastebin.com/8JJeHuRT" rel="nofollow"> Brian - Package Base</a> </li>
<li><a href="http://pastebin.com/VC0DPQUF" rel="nofollow"> Wim - TrueOS Desktop All-n-one</a> </li>
<li><a href="http://pastebin.com/q7pFu7pR" rel="nofollow"> Daniel - Long Boots</a> </li>
<li><a href="http://pastebin.com/xgUnbzr7" rel="nofollow"> Bryan - ZFS / FreeNAS</a> </li>
<li><a href="http://pastebin.com/qqCvVTLB" rel="nofollow"> Bryan - FreeNAS Security</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we’ve got some great stories to bring you, a look at the odder side of UNIX history</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" <br>
title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://marc.info/?l=openbsd-tech&m=148058309126053&w=2" rel="nofollow">syspatch in testing state</a></h3>

<ul>
<li>Antoine Jacoutot ajacoutot@ openbsd has posted a call for testing for OpenBSD’s new syspatch tool</li>
<li>“syspatch(8), a &quot;binary&quot; patch system for -release is now ready for early testing. This does not use binary diffing to update the system, but regular signed tarballs containing the updated files (ala installer).”</li>
<li>“I would appreciate feedback on the tool. But please send it directly to <em>me</em>, there&#39;s no need to pollute the list. This is obviously WIP and the tool may or may not change in drastic ways.”</li>
<li>“These test binary patches are <em>not</em> endorsed by the OpenBSD project and should not be trusted, I am only providing them to get early feedback on the tool. If all goes as planned, I am hoping that syspatch will make it into the 6.1 release; but for it to happen, I need to know how it breaks your systems :-)”</li>
<li><a href="http://syspatch.openbsd.org/pub/OpenBSD/6.0/syspatch/amd64/README.txt" rel="nofollow">Instructions</a></li>
<li>If you test it, report back and let us know how it went
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2016-December/064198.html" rel="nofollow">Weston working</a></h3>

<ul>
<li>Over the past few years we’ve had some user-interest in the state of Wayland / Weston on FreeBSD. In the past day or so, Johannes Lundberg has sent in a progress report to the FreeBSD mailing lists.</li>
<li>Without further ADO:</li>
</ul>

<blockquote>
<p>We had some progress with Wayland that we&#39;d like to share.</p>

<p>Wayland (v1.12.0)<br>
  Working</p>

<p>Weston (v1.12.0)<br>
  Working (Porting WIP)</p>

<p>Weston-clients (installed with wayland/weston port)<br>
  Working</p>

<p>XWayland (run X11 apps in Wayland compositor)<br>
  Works (maximized window only) if started manually but not when<br>
  launching X11 app from Weston.  Most likely problem with Weston IPC.</p>

<p>Sway (i3-compatible Wayland compositor)<br>
  Working</p>

<p>SDL20 (Wayland backend)<br>
  games/stonesoup-sdl briefly tested.<br>
  <a href="https://twitter.com/johalun/status/811334203358867456" rel="nofollow">https://twitter.com/johalun/status/811334203358867456</a></p>

<p>GDM (with Wayland)<br>
  Halted - depends on logind.</p>

<p>GTK3<br>
  gtk3-demo runs fine on Weston (might have to set GDK_BACKEND=wayland<br>
first.<br>
  GTK3 apps working (gedit, gnumeric, xfce4-terminal tested, xfce desktop<br>
(4.12) does not yet support GTK3)“</p>
</blockquote>

<ul>
<li>Johannes goes on to give instructions on how / where you can fetch their WiP and do your own testing. At the moment you’ll need Matt Macy’s newer Intel video work, as well as their ports tree which includes all the necessary software bits.</li>
<li>Before anybody asks, yes we are watching this for TrueOS!
***</li>
</ul>

<h3><a href="https://functionallyparanoid.com/2016/12/15/where-the-rubber-meets-the-road-part-two/" rel="nofollow">Where the rubber meets the road (part two)</a></h3>

<ul>
<li>Continuing with our story from Brian Everly from a week ago, we have an update today on the process to dual-boot OpenBSD with Arch Linux.</li>
<li>As we last left off, Arch was up and running on the laptop, but some quirks in the hardware meant OpenBSD would take a bit longer. </li>
<li>With those issues resolved and the HD seen again, the next issue that reared its head was OpenBSD not seeing the partition tables on the disk. After much frustration, it was time to nuke and pave, starting with OpenBSD first this time.</li>
<li>After a successful GPT partitioning and install of OpenBSD, he went back to installing Arch, and then the story got more interesting. </li>
</ul>

<blockquote>
<p>“I installed Arch as I detailed in my last post; however, when I fired up gdisk I got a weird error message:</p>

<p>“Warning! Disk size is smaller than the main header indicates! Loading secondary header from the last sector of the disk! You should use ‘v’ to verify disk integrity, and perhaps options on the expert’s menu to repair the disk.”</p>

<p>Immediately after this, I saw a second warning:</p>

<p>“Caution: Invalid backup GPT header, but valid main header; regenerating backup header from main header.”</p>

<p>And, not to be outdone, there was a third:</p>

<p>“Warning! Main and backup partition tables differ! Use the ‘c’ and ‘e’ options on the recovery &amp; transformation menu to examine the two tables.”</p>

<p>Finally (not kidding), there was a fourth:</p>

<p>“Warning! One or more CRCs don’t match. You should repair the disk!”</p>

<p>Given all of that, I thought to myself, “This is probably why I couldn’t see the disk properly when I partitioned it under Linux on the OpenBSD side.  I’ll let it repair things and I should be good to go.”  I then followed the recommendation and repaired things, using the primary GPT table to recreate the backup one.  I then installed Arch and figured I was good to go.“</p>
</blockquote>

<ul>
<li>After confirming through several additional re-installs that the behavior was reproducible, he then decided to go full on crazy,and partition with MBR. That in and of itself was a challenge, since as he mentions, not many people dual-boot OpenBSD with Linux on MBR, especially using luks and lvm!</li>
<li>If you want to see the details on how that was done, check it out.</li>
<li>The story ends in success though! And better yet:</li>
</ul>

<blockquote>
<p>“Now that I have everything working, I’ll restore my config and data to Arch, configure OpenBSD the way I like it and get moving.  I’ll take some time and drop a note on the tech@ mailing list for OpenBSD to see if they can figure out what the GPT problem was I was running into.  Hopefully it will make that part of the code stronger to get an edge-case bug report like this.”</p>
</blockquote>

<ul>
<li>Take note here, if you run into issues like this with any OS, be sure to document in detail what happened so developers can explore solutions to the issue. 
***</li>
</ul>

<h3><a href="https://blog.feld.me/posts/2016/12/using-freebsd-as-a-time-capsule-for-osx/" rel="nofollow">FreeBSD and ZFS as a time capsule for OS X </a></h3>

<ul>
<li>Do you have any Apple users in your life? Perhaps you run FreeBSD for ZFS somewhere else in the house or office. Well today we have a blog post from Mark Felder which shows how you can use FreeBSD as a time-capsule for your OSX systems.</li>
<li>The setup is quite simple, to get started you’ll need packages for netatalk3 and avahi-app for service discovery.</li>
<li>Next up will be your AFP configuration. He helpfully provides a nice example that you should be able to just cut-n-paste. Be sure to check the hosts allow lines and adjust to fit your network. Also of note will be the backup location and valid users to adjust.</li>
<li>A little easier should be the avahi setup, which can be a straight copy-n-paste from the site, which will perform the service advertisements.</li>
<li>The final piece is just enabling specific services in /etc/rc.conf and either starting them by hand, or rebooting. At this point your OSX systems should be able to discover the new time-capsule provider on the network and DTRT.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/ocochard/netbenches" rel="nofollow">netbenches - FreeBSD network forwarding performance benchmark results</a></h3>

<ul>
<li>Olivier Cochard-Labbé, original creator of FreeNAS, and leader of the BSD Router Project, has a github repo of network benchmarks</li>
<li>There are many interesting results, and all of the scripts, documentation, and configuration files to run the tests yourself</li>
<li><a href="https://github.com/ocochard/netbenches/tree/master/Atom_C2558_4Cores-Intel_i350/ipsec/results/fbsd12.projects-ipsec.equilibrium" rel="nofollow">IPSec Performance on an Atom C2558, 12-head vs IPSec Performance Branch </a> </li>
<li>Compared to: <a href="https://github.com/ocochard/netbenches/tree/2f3bb1b3c51e454736f1fcc650c3328071834f8d/Xeon_L5630-4Cores-Intel_82599EB/ipsec/results/fbsd11.0" rel="nofollow">Xeon L5630 2.13GHz </a> </li>
<li>and <a href="https://github.com/ocochard/netbenches/tree/305235114ba8a3748ad9681c629333f87f82613a/Atom_C2558_4Cores-Intel_i350/ipsec.ah/results/fbsd12.projects-ipsec.equilibrium" rel="nofollow">IPSec with Authentication </a> </li>
<li>I look forward to seeing tests on even more hardware, as people with access to different configurations try out these benchmarks
***</li>
</ul>

<h3><a href="https://danielmiessler.com/study/tcpdump/" rel="nofollow">A tcpdump Tutorial and Primer with Examples</a></h3>

<ul>
<li>Most users will be familiar with the basics of using tcpdump, but this tutorial/primer is likely to fill in a lot of blanks, and advance many users understanding of tcpdump</li>
<li>“tcpdump is the premier network analysis tool for information security professionals. Having a solid grasp of this über-powerful application is mandatory for anyone desiring a thorough understanding of TCP/IP. Many prefer to use higher level analysis tools such as Wireshark, but I believe this to usually be a mistake.”</li>
<li>tcpdump is an important tool for any system or network administrator, it is not just for security. It is often the best way to figure out why the network is not behaving as expected.</li>
<li>“In a discipline so dependent on a true understanding of concepts vs. rote learning, it’s important to stay fluent in the underlying mechanics of the TCP/IP suite. A thorough grasp of these protocols allows one to troubleshoot at a level far beyond the average analyst, but mastery of the protocols is only possible through continued exposure to them.”</li>
<li>Not just that, but TCP/IP is a very interesting protocol, considering how little it has changed in its 40+ year history</li>
<li>“First off, I like to add a few options to the tcpdump command itself, depending on what I’m looking at. The first of these is -n, which requests that names are not resolved, resulting in the IPs themselves always being displayed. The second is -X, which displays both hex and ascii content within the packet.”</li>
<li>“It’s also important to note that tcpdump only takes the first 96 bytes of data from a packet by default. If you would like to look at more, add the -s number option to the mix, where number is the number of bytes you want to capture. I recommend using 0 (zero) for a snaplength, which gets everything.”</li>
<li>The page has a nice table of the most useful options</li>
<li>It also has a great primer on doing basic filtering</li>
<li>If you are relatively new to using tcpdump, I highly recommend you spend a few minutes reading through this article
***</li>
</ul>

<h3><a href="http://minnie.tuhs.org/pipermail/tuhs/2016-December/007519.html" rel="nofollow">How Unix made it to the top</a></h3>

<ul>
<li>Doug McIlroy gives us a nice background post on how “Unix made it to the top”</li>
<li>It’s fairly short / concise, so I felt it would be good to read in its entirety. </li>
</ul>

<blockquote>
<p>“It has often been told how the Bell Labs law department became the first non-research department to use Unix, displacing a newly acquired stand-alone word-processing system that fell short of the department&#39;s hopes because it couldn&#39;t number the lines on patent applications, as USPTO required. When Joe Ossanna heard of this, he told them about roff and promised to give it line-numbering capability the next day. They tried it and were hooked. Patent secretaries became remote members of the fellowship of the Unix lab. In due time the law department got its own machine.</p>

<p>Less well known is how Unix made it into the head office of AT&amp;T. It seems that the CEO, Charlie Brown, did not like to be seen wearing glasses when he read speeches. Somehow his PR assistant learned of the CAT phototypesetter in the Unix lab and asked whether it might be possible to use it to produce scripts in large type. Of course it was. As connections to the top never hurt, the CEO&#39;s office was welcomed as another ouside user. The cost--occasionally having to develop film for the final copy of a speech--was not onerous.</p>

<p>Having teethed on speeches, the head office realized that Unix could also be useful for things that didn&#39;t need phototypesetting. Other documents began to accumulate in their directory. By the time we became aware of it, the hoard came to include minutes of AT&amp;T board meetings. It didn&#39;t seem like a very good idea for us to be keeping records from the inner sanctum of the corporation on a computer where most everybody had super-user privileges. A call to the PR guy convinced him of the wisdom of keeping such things on their own premises. And so the CEO&#39;s office bought a Unix system.</p>

<p>Just as one hears of cars chosen for their cupholders, so were theseusers converted to Unix for trivial reasons: line numbers and vanity.“</p>
</blockquote>

<hr>

<h3><a href="http://orkinos.cmpe.boun.edu.tr/%7Ekosar/odd.html" rel="nofollow">Odd Comments and Strange Doings in Unix</a></h3>

<ul>
<li>Everybody loves easter-eggs, and today we have some fun odd ones from the history throughout UNIX told by Dennis Ritchie.</li>
<li>First up, was a fun one where the “mv” command could sometimes print the following “values of b may give rise to dom!”</li>
<li></li>
</ul>

<blockquote>
<p>“Like most of the messages recorded in these compilations, this one was produced in some situation that we considered unlikely or as result of abuse; the details don&#39;t matter. I&#39;m recording why the phrase was selected.</p>

<p>The very first use of Unix in the &quot;real business&quot; of Bell Labs was to type and produce patent applications, and for a while in the early 1970s we had three typists busily typing away in the grotty lab on the sixth floor. One day someone came in and observed on the paper sticking out of one of the Teletypes, displayed in magnificent isolation, this ominous phrase:    values of b may give rise to dom!</p>

<p>It was of course obvious that the typist had interrupted a printout (generating the &quot;!&quot; from the ed editor) and moved up the paper, and that the context must have been something like &quot;varying values of beta may give rise to domain wall movement&quot; or some other fragment of a physically plausible patent application.But the phrase itself was just so striking! Utterly meaningless, but it looks like what... a warning? What is &quot;dom?&quot;</p>

<p>At the same time, we were experimenting with text-to-voice software by Doug McIlroy and others, and of course the phrase was tried out with it. For whatever reason, its rendition of &quot;give rise to dom!&quot; accented the last word in a way that emphasized the phonetic similarity between &quot;doom&quot; and the first syllable of &quot;dominance.&quot; It pronounced &quot;beta&quot; in the British style, &quot;beeta.&quot; The entire occurrence became a small, shared treasure.The phrase had to be recorded somewhere, and it was, in the v6 source. Most likely it was Bob Morris who did the deed, but it could just as easily have been Ken. I hope that your browser reproduces the b as a Greek beta.“</p>
</blockquote>

<ul>
<li>Next up is one you might have heard before: </li>
</ul>

<blockquote>
<p>/* You are not expected to understand this */&gt; Every now and then on Usenet or elsewhere I run across a reference to a certain comment in the source code of the Sixth <br>
Edition Unix operating system.</p>

<p>I&#39;ve even been given two sweatshirts that quote it.</p>

<p>Most probably just heard about it, but those who saw it in the flesh either had Sixth Edition Unix (ca. 1975) or read the annotated version of this system by John Lions (which was republished in 1996: ISBN 1-57298-013-7, Peer-to-Peer Communications).It&#39;s often quoted as a slur on the quantity or quality of the comments in the Bell Labs research releases of Unix. Not an unfair observation in general, I fear, but in this case unjustified. </p>

<p>So we tried to explain what was going on. &quot;You are not expected to understand this&quot; was intended as a remark in the spirit of &quot;This won&#39;t be on the exam,&quot; rather than as an impudent challenge. </p>
</blockquote>

<ul>
<li>There’s a few other interesting stories as well, if the odd/fun side of UNIX history at all interests you, I would recommend checking it out.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://twitter.com/ed_maste/status/811289279611682816" rel="nofollow">With patches in review the #FreeBSD base system builds 100% reproducibly</a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/news-and-events/call-for-papers/bsdcan-2017/" rel="nofollow">BSDCan 2017 Call for Participation</a></p></li>
<li><p><a href="https://github.com/bartekrutkowski/iocell/releases" rel="nofollow">ioCell 2.0 released </a> </p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/who-even-calls-link-ntoa" rel="nofollow">who even calls link_ntoa?</a></p></li>
<li><p><a href="https://twitter.com/pr1ntf/status/809528845673996288" rel="nofollow">Booting Androidx86 under bhyve</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/016BfvU9" rel="nofollow"> Chris - VNET</a> </li>
<li><a href="http://pastebin.com/8JJeHuRT" rel="nofollow"> Brian - Package Base</a> </li>
<li><a href="http://pastebin.com/VC0DPQUF" rel="nofollow"> Wim - TrueOS Desktop All-n-one</a> </li>
<li><a href="http://pastebin.com/q7pFu7pR" rel="nofollow"> Daniel - Long Boots</a> </li>
<li><a href="http://pastebin.com/xgUnbzr7" rel="nofollow"> Bryan - ZFS / FreeNAS</a> </li>
<li><a href="http://pastebin.com/qqCvVTLB" rel="nofollow"> Bryan - FreeNAS Security</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>172: A tale of BSD from yore</title>
  <link>https://www.bsdnow.tv/172</link>
  <guid isPermaLink="false">7b623fbf-836c-4ffe-964a-39163d4439b2</guid>
  <pubDate>Wed, 14 Dec 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7b623fbf-836c-4ffe-964a-39163d4439b2.mp3" length="64918516" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we have a very special guest joining us to tell us a tale of the early days in BSD history. That plus some new OpenSSH goodness, shell scripting utilities and much more. Stay tuned for your place to B...SD!</itunes:subtitle>
  <itunes:duration>1:30:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we have a very special guest joining us to tell us a tale of the early days in BSD history. That plus some new OpenSSH goodness, shell scripting utilities and much more. Stay tuned for your place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openssh-unix-dev&amp;amp;m=148167688911316&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Call For Testing: OpenSSH 7.4 &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Getting ready to head into the holidays for for the end of 2016 means some of us will have spare time on our hands. What a perfect time to get some call for testing work done!&lt;/li&gt;
&lt;li&gt;Damien Miller has issued a public CFT for the upcoming OpenSSH 7.4 release, which considering how much we all rely on SSH I would expect will get some eager volunteers for testing.&lt;/li&gt;
&lt;li&gt;What are some of the potential breakers?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “* This release removes server support for the SSH v.1 protocol.&lt;/p&gt;

&lt;p&gt;&amp;gt; * ssh(1): Remove 3des-cbc from the client's default proposal. 64-bit&lt;br&gt;
   block ciphers are not safe in 2016 and we don't want to wait until&lt;br&gt;
   attacks like SWEET32 are extended to SSH. As 3des-cbc was the&lt;br&gt;
   only mandatory cipher in the SSH RFCs, this may cause problems&lt;br&gt;
   connecting to older devices using the default configuration,&lt;br&gt;
   but it's highly likely that such devices already need explicit&lt;br&gt;
   configuration for key exchange and hostkey algorithms already&lt;br&gt;
   anyway.&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8): Remove support for pre-authentication compression.&lt;br&gt;
   Doing compression early in the protocol probably seemed reasonable&lt;br&gt;
   in the 1990s, but today it's clearly a bad idea in terms of both&lt;br&gt;
   cryptography (cf. multiple compression oracle attacks in TLS) and&lt;br&gt;
   attack surface. Pre-auth compression support has been disabled by&lt;br&gt;
   default for &amp;gt;10 years. Support remains in the client.&lt;/p&gt;

&lt;p&gt;&amp;gt; * ssh-agent will refuse to load PKCS#11 modules outside a whitelist&lt;br&gt;
   of trusted paths by default. The path whitelist may be specified&lt;br&gt;
   at run-time.&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8): When a forced-command appears in both a certificate and&lt;br&gt;
   an authorized keys/principals command= restriction, sshd will now&lt;br&gt;
   refuse to accept the certificate unless they are identical.&lt;br&gt;
   The previous (documented) behaviour of having the certificate&lt;br&gt;
   forced-command override the other could be a bit confusing and&lt;br&gt;
   error-prone.&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8): Remove the UseLogin configuration directive and support&lt;br&gt;
   for having /bin/login manage login sessions.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What about new features? 7.4 has some of those to wake you up also:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “* ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by the&lt;br&gt;
   version in PuTTY by Simon Tatham. This allows a multiplexing&lt;br&gt;
   client to communicate with the master process using a subset of&lt;br&gt;
   the SSH packet and channels protocol over a Unix-domain socket,&lt;br&gt;
   with the main process acting as a proxy that translates channel&lt;br&gt;
   IDs, etc.  This allows multiplexing mode to run on systems that&lt;br&gt;
   lack file- descriptor passing (used by current multiplexing&lt;br&gt;
   code) and potentially, in conjunction with Unix-domain socket&lt;br&gt;
   forwarding, with the client and multiplexing master process on&lt;br&gt;
   different machines. Multiplexing proxy mode may be invoked using&lt;br&gt;
   "ssh -O proxy ..."&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8): Add a sshd_config DisableForwaring option that disables&lt;br&gt;
   X11, agent, TCP, tunnel and Unix domain socket forwarding, as well&lt;br&gt;
   as anything else we might implement in the future. Like the&lt;br&gt;
   'restrict' authorized_keys flag, this is intended to be a simple&lt;br&gt;
   and future-proof way of restricting an account.&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8), ssh(1): Support the "curve25519-sha256" key exchange&lt;br&gt;
   method. This is identical to the currently-support method named&lt;br&gt;
   "&lt;a href="mailto:curve25519-sha256@libssh.org" target="_blank" rel="nofollow noopener"&gt;curve25519-sha256@libssh.org&lt;/a&gt;".&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8): Improve handling of SIGHUP by checking to see if sshd is&lt;br&gt;
   already daemonised at startup and skipping the call to daemon(3)&lt;br&gt;
   if it is. This ensures that a SIGHUP restart of sshd(8) will&lt;br&gt;
   retain the same process-ID as the initial execution. sshd(8) will&lt;br&gt;
   also now unlink the PidFile prior to SIGHUP restart and re-create&lt;br&gt;
   it after a successful restart, rather than leaving a stale file in&lt;br&gt;
   the case of a configuration error. bz#2641&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8): Allow ClientAliveInterval and ClientAliveCountMax&lt;br&gt;
   directives to appear in sshd_config Match blocks.&lt;/p&gt;

&lt;p&gt;&amp;gt; * sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to match&lt;br&gt;
   those supported by AuthorizedKeysCommand (key, key type,&lt;br&gt;
   fingerprint, etc.) and a few more to provide access to the&lt;br&gt;
   contents of the certificate being offered.&lt;/p&gt;

&lt;p&gt;&amp;gt; * Added regression tests for string matching, address matching and&lt;br&gt;
   string sanitisation functions.&lt;/p&gt;

&lt;p&gt;&amp;gt; * Improved the key exchange fuzzer harness.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Get those tests done and be sure to send feedback, both positive and negative.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://zinascii.com/2014/how-my-printer-caused-excessive-syscalls.html" target="_blank" rel="nofollow noopener"&gt;How My Printer Caused Excessive Syscalls &amp;amp; UDP Traffic&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; “3,000 syscalls a second, on an idle machine? That doesn’t seem right. I just booted this machine. The only processes running are those required to boot the SmartOS Global Zone, which is minimal.”&lt;/p&gt;

&lt;p&gt;&amp;gt; This is a story from 2014, about debugging a machine that was being slowed down by excessive syscalls and UDP traffic. It is also an excellent walkthrough of the basics of DTrace&lt;/p&gt;

&lt;p&gt;&amp;gt; “Well, at least I have DTrace. I can use this one-liner to figure out what syscalls are being made across the entire system.”&lt;/p&gt;

&lt;p&gt;&amp;gt; dtrace -n 'syscall:::entry { @[probefunc,probename] = count(); }'&lt;/p&gt;

&lt;p&gt;&amp;gt; “Wow! That is a lot of lwp_sigmask calls. Now that I know what is being called, it’s time to find out who is doing the calling? I’ll use another one-liner to show me the most common user stacks invoking lwp_sigmask.”&lt;/p&gt;

&lt;p&gt;&amp;gt; dtrace -n 'syscall::lwp_sigmask:entry { @[ustack()] = count(); }'&lt;/p&gt;

&lt;p&gt;&amp;gt; “Okay, so this mdnsd code is causing all the trouble. What is the distribution of syscalls for the mdnsd program?”&lt;/p&gt;

&lt;p&gt;&amp;gt; dtrace -n 'syscall:::entry /execname == "mdnsd"/ { @[probefunc] = count(); } tick-1s { exit(0); }'&lt;/p&gt;

&lt;p&gt;&amp;gt; “Lots of signal masking and polling. What the hell! Why is it doing this? What is mdnsd anyways? Is there a man page? Googling for mdns reveals that it is used for resolving host names in small networks, like my home network. It uses UDP, and requires zero configuration. Nothing obvious to explain why it’s flipping out. I feel helpless. I turn to the only thing I can trust, the code.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Woah boy, this is some messy looking code. This would not pass illumos cstyle checks. Turns out this is code from Darwin—the kernel of OSX.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Hmmm…an idea pops into my computer animal brain. I wonder…I wonder if my MacBook is also experiencing abnormal syscall rates? Nooo, that can’t be it. Why would both my SmartOS server and MacBook both have the same problem? There is no good technical reason to link these two. But, then again, I’m dealing with computers here, and I’ve seen a lot of strange things over the years—I switch to my laptop.”&lt;/p&gt;

&lt;p&gt;&amp;gt; sudo dtrace -n 'syscall::: { @[execname] = count(); } tick-1s { exit(0); }'&lt;/p&gt;

&lt;p&gt;&amp;gt; Same thing, except mdns is called discoverd on OS X&lt;/p&gt;

&lt;p&gt;&amp;gt; “I ask my friend Steve Vinoski to run the same DTrace one-liner on his OSX machines. He has both Yosemite and the older Mountain Lion. But, to my dismay, neither of his machines are exhibiting high syscall rates. My search continues.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Not sure what to do next, I open the OSX Activity Monitor. In desperation I click on the Network tab.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “ HOLE—E—SHIT! Two-Hundred-and-Seventy Million packets received by discoveryd. Obviously, I need to stop looking at code and start looking at my network. I hop back onto my SmartOS machine and check network interface statistics.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Whatever is causing all this, it is sending about 200 packets a second. At this point, the only thing left to do is actually inspect some of these incoming packets. I run snoop(1M) to collect events on the e1000g0 interface, stopping at about 600 events. Then I view the first 15.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “ A constant stream of mDNS packets arriving from IP 10.0.1.8. I know that this IP is not any of my computers. The only devices left are my iPhone, AppleTV, and Canon printer. Wait a minute! The printer! Two days earlier I heard some beeping noises…”&lt;/p&gt;

&lt;p&gt;&amp;gt; “I own a Canon PIXMA MG6120 printer. It has a touch interface with a small LCD at the top, used to set various options. Since it sits next to my desk I sometimes lay things on top of it like a book or maybe a plate after I’m done eating. If I lay things in the wrong place it will activate the touch interface and cause repeated pressing. Each press makes a beeping noise. If the object lays there long enough the printer locks up and I have to reboot it. Just such events occurred two days earlier.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “I fire up dladm again to monitor incoming packets in realtime. Then I turn to the printer. I move all the crap off of it: two books, an empty plate, and the title for my Suzuki SV650 that I’ve been meaning to sell for the last year. I try to use the touch screen on top of the printer. It’s locked up, as expected. I cut power to the printer and whip my head back to my terminal.”&lt;/p&gt;

&lt;p&gt;&amp;gt; No more packet storm&lt;/p&gt;

&lt;p&gt;&amp;gt; “Giddy, I run DTrace again to count syscalls.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “I’m not sure whether to laugh or cry. I laugh, because, LOL computers. There’s some new dumb shit you deal with everyday, better to roll with the punches and laugh. You live longer that way. At least I got to flex my DTrace muscles a bit. In fact, I felt a bit like Brendan Gregg when he was debugging why OSX was dropping keystrokes.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “I didn’t bother to root cause why my printer turned into a UDP machine gun. I don’t intend to either. I have better things to do, and if rebooting solves the problem then I’m happy. Besides, I had to get back to what I was trying to do six hours before I started debugging this damn thing.”&lt;/p&gt;

&lt;p&gt;&amp;gt; There you go. The Internet of Terror has already been on your LAN for years.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://emptysqua.re/blog/getaddrinfo-cpython-mac-and-bsd/" target="_blank" rel="nofollow noopener"&gt;Making Getaddrinfo Concurrent in Python on Mac OS and BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a very fun blog post today to pass along originally authored by “A. Jesse Jiryu Davis”. Specifically the tale of one man’s quest to unify the Getaddrinfo in Python with Mac OS and BSD.&lt;/li&gt;
&lt;li&gt;To give you a small taste of this tale, let us pass along just the introduction&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Tell us about the time you made DNS resolution concurrent in Python on Mac and BSD.   No, no, you do not want to hear that story, my friends. It is nothing but old lore and #ifdefs.&lt;/p&gt;

&lt;p&gt;&amp;gt; But you made Python more scalable. The saga of Steve Jobs was sung to you by a mysterious wizard with a fanciful nickname! Tell us!&lt;/p&gt;

&lt;p&gt;&amp;gt; Gather round, then. I will tell you how I unearthed a lost secret, unbound Python from old shackles, and banished an ancient and horrible Mutex Troll. Let us begin at the beginning.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Is your interest piqued? It should be. I’m not sure we could do this blog post justice trying to read it aloud here, but definetly recommend if you want to see how he managed to get this bit of code working cross platform. (And it’s highly entertaining as well)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “A long time ago, in the 1980s, a coven of Berkeley sorcerers crafted an operating system. They named it after themselves: the Berkeley Software Distribution, or BSD. For generations they nurtured it, growing it and adding features. One night, they conjured a powerful function that could resolve hostnames to IPv4 or IPv6 addresses. It was called getaddrinfo. The function was mighty, but in years to come it would grow dangerous, for the sorcerers had not made getaddrinfo thread-safe.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “As ages passed, BSD spawned many offspring. There were FreeBSD, OpenBSD, NetBSD, and in time, Mac OS X. Each made its copy of getaddrinfo thread safe, at different times and different ways. Some operating systems retained scribes who recorded these events in the annals. Some did not.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The story continues as our hero battles the Mutex Troll and quests for ancient knowledge&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Apple engineers are not like you and me — they are a shy and secretive folk. They publish only what code they must from Darwin. Their comings and goings are recorded in no bug tracker, their works in no changelog. To learn their secrets, one must delve deep.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “There is a tiny coven of NYC BSD users who meet at the tavern called Stone Creek, near my dwelling. They are aged and fierce, but I made the Sign of the Trident and supplicated them humbly for advice, and they were kindly to me.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Spoiler: “Without a word, the mercenary troll shouldered its axe and trudged off in search of other patrons on other platforms. Never again would it hold hostage the worthy smiths forging Python code on BSD.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://diegocasati.com/2016/12/13/using-release7-to-create-freebsd-images-for-openstack-yes-you-can-do-it/" target="_blank" rel="nofollow noopener"&gt;Using release(7) to create FreeBSD images for OpenStack &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Following a recent episode where we covered a walk through on how to create FreeBSD guest OpenStack images, we wondered if it would be possible to integrate this process into the FreeBSD release(7) process, so they images could be generated consistently and automatically&lt;/li&gt;
&lt;li&gt;Being the awesome audience that you are, one of you responded by doing exactly that&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “During a recent BSDNow podcast, Allan and Kris mentioned that it would be nice to have a tutorial on how to create a FreeBSD image for OpenStack using the official release(7) tools. With that, it came to me that: #1 I do have access to an OpenStack environment and #2 I am interested in having FreeBSD as a guest image in my environment. Looks like I was up for the challenge.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Previously, I’ve had success running FreeBSD 11.0-RELEASE on OpenStack but more could/should be done. For instance, as suggested by Allan,  wouldn’t be nice to deploy the latest code from FreeBSD ? Running -STABLE or even -CURRENT ? Yes, it would. Also, wouldn’t it be nice to customize these images for a specific need? I’d say ‘Yes’ for that as well.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “After some research I found that the current openstack.conf file, located at /usr/src/release/tools/ could use some extra tweaks to get where I wanted. I’ve created and attached that to a bugzilla on the same topic. You can read about that &lt;a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=213396" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Steps:

&lt;ul&gt;
&lt;li&gt;Fetch the FreeBSD source code and extract it under /usr/src&lt;/li&gt;
&lt;li&gt;Once the code is in place, follow the regular process of build(7) and perform a &lt;code&gt;make buildworld buildkernel&lt;/code&gt;
&lt;/li&gt;
&lt;li&gt;Change into the release directory (/usr/src/release) and perform a make cloudware&lt;/li&gt;
&lt;li&gt;make cloudware-release WITH_CLOUDWARE=yes CLOUDWARE=OPENSTACK VMIMAGE=2G&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “That’s it! This will generate a qcow2 image with 1.4G in size and a raw image of 2G. The entire process uses the release(7) toolchain to generate the image and should work with newer versions of FreeBSD.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The patch has already been &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=310047" target="_blank" rel="nofollow noopener"&gt;committed to FreeBSD &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Rod Grimes - &lt;a href="mailto:rgrimes@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rgrimes@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Want to help fund the development of GPU Passthru? &lt;a href="http://bhyve.org/" target="_blank" rel="nofollow noopener"&gt;Visit bhyve.org&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.khubla.com/freebsd/configuring-the-freebsd-automounter" target="_blank" rel="nofollow noopener"&gt;Configuring the FreeBSD automounter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ever had to configure the FreeBSD auto-mounting daemon? Today we have a blog post that walks us through a few of the configuration knobs you have at your disposal.&lt;/li&gt;
&lt;li&gt;First up, Tom shows us his /etc/fstab file, and the various UFS partitions he has setup with the ‘noauto’ flag so they are not mounted at system boot.&lt;/li&gt;
&lt;li&gt;His amd.conf file is pretty basic, with just options enabled to restart mounts, and unmount on exit.&lt;/li&gt;
&lt;li&gt;Where most users will most likely want to pay attention is in the crafting of an amd.map file&lt;/li&gt;
&lt;li&gt;Within this file, we have the various command-foo which performs mounts and unmounts of targeted disks / file-systems on demand.&lt;/li&gt;
&lt;li&gt;Pay special attention to all the special chars, since those all matter and a stray or missing ; could be a source of failure.&lt;/li&gt;
&lt;li&gt;Lastly a few knobs in rc.conf will enable the various services and a reboot should confirm the functionality.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20161114174451" target="_blank" rel="nofollow noopener"&gt;l2k16 hackathon report: LibreSSL manuals now in mdoc(7)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Hackathon report by Ingo Schwarze&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Back in the spring two years ago, Kristaps Dzonsons started the pod2mdoc(1) conversion utility, and less than a month later, the LibreSSL project began. During the general summer hackathon in the same year, g2k14, Anthony Bentley started using pod2mdoc(1) for converting LibreSSL manuals to mdoc(7).”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Back then, doing so still was a pain, because pod2mdoc(1) was still full of bugs and had gaping holes in functionality. For example, Anthony was forced to basically translate the SYNOPSIS sections by hand, and to fix up .Fn and .Xr in the body by hand as well. All the same, he speedily finished all of libssl, and in the autumn of the same year, he mustered the courage to commit his work.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Near the end of the following winter, i improved the pod2mdoc(1) tool to actually become convenient in practice and started work on libcrypto, converting about 50 out of the about 190 manuals. Max Fillinger also helped a bit, converting a handful of pages, but i fear i tarried too much checking and committing his work, so he quickly gave up on the task. After that, almost nothing happened for a full year.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Now i was finally fed up with the messy situation and decided to put an end to it. So i went to Toulouse and finished the conversion of the remaining 130 manual pages in libcrypto, such that you can now view the documentation of all functions”&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://github.com/p-gen/smenu" target="_blank" rel="nofollow noopener"&gt;Interactive Terminal Utility: smenu&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ok, I’ve made no secret of my love for shell scripting. Well today we have a new (somewhat new to us) tool to bring your way.&lt;/li&gt;
&lt;li&gt;Have you ever needed to deal with large lists of data, perhaps as the result of a long specially crafted pipe?&lt;/li&gt;
&lt;li&gt;What if you need to select a specific value from a range and then continue processing?&lt;/li&gt;
&lt;li&gt;Enter ‘smenu’ which can help make your scripting life easier.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “smenu is a selection filter just like sed is an editing filter.&lt;/p&gt;

&lt;p&gt;&amp;gt; This simple tool reads words from the standard input, presents them in a cool interactive window after the current line on the terminal and writes the selected word, if any, on the standard output.&lt;/p&gt;

&lt;p&gt;&amp;gt; After having unsuccessfully searched the NET for what I wanted, I decided to try to write my own.&lt;/p&gt;

&lt;p&gt;&amp;gt; I have tried hard to made its usage as simple as possible. It should work, even when using an old vt100 terminal and is UTF-8 aware.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What this means, is in your interactive scripts, you can much easier present the user with a cursor driven menu to select from a range of possible choices. (Without needing to craft a bunch of dialog flags)&lt;/li&gt;
&lt;li&gt;Take a look, and hopefully you’ll be able to find creative uses for your shell scripts in the future.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mjg59.dreamwidth.org/45939.html" target="_blank" rel="nofollow noopener"&gt;Ubuntu still isn't free software&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; “Any redistribution of modified versions of Ubuntu must be approved, certified or provided by Canonical if you are going to associate it with the Trademarks. Otherwise you must remove and replace the Trademarks and will need to recompile the source code to create your own binaries. This does not affect your rights under any open source licence applicable to any of the components of Ubuntu. If you need us to approve, certify or provide modified versions for redistribution you will require a licence agreement from Canonical, for which you may be required to pay. For further information, please contact us”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Mark Shuttleworth &lt;a href="http://insights.ubuntu.com/2016/12/01/taking-a-stand-against-unstable-risky-unofficial-ubuntu-images/" target="_blank" rel="nofollow noopener"&gt;just blogged&lt;/a&gt; about their stance against unofficial Ubuntu images. The assertion is that a cloud hoster is providing unofficial and modified Ubuntu images, and that these images are meaningfully different from upstream Ubuntu in terms of their functionality and security. Users are attempting to make use of these images, are finding that they don't work properly and are assuming that Ubuntu is a shoddy product. This is an entirely legitimate concern, and if Canonical are acting to reduce user confusion then they should be commended for that.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “The appropriate means to handle this kind of issue is trademark law. If someone claims that something is Ubuntu when it isn't, that's probably an infringement of the trademark and it's entirely reasonable for the trademark owner to take action to protect the value associated with their trademark. But Canonical's IP policy goes much further than that - it can be interpreted as meaning[1] that you can't distribute works based on Ubuntu without paying Canonical for the privilege, even if you call it something other than Ubuntu. [1]: And by "interpreted as meaning" I mean that's what it says and Canonical refuse to say otherwise”&lt;/p&gt;

&lt;p&gt;&amp;gt; “If you ask a copyright holder if you can give a copy of their work to someone else (assuming it doesn't infringe trademark law), and they say no or insist you need an additional contract, it's not free software. If they insist that you recompile source code before you can give copies to someone else, it's not free software. Asking that you remove trademarks that would otherwise infringe trademark law is fine, but if you can't use their trademarks in non-infringing ways, that's still not free software.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “Canonical's IP policy continues to impose restrictions on all of these things, and therefore Ubuntu is not free software.”&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://opnsense.org/opnsense-16-7-10-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.7.10 released&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20161123193708&amp;amp;mode=expanded&amp;amp;count=8" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation Welcomes First Iridium Donor: Smartisan&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/blog/foundation-announces-new-uranium-donor/" target="_blank" rel="nofollow noopener"&gt;Jan Koum donates $500,000 to FreeBSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/DEMOS" target="_blank" rel="nofollow noopener"&gt;The Soviet Russia, BSD makes you&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/gRN4Lzy8" target="_blank" rel="nofollow noopener"&gt; Jason - Value&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/GZYjRmSR" target="_blank" rel="nofollow noopener"&gt; Hamza - Shell Scripting&lt;/a&gt; 

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://aikchar.me/blog/unix-shell-programming-lessons-learned.html" target="_blank" rel="nofollow noopener"&gt;Blog link&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/hEBu3Drp" target="_blank" rel="nofollow noopener"&gt; Dave - Migrating to FreeBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/1HpKqCSt" target="_blank" rel="nofollow noopener"&gt; Dan - Which BSD?&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/4Aj5ebns" target="_blank" rel="nofollow noopener"&gt; Zach - AMD Video&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we have a very special guest joining us to tell us a tale of the early days in BSD history. That plus some new OpenSSH goodness, shell scripting utilities and much more. Stay tuned for your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://marc.info/?l=openssh-unix-dev&m=148167688911316&w=2" rel="nofollow">Call For Testing: OpenSSH 7.4 </a></h3>

<ul>
<li>Getting ready to head into the holidays for for the end of 2016 means some of us will have spare time on our hands. What a perfect time to get some call for testing work done!</li>
<li>Damien Miller has issued a public CFT for the upcoming OpenSSH 7.4 release, which considering how much we all rely on SSH I would expect will get some eager volunteers for testing.</li>
<li>What are some of the potential breakers?</li>
</ul>

<blockquote>
<p>“* This release removes server support for the SSH v.1 protocol.</p>

<ul>
<li><p>ssh(1): Remove 3des-cbc from the client&#39;s default proposal. 64-bit<br>
block ciphers are not safe in 2016 and we don&#39;t want to wait until<br>
attacks like SWEET32 are extended to SSH. As 3des-cbc was the<br>
only mandatory cipher in the SSH RFCs, this may cause problems<br>
connecting to older devices using the default configuration,<br>
but it&#39;s highly likely that such devices already need explicit<br>
configuration for key exchange and hostkey algorithms already<br>
anyway.</p></li>
<li><p>sshd(8): Remove support for pre-authentication compression.<br>
Doing compression early in the protocol probably seemed reasonable<br>
in the 1990s, but today it&#39;s clearly a bad idea in terms of both<br>
cryptography (cf. multiple compression oracle attacks in TLS) and<br>
attack surface. Pre-auth compression support has been disabled by<br>
default for &gt;10 years. Support remains in the client.</p></li>
<li><p>ssh-agent will refuse to load PKCS#11 modules outside a whitelist<br>
of trusted paths by default. The path whitelist may be specified<br>
at run-time.</p></li>
<li><p>sshd(8): When a forced-command appears in both a certificate and<br>
an authorized keys/principals command= restriction, sshd will now<br>
refuse to accept the certificate unless they are identical.<br>
The previous (documented) behaviour of having the certificate<br>
forced-command override the other could be a bit confusing and<br>
error-prone.</p></li>
<li><p>sshd(8): Remove the UseLogin configuration directive and support<br>
for having /bin/login manage login sessions.“</p></li>
</ul>
</blockquote>

<ul>
<li>What about new features? 7.4 has some of those to wake you up also:</li>
</ul>

<blockquote>
<p>“* ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by the<br>
   version in PuTTY by Simon Tatham. This allows a multiplexing<br>
   client to communicate with the master process using a subset of<br>
   the SSH packet and channels protocol over a Unix-domain socket,<br>
   with the main process acting as a proxy that translates channel<br>
   IDs, etc.  This allows multiplexing mode to run on systems that<br>
   lack file- descriptor passing (used by current multiplexing<br>
   code) and potentially, in conjunction with Unix-domain socket<br>
   forwarding, with the client and multiplexing master process on<br>
   different machines. Multiplexing proxy mode may be invoked using<br>
   &quot;ssh -O proxy ...&quot;</p>

<ul>
<li><p>sshd(8): Add a sshd_config DisableForwaring option that disables<br>
X11, agent, TCP, tunnel and Unix domain socket forwarding, as well<br>
as anything else we might implement in the future. Like the<br>
&#39;restrict&#39; authorized_keys flag, this is intended to be a simple<br>
and future-proof way of restricting an account.</p></li>
<li><p>sshd(8), ssh(1): Support the &quot;curve25519-sha256&quot; key exchange<br>
method. This is identical to the currently-support method named<br>
&quot;<a href="mailto:curve25519-sha256@libssh.org" rel="nofollow">curve25519-sha256@libssh.org</a>&quot;.</p></li>
<li><p>sshd(8): Improve handling of SIGHUP by checking to see if sshd is<br>
already daemonised at startup and skipping the call to daemon(3)<br>
if it is. This ensures that a SIGHUP restart of sshd(8) will<br>
retain the same process-ID as the initial execution. sshd(8) will<br>
also now unlink the PidFile prior to SIGHUP restart and re-create<br>
it after a successful restart, rather than leaving a stale file in<br>
the case of a configuration error. bz#2641</p></li>
<li><p>sshd(8): Allow ClientAliveInterval and ClientAliveCountMax<br>
directives to appear in sshd_config Match blocks.</p></li>
<li><p>sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to match<br>
those supported by AuthorizedKeysCommand (key, key type,<br>
fingerprint, etc.) and a few more to provide access to the<br>
contents of the certificate being offered.</p></li>
<li><p>Added regression tests for string matching, address matching and<br>
string sanitisation functions.</p></li>
<li><p>Improved the key exchange fuzzer harness.“</p></li>
</ul>
</blockquote>

<ul>
<li>Get those tests done and be sure to send feedback, both positive and negative.
***</li>
</ul>

<h3><a href="https://zinascii.com/2014/how-my-printer-caused-excessive-syscalls.html" rel="nofollow">How My Printer Caused Excessive Syscalls &amp; UDP Traffic</a></h3>

<blockquote>
<p>“3,000 syscalls a second, on an idle machine? That doesn’t seem right. I just booted this machine. The only processes running are those required to boot the SmartOS Global Zone, which is minimal.”</p>

<p>This is a story from 2014, about debugging a machine that was being slowed down by excessive syscalls and UDP traffic. It is also an excellent walkthrough of the basics of DTrace</p>

<p>“Well, at least I have DTrace. I can use this one-liner to figure out what syscalls are being made across the entire system.”</p>

<p>dtrace -n &#39;syscall:::entry { @[probefunc,probename] = count(); }&#39;</p>

<p>“Wow! That is a lot of lwp_sigmask calls. Now that I know what is being called, it’s time to find out who is doing the calling? I’ll use another one-liner to show me the most common user stacks invoking lwp_sigmask.”</p>

<p>dtrace -n &#39;syscall::lwp_sigmask:entry { @[ustack()] = count(); }&#39;</p>

<p>“Okay, so this mdnsd code is causing all the trouble. What is the distribution of syscalls for the mdnsd program?”</p>

<p>dtrace -n &#39;syscall:::entry /execname == &quot;mdnsd&quot;/ { @[probefunc] = count(); } tick-1s { exit(0); }&#39;</p>

<p>“Lots of signal masking and polling. What the hell! Why is it doing this? What is mdnsd anyways? Is there a man page? Googling for mdns reveals that it is used for resolving host names in small networks, like my home network. It uses UDP, and requires zero configuration. Nothing obvious to explain why it’s flipping out. I feel helpless. I turn to the only thing I can trust, the code.”</p>

<p>“Woah boy, this is some messy looking code. This would not pass illumos cstyle checks. Turns out this is code from Darwin—the kernel of OSX.”</p>

<p>“Hmmm…an idea pops into my computer animal brain. I wonder…I wonder if my MacBook is also experiencing abnormal syscall rates? Nooo, that can’t be it. Why would both my SmartOS server and MacBook both have the same problem? There is no good technical reason to link these two. But, then again, I’m dealing with computers here, and I’ve seen a lot of strange things over the years—I switch to my laptop.”</p>

<p>sudo dtrace -n &#39;syscall::: { @[execname] = count(); } tick-1s { exit(0); }&#39;</p>

<p>Same thing, except mdns is called discoverd on OS X</p>

<p>“I ask my friend Steve Vinoski to run the same DTrace one-liner on his OSX machines. He has both Yosemite and the older Mountain Lion. But, to my dismay, neither of his machines are exhibiting high syscall rates. My search continues.”</p>

<p>“Not sure what to do next, I open the OSX Activity Monitor. In desperation I click on the Network tab.”</p>

<p>“ HOLE—E—SHIT! Two-Hundred-and-Seventy Million packets received by discoveryd. Obviously, I need to stop looking at code and start looking at my network. I hop back onto my SmartOS machine and check network interface statistics.”</p>

<p>“Whatever is causing all this, it is sending about 200 packets a second. At this point, the only thing left to do is actually inspect some of these incoming packets. I run snoop(1M) to collect events on the e1000g0 interface, stopping at about 600 events. Then I view the first 15.”</p>

<p>“ A constant stream of mDNS packets arriving from IP 10.0.1.8. I know that this IP is not any of my computers. The only devices left are my iPhone, AppleTV, and Canon printer. Wait a minute! The printer! Two days earlier I heard some beeping noises…”</p>

<p>“I own a Canon PIXMA MG6120 printer. It has a touch interface with a small LCD at the top, used to set various options. Since it sits next to my desk I sometimes lay things on top of it like a book or maybe a plate after I’m done eating. If I lay things in the wrong place it will activate the touch interface and cause repeated pressing. Each press makes a beeping noise. If the object lays there long enough the printer locks up and I have to reboot it. Just such events occurred two days earlier.”</p>

<p>“I fire up dladm again to monitor incoming packets in realtime. Then I turn to the printer. I move all the crap off of it: two books, an empty plate, and the title for my Suzuki SV650 that I’ve been meaning to sell for the last year. I try to use the touch screen on top of the printer. It’s locked up, as expected. I cut power to the printer and whip my head back to my terminal.”</p>

<p>No more packet storm</p>

<p>“Giddy, I run DTrace again to count syscalls.”</p>

<p>“I’m not sure whether to laugh or cry. I laugh, because, LOL computers. There’s some new dumb shit you deal with everyday, better to roll with the punches and laugh. You live longer that way. At least I got to flex my DTrace muscles a bit. In fact, I felt a bit like Brendan Gregg when he was debugging why OSX was dropping keystrokes.”</p>

<p>“I didn’t bother to root cause why my printer turned into a UDP machine gun. I don’t intend to either. I have better things to do, and if rebooting solves the problem then I’m happy. Besides, I had to get back to what I was trying to do six hours before I started debugging this damn thing.”</p>

<p>There you go. The Internet of Terror has already been on your LAN for years.</p>

<hr>
</blockquote>

<h3><a href="https://emptysqua.re/blog/getaddrinfo-cpython-mac-and-bsd/" rel="nofollow">Making Getaddrinfo Concurrent in Python on Mac OS and BSD</a></h3>

<ul>
<li>We have a very fun blog post today to pass along originally authored by “A. Jesse Jiryu Davis”. Specifically the tale of one man’s quest to unify the Getaddrinfo in Python with Mac OS and BSD.</li>
<li>To give you a small taste of this tale, let us pass along just the introduction</li>
</ul>

<blockquote>
<p>“Tell us about the time you made DNS resolution concurrent in Python on Mac and BSD.   No, no, you do not want to hear that story, my friends. It is nothing but old lore and #ifdefs.</p>

<p>But you made Python more scalable. The saga of Steve Jobs was sung to you by a mysterious wizard with a fanciful nickname! Tell us!</p>

<p>Gather round, then. I will tell you how I unearthed a lost secret, unbound Python from old shackles, and banished an ancient and horrible Mutex Troll. Let us begin at the beginning.“</p>
</blockquote>

<ul>
<li>Is your interest piqued? It should be. I’m not sure we could do this blog post justice trying to read it aloud here, but definetly recommend if you want to see how he managed to get this bit of code working cross platform. (And it’s highly entertaining as well)</li>
</ul>

<blockquote>
<p>“A long time ago, in the 1980s, a coven of Berkeley sorcerers crafted an operating system. They named it after themselves: the Berkeley Software Distribution, or BSD. For generations they nurtured it, growing it and adding features. One night, they conjured a powerful function that could resolve hostnames to IPv4 or IPv6 addresses. It was called getaddrinfo. The function was mighty, but in years to come it would grow dangerous, for the sorcerers had not made getaddrinfo thread-safe.”</p>

<p>“As ages passed, BSD spawned many offspring. There were FreeBSD, OpenBSD, NetBSD, and in time, Mac OS X. Each made its copy of getaddrinfo thread safe, at different times and different ways. Some operating systems retained scribes who recorded these events in the annals. Some did not.”</p>
</blockquote>

<ul>
<li>The story continues as our hero battles the Mutex Troll and quests for ancient knowledge</li>
</ul>

<blockquote>
<p>“Apple engineers are not like you and me — they are a shy and secretive folk. They publish only what code they must from Darwin. Their comings and goings are recorded in no bug tracker, their works in no changelog. To learn their secrets, one must delve deep.”</p>

<p>“There is a tiny coven of NYC BSD users who meet at the tavern called Stone Creek, near my dwelling. They are aged and fierce, but I made the Sign of the Trident and supplicated them humbly for advice, and they were kindly to me.”</p>
</blockquote>

<ul>
<li>Spoiler: “Without a word, the mercenary troll shouldered its axe and trudged off in search of other patrons on other platforms. Never again would it hold hostage the worthy smiths forging Python code on BSD.”
***</li>
</ul>

<h3><a href="https://diegocasati.com/2016/12/13/using-release7-to-create-freebsd-images-for-openstack-yes-you-can-do-it/" rel="nofollow">Using release(7) to create FreeBSD images for OpenStack </a></h3>

<ul>
<li>Following a recent episode where we covered a walk through on how to create FreeBSD guest OpenStack images, we wondered if it would be possible to integrate this process into the FreeBSD release(7) process, so they images could be generated consistently and automatically</li>
<li>Being the awesome audience that you are, one of you responded by doing exactly that</li>
</ul>

<blockquote>
<p>“During a recent BSDNow podcast, Allan and Kris mentioned that it would be nice to have a tutorial on how to create a FreeBSD image for OpenStack using the official release(7) tools. With that, it came to me that: #1 I do have access to an OpenStack environment and #2 I am interested in having FreeBSD as a guest image in my environment. Looks like I was up for the challenge.”</p>

<p>“Previously, I’ve had success running FreeBSD 11.0-RELEASE on OpenStack but more could/should be done. For instance, as suggested by Allan,  wouldn’t be nice to deploy the latest code from FreeBSD ? Running -STABLE or even -CURRENT ? Yes, it would. Also, wouldn’t it be nice to customize these images for a specific need? I’d say ‘Yes’ for that as well.”</p>

<p>“After some research I found that the current openstack.conf file, located at /usr/src/release/tools/ could use some extra tweaks to get where I wanted. I’ve created and attached that to a bugzilla on the same topic. You can read about that <a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=213396" rel="nofollow">here</a>.”</p>
</blockquote>

<ul>
<li>Steps:

<ul>
<li>Fetch the FreeBSD source code and extract it under /usr/src</li>
<li>Once the code is in place, follow the regular process of build(7) and perform a <code>make buildworld buildkernel</code></li>
<li>Change into the release directory (/usr/src/release) and perform a make cloudware</li>
<li>make cloudware-release WITH_CLOUDWARE=yes CLOUDWARE=OPENSTACK VMIMAGE=2G</li>
</ul></li>
</ul>

<blockquote>
<p>“That’s it! This will generate a qcow2 image with 1.4G in size and a raw image of 2G. The entire process uses the release(7) toolchain to generate the image and should work with newer versions of FreeBSD.”</p>

<ul>
<li>The patch has already been <a href="https://svnweb.freebsd.org/base?view=revision&revision=310047" rel="nofollow">committed to FreeBSD </a> 
***</li>
</ul>
</blockquote>

<h2>Interview - Rod Grimes - <a href="mailto:rgrimes@freebsd.org" rel="nofollow">rgrimes@freebsd.org</a></h2>

<ul>
<li>Want to help fund the development of GPU Passthru? <a href="http://bhyve.org/" rel="nofollow">Visit bhyve.org</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.khubla.com/freebsd/configuring-the-freebsd-automounter" rel="nofollow">Configuring the FreeBSD automounter</a></h3>

<ul>
<li>Ever had to configure the FreeBSD auto-mounting daemon? Today we have a blog post that walks us through a few of the configuration knobs you have at your disposal.</li>
<li>First up, Tom shows us his /etc/fstab file, and the various UFS partitions he has setup with the ‘noauto’ flag so they are not mounted at system boot.</li>
<li>His amd.conf file is pretty basic, with just options enabled to restart mounts, and unmount on exit.</li>
<li>Where most users will most likely want to pay attention is in the crafting of an amd.map file</li>
<li>Within this file, we have the various command-foo which performs mounts and unmounts of targeted disks / file-systems on demand.</li>
<li>Pay special attention to all the special chars, since those all matter and a stray or missing ; could be a source of failure.</li>
<li>Lastly a few knobs in rc.conf will enable the various services and a reboot should confirm the functionality.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20161114174451" rel="nofollow">l2k16 hackathon report: LibreSSL manuals now in mdoc(7)</a></h3>

<ul>
<li>Hackathon report by Ingo Schwarze</li>
</ul>

<blockquote>
<p>“Back in the spring two years ago, Kristaps Dzonsons started the pod2mdoc(1) conversion utility, and less than a month later, the LibreSSL project began. During the general summer hackathon in the same year, g2k14, Anthony Bentley started using pod2mdoc(1) for converting LibreSSL manuals to mdoc(7).”</p>

<p>“Back then, doing so still was a pain, because pod2mdoc(1) was still full of bugs and had gaping holes in functionality. For example, Anthony was forced to basically translate the SYNOPSIS sections by hand, and to fix up .Fn and .Xr in the body by hand as well. All the same, he speedily finished all of libssl, and in the autumn of the same year, he mustered the courage to commit his work.”</p>

<p>“Near the end of the following winter, i improved the pod2mdoc(1) tool to actually become convenient in practice and started work on libcrypto, converting about 50 out of the about 190 manuals. Max Fillinger also helped a bit, converting a handful of pages, but i fear i tarried too much checking and committing his work, so he quickly gave up on the task. After that, almost nothing happened for a full year.”</p>

<p>“Now i was finally fed up with the messy situation and decided to put an end to it. So i went to Toulouse and finished the conversion of the remaining 130 manual pages in libcrypto, such that you can now view the documentation of all functions”</p>

<hr>
</blockquote>

<h3><a href="https://github.com/p-gen/smenu" rel="nofollow">Interactive Terminal Utility: smenu</a></h3>

<ul>
<li>Ok, I’ve made no secret of my love for shell scripting. Well today we have a new (somewhat new to us) tool to bring your way.</li>
<li>Have you ever needed to deal with large lists of data, perhaps as the result of a long specially crafted pipe?</li>
<li>What if you need to select a specific value from a range and then continue processing?</li>
<li>Enter ‘smenu’ which can help make your scripting life easier.</li>
</ul>

<blockquote>
<p>“smenu is a selection filter just like sed is an editing filter.</p>

<p>This simple tool reads words from the standard input, presents them in a cool interactive window after the current line on the terminal and writes the selected word, if any, on the standard output.</p>

<p>After having unsuccessfully searched the NET for what I wanted, I decided to try to write my own.</p>

<p>I have tried hard to made its usage as simple as possible. It should work, even when using an old vt100 terminal and is UTF-8 aware.“</p>
</blockquote>

<ul>
<li>What this means, is in your interactive scripts, you can much easier present the user with a cursor driven menu to select from a range of possible choices. (Without needing to craft a bunch of dialog flags)</li>
<li>Take a look, and hopefully you’ll be able to find creative uses for your shell scripts in the future.
***</li>
</ul>

<h3><a href="http://mjg59.dreamwidth.org/45939.html" rel="nofollow">Ubuntu still isn&#39;t free software</a></h3>

<blockquote>
<p>“Any redistribution of modified versions of Ubuntu must be approved, certified or provided by Canonical if you are going to associate it with the Trademarks. Otherwise you must remove and replace the Trademarks and will need to recompile the source code to create your own binaries. This does not affect your rights under any open source licence applicable to any of the components of Ubuntu. If you need us to approve, certify or provide modified versions for redistribution you will require a licence agreement from Canonical, for which you may be required to pay. For further information, please contact us”</p>

<p>“Mark Shuttleworth <a href="http://insights.ubuntu.com/2016/12/01/taking-a-stand-against-unstable-risky-unofficial-ubuntu-images/" rel="nofollow">just blogged</a> about their stance against unofficial Ubuntu images. The assertion is that a cloud hoster is providing unofficial and modified Ubuntu images, and that these images are meaningfully different from upstream Ubuntu in terms of their functionality and security. Users are attempting to make use of these images, are finding that they don&#39;t work properly and are assuming that Ubuntu is a shoddy product. This is an entirely legitimate concern, and if Canonical are acting to reduce user confusion then they should be commended for that.”</p>

<p>“The appropriate means to handle this kind of issue is trademark law. If someone claims that something is Ubuntu when it isn&#39;t, that&#39;s probably an infringement of the trademark and it&#39;s entirely reasonable for the trademark owner to take action to protect the value associated with their trademark. But Canonical&#39;s IP policy goes much further than that - it can be interpreted as meaning[1] that you can&#39;t distribute works based on Ubuntu without paying Canonical for the privilege, even if you call it something other than Ubuntu. [1]: And by &quot;interpreted as meaning&quot; I mean that&#39;s what it says and Canonical refuse to say otherwise”</p>

<p>“If you ask a copyright holder if you can give a copy of their work to someone else (assuming it doesn&#39;t infringe trademark law), and they say no or insist you need an additional contract, it&#39;s not free software. If they insist that you recompile source code before you can give copies to someone else, it&#39;s not free software. Asking that you remove trademarks that would otherwise infringe trademark law is fine, but if you can&#39;t use their trademarks in non-infringing ways, that&#39;s still not free software.”</p>

<p>“Canonical&#39;s IP policy continues to impose restrictions on all of these things, and therefore Ubuntu is not free software.”</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://opnsense.org/opnsense-16-7-10-released/" rel="nofollow">OPNsense 16.7.10 released</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161123193708&mode=expanded&count=8" rel="nofollow">OpenBSD Foundation Welcomes First Iridium Donor: Smartisan</a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/foundation-announces-new-uranium-donor/" rel="nofollow">Jan Koum donates $500,000 to FreeBSD</a> </p></li>
<li><p><a href="https://en.wikipedia.org/wiki/DEMOS" rel="nofollow">The Soviet Russia, BSD makes you</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/gRN4Lzy8" rel="nofollow"> Jason - Value</a> </li>
<li><a href="http://pastebin.com/GZYjRmSR" rel="nofollow"> Hamza - Shell Scripting</a> 

<ul>
<li><a href="http://aikchar.me/blog/unix-shell-programming-lessons-learned.html" rel="nofollow">Blog link</a></li>
</ul></li>
<li><a href="http://pastebin.com/hEBu3Drp" rel="nofollow"> Dave - Migrating to FreeBSD</a> </li>
<li><a href="http://pastebin.com/1HpKqCSt" rel="nofollow"> Dan - Which BSD?</a> </li>
<li><a href="http://pastebin.com/4Aj5ebns" rel="nofollow"> Zach - AMD Video</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we have a very special guest joining us to tell us a tale of the early days in BSD history. That plus some new OpenSSH goodness, shell scripting utilities and much more. Stay tuned for your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://marc.info/?l=openssh-unix-dev&m=148167688911316&w=2" rel="nofollow">Call For Testing: OpenSSH 7.4 </a></h3>

<ul>
<li>Getting ready to head into the holidays for for the end of 2016 means some of us will have spare time on our hands. What a perfect time to get some call for testing work done!</li>
<li>Damien Miller has issued a public CFT for the upcoming OpenSSH 7.4 release, which considering how much we all rely on SSH I would expect will get some eager volunteers for testing.</li>
<li>What are some of the potential breakers?</li>
</ul>

<blockquote>
<p>“* This release removes server support for the SSH v.1 protocol.</p>

<ul>
<li><p>ssh(1): Remove 3des-cbc from the client&#39;s default proposal. 64-bit<br>
block ciphers are not safe in 2016 and we don&#39;t want to wait until<br>
attacks like SWEET32 are extended to SSH. As 3des-cbc was the<br>
only mandatory cipher in the SSH RFCs, this may cause problems<br>
connecting to older devices using the default configuration,<br>
but it&#39;s highly likely that such devices already need explicit<br>
configuration for key exchange and hostkey algorithms already<br>
anyway.</p></li>
<li><p>sshd(8): Remove support for pre-authentication compression.<br>
Doing compression early in the protocol probably seemed reasonable<br>
in the 1990s, but today it&#39;s clearly a bad idea in terms of both<br>
cryptography (cf. multiple compression oracle attacks in TLS) and<br>
attack surface. Pre-auth compression support has been disabled by<br>
default for &gt;10 years. Support remains in the client.</p></li>
<li><p>ssh-agent will refuse to load PKCS#11 modules outside a whitelist<br>
of trusted paths by default. The path whitelist may be specified<br>
at run-time.</p></li>
<li><p>sshd(8): When a forced-command appears in both a certificate and<br>
an authorized keys/principals command= restriction, sshd will now<br>
refuse to accept the certificate unless they are identical.<br>
The previous (documented) behaviour of having the certificate<br>
forced-command override the other could be a bit confusing and<br>
error-prone.</p></li>
<li><p>sshd(8): Remove the UseLogin configuration directive and support<br>
for having /bin/login manage login sessions.“</p></li>
</ul>
</blockquote>

<ul>
<li>What about new features? 7.4 has some of those to wake you up also:</li>
</ul>

<blockquote>
<p>“* ssh(1): Add a proxy multiplexing mode to ssh(1) inspired by the<br>
   version in PuTTY by Simon Tatham. This allows a multiplexing<br>
   client to communicate with the master process using a subset of<br>
   the SSH packet and channels protocol over a Unix-domain socket,<br>
   with the main process acting as a proxy that translates channel<br>
   IDs, etc.  This allows multiplexing mode to run on systems that<br>
   lack file- descriptor passing (used by current multiplexing<br>
   code) and potentially, in conjunction with Unix-domain socket<br>
   forwarding, with the client and multiplexing master process on<br>
   different machines. Multiplexing proxy mode may be invoked using<br>
   &quot;ssh -O proxy ...&quot;</p>

<ul>
<li><p>sshd(8): Add a sshd_config DisableForwaring option that disables<br>
X11, agent, TCP, tunnel and Unix domain socket forwarding, as well<br>
as anything else we might implement in the future. Like the<br>
&#39;restrict&#39; authorized_keys flag, this is intended to be a simple<br>
and future-proof way of restricting an account.</p></li>
<li><p>sshd(8), ssh(1): Support the &quot;curve25519-sha256&quot; key exchange<br>
method. This is identical to the currently-support method named<br>
&quot;<a href="mailto:curve25519-sha256@libssh.org" rel="nofollow">curve25519-sha256@libssh.org</a>&quot;.</p></li>
<li><p>sshd(8): Improve handling of SIGHUP by checking to see if sshd is<br>
already daemonised at startup and skipping the call to daemon(3)<br>
if it is. This ensures that a SIGHUP restart of sshd(8) will<br>
retain the same process-ID as the initial execution. sshd(8) will<br>
also now unlink the PidFile prior to SIGHUP restart and re-create<br>
it after a successful restart, rather than leaving a stale file in<br>
the case of a configuration error. bz#2641</p></li>
<li><p>sshd(8): Allow ClientAliveInterval and ClientAliveCountMax<br>
directives to appear in sshd_config Match blocks.</p></li>
<li><p>sshd(8): Add %-escapes to AuthorizedPrincipalsCommand to match<br>
those supported by AuthorizedKeysCommand (key, key type,<br>
fingerprint, etc.) and a few more to provide access to the<br>
contents of the certificate being offered.</p></li>
<li><p>Added regression tests for string matching, address matching and<br>
string sanitisation functions.</p></li>
<li><p>Improved the key exchange fuzzer harness.“</p></li>
</ul>
</blockquote>

<ul>
<li>Get those tests done and be sure to send feedback, both positive and negative.
***</li>
</ul>

<h3><a href="https://zinascii.com/2014/how-my-printer-caused-excessive-syscalls.html" rel="nofollow">How My Printer Caused Excessive Syscalls &amp; UDP Traffic</a></h3>

<blockquote>
<p>“3,000 syscalls a second, on an idle machine? That doesn’t seem right. I just booted this machine. The only processes running are those required to boot the SmartOS Global Zone, which is minimal.”</p>

<p>This is a story from 2014, about debugging a machine that was being slowed down by excessive syscalls and UDP traffic. It is also an excellent walkthrough of the basics of DTrace</p>

<p>“Well, at least I have DTrace. I can use this one-liner to figure out what syscalls are being made across the entire system.”</p>

<p>dtrace -n &#39;syscall:::entry { @[probefunc,probename] = count(); }&#39;</p>

<p>“Wow! That is a lot of lwp_sigmask calls. Now that I know what is being called, it’s time to find out who is doing the calling? I’ll use another one-liner to show me the most common user stacks invoking lwp_sigmask.”</p>

<p>dtrace -n &#39;syscall::lwp_sigmask:entry { @[ustack()] = count(); }&#39;</p>

<p>“Okay, so this mdnsd code is causing all the trouble. What is the distribution of syscalls for the mdnsd program?”</p>

<p>dtrace -n &#39;syscall:::entry /execname == &quot;mdnsd&quot;/ { @[probefunc] = count(); } tick-1s { exit(0); }&#39;</p>

<p>“Lots of signal masking and polling. What the hell! Why is it doing this? What is mdnsd anyways? Is there a man page? Googling for mdns reveals that it is used for resolving host names in small networks, like my home network. It uses UDP, and requires zero configuration. Nothing obvious to explain why it’s flipping out. I feel helpless. I turn to the only thing I can trust, the code.”</p>

<p>“Woah boy, this is some messy looking code. This would not pass illumos cstyle checks. Turns out this is code from Darwin—the kernel of OSX.”</p>

<p>“Hmmm…an idea pops into my computer animal brain. I wonder…I wonder if my MacBook is also experiencing abnormal syscall rates? Nooo, that can’t be it. Why would both my SmartOS server and MacBook both have the same problem? There is no good technical reason to link these two. But, then again, I’m dealing with computers here, and I’ve seen a lot of strange things over the years—I switch to my laptop.”</p>

<p>sudo dtrace -n &#39;syscall::: { @[execname] = count(); } tick-1s { exit(0); }&#39;</p>

<p>Same thing, except mdns is called discoverd on OS X</p>

<p>“I ask my friend Steve Vinoski to run the same DTrace one-liner on his OSX machines. He has both Yosemite and the older Mountain Lion. But, to my dismay, neither of his machines are exhibiting high syscall rates. My search continues.”</p>

<p>“Not sure what to do next, I open the OSX Activity Monitor. In desperation I click on the Network tab.”</p>

<p>“ HOLE—E—SHIT! Two-Hundred-and-Seventy Million packets received by discoveryd. Obviously, I need to stop looking at code and start looking at my network. I hop back onto my SmartOS machine and check network interface statistics.”</p>

<p>“Whatever is causing all this, it is sending about 200 packets a second. At this point, the only thing left to do is actually inspect some of these incoming packets. I run snoop(1M) to collect events on the e1000g0 interface, stopping at about 600 events. Then I view the first 15.”</p>

<p>“ A constant stream of mDNS packets arriving from IP 10.0.1.8. I know that this IP is not any of my computers. The only devices left are my iPhone, AppleTV, and Canon printer. Wait a minute! The printer! Two days earlier I heard some beeping noises…”</p>

<p>“I own a Canon PIXMA MG6120 printer. It has a touch interface with a small LCD at the top, used to set various options. Since it sits next to my desk I sometimes lay things on top of it like a book or maybe a plate after I’m done eating. If I lay things in the wrong place it will activate the touch interface and cause repeated pressing. Each press makes a beeping noise. If the object lays there long enough the printer locks up and I have to reboot it. Just such events occurred two days earlier.”</p>

<p>“I fire up dladm again to monitor incoming packets in realtime. Then I turn to the printer. I move all the crap off of it: two books, an empty plate, and the title for my Suzuki SV650 that I’ve been meaning to sell for the last year. I try to use the touch screen on top of the printer. It’s locked up, as expected. I cut power to the printer and whip my head back to my terminal.”</p>

<p>No more packet storm</p>

<p>“Giddy, I run DTrace again to count syscalls.”</p>

<p>“I’m not sure whether to laugh or cry. I laugh, because, LOL computers. There’s some new dumb shit you deal with everyday, better to roll with the punches and laugh. You live longer that way. At least I got to flex my DTrace muscles a bit. In fact, I felt a bit like Brendan Gregg when he was debugging why OSX was dropping keystrokes.”</p>

<p>“I didn’t bother to root cause why my printer turned into a UDP machine gun. I don’t intend to either. I have better things to do, and if rebooting solves the problem then I’m happy. Besides, I had to get back to what I was trying to do six hours before I started debugging this damn thing.”</p>

<p>There you go. The Internet of Terror has already been on your LAN for years.</p>

<hr>
</blockquote>

<h3><a href="https://emptysqua.re/blog/getaddrinfo-cpython-mac-and-bsd/" rel="nofollow">Making Getaddrinfo Concurrent in Python on Mac OS and BSD</a></h3>

<ul>
<li>We have a very fun blog post today to pass along originally authored by “A. Jesse Jiryu Davis”. Specifically the tale of one man’s quest to unify the Getaddrinfo in Python with Mac OS and BSD.</li>
<li>To give you a small taste of this tale, let us pass along just the introduction</li>
</ul>

<blockquote>
<p>“Tell us about the time you made DNS resolution concurrent in Python on Mac and BSD.   No, no, you do not want to hear that story, my friends. It is nothing but old lore and #ifdefs.</p>

<p>But you made Python more scalable. The saga of Steve Jobs was sung to you by a mysterious wizard with a fanciful nickname! Tell us!</p>

<p>Gather round, then. I will tell you how I unearthed a lost secret, unbound Python from old shackles, and banished an ancient and horrible Mutex Troll. Let us begin at the beginning.“</p>
</blockquote>

<ul>
<li>Is your interest piqued? It should be. I’m not sure we could do this blog post justice trying to read it aloud here, but definetly recommend if you want to see how he managed to get this bit of code working cross platform. (And it’s highly entertaining as well)</li>
</ul>

<blockquote>
<p>“A long time ago, in the 1980s, a coven of Berkeley sorcerers crafted an operating system. They named it after themselves: the Berkeley Software Distribution, or BSD. For generations they nurtured it, growing it and adding features. One night, they conjured a powerful function that could resolve hostnames to IPv4 or IPv6 addresses. It was called getaddrinfo. The function was mighty, but in years to come it would grow dangerous, for the sorcerers had not made getaddrinfo thread-safe.”</p>

<p>“As ages passed, BSD spawned many offspring. There were FreeBSD, OpenBSD, NetBSD, and in time, Mac OS X. Each made its copy of getaddrinfo thread safe, at different times and different ways. Some operating systems retained scribes who recorded these events in the annals. Some did not.”</p>
</blockquote>

<ul>
<li>The story continues as our hero battles the Mutex Troll and quests for ancient knowledge</li>
</ul>

<blockquote>
<p>“Apple engineers are not like you and me — they are a shy and secretive folk. They publish only what code they must from Darwin. Their comings and goings are recorded in no bug tracker, their works in no changelog. To learn their secrets, one must delve deep.”</p>

<p>“There is a tiny coven of NYC BSD users who meet at the tavern called Stone Creek, near my dwelling. They are aged and fierce, but I made the Sign of the Trident and supplicated them humbly for advice, and they were kindly to me.”</p>
</blockquote>

<ul>
<li>Spoiler: “Without a word, the mercenary troll shouldered its axe and trudged off in search of other patrons on other platforms. Never again would it hold hostage the worthy smiths forging Python code on BSD.”
***</li>
</ul>

<h3><a href="https://diegocasati.com/2016/12/13/using-release7-to-create-freebsd-images-for-openstack-yes-you-can-do-it/" rel="nofollow">Using release(7) to create FreeBSD images for OpenStack </a></h3>

<ul>
<li>Following a recent episode where we covered a walk through on how to create FreeBSD guest OpenStack images, we wondered if it would be possible to integrate this process into the FreeBSD release(7) process, so they images could be generated consistently and automatically</li>
<li>Being the awesome audience that you are, one of you responded by doing exactly that</li>
</ul>

<blockquote>
<p>“During a recent BSDNow podcast, Allan and Kris mentioned that it would be nice to have a tutorial on how to create a FreeBSD image for OpenStack using the official release(7) tools. With that, it came to me that: #1 I do have access to an OpenStack environment and #2 I am interested in having FreeBSD as a guest image in my environment. Looks like I was up for the challenge.”</p>

<p>“Previously, I’ve had success running FreeBSD 11.0-RELEASE on OpenStack but more could/should be done. For instance, as suggested by Allan,  wouldn’t be nice to deploy the latest code from FreeBSD ? Running -STABLE or even -CURRENT ? Yes, it would. Also, wouldn’t it be nice to customize these images for a specific need? I’d say ‘Yes’ for that as well.”</p>

<p>“After some research I found that the current openstack.conf file, located at /usr/src/release/tools/ could use some extra tweaks to get where I wanted. I’ve created and attached that to a bugzilla on the same topic. You can read about that <a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=213396" rel="nofollow">here</a>.”</p>
</blockquote>

<ul>
<li>Steps:

<ul>
<li>Fetch the FreeBSD source code and extract it under /usr/src</li>
<li>Once the code is in place, follow the regular process of build(7) and perform a <code>make buildworld buildkernel</code></li>
<li>Change into the release directory (/usr/src/release) and perform a make cloudware</li>
<li>make cloudware-release WITH_CLOUDWARE=yes CLOUDWARE=OPENSTACK VMIMAGE=2G</li>
</ul></li>
</ul>

<blockquote>
<p>“That’s it! This will generate a qcow2 image with 1.4G in size and a raw image of 2G. The entire process uses the release(7) toolchain to generate the image and should work with newer versions of FreeBSD.”</p>

<ul>
<li>The patch has already been <a href="https://svnweb.freebsd.org/base?view=revision&revision=310047" rel="nofollow">committed to FreeBSD </a> 
***</li>
</ul>
</blockquote>

<h2>Interview - Rod Grimes - <a href="mailto:rgrimes@freebsd.org" rel="nofollow">rgrimes@freebsd.org</a></h2>

<ul>
<li>Want to help fund the development of GPU Passthru? <a href="http://bhyve.org/" rel="nofollow">Visit bhyve.org</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.khubla.com/freebsd/configuring-the-freebsd-automounter" rel="nofollow">Configuring the FreeBSD automounter</a></h3>

<ul>
<li>Ever had to configure the FreeBSD auto-mounting daemon? Today we have a blog post that walks us through a few of the configuration knobs you have at your disposal.</li>
<li>First up, Tom shows us his /etc/fstab file, and the various UFS partitions he has setup with the ‘noauto’ flag so they are not mounted at system boot.</li>
<li>His amd.conf file is pretty basic, with just options enabled to restart mounts, and unmount on exit.</li>
<li>Where most users will most likely want to pay attention is in the crafting of an amd.map file</li>
<li>Within this file, we have the various command-foo which performs mounts and unmounts of targeted disks / file-systems on demand.</li>
<li>Pay special attention to all the special chars, since those all matter and a stray or missing ; could be a source of failure.</li>
<li>Lastly a few knobs in rc.conf will enable the various services and a reboot should confirm the functionality.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20161114174451" rel="nofollow">l2k16 hackathon report: LibreSSL manuals now in mdoc(7)</a></h3>

<ul>
<li>Hackathon report by Ingo Schwarze</li>
</ul>

<blockquote>
<p>“Back in the spring two years ago, Kristaps Dzonsons started the pod2mdoc(1) conversion utility, and less than a month later, the LibreSSL project began. During the general summer hackathon in the same year, g2k14, Anthony Bentley started using pod2mdoc(1) for converting LibreSSL manuals to mdoc(7).”</p>

<p>“Back then, doing so still was a pain, because pod2mdoc(1) was still full of bugs and had gaping holes in functionality. For example, Anthony was forced to basically translate the SYNOPSIS sections by hand, and to fix up .Fn and .Xr in the body by hand as well. All the same, he speedily finished all of libssl, and in the autumn of the same year, he mustered the courage to commit his work.”</p>

<p>“Near the end of the following winter, i improved the pod2mdoc(1) tool to actually become convenient in practice and started work on libcrypto, converting about 50 out of the about 190 manuals. Max Fillinger also helped a bit, converting a handful of pages, but i fear i tarried too much checking and committing his work, so he quickly gave up on the task. After that, almost nothing happened for a full year.”</p>

<p>“Now i was finally fed up with the messy situation and decided to put an end to it. So i went to Toulouse and finished the conversion of the remaining 130 manual pages in libcrypto, such that you can now view the documentation of all functions”</p>

<hr>
</blockquote>

<h3><a href="https://github.com/p-gen/smenu" rel="nofollow">Interactive Terminal Utility: smenu</a></h3>

<ul>
<li>Ok, I’ve made no secret of my love for shell scripting. Well today we have a new (somewhat new to us) tool to bring your way.</li>
<li>Have you ever needed to deal with large lists of data, perhaps as the result of a long specially crafted pipe?</li>
<li>What if you need to select a specific value from a range and then continue processing?</li>
<li>Enter ‘smenu’ which can help make your scripting life easier.</li>
</ul>

<blockquote>
<p>“smenu is a selection filter just like sed is an editing filter.</p>

<p>This simple tool reads words from the standard input, presents them in a cool interactive window after the current line on the terminal and writes the selected word, if any, on the standard output.</p>

<p>After having unsuccessfully searched the NET for what I wanted, I decided to try to write my own.</p>

<p>I have tried hard to made its usage as simple as possible. It should work, even when using an old vt100 terminal and is UTF-8 aware.“</p>
</blockquote>

<ul>
<li>What this means, is in your interactive scripts, you can much easier present the user with a cursor driven menu to select from a range of possible choices. (Without needing to craft a bunch of dialog flags)</li>
<li>Take a look, and hopefully you’ll be able to find creative uses for your shell scripts in the future.
***</li>
</ul>

<h3><a href="http://mjg59.dreamwidth.org/45939.html" rel="nofollow">Ubuntu still isn&#39;t free software</a></h3>

<blockquote>
<p>“Any redistribution of modified versions of Ubuntu must be approved, certified or provided by Canonical if you are going to associate it with the Trademarks. Otherwise you must remove and replace the Trademarks and will need to recompile the source code to create your own binaries. This does not affect your rights under any open source licence applicable to any of the components of Ubuntu. If you need us to approve, certify or provide modified versions for redistribution you will require a licence agreement from Canonical, for which you may be required to pay. For further information, please contact us”</p>

<p>“Mark Shuttleworth <a href="http://insights.ubuntu.com/2016/12/01/taking-a-stand-against-unstable-risky-unofficial-ubuntu-images/" rel="nofollow">just blogged</a> about their stance against unofficial Ubuntu images. The assertion is that a cloud hoster is providing unofficial and modified Ubuntu images, and that these images are meaningfully different from upstream Ubuntu in terms of their functionality and security. Users are attempting to make use of these images, are finding that they don&#39;t work properly and are assuming that Ubuntu is a shoddy product. This is an entirely legitimate concern, and if Canonical are acting to reduce user confusion then they should be commended for that.”</p>

<p>“The appropriate means to handle this kind of issue is trademark law. If someone claims that something is Ubuntu when it isn&#39;t, that&#39;s probably an infringement of the trademark and it&#39;s entirely reasonable for the trademark owner to take action to protect the value associated with their trademark. But Canonical&#39;s IP policy goes much further than that - it can be interpreted as meaning[1] that you can&#39;t distribute works based on Ubuntu without paying Canonical for the privilege, even if you call it something other than Ubuntu. [1]: And by &quot;interpreted as meaning&quot; I mean that&#39;s what it says and Canonical refuse to say otherwise”</p>

<p>“If you ask a copyright holder if you can give a copy of their work to someone else (assuming it doesn&#39;t infringe trademark law), and they say no or insist you need an additional contract, it&#39;s not free software. If they insist that you recompile source code before you can give copies to someone else, it&#39;s not free software. Asking that you remove trademarks that would otherwise infringe trademark law is fine, but if you can&#39;t use their trademarks in non-infringing ways, that&#39;s still not free software.”</p>

<p>“Canonical&#39;s IP policy continues to impose restrictions on all of these things, and therefore Ubuntu is not free software.”</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://opnsense.org/opnsense-16-7-10-released/" rel="nofollow">OPNsense 16.7.10 released</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161123193708&mode=expanded&count=8" rel="nofollow">OpenBSD Foundation Welcomes First Iridium Donor: Smartisan</a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/foundation-announces-new-uranium-donor/" rel="nofollow">Jan Koum donates $500,000 to FreeBSD</a> </p></li>
<li><p><a href="https://en.wikipedia.org/wiki/DEMOS" rel="nofollow">The Soviet Russia, BSD makes you</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/gRN4Lzy8" rel="nofollow"> Jason - Value</a> </li>
<li><a href="http://pastebin.com/GZYjRmSR" rel="nofollow"> Hamza - Shell Scripting</a> 

<ul>
<li><a href="http://aikchar.me/blog/unix-shell-programming-lessons-learned.html" rel="nofollow">Blog link</a></li>
</ul></li>
<li><a href="http://pastebin.com/hEBu3Drp" rel="nofollow"> Dave - Migrating to FreeBSD</a> </li>
<li><a href="http://pastebin.com/1HpKqCSt" rel="nofollow"> Dan - Which BSD?</a> </li>
<li><a href="http://pastebin.com/4Aj5ebns" rel="nofollow"> Zach - AMD Video</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>171: The APU - BSD Style!</title>
  <link>https://www.bsdnow.tv/171</link>
  <guid isPermaLink="false">a62aa20a-ad86-4e21-b547-cd53c38c6b46</guid>
  <pubDate>Wed, 07 Dec 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a62aa20a-ad86-4e21-b547-cd53c38c6b46.mp3" length="62802580" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Today on the show, we’ve got a look at running OpenBSD on a APU, some BSD in your Android, managing your own FreeBSD cloud service with ansible and much more. Keep it turned on your place to B...SD!</itunes:subtitle>
  <itunes:duration>1:27:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Today on the show, we’ve got a look at running OpenBSD on a APU, some BSD in your Android, managing your own FreeBSD cloud service with ansible and much more. Keep it turned on your place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/elad/openbsd-apu2" target="_blank" rel="nofollow noopener"&gt;OpenBSD on PC Engines APU2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A detailed walkthrough of building an OpenBSD firewall on a PC Engines APU2&lt;/li&gt;
&lt;li&gt;It starts with a breakdown of the parts that were purchases, totally around $200&lt;/li&gt;
&lt;li&gt;Then the reader is walked through configuring the serial console, flashing the ROM, and updating the BIOS&lt;/li&gt;
&lt;li&gt;The next step is actually creating a custom OpenBSD install image, and pre-configuring its serial console. Starting with OpenBSD 6.0, this step is done automatically by the installer&lt;/li&gt;
&lt;li&gt;Installation:

&lt;ul&gt;
&lt;li&gt;Power off the APU2&lt;/li&gt;
&lt;li&gt;Insert the bootable OpenBSD installer USB flash drive to one of the USB slots on the APU2&lt;/li&gt;
&lt;li&gt;Power on the APU2, press F10 to get to the boot menu, and choose to boot from USB (usually option number 1)&lt;/li&gt;
&lt;li&gt;At the boot&amp;gt; prompt, remember the serial console settings (see above)&lt;/li&gt;
&lt;li&gt;Also at the boot&amp;gt; prompt, press Enter to start the installer&lt;/li&gt;
&lt;li&gt;Follow the installation instructions&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The driver used for wireless networking is athn(4). It might not work properly out of the box. Once OpenBSD is installed, run fw_update with no arguments. It will figure out which firmware updates are required and will download and install them. When it finishes, reboot.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://functionallyparanoid.com/2016/11/29/where-the-rubber-meets-the-road-part-one/" target="_blank" rel="nofollow noopener"&gt;Where the rubber meets the road… (part one)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A user describes their adventures installing OpenBSD and Arch Linux on a new Lenovo X1 Carbon (4th gen, skylake)&lt;/li&gt;
&lt;li&gt;They also detail why they moved away from their beloved Macbook, which while long, does describe a journey away from Apple that we’ve heard elsewhere.&lt;/li&gt;
&lt;li&gt;The journey begins with getting a new Windows laptop, shrinking the partition and creating space for a triple-boot install, of Windows / Arch / OpenBSD&lt;/li&gt;
&lt;li&gt;Brian then details how he setup the partitioning and performed the initial Arch installation, getting it tuned to his specifications.&lt;/li&gt;
&lt;li&gt;Next up was OpenBSD though, and that went sideways initially due to a new NVMe drive that wasn’t fully supported (yet)&lt;/li&gt;
&lt;li&gt;The article is split into two parts (we will bring you the next installment at a future date), but he leaves us with the plan of attack to build a custom OpenBSD kernel with corrected PCI device identifiers.&lt;/li&gt;
&lt;li&gt;We wish Brian luck, and look forward to the “rest of the story” soon.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/JoergFiedler/freebsd-ansible-demo" target="_blank" rel="nofollow noopener"&gt;Howto setup a FreeBSD jail server using iocage and ansible.&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Setting up a FreeBSD jail server can be a daunting task. However when a guide comes along which shows you how to do that, including not exposing a single (non-jailed) port to the outside world, you know we had a take a closer look.&lt;/li&gt;
&lt;li&gt;This guide comes to us from GitHub, courtesy of Joerg Fielder. &lt;/li&gt;
&lt;li&gt;&lt;p&gt;The project goals seem notable:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Ansible playbook that creates a FreeBSD server which hosts multiple jails.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Travis is used to run/test the playbook.&lt;/li&gt;
&lt;li&gt;No service on the host is exposed externally.&lt;/li&gt;
&lt;li&gt;All external connections terminate within a jail.&lt;/li&gt;
&lt;li&gt;Roles can be reused using Ansible Galaxy.&lt;/li&gt;
&lt;li&gt;Combine any of those roles to create FreeBSD server, which perfectly suits you.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;To get started, you’ll need a machine with Ansible, Vagrant and VirtualBox, and your credentials to AWS if you want it to automatically create / destroy EC2 instances.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;There’s already an impressive list of Anisible roles created for you to start with:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;freebsd-build-server - Creates a FreeBSD poudriere build server&lt;/li&gt;
&lt;li&gt;freebsd-jail-host - FreeBSD Jail host&lt;/li&gt;
&lt;li&gt;freebsd-jailed - Provides a jail&lt;/li&gt;
&lt;li&gt;freebsd-jailed-nginx - Provides a jailed nginx server&lt;/li&gt;
&lt;li&gt;freebsd-jailed-php-fpm - Creates a php-fpm pool and a ZFS dataset which is used as web root by php-fpm&lt;/li&gt;
&lt;li&gt;freebsd-jailed-sftp - Installs a SFTP server&lt;/li&gt;
&lt;li&gt;freebsd-jailed-sshd - Provides a jailed sshd server.&lt;/li&gt;
&lt;li&gt;freebsd-jailed-syslogd - Provides a jailed syslogd&lt;/li&gt;
&lt;li&gt;freebsd-jailed-btsync - Provides a jailed btsync instance server&lt;/li&gt;
&lt;li&gt;freebsd-jailed-joomla - Installs Joomla&lt;/li&gt;
&lt;li&gt;freebsd-jailed-mariadb - Provides a jailed MariaDB server&lt;/li&gt;
&lt;li&gt;freebsd-jailed-wordpress - Provides a jailed Wordpress server.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Since the machines have to be customized before starting, he mentions that cloud-init is used to do the following:&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;activate pf firewall&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;add a pass all keep state rule to pf to keep track of connection states, which in turn allows you to reload the pf service without losing the connection&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;install the following packages:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;sudo&lt;/li&gt;
&lt;li&gt;bash&lt;/li&gt;
&lt;li&gt;python27&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;allow passwordless sudo for user ec2-user&lt;br&gt;
“&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;From there it is pretty straight-forward, just a couple commands to spin up the VM’s either locally on your VirtualBox host, or in the cloud with AWS. Internally the VM’s are auto-configured with iocage to create jails, where all your actual services run.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A neat project, check it out today if you want a shake-n-bake type cloud + jail solution.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://android-developers.blogspot.ca/2016/12/saving-data-reducing-the-size-of-app-updates-by-65-percent.html" target="_blank" rel="nofollow noopener"&gt;Colin Percival's bsdiff helps reduce Android apk bandwidth usage by 6 petabytes per day&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A post on the official Android-Developers blog, talks about how they used bsdiff (and bspatch) to reduce the size of Android application updates by 65%&lt;/li&gt;
&lt;li&gt;bsdiff was developed by FreeBSD’s Colin Percival&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Earlier this year, we announced that we started using the bsdiff algorithm (by Colin Percival). Using bsdiff, we were able to reduce the size of app updates on average by 47% compared to the full APK size.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This post is actually about the second generation of the code.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Today, we're excited to share a new approach that goes further — File-by-File patching. App Updates using File-by-File patching are, on average, 65% smaller than the full app, and in some cases more than 90% smaller.&lt;br&gt;
&amp;gt; Android apps are packaged as APKs, which are ZIP files with special conventions. Most of the content within the ZIP files (and APKs) is compressed using a technology called Deflate. Deflate is really good at compressing data but it has a drawback: it makes identifying changes in the original (uncompressed) content really hard. Even a tiny change to the original content (like changing one word in a book) can make the compressed output of deflate look completely different. Describing the differences between the original content is easy, but describing the differences between the compressed content is so hard that it leads to inefficient patches.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So in the second generation of the code, they use bsdiff on each individual file, then package that, rather than diffing the original and new archives&lt;/li&gt;
&lt;li&gt;bsdiff is used in a great many other places, including shrinking the updates for the Firefox and Chrome browsers&lt;/li&gt;
&lt;li&gt;You can find out more about bsdiff here: &lt;a href="http://www.daemonology.net/bsdiff/" target="_blank" rel="nofollow noopener"&gt;http://www.daemonology.net/bsdiff/&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; A far more sophisticated algorithm, which typically provides roughly 20% smaller patches, is described in my &lt;a href="http://www.daemonology.net/papers/thesis.pdf" target="_blank" rel="nofollow noopener"&gt;doctoral thesis&lt;/a&gt;.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Considering the gains, it is interesting that no one has implemented Colin’s more sophisticated algorithm&lt;/li&gt;
&lt;li&gt;Colin had an &lt;a href="https://twitter.com/cperciva/status/806426180379230208" target="_blank" rel="nofollow noopener"&gt;interesting observation&lt;/a&gt; last night: “I just realized that bandwidth savings due to bsdiff are now roughly equal to what the &lt;em&gt;total internet traffic&lt;/em&gt; was when I wrote it in 2003.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://distrowatch.com/weekly.php?issue=20161114#nas4free" target="_blank" rel="nofollow noopener"&gt;Distrowatch does an in-depth review of NAS4Free&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Jesse Smith over at DistroWatch has done a pretty in-depth review of Nas4Free.&lt;/li&gt;
&lt;li&gt;The review starts with mentioning that NAS4Free works on 3 platforms, ARM/i386/AMD64 and for the purposes of this review he would be using AMD64 builds.&lt;/li&gt;
&lt;li&gt;After going through the initial install (doing typical disk management operations, such as GPT/MBR, etc) he was ready to begin using the product.&lt;/li&gt;
&lt;li&gt;One concern originally observed was that the initial boot seemed rather slow. Investigation revealed this was due to it loading the entire OS image into memory, and the first (long) disk read did take some time, but once loaded was super responsive.&lt;/li&gt;
&lt;li&gt;The next steps involved doing the initial configuration, which meant creating a new ZFS storage pool. After this process was done, he did find one puzzling UI option called “VM” which indicated it can be linked to VirtualBox in some way, but the Docs didn’t reveal its secrets of usage.&lt;/li&gt;
&lt;li&gt;Additionally covered were some of the various “Access” methods, including traditional UNIX permissions, AD and LDAP, and then various Sharing services which are typical to a NAS, Such as NFS / Samba and others.&lt;/li&gt;
&lt;li&gt;One neat feature was the built-in file-browser via the web-interface, which allows you another method of getting at your data when sometimes NFS / Samba or WebDav aren’t enough.&lt;/li&gt;
&lt;li&gt;Jesse gives us a nice round-up conclusion as well&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Most of the NAS operating systems I have used in the past were built around useful features. Some focused on making storage easy to set up and manage, others focused on services, such as making files available over multiple protocols or managing torrents. Some strive to be very easy to set up. NAS4Free does pretty well in each of the above categories. It may not be the easiest platform to set up, but it's probably a close second. It may not have the prettiest interface for managing settings, but it is quite easy to navigate. NAS4Free may not have the most add-on services and access protocols, but I suspect there are more than enough of both for most people.&lt;/p&gt;

&lt;p&gt;&amp;gt; Where NAS4Free does better than most other solutions I have looked at is security. I don't think the project's website or documentation particularly focuses on security as a feature, but there are plenty of little security features that I liked. NAS4Free makes it very easy to lock the text console, which is good because we do not all keep our NAS boxes behind locked doors. The system is fairly easy to upgrade and appears to publish regular security updates in the form of new firmware. NAS4Free makes it fairly easy to set up user accounts, handle permissions and manage home directories. It's also pretty straight forward to switch from HTTP to HTTPS and to block people not on the local network from accessing the NAS's web interface.&lt;/p&gt;

&lt;p&gt;&amp;gt; All in all, I like NAS4Free. It's a good, general purpose NAS operating system. While I did not feel the project did anything really amazing in any one category, nor did I run into any serious issues. The NAS ran as expected, was fairly straight forward to set up and easy to manage. This strikes me as an especially good platform for home or small business users who want an easy set up, some basic security and a solid collection of features.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://browsix.org/" target="_blank" rel="nofollow noopener"&gt;Browsix: Unix in the browser tab&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Browsix is a research project from the PLASMA lab at the University of Massachusetts, Amherst.&lt;/li&gt;
&lt;li&gt;The goal: Run C, C++, Go and Node.js programs as processes in browsers, including LaTeX, GNU Make, Go HTTP servers, and POSIX shell scripts.&lt;/li&gt;
&lt;li&gt;“Processes are built on top of Web Workers, letting applications run in parallel and spawn subprocesses. System calls include fork, spawn, exec, and wait.”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Pipes are supported with pipe(2) enabling developers to compose processes into pipelines.&lt;/p&gt;

&lt;p&gt;&amp;gt; Sockets include support for TCP socket servers and clients, making it possible to run applications like databases and HTTP servers together with their clients in the browser.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt; Browsix comprises two core parts:

&lt;ul&gt;
&lt;li&gt;A kernel written in TypeScript that makes core Unix features (including pipes, concurrent processes, signals, sockets, and a shared file system) available to web applications.&lt;/li&gt;
&lt;li&gt;Extended JavaScript runtimes for C, C++, Go, and Node.js that support running programs written in these languages as processes in the browser.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;This seems like an interesting project, although I am not sure how it would be used as more than a toy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.cyberciti.biz/reviews/book-review-pam-mastery/" target="_blank" rel="nofollow noopener"&gt;Book Review: PAM Mastery&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;nixCraft does a book review of Michael W. Lucas’ “Pam Mastery”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Linux, FreeBSD, and Unix-like systems are multi-user and need some way of authenticating individual users. Back in the old days, this was done in different ways. You need to change each Unix application to use different authentication scheme.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Before PAM, if you wanted to use an SQL database to authenticate users, you had to write specific support for that into each of your applications. Same for LDAP, etc.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; So Open Group lead to the development of PAM for the Unix-like system. Today Linux, FreeBSD, MacOS X and many other Unix-like systems are configured to use a centralized authentication mechanism called Pluggable Authentication Modules (PAM). The book “PAM Mastery” deals with the black magic of PAM.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Of course, each OS chose to implement PAM a little bit differently&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The book starts with the basic concepts about PAM and authentication. You learn about Multi-Factor Authentication and why use PAM instead of changing each program to authenticate the user. The author went into great details about why PAM is useful for developers and sysadmin for several reasons. The examples cover CentOS Linux (RHEL and clones), Debian Linux, and FreeBSD Unix system.&lt;/p&gt;

&lt;p&gt;&amp;gt; I like the way the author described PAM Configuration Files and Common Modules that covers everyday scenarios for the sysadmin. PAM configuration file format and PAM Module Interfaces are discussed in easy to understand language. Control flags in PAM can be very confusing for new sysadmins. Modules can be stacked in a particular order, and the control flags determine how important the success or failure of a particular module.&lt;/p&gt;

&lt;p&gt;&amp;gt; There is also a chapter about using one-time passwords (Google Authenticator) for your application.&lt;/p&gt;

&lt;p&gt;&amp;gt; The final chapter is all about enforcing good password policies for users and apps using PAM.&lt;/p&gt;

&lt;p&gt;&amp;gt; The sysadmin would find this book useful as it covers a common authentication scheme that can be used with a wide variety of applications on Unix. You will master PAM topics and take control over authentication for your organization IT infrastructure. If you are Linux or Unix sysadmin, I would highly recommend this book. Once again Michael W Lucas nailed it. The only book you may need for PAM deployment.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.michaelwlucas.com/tools/pam" target="_blank" rel="nofollow noopener"&gt;get “PAM Mastery” &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.win.tue.nl/%7Eaeb/linux/hh/thompson/trust.html" target="_blank" rel="nofollow noopener"&gt;Reflections on Trusting Trust - Ken Thompson, co-author of UNIX&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Ken Thompson's "cc hack" - Presented in the journal, Communication of the ACM, Vol. 27, No. 8, August 1984, in a paper entitled "Reflections on Trusting Trust", Ken Thompson, co-author of UNIX, recounted a story of how he created a version of the C compiler that, when presented with the source code for the "login" program, would automatically compile in a backdoor to allow him entry to the system. This is only half the story, though. In order to hide this trojan horse, Ken also added to this version of "cc" the ability to recognize if it was recompiling itself to make sure that the newly compiled C compiler contained both the "login" backdoor, and the code to insert both trojans into a newly compiled C compiler. In this way, the source code for the C compiler would never show that these trojans existed.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The article starts off by talking about a content to write a program that produces its own source code as output. Or rather, a C program, that writes a C program, that produces its own source code as output.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The C compiler is written in C. What I am about to describe is one of many "chicken and egg" problems that arise when compilers are written in their own language. In this case, I will use a specific example from the C compiler.&lt;/p&gt;

&lt;p&gt;&amp;gt; Suppose we wish to alter the C compiler to include the sequence "\v" to represent the vertical tab character. The extension to Figure 2 is obvious and is presented in Figure 3. We then recompile the C compiler, but we get a diagnostic. Obviously, since the binary version of the compiler does not know about "\v," the source is not legal C. We must "train" the compiler. After it "knows" what "\v" means, then our new change will become legal C. We look up on an ASCII chart that a vertical tab is decimal 11. We alter our source to look like Figure 4. Now the old compiler accepts the new source. We install the resulting binary as the new official C compiler and now we can write the portable version the way we had it in Figure 3.&lt;/p&gt;

&lt;p&gt;&amp;gt; The actual bug I planted in the compiler would match code in the UNIX "login" command. The replacement code would miscompile the login command so that it would accept either the intended encrypted password or a particular known password. Thus if this code were installed in binary and the binary were used to compile the login command, I could log into that system as any user. Such blatant code would not go undetected for long. Even the most casual perusal of the source of the C compiler would raise suspicions.&lt;/p&gt;

&lt;p&gt;&amp;gt; Next “simply add a second Trojan horse to the one that already exists. The second pattern is aimed at the C compiler. The replacement code is a Stage I self-reproducing program that inserts both Trojan horses into the compiler. This requires a learning phase as in the Stage II example. First we compile the modified source with the normal C compiler to produce a bugged binary. We install this binary as the official C. We can now remove the bugs from the source of the compiler and the new binary will reinsert the bugs whenever it is compiled. Of course, the login command will remain bugged with no trace in source anywhere.&lt;/p&gt;

&lt;p&gt;&amp;gt; So now there is a trojan’d version of cc. If you compile a clean version of cc, using the bad cc, you will get a bad cc. If you use the bad cc to compile the login program, it will have a backdoor. The source code for both backdoors no longer exists on the system. You can audit the source code of cc and login all you want, they are trustworthy.&lt;/p&gt;

&lt;p&gt;&amp;gt; The compiler you use to compile your new compiler, is the untrustworthy bit, but you have no way to know it is untrustworthy, and no way to make a new compiler, without using the bad compiler.&lt;/p&gt;

&lt;p&gt;&amp;gt; The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.&lt;/p&gt;

&lt;p&gt;&amp;gt; Acknowledgment: I first read of the possibility of such a Trojan horse in an Air Force critique of the security of an early implementation of Multics. I can- not find a more specific reference to this document. I would appreciate it if anyone who can supply this reference would let me know.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.etsy.com/listing/496638945/freebsd-beastie-christmas-stocking" target="_blank" rel="nofollow noopener"&gt;Custom made Beastie Stockings&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://ximalas.info/2016/12/06/migrating-zfs-from-mirrored-pool-to-raidz1-pool/" target="_blank" rel="nofollow noopener"&gt;Migrating ZFS from mirrored pool to raidz1 pool&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://home.nuug.no/%7Epeter/blug2016/" target="_blank" rel="nofollow noopener"&gt;OpenBSD and you&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://fxr.watson.org/" target="_blank" rel="nofollow noopener"&gt;Watson.org FreeBSD and Linux cross reference &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://bxr.su/" target="_blank" rel="nofollow noopener"&gt;OpenGrok&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:37.libc.asc" target="_blank" rel="nofollow noopener"&gt;FreeBSD SA-16:37: libc&lt;/a&gt; -- A 26+ year old bug found in BSD’s libc, all BSDs likely affected -- A specially crafted argument can trigger a static buffer overflow in the library, with possibility to rewrite following static buffers that belong to other library functions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/HardenedBSD/hardenedBSD/commit/fb823297fbced336b6beeeb624e2dc65b67aa0eb" target="_blank" rel="nofollow noopener"&gt;HardenedBSD issues correction for libc patch &lt;/a&gt; -- original patch improperly calculates how many bytes are remaining in the buffer.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; From December the 27th until the 30th there the 33rd Chaos Communication Congress[0] is going to take place in Hamburg, Germany. Think of it as the yearly gathering of the european hackerscene and their overseas friends. I am one of the persons organizing the "&lt;a href="https://events.ccc.de/congress/2016/wiki/Assembly:BSD" target="_blank" rel="nofollow noopener"&gt;BSD assembly&lt;/a&gt;" as a gathering place for BSD enthusiasts and waving the flag amidst the all the other projects / communities.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/WRiuW6nn" target="_blank" rel="nofollow noopener"&gt; Chris - IPFW + Wifi&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/JgerqZZP" target="_blank" rel="nofollow noopener"&gt; Jason - bhyve pci&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/3XY5MVca" target="_blank" rel="nofollow noopener"&gt; Al - pf errors&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Kty0qYXM" target="_blank" rel="nofollow noopener"&gt; Zach - Xorg settings&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/m3D81GBW" target="_blank" rel="nofollow noopener"&gt; Bart - Wireless Support&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today on the show, we’ve got a look at running OpenBSD on a APU, some BSD in your Android, managing your own FreeBSD cloud service with ansible and much more. Keep it turned on your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://github.com/elad/openbsd-apu2" rel="nofollow">OpenBSD on PC Engines APU2</a></h3>

<ul>
<li>A detailed walkthrough of building an OpenBSD firewall on a PC Engines APU2</li>
<li>It starts with a breakdown of the parts that were purchases, totally around $200</li>
<li>Then the reader is walked through configuring the serial console, flashing the ROM, and updating the BIOS</li>
<li>The next step is actually creating a custom OpenBSD install image, and pre-configuring its serial console. Starting with OpenBSD 6.0, this step is done automatically by the installer</li>
<li>Installation:

<ul>
<li>Power off the APU2</li>
<li>Insert the bootable OpenBSD installer USB flash drive to one of the USB slots on the APU2</li>
<li>Power on the APU2, press F10 to get to the boot menu, and choose to boot from USB (usually option number 1)</li>
<li>At the boot&gt; prompt, remember the serial console settings (see above)</li>
<li>Also at the boot&gt; prompt, press Enter to start the installer</li>
<li>Follow the installation instructions</li>
</ul></li>
</ul>

<blockquote>
<p>The driver used for wireless networking is athn(4). It might not work properly out of the box. Once OpenBSD is installed, run fw_update with no arguments. It will figure out which firmware updates are required and will download and install them. When it finishes, reboot.</p>

<hr>
</blockquote>

<h3><a href="https://functionallyparanoid.com/2016/11/29/where-the-rubber-meets-the-road-part-one/" rel="nofollow">Where the rubber meets the road… (part one)</a></h3>

<ul>
<li>A user describes their adventures installing OpenBSD and Arch Linux on a new Lenovo X1 Carbon (4th gen, skylake)</li>
<li>They also detail why they moved away from their beloved Macbook, which while long, does describe a journey away from Apple that we’ve heard elsewhere.</li>
<li>The journey begins with getting a new Windows laptop, shrinking the partition and creating space for a triple-boot install, of Windows / Arch / OpenBSD</li>
<li>Brian then details how he setup the partitioning and performed the initial Arch installation, getting it tuned to his specifications.</li>
<li>Next up was OpenBSD though, and that went sideways initially due to a new NVMe drive that wasn’t fully supported (yet)</li>
<li>The article is split into two parts (we will bring you the next installment at a future date), but he leaves us with the plan of attack to build a custom OpenBSD kernel with corrected PCI device identifiers.</li>
<li>We wish Brian luck, and look forward to the “rest of the story” soon.
***</li>
</ul>

<h3><a href="https://github.com/JoergFiedler/freebsd-ansible-demo" rel="nofollow">Howto setup a FreeBSD jail server using iocage and ansible.</a></h3>

<ul>
<li>Setting up a FreeBSD jail server can be a daunting task. However when a guide comes along which shows you how to do that, including not exposing a single (non-jailed) port to the outside world, you know we had a take a closer look.</li>
<li>This guide comes to us from GitHub, courtesy of Joerg Fielder. </li>
<li><p>The project goals seem notable:</p></li>
<li><p>Ansible playbook that creates a FreeBSD server which hosts multiple jails.</p>

<ul>
<li>Travis is used to run/test the playbook.</li>
<li>No service on the host is exposed externally.</li>
<li>All external connections terminate within a jail.</li>
<li>Roles can be reused using Ansible Galaxy.</li>
<li>Combine any of those roles to create FreeBSD server, which perfectly suits you.</li>
</ul></li>
<li><p>To get started, you’ll need a machine with Ansible, Vagrant and VirtualBox, and your credentials to AWS if you want it to automatically create / destroy EC2 instances.</p></li>
<li><p>There’s already an impressive list of Anisible roles created for you to start with:</p>

<ul>
<li>freebsd-build-server - Creates a FreeBSD poudriere build server</li>
<li>freebsd-jail-host - FreeBSD Jail host</li>
<li>freebsd-jailed - Provides a jail</li>
<li>freebsd-jailed-nginx - Provides a jailed nginx server</li>
<li>freebsd-jailed-php-fpm - Creates a php-fpm pool and a ZFS dataset which is used as web root by php-fpm</li>
<li>freebsd-jailed-sftp - Installs a SFTP server</li>
<li>freebsd-jailed-sshd - Provides a jailed sshd server.</li>
<li>freebsd-jailed-syslogd - Provides a jailed syslogd</li>
<li>freebsd-jailed-btsync - Provides a jailed btsync instance server</li>
<li>freebsd-jailed-joomla - Installs Joomla</li>
<li>freebsd-jailed-mariadb - Provides a jailed MariaDB server</li>
<li>freebsd-jailed-wordpress - Provides a jailed Wordpress server.</li>
</ul></li>
<li><p>Since the machines have to be customized before starting, he mentions that cloud-init is used to do the following:</p></li>
<li><p>activate pf firewall</p></li>
<li><p>add a pass all keep state rule to pf to keep track of connection states, which in turn allows you to reload the pf service without losing the connection</p></li>
<li><p>install the following packages:</p>

<ul>
<li>sudo</li>
<li>bash</li>
<li>python27</li>
</ul></li>
<li><p>allow passwordless sudo for user ec2-user<br>
“</p></li>
<li><p>From there it is pretty straight-forward, just a couple commands to spin up the VM’s either locally on your VirtualBox host, or in the cloud with AWS. Internally the VM’s are auto-configured with iocage to create jails, where all your actual services run.</p></li>
<li><p>A neat project, check it out today if you want a shake-n-bake type cloud + jail solution.</p>

<hr></li>
</ul>

<h3><a href="http://android-developers.blogspot.ca/2016/12/saving-data-reducing-the-size-of-app-updates-by-65-percent.html" rel="nofollow">Colin Percival&#39;s bsdiff helps reduce Android apk bandwidth usage by 6 petabytes per day</a></h3>

<ul>
<li>A post on the official Android-Developers blog, talks about how they used bsdiff (and bspatch) to reduce the size of Android application updates by 65%</li>
<li>bsdiff was developed by FreeBSD’s Colin Percival</li>
</ul>

<blockquote>
<p>Earlier this year, we announced that we started using the bsdiff algorithm (by Colin Percival). Using bsdiff, we were able to reduce the size of app updates on average by 47% compared to the full APK size.</p>
</blockquote>

<ul>
<li>This post is actually about the second generation of the code.</li>
</ul>

<blockquote>
<p>Today, we&#39;re excited to share a new approach that goes further — File-by-File patching. App Updates using File-by-File patching are, on average, 65% smaller than the full app, and in some cases more than 90% smaller.<br>
Android apps are packaged as APKs, which are ZIP files with special conventions. Most of the content within the ZIP files (and APKs) is compressed using a technology called Deflate. Deflate is really good at compressing data but it has a drawback: it makes identifying changes in the original (uncompressed) content really hard. Even a tiny change to the original content (like changing one word in a book) can make the compressed output of deflate look completely different. Describing the differences between the original content is easy, but describing the differences between the compressed content is so hard that it leads to inefficient patches.</p>
</blockquote>

<ul>
<li>So in the second generation of the code, they use bsdiff on each individual file, then package that, rather than diffing the original and new archives</li>
<li>bsdiff is used in a great many other places, including shrinking the updates for the Firefox and Chrome browsers</li>
<li>You can find out more about bsdiff here: <a href="http://www.daemonology.net/bsdiff/" rel="nofollow">http://www.daemonology.net/bsdiff/</a></li>
</ul>

<blockquote>
<p>A far more sophisticated algorithm, which typically provides roughly 20% smaller patches, is described in my <a href="http://www.daemonology.net/papers/thesis.pdf" rel="nofollow">doctoral thesis</a>.</p>
</blockquote>

<ul>
<li>Considering the gains, it is interesting that no one has implemented Colin’s more sophisticated algorithm</li>
<li>Colin had an <a href="https://twitter.com/cperciva/status/806426180379230208" rel="nofollow">interesting observation</a> last night: “I just realized that bandwidth savings due to bsdiff are now roughly equal to what the <em>total internet traffic</em> was when I wrote it in 2003.”
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20161114#nas4free" rel="nofollow">Distrowatch does an in-depth review of NAS4Free</a></h3>

<ul>
<li>Jesse Smith over at DistroWatch has done a pretty in-depth review of Nas4Free.</li>
<li>The review starts with mentioning that NAS4Free works on 3 platforms, ARM/i386/AMD64 and for the purposes of this review he would be using AMD64 builds.</li>
<li>After going through the initial install (doing typical disk management operations, such as GPT/MBR, etc) he was ready to begin using the product.</li>
<li>One concern originally observed was that the initial boot seemed rather slow. Investigation revealed this was due to it loading the entire OS image into memory, and the first (long) disk read did take some time, but once loaded was super responsive.</li>
<li>The next steps involved doing the initial configuration, which meant creating a new ZFS storage pool. After this process was done, he did find one puzzling UI option called “VM” which indicated it can be linked to VirtualBox in some way, but the Docs didn’t reveal its secrets of usage.</li>
<li>Additionally covered were some of the various “Access” methods, including traditional UNIX permissions, AD and LDAP, and then various Sharing services which are typical to a NAS, Such as NFS / Samba and others.</li>
<li>One neat feature was the built-in file-browser via the web-interface, which allows you another method of getting at your data when sometimes NFS / Samba or WebDav aren’t enough.</li>
<li>Jesse gives us a nice round-up conclusion as well</li>
</ul>

<blockquote>
<p>Most of the NAS operating systems I have used in the past were built around useful features. Some focused on making storage easy to set up and manage, others focused on services, such as making files available over multiple protocols or managing torrents. Some strive to be very easy to set up. NAS4Free does pretty well in each of the above categories. It may not be the easiest platform to set up, but it&#39;s probably a close second. It may not have the prettiest interface for managing settings, but it is quite easy to navigate. NAS4Free may not have the most add-on services and access protocols, but I suspect there are more than enough of both for most people.</p>

<p>Where NAS4Free does better than most other solutions I have looked at is security. I don&#39;t think the project&#39;s website or documentation particularly focuses on security as a feature, but there are plenty of little security features that I liked. NAS4Free makes it very easy to lock the text console, which is good because we do not all keep our NAS boxes behind locked doors. The system is fairly easy to upgrade and appears to publish regular security updates in the form of new firmware. NAS4Free makes it fairly easy to set up user accounts, handle permissions and manage home directories. It&#39;s also pretty straight forward to switch from HTTP to HTTPS and to block people not on the local network from accessing the NAS&#39;s web interface.</p>

<p>All in all, I like NAS4Free. It&#39;s a good, general purpose NAS operating system. While I did not feel the project did anything really amazing in any one category, nor did I run into any serious issues. The NAS ran as expected, was fairly straight forward to set up and easy to manage. This strikes me as an especially good platform for home or small business users who want an easy set up, some basic security and a solid collection of features.</p>

<hr>
</blockquote>

<h3><a href="https://browsix.org/" rel="nofollow">Browsix: Unix in the browser tab</a></h3>

<ul>
<li>Browsix is a research project from the PLASMA lab at the University of Massachusetts, Amherst.</li>
<li>The goal: Run C, C++, Go and Node.js programs as processes in browsers, including LaTeX, GNU Make, Go HTTP servers, and POSIX shell scripts.</li>
<li>“Processes are built on top of Web Workers, letting applications run in parallel and spawn subprocesses. System calls include fork, spawn, exec, and wait.”</li>
</ul>

<blockquote>
<p>Pipes are supported with pipe(2) enabling developers to compose processes into pipelines.</p>

<p>Sockets include support for TCP socket servers and clients, making it possible to run applications like databases and HTTP servers together with their clients in the browser.</p>
</blockquote>

<ul>
<li> Browsix comprises two core parts:

<ul>
<li>A kernel written in TypeScript that makes core Unix features (including pipes, concurrent processes, signals, sockets, and a shared file system) available to web applications.</li>
<li>Extended JavaScript runtimes for C, C++, Go, and Node.js that support running programs written in these languages as processes in the browser.</li>
</ul></li>
<li>This seems like an interesting project, although I am not sure how it would be used as more than a toy
***</li>
</ul>

<h3><a href="https://www.cyberciti.biz/reviews/book-review-pam-mastery/" rel="nofollow">Book Review: PAM Mastery</a></h3>

<ul>
<li>nixCraft does a book review of Michael W. Lucas’ “Pam Mastery”</li>
</ul>

<blockquote>
<p>Linux, FreeBSD, and Unix-like systems are multi-user and need some way of authenticating individual users. Back in the old days, this was done in different ways. You need to change each Unix application to use different authentication scheme.</p>
</blockquote>

<ul>
<li>Before PAM, if you wanted to use an SQL database to authenticate users, you had to write specific support for that into each of your applications. Same for LDAP, etc.</li>
</ul>

<blockquote>
<p>So Open Group lead to the development of PAM for the Unix-like system. Today Linux, FreeBSD, MacOS X and many other Unix-like systems are configured to use a centralized authentication mechanism called Pluggable Authentication Modules (PAM). The book “PAM Mastery” deals with the black magic of PAM.</p>
</blockquote>

<ul>
<li>Of course, each OS chose to implement PAM a little bit differently</li>
</ul>

<blockquote>
<p>The book starts with the basic concepts about PAM and authentication. You learn about Multi-Factor Authentication and why use PAM instead of changing each program to authenticate the user. The author went into great details about why PAM is useful for developers and sysadmin for several reasons. The examples cover CentOS Linux (RHEL and clones), Debian Linux, and FreeBSD Unix system.</p>

<p>I like the way the author described PAM Configuration Files and Common Modules that covers everyday scenarios for the sysadmin. PAM configuration file format and PAM Module Interfaces are discussed in easy to understand language. Control flags in PAM can be very confusing for new sysadmins. Modules can be stacked in a particular order, and the control flags determine how important the success or failure of a particular module.</p>

<p>There is also a chapter about using one-time passwords (Google Authenticator) for your application.</p>

<p>The final chapter is all about enforcing good password policies for users and apps using PAM.</p>

<p>The sysadmin would find this book useful as it covers a common authentication scheme that can be used with a wide variety of applications on Unix. You will master PAM topics and take control over authentication for your organization IT infrastructure. If you are Linux or Unix sysadmin, I would highly recommend this book. Once again Michael W Lucas nailed it. The only book you may need for PAM deployment.</p>
</blockquote>

<ul>
<li><a href="https://www.michaelwlucas.com/tools/pam" rel="nofollow">get “PAM Mastery” </a>
***</li>
</ul>

<h3><a href="http://www.win.tue.nl/%7Eaeb/linux/hh/thompson/trust.html" rel="nofollow">Reflections on Trusting Trust - Ken Thompson, co-author of UNIX</a></h3>

<blockquote>
<p>Ken Thompson&#39;s &quot;cc hack&quot; - Presented in the journal, Communication of the ACM, Vol. 27, No. 8, August 1984, in a paper entitled &quot;Reflections on Trusting Trust&quot;, Ken Thompson, co-author of UNIX, recounted a story of how he created a version of the C compiler that, when presented with the source code for the &quot;login&quot; program, would automatically compile in a backdoor to allow him entry to the system. This is only half the story, though. In order to hide this trojan horse, Ken also added to this version of &quot;cc&quot; the ability to recognize if it was recompiling itself to make sure that the newly compiled C compiler contained both the &quot;login&quot; backdoor, and the code to insert both trojans into a newly compiled C compiler. In this way, the source code for the C compiler would never show that these trojans existed.</p>
</blockquote>

<ul>
<li>The article starts off by talking about a content to write a program that produces its own source code as output. Or rather, a C program, that writes a C program, that produces its own source code as output.</li>
</ul>

<blockquote>
<p>The C compiler is written in C. What I am about to describe is one of many &quot;chicken and egg&quot; problems that arise when compilers are written in their own language. In this case, I will use a specific example from the C compiler.</p>

<p>Suppose we wish to alter the C compiler to include the sequence &quot;\v&quot; to represent the vertical tab character. The extension to Figure 2 is obvious and is presented in Figure 3. We then recompile the C compiler, but we get a diagnostic. Obviously, since the binary version of the compiler does not know about &quot;\v,&quot; the source is not legal C. We must &quot;train&quot; the compiler. After it &quot;knows&quot; what &quot;\v&quot; means, then our new change will become legal C. We look up on an ASCII chart that a vertical tab is decimal 11. We alter our source to look like Figure 4. Now the old compiler accepts the new source. We install the resulting binary as the new official C compiler and now we can write the portable version the way we had it in Figure 3.</p>

<p>The actual bug I planted in the compiler would match code in the UNIX &quot;login&quot; command. The replacement code would miscompile the login command so that it would accept either the intended encrypted password or a particular known password. Thus if this code were installed in binary and the binary were used to compile the login command, I could log into that system as any user. Such blatant code would not go undetected for long. Even the most casual perusal of the source of the C compiler would raise suspicions.</p>

<p>Next “simply add a second Trojan horse to the one that already exists. The second pattern is aimed at the C compiler. The replacement code is a Stage I self-reproducing program that inserts both Trojan horses into the compiler. This requires a learning phase as in the Stage II example. First we compile the modified source with the normal C compiler to produce a bugged binary. We install this binary as the official C. We can now remove the bugs from the source of the compiler and the new binary will reinsert the bugs whenever it is compiled. Of course, the login command will remain bugged with no trace in source anywhere.</p>

<p>So now there is a trojan’d version of cc. If you compile a clean version of cc, using the bad cc, you will get a bad cc. If you use the bad cc to compile the login program, it will have a backdoor. The source code for both backdoors no longer exists on the system. You can audit the source code of cc and login all you want, they are trustworthy.</p>

<p>The compiler you use to compile your new compiler, is the untrustworthy bit, but you have no way to know it is untrustworthy, and no way to make a new compiler, without using the bad compiler.</p>

<p>The moral is obvious. You can&#39;t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.</p>

<p>Acknowledgment: I first read of the possibility of such a Trojan horse in an Air Force critique of the security of an early implementation of Multics. I can- not find a more specific reference to this document. I would appreciate it if anyone who can supply this reference would let me know.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.etsy.com/listing/496638945/freebsd-beastie-christmas-stocking" rel="nofollow">Custom made Beastie Stockings</a></p></li>
<li><p><a href="http://ximalas.info/2016/12/06/migrating-zfs-from-mirrored-pool-to-raidz1-pool/" rel="nofollow">Migrating ZFS from mirrored pool to raidz1 pool</a></p></li>
<li><p><a href="https://home.nuug.no/%7Epeter/blug2016/" rel="nofollow">OpenBSD and you</a> </p></li>
<li><p><a href="http://fxr.watson.org/" rel="nofollow">Watson.org FreeBSD and Linux cross reference </a> </p></li>
<li><p><a href="http://bxr.su/" rel="nofollow">OpenGrok</a> </p></li>
<li><p><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:37.libc.asc" rel="nofollow">FreeBSD SA-16:37: libc</a> -- A 26+ year old bug found in BSD’s libc, all BSDs likely affected -- A specially crafted argument can trigger a static buffer overflow in the library, with possibility to rewrite following static buffers that belong to other library functions.</p></li>
<li><p><a href="https://github.com/HardenedBSD/hardenedBSD/commit/fb823297fbced336b6beeeb624e2dc65b67aa0eb" rel="nofollow">HardenedBSD issues correction for libc patch </a> -- original patch improperly calculates how many bytes are remaining in the buffer.</p></li>
</ul>

<blockquote>
<p>From December the 27th until the 30th there the 33rd Chaos Communication Congress[0] is going to take place in Hamburg, Germany. Think of it as the yearly gathering of the european hackerscene and their overseas friends. I am one of the persons organizing the &quot;<a href="https://events.ccc.de/congress/2016/wiki/Assembly:BSD" rel="nofollow">BSD assembly</a>&quot; as a gathering place for BSD enthusiasts and waving the flag amidst the all the other projects / communities.</p>

<hr>
</blockquote>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/WRiuW6nn" rel="nofollow"> Chris - IPFW + Wifi</a> </li>
<li><a href="http://pastebin.com/JgerqZZP" rel="nofollow"> Jason - bhyve pci</a> </li>
<li><a href="http://pastebin.com/3XY5MVca" rel="nofollow"> Al - pf errors</a> </li>
<li><a href="http://pastebin.com/Kty0qYXM" rel="nofollow"> Zach - Xorg settings</a> </li>
<li><a href="http://pastebin.com/m3D81GBW" rel="nofollow"> Bart - Wireless Support</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today on the show, we’ve got a look at running OpenBSD on a APU, some BSD in your Android, managing your own FreeBSD cloud service with ansible and much more. Keep it turned on your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://github.com/elad/openbsd-apu2" rel="nofollow">OpenBSD on PC Engines APU2</a></h3>

<ul>
<li>A detailed walkthrough of building an OpenBSD firewall on a PC Engines APU2</li>
<li>It starts with a breakdown of the parts that were purchases, totally around $200</li>
<li>Then the reader is walked through configuring the serial console, flashing the ROM, and updating the BIOS</li>
<li>The next step is actually creating a custom OpenBSD install image, and pre-configuring its serial console. Starting with OpenBSD 6.0, this step is done automatically by the installer</li>
<li>Installation:

<ul>
<li>Power off the APU2</li>
<li>Insert the bootable OpenBSD installer USB flash drive to one of the USB slots on the APU2</li>
<li>Power on the APU2, press F10 to get to the boot menu, and choose to boot from USB (usually option number 1)</li>
<li>At the boot&gt; prompt, remember the serial console settings (see above)</li>
<li>Also at the boot&gt; prompt, press Enter to start the installer</li>
<li>Follow the installation instructions</li>
</ul></li>
</ul>

<blockquote>
<p>The driver used for wireless networking is athn(4). It might not work properly out of the box. Once OpenBSD is installed, run fw_update with no arguments. It will figure out which firmware updates are required and will download and install them. When it finishes, reboot.</p>

<hr>
</blockquote>

<h3><a href="https://functionallyparanoid.com/2016/11/29/where-the-rubber-meets-the-road-part-one/" rel="nofollow">Where the rubber meets the road… (part one)</a></h3>

<ul>
<li>A user describes their adventures installing OpenBSD and Arch Linux on a new Lenovo X1 Carbon (4th gen, skylake)</li>
<li>They also detail why they moved away from their beloved Macbook, which while long, does describe a journey away from Apple that we’ve heard elsewhere.</li>
<li>The journey begins with getting a new Windows laptop, shrinking the partition and creating space for a triple-boot install, of Windows / Arch / OpenBSD</li>
<li>Brian then details how he setup the partitioning and performed the initial Arch installation, getting it tuned to his specifications.</li>
<li>Next up was OpenBSD though, and that went sideways initially due to a new NVMe drive that wasn’t fully supported (yet)</li>
<li>The article is split into two parts (we will bring you the next installment at a future date), but he leaves us with the plan of attack to build a custom OpenBSD kernel with corrected PCI device identifiers.</li>
<li>We wish Brian luck, and look forward to the “rest of the story” soon.
***</li>
</ul>

<h3><a href="https://github.com/JoergFiedler/freebsd-ansible-demo" rel="nofollow">Howto setup a FreeBSD jail server using iocage and ansible.</a></h3>

<ul>
<li>Setting up a FreeBSD jail server can be a daunting task. However when a guide comes along which shows you how to do that, including not exposing a single (non-jailed) port to the outside world, you know we had a take a closer look.</li>
<li>This guide comes to us from GitHub, courtesy of Joerg Fielder. </li>
<li><p>The project goals seem notable:</p></li>
<li><p>Ansible playbook that creates a FreeBSD server which hosts multiple jails.</p>

<ul>
<li>Travis is used to run/test the playbook.</li>
<li>No service on the host is exposed externally.</li>
<li>All external connections terminate within a jail.</li>
<li>Roles can be reused using Ansible Galaxy.</li>
<li>Combine any of those roles to create FreeBSD server, which perfectly suits you.</li>
</ul></li>
<li><p>To get started, you’ll need a machine with Ansible, Vagrant and VirtualBox, and your credentials to AWS if you want it to automatically create / destroy EC2 instances.</p></li>
<li><p>There’s already an impressive list of Anisible roles created for you to start with:</p>

<ul>
<li>freebsd-build-server - Creates a FreeBSD poudriere build server</li>
<li>freebsd-jail-host - FreeBSD Jail host</li>
<li>freebsd-jailed - Provides a jail</li>
<li>freebsd-jailed-nginx - Provides a jailed nginx server</li>
<li>freebsd-jailed-php-fpm - Creates a php-fpm pool and a ZFS dataset which is used as web root by php-fpm</li>
<li>freebsd-jailed-sftp - Installs a SFTP server</li>
<li>freebsd-jailed-sshd - Provides a jailed sshd server.</li>
<li>freebsd-jailed-syslogd - Provides a jailed syslogd</li>
<li>freebsd-jailed-btsync - Provides a jailed btsync instance server</li>
<li>freebsd-jailed-joomla - Installs Joomla</li>
<li>freebsd-jailed-mariadb - Provides a jailed MariaDB server</li>
<li>freebsd-jailed-wordpress - Provides a jailed Wordpress server.</li>
</ul></li>
<li><p>Since the machines have to be customized before starting, he mentions that cloud-init is used to do the following:</p></li>
<li><p>activate pf firewall</p></li>
<li><p>add a pass all keep state rule to pf to keep track of connection states, which in turn allows you to reload the pf service without losing the connection</p></li>
<li><p>install the following packages:</p>

<ul>
<li>sudo</li>
<li>bash</li>
<li>python27</li>
</ul></li>
<li><p>allow passwordless sudo for user ec2-user<br>
“</p></li>
<li><p>From there it is pretty straight-forward, just a couple commands to spin up the VM’s either locally on your VirtualBox host, or in the cloud with AWS. Internally the VM’s are auto-configured with iocage to create jails, where all your actual services run.</p></li>
<li><p>A neat project, check it out today if you want a shake-n-bake type cloud + jail solution.</p>

<hr></li>
</ul>

<h3><a href="http://android-developers.blogspot.ca/2016/12/saving-data-reducing-the-size-of-app-updates-by-65-percent.html" rel="nofollow">Colin Percival&#39;s bsdiff helps reduce Android apk bandwidth usage by 6 petabytes per day</a></h3>

<ul>
<li>A post on the official Android-Developers blog, talks about how they used bsdiff (and bspatch) to reduce the size of Android application updates by 65%</li>
<li>bsdiff was developed by FreeBSD’s Colin Percival</li>
</ul>

<blockquote>
<p>Earlier this year, we announced that we started using the bsdiff algorithm (by Colin Percival). Using bsdiff, we were able to reduce the size of app updates on average by 47% compared to the full APK size.</p>
</blockquote>

<ul>
<li>This post is actually about the second generation of the code.</li>
</ul>

<blockquote>
<p>Today, we&#39;re excited to share a new approach that goes further — File-by-File patching. App Updates using File-by-File patching are, on average, 65% smaller than the full app, and in some cases more than 90% smaller.<br>
Android apps are packaged as APKs, which are ZIP files with special conventions. Most of the content within the ZIP files (and APKs) is compressed using a technology called Deflate. Deflate is really good at compressing data but it has a drawback: it makes identifying changes in the original (uncompressed) content really hard. Even a tiny change to the original content (like changing one word in a book) can make the compressed output of deflate look completely different. Describing the differences between the original content is easy, but describing the differences between the compressed content is so hard that it leads to inefficient patches.</p>
</blockquote>

<ul>
<li>So in the second generation of the code, they use bsdiff on each individual file, then package that, rather than diffing the original and new archives</li>
<li>bsdiff is used in a great many other places, including shrinking the updates for the Firefox and Chrome browsers</li>
<li>You can find out more about bsdiff here: <a href="http://www.daemonology.net/bsdiff/" rel="nofollow">http://www.daemonology.net/bsdiff/</a></li>
</ul>

<blockquote>
<p>A far more sophisticated algorithm, which typically provides roughly 20% smaller patches, is described in my <a href="http://www.daemonology.net/papers/thesis.pdf" rel="nofollow">doctoral thesis</a>.</p>
</blockquote>

<ul>
<li>Considering the gains, it is interesting that no one has implemented Colin’s more sophisticated algorithm</li>
<li>Colin had an <a href="https://twitter.com/cperciva/status/806426180379230208" rel="nofollow">interesting observation</a> last night: “I just realized that bandwidth savings due to bsdiff are now roughly equal to what the <em>total internet traffic</em> was when I wrote it in 2003.”
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://distrowatch.com/weekly.php?issue=20161114#nas4free" rel="nofollow">Distrowatch does an in-depth review of NAS4Free</a></h3>

<ul>
<li>Jesse Smith over at DistroWatch has done a pretty in-depth review of Nas4Free.</li>
<li>The review starts with mentioning that NAS4Free works on 3 platforms, ARM/i386/AMD64 and for the purposes of this review he would be using AMD64 builds.</li>
<li>After going through the initial install (doing typical disk management operations, such as GPT/MBR, etc) he was ready to begin using the product.</li>
<li>One concern originally observed was that the initial boot seemed rather slow. Investigation revealed this was due to it loading the entire OS image into memory, and the first (long) disk read did take some time, but once loaded was super responsive.</li>
<li>The next steps involved doing the initial configuration, which meant creating a new ZFS storage pool. After this process was done, he did find one puzzling UI option called “VM” which indicated it can be linked to VirtualBox in some way, but the Docs didn’t reveal its secrets of usage.</li>
<li>Additionally covered were some of the various “Access” methods, including traditional UNIX permissions, AD and LDAP, and then various Sharing services which are typical to a NAS, Such as NFS / Samba and others.</li>
<li>One neat feature was the built-in file-browser via the web-interface, which allows you another method of getting at your data when sometimes NFS / Samba or WebDav aren’t enough.</li>
<li>Jesse gives us a nice round-up conclusion as well</li>
</ul>

<blockquote>
<p>Most of the NAS operating systems I have used in the past were built around useful features. Some focused on making storage easy to set up and manage, others focused on services, such as making files available over multiple protocols or managing torrents. Some strive to be very easy to set up. NAS4Free does pretty well in each of the above categories. It may not be the easiest platform to set up, but it&#39;s probably a close second. It may not have the prettiest interface for managing settings, but it is quite easy to navigate. NAS4Free may not have the most add-on services and access protocols, but I suspect there are more than enough of both for most people.</p>

<p>Where NAS4Free does better than most other solutions I have looked at is security. I don&#39;t think the project&#39;s website or documentation particularly focuses on security as a feature, but there are plenty of little security features that I liked. NAS4Free makes it very easy to lock the text console, which is good because we do not all keep our NAS boxes behind locked doors. The system is fairly easy to upgrade and appears to publish regular security updates in the form of new firmware. NAS4Free makes it fairly easy to set up user accounts, handle permissions and manage home directories. It&#39;s also pretty straight forward to switch from HTTP to HTTPS and to block people not on the local network from accessing the NAS&#39;s web interface.</p>

<p>All in all, I like NAS4Free. It&#39;s a good, general purpose NAS operating system. While I did not feel the project did anything really amazing in any one category, nor did I run into any serious issues. The NAS ran as expected, was fairly straight forward to set up and easy to manage. This strikes me as an especially good platform for home or small business users who want an easy set up, some basic security and a solid collection of features.</p>

<hr>
</blockquote>

<h3><a href="https://browsix.org/" rel="nofollow">Browsix: Unix in the browser tab</a></h3>

<ul>
<li>Browsix is a research project from the PLASMA lab at the University of Massachusetts, Amherst.</li>
<li>The goal: Run C, C++, Go and Node.js programs as processes in browsers, including LaTeX, GNU Make, Go HTTP servers, and POSIX shell scripts.</li>
<li>“Processes are built on top of Web Workers, letting applications run in parallel and spawn subprocesses. System calls include fork, spawn, exec, and wait.”</li>
</ul>

<blockquote>
<p>Pipes are supported with pipe(2) enabling developers to compose processes into pipelines.</p>

<p>Sockets include support for TCP socket servers and clients, making it possible to run applications like databases and HTTP servers together with their clients in the browser.</p>
</blockquote>

<ul>
<li> Browsix comprises two core parts:

<ul>
<li>A kernel written in TypeScript that makes core Unix features (including pipes, concurrent processes, signals, sockets, and a shared file system) available to web applications.</li>
<li>Extended JavaScript runtimes for C, C++, Go, and Node.js that support running programs written in these languages as processes in the browser.</li>
</ul></li>
<li>This seems like an interesting project, although I am not sure how it would be used as more than a toy
***</li>
</ul>

<h3><a href="https://www.cyberciti.biz/reviews/book-review-pam-mastery/" rel="nofollow">Book Review: PAM Mastery</a></h3>

<ul>
<li>nixCraft does a book review of Michael W. Lucas’ “Pam Mastery”</li>
</ul>

<blockquote>
<p>Linux, FreeBSD, and Unix-like systems are multi-user and need some way of authenticating individual users. Back in the old days, this was done in different ways. You need to change each Unix application to use different authentication scheme.</p>
</blockquote>

<ul>
<li>Before PAM, if you wanted to use an SQL database to authenticate users, you had to write specific support for that into each of your applications. Same for LDAP, etc.</li>
</ul>

<blockquote>
<p>So Open Group lead to the development of PAM for the Unix-like system. Today Linux, FreeBSD, MacOS X and many other Unix-like systems are configured to use a centralized authentication mechanism called Pluggable Authentication Modules (PAM). The book “PAM Mastery” deals with the black magic of PAM.</p>
</blockquote>

<ul>
<li>Of course, each OS chose to implement PAM a little bit differently</li>
</ul>

<blockquote>
<p>The book starts with the basic concepts about PAM and authentication. You learn about Multi-Factor Authentication and why use PAM instead of changing each program to authenticate the user. The author went into great details about why PAM is useful for developers and sysadmin for several reasons. The examples cover CentOS Linux (RHEL and clones), Debian Linux, and FreeBSD Unix system.</p>

<p>I like the way the author described PAM Configuration Files and Common Modules that covers everyday scenarios for the sysadmin. PAM configuration file format and PAM Module Interfaces are discussed in easy to understand language. Control flags in PAM can be very confusing for new sysadmins. Modules can be stacked in a particular order, and the control flags determine how important the success or failure of a particular module.</p>

<p>There is also a chapter about using one-time passwords (Google Authenticator) for your application.</p>

<p>The final chapter is all about enforcing good password policies for users and apps using PAM.</p>

<p>The sysadmin would find this book useful as it covers a common authentication scheme that can be used with a wide variety of applications on Unix. You will master PAM topics and take control over authentication for your organization IT infrastructure. If you are Linux or Unix sysadmin, I would highly recommend this book. Once again Michael W Lucas nailed it. The only book you may need for PAM deployment.</p>
</blockquote>

<ul>
<li><a href="https://www.michaelwlucas.com/tools/pam" rel="nofollow">get “PAM Mastery” </a>
***</li>
</ul>

<h3><a href="http://www.win.tue.nl/%7Eaeb/linux/hh/thompson/trust.html" rel="nofollow">Reflections on Trusting Trust - Ken Thompson, co-author of UNIX</a></h3>

<blockquote>
<p>Ken Thompson&#39;s &quot;cc hack&quot; - Presented in the journal, Communication of the ACM, Vol. 27, No. 8, August 1984, in a paper entitled &quot;Reflections on Trusting Trust&quot;, Ken Thompson, co-author of UNIX, recounted a story of how he created a version of the C compiler that, when presented with the source code for the &quot;login&quot; program, would automatically compile in a backdoor to allow him entry to the system. This is only half the story, though. In order to hide this trojan horse, Ken also added to this version of &quot;cc&quot; the ability to recognize if it was recompiling itself to make sure that the newly compiled C compiler contained both the &quot;login&quot; backdoor, and the code to insert both trojans into a newly compiled C compiler. In this way, the source code for the C compiler would never show that these trojans existed.</p>
</blockquote>

<ul>
<li>The article starts off by talking about a content to write a program that produces its own source code as output. Or rather, a C program, that writes a C program, that produces its own source code as output.</li>
</ul>

<blockquote>
<p>The C compiler is written in C. What I am about to describe is one of many &quot;chicken and egg&quot; problems that arise when compilers are written in their own language. In this case, I will use a specific example from the C compiler.</p>

<p>Suppose we wish to alter the C compiler to include the sequence &quot;\v&quot; to represent the vertical tab character. The extension to Figure 2 is obvious and is presented in Figure 3. We then recompile the C compiler, but we get a diagnostic. Obviously, since the binary version of the compiler does not know about &quot;\v,&quot; the source is not legal C. We must &quot;train&quot; the compiler. After it &quot;knows&quot; what &quot;\v&quot; means, then our new change will become legal C. We look up on an ASCII chart that a vertical tab is decimal 11. We alter our source to look like Figure 4. Now the old compiler accepts the new source. We install the resulting binary as the new official C compiler and now we can write the portable version the way we had it in Figure 3.</p>

<p>The actual bug I planted in the compiler would match code in the UNIX &quot;login&quot; command. The replacement code would miscompile the login command so that it would accept either the intended encrypted password or a particular known password. Thus if this code were installed in binary and the binary were used to compile the login command, I could log into that system as any user. Such blatant code would not go undetected for long. Even the most casual perusal of the source of the C compiler would raise suspicions.</p>

<p>Next “simply add a second Trojan horse to the one that already exists. The second pattern is aimed at the C compiler. The replacement code is a Stage I self-reproducing program that inserts both Trojan horses into the compiler. This requires a learning phase as in the Stage II example. First we compile the modified source with the normal C compiler to produce a bugged binary. We install this binary as the official C. We can now remove the bugs from the source of the compiler and the new binary will reinsert the bugs whenever it is compiled. Of course, the login command will remain bugged with no trace in source anywhere.</p>

<p>So now there is a trojan’d version of cc. If you compile a clean version of cc, using the bad cc, you will get a bad cc. If you use the bad cc to compile the login program, it will have a backdoor. The source code for both backdoors no longer exists on the system. You can audit the source code of cc and login all you want, they are trustworthy.</p>

<p>The compiler you use to compile your new compiler, is the untrustworthy bit, but you have no way to know it is untrustworthy, and no way to make a new compiler, without using the bad compiler.</p>

<p>The moral is obvious. You can&#39;t trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.</p>

<p>Acknowledgment: I first read of the possibility of such a Trojan horse in an Air Force critique of the security of an early implementation of Multics. I can- not find a more specific reference to this document. I would appreciate it if anyone who can supply this reference would let me know.</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.etsy.com/listing/496638945/freebsd-beastie-christmas-stocking" rel="nofollow">Custom made Beastie Stockings</a></p></li>
<li><p><a href="http://ximalas.info/2016/12/06/migrating-zfs-from-mirrored-pool-to-raidz1-pool/" rel="nofollow">Migrating ZFS from mirrored pool to raidz1 pool</a></p></li>
<li><p><a href="https://home.nuug.no/%7Epeter/blug2016/" rel="nofollow">OpenBSD and you</a> </p></li>
<li><p><a href="http://fxr.watson.org/" rel="nofollow">Watson.org FreeBSD and Linux cross reference </a> </p></li>
<li><p><a href="http://bxr.su/" rel="nofollow">OpenGrok</a> </p></li>
<li><p><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:37.libc.asc" rel="nofollow">FreeBSD SA-16:37: libc</a> -- A 26+ year old bug found in BSD’s libc, all BSDs likely affected -- A specially crafted argument can trigger a static buffer overflow in the library, with possibility to rewrite following static buffers that belong to other library functions.</p></li>
<li><p><a href="https://github.com/HardenedBSD/hardenedBSD/commit/fb823297fbced336b6beeeb624e2dc65b67aa0eb" rel="nofollow">HardenedBSD issues correction for libc patch </a> -- original patch improperly calculates how many bytes are remaining in the buffer.</p></li>
</ul>

<blockquote>
<p>From December the 27th until the 30th there the 33rd Chaos Communication Congress[0] is going to take place in Hamburg, Germany. Think of it as the yearly gathering of the european hackerscene and their overseas friends. I am one of the persons organizing the &quot;<a href="https://events.ccc.de/congress/2016/wiki/Assembly:BSD" rel="nofollow">BSD assembly</a>&quot; as a gathering place for BSD enthusiasts and waving the flag amidst the all the other projects / communities.</p>

<hr>
</blockquote>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/WRiuW6nn" rel="nofollow"> Chris - IPFW + Wifi</a> </li>
<li><a href="http://pastebin.com/JgerqZZP" rel="nofollow"> Jason - bhyve pci</a> </li>
<li><a href="http://pastebin.com/3XY5MVca" rel="nofollow"> Al - pf errors</a> </li>
<li><a href="http://pastebin.com/Kty0qYXM" rel="nofollow"> Zach - Xorg settings</a> </li>
<li><a href="http://pastebin.com/m3D81GBW" rel="nofollow"> Bart - Wireless Support</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>170: Sandboxing Cohabitation</title>
  <link>https://www.bsdnow.tv/170</link>
  <guid isPermaLink="false">1eecd778-12f6-4789-a729-294313b152c8</guid>
  <pubDate>Wed, 30 Nov 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1eecd778-12f6-4789-a729-294313b152c8.mp3" length="55016500" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we’ve got some new info on the talks from EuroBSDCon, a look at sharing a single ZFS pool between Linux and BSD, Sandboxing and much more! Stay tuned for your place to B...SD!</itunes:subtitle>
  <itunes:duration>1:16:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we’ve got some new info on the talks from EuroBSDCon, a look at sharing a single ZFS pool between Linux and BSD, Sandboxing and much more! Stay tuned for your place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://2016.eurobsdcon.org/PresentationSlides/" target="_blank" rel="nofollow noopener"&gt;EuroBSDcon 2016 Presentation Slides&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Due to circumstances beyond the control of the organizers of EuroBSDCon, there were not recordings of the talks given at the event.&lt;/li&gt;
&lt;li&gt;However, they have collected the slide decks from each of the speakers and assembled them on this page for you&lt;/li&gt;
&lt;li&gt;Also, we have some stuff from MeetBSD already:&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8TAMC2HJLZ7H54edD2BeGWv" target="_blank" rel="nofollow noopener"&gt;Youtube Playlist &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Not all of the sessions are posted yet, but the rest should appear shortly&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.freebsdfoundation.org/blog/meetbsd-2016-trip-report-domagoj-stolfa/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2016 Trip Report: Domagoj Stolfa&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://ericmccorkleblog.wordpress.com/2016/11/15/cohabiting-freebsd-and-gentoo-linux-on-a-common-zfs-volume/" target="_blank" rel="nofollow noopener"&gt;Cohabiting FreeBSD and Gentoo Linux on a Common ZFS Volume&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eric McCorkle, who has contributed ZFS support to the FreeBSD EFI boot-loader code has posted an in-depth look at how he’s setup dual-boot with FreeBSD and Gentoo on the same ZFS volume.&lt;/li&gt;
&lt;li&gt;He starts by giving us some background on how the layout is done. First up, GRUB is used as the boot-loader, allowing boot of both Linux and BSD&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The next non-typical thing was using /etc/fstab to manage mount-points, instead of the typical ‘zfs mount’ usage, (apart from /home datasets)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;data/home is mounted to /home, with all of its child datasets using the ZFS mountpoint system&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;data/freebsd and its child datasets house the FreeBSD system, and all have their mountpoints set to legacy&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;data/gentoo and its child datasets house the Gentoo system, and have their mountpoints set to legacy as well&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;So, how did he set this up? He helpfully provides an overview of the steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use the FreeBSD installer to create the GPT and ZFS pool&lt;/li&gt;
&lt;li&gt;Install and configure FreeBSD, with the native FreeBSD boot loader&lt;/li&gt;
&lt;li&gt;Boot into FreeBSD, create the Gentoo Linux datasets, install GRUB&lt;/li&gt;
&lt;li&gt;Boot into the Gentoo Linux installer, install Gentoo&lt;/li&gt;
&lt;li&gt;Boot into Gentoo, finish any configuration tasks&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The rest of the article walks us through the individual commands that make up each of those steps, as well as how to craft a GRUB config file capable of booting both systems.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Personally, since we are using EFI, I would have installed rEFInd, and chain-loaded each systems EFI boot code from there, allowing the use of the BSD loader, but to each their own!&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2016-11-27/introducing-safestack" target="_blank" rel="nofollow noopener"&gt;HardenedBSD introduces Safestack into base&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;HardenedBSD has integrated SafeStack into its base system and ports tree&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://clang.llvm.org/docs/SafeStack.html" target="_blank" rel="nofollow noopener"&gt;SafeStack&lt;/a&gt; is part of the Code Pointer Integrity (CPI) project within clang.&lt;/li&gt;
&lt;li&gt;“SafeStack is an instrumentation pass that protects programs against attacks based on stack buffer overflows, without introducing any measurable performance overhead. It works by separating the program stack into two distinct regions: the safe stack and the unsafe stack. The safe stack stores return addresses, register spills, and local variables that are always accessed in a safe way, while the unsafe stack stores everything else. This separation ensures that buffer overflows on the unsafe stack cannot be used to overwrite anything on the safe stack.”&lt;/li&gt;
&lt;li&gt;“As of 28 November 2016, with clang 3.9.0, SafeStack only supports being applied to applications and not shared libraries. Multiple patches have been submitted to clang by third parties to add support for shared libraries.”&lt;/li&gt;
&lt;li&gt;SafeStack is only enabled on AMD64
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://learnbchs.org/pledge.html" target="_blank" rel="nofollow noopener"&gt;pledge(2)… or, how I learned to love web application sandboxing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve talked about OpenBSD’s sandboxing mechanism pledge() in the past, but today we have a great article by Kristaps Dzonsons, about how he grew to love it for Web Sandboxing.
+First up, he gives us his opening argument that should make most of you sit up and listen:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I use application-level sandboxing a lot because I make mistakes a lot;                 and when writing web applications, the price of making mistakes is very dear.             &lt;/p&gt;

&lt;p&gt;&amp;gt; In the early 2000s, that meant using systrace(4) on OpenBSD and NetBSD.  Then it was seccomp(2) (followed by libseccomp(3)) on Linux.     Then there was capsicum(4) on FreeBSD and sandbox_init(3) on Mac OS X.                         &lt;/p&gt;

&lt;p&gt;&amp;gt; All of these systems are invoked differently; and for the most part, whenever it came     time to interface with one of them, I longed for sweet release from the nightmare.         Please, try reading seccomp(2). To the end. Aligning web application logic and security policy would require an arduous (and usually trial-and-error or worse, copy-and-paste) process. If there was any process at all — if the burden of writing a policy didn't cause me to abandon sandboxing at the start.                         &lt;/p&gt;

&lt;p&gt;&amp;gt; And then there was pledge(2).                         &lt;/p&gt;

&lt;p&gt;&amp;gt; This document is about pledge(2) and why you should use it and love it. “&lt;/p&gt;

&lt;p&gt;+Not convinced yet? Maybe you should take his challenge:&lt;/p&gt;

&lt;p&gt;&amp;gt; Let's play a drinking game.     The challenge is to stay out of the hospital.             &lt;/p&gt;

&lt;p&gt;&amp;gt; 1.Navigate to seccomp(2).&lt;br&gt;&lt;br&gt;
&amp;gt; 2. Read it to the end.&lt;br&gt;&lt;br&gt;
&amp;gt; 3. Drink every time you don't understand.                             &lt;/p&gt;

&lt;p&gt;&amp;gt; For capsicum(4), the    challenge is no less difficult.     To see these in action, navigate no further than OpenSSH, which interfaces with these sandboxes: sandbox-seccomp-filter.c or sandbox-capsicum.c.     (For a history lesson, you can even see sandbox-systrace.c.)         Keep in mind that these do little more than restrict resources to open descriptors and the     usual necessities of memory, signals, timing, etc. Keep that in mind and be horrified.     “&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Now Kristaps has his theory on why these are so difficult (NS..), but perhaps there is a better way. He makes the case that pledge() sits right in that sweet-spot, being powerful enough to be useful, but easy enough to implement that developers might actually use it.&lt;/li&gt;
&lt;li&gt;All in all, a nice read, check it out! Would love to hear other developer success stories using pledge() as well.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.osnews.com/story/29513/Unix_history_repository_now_on_GitHub" target="_blank" rel="nofollow noopener"&gt;Unix history repository, now on GitHub&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;OS News has an interesting tidbit on their site today, about the entire commit history of Unix now being available online, starting all the way back in 1970 and bringing us forward to today. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;From the README&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The history and evolution of the Unix operating system is made available as a revision management repository, covering the period from its inception in 1970 as a 2.5 thousand line kernel and 26 commands, to 2016 as a widely-used 27 million line system. The 1.1GB repository contains about half a million commits and more than two thousand merges. The repository employs Git system for its storage and is hosted on GitHub. It has been created by synthesizing with custom software 24 snapshots of systems developed at Bell Labs, the University of California at Berkeley, and the 386BSD team, two legacy repositories, and the modern repository of the open source FreeBSD system. In total, about one thousand individual contributors are identified, the early ones through primary research. The data set can be used for empirical research in software engineering, information systems, and software archaeology.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This is a fascinating find, especially will be of value to students and historians who wish to look back in time to see how UNIX evolved, and in this repo ultimately turned into modern FreeBSD.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://reviews.freebsd.org/D8526" target="_blank" rel="nofollow noopener"&gt;Yandex commits improvements to FreeBSD network stack &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“Rework ip_tryforward() to use FIB4 KPI.”&lt;/li&gt;
&lt;li&gt;This commit brings some code from the experimental routing branch into head&lt;/li&gt;
&lt;li&gt;As you can see from the graphs, it offers some sizable improvements in forwarding and firewalled packets per second&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=309257" target="_blank" rel="nofollow noopener"&gt;commit &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://idea.popcount.org/2016-11-01-a-brief-history-of-select2/" target="_blank" rel="nofollow noopener"&gt;The brief history of Unix socket multiplexing – select(2) system call&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ever wondered about the details of socket multiplexing, aka the history of select(2)?&lt;/li&gt;
&lt;li&gt;Well Marek today gives a treat, with a quick look back at the history that made today’s modern multiplexing possible.&lt;/li&gt;
&lt;li&gt;First, his article starts the way all good ones do, presenting the problem in silent-movie form:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; In mid-1960's time sharing was still a recent invention. Compared to a previous paradigm - batch-processing - time sharing was truly revolutionary. It greatly reduced the time wasted between writing a program and getting its result. Batch-processing meant hours and hours of waiting often to only see a program error. See this film to better understand the problems of 1960's programmers: "The trials and tribulations of batch processing".&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enter the wild world of the 1970’s, and we’ve now reached the birth of UNIX which tried to solve the batch processing problem with time-sharing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; These days when a program was executed, it could "stall" (block) only on a couple of things1:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;wait for CPU&lt;/li&gt;
&lt;li&gt;wait for disk I/O&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;wait for user input (waiting for a shell command) or console (printing data too fast)“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Jump forward another dozen years or so, and the world changes yet again:&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; This all changed in 1983 with the release of 4.2BSD. This revision introduced an early implementation of a TCP/IP stack and most importantly - the BSD Sockets API.Although today we take the BSD sockets API for granted, it wasn't obvious it was the right API. STREAMS were a competing API design on System V Revision 3.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Coming in along with the sockets API was the select(2) call, which our very own Kirk McKusick gives us some background on:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Select was introduced to allow applications to multiplex their I/O.&lt;/p&gt;

&lt;p&gt;&amp;gt; Consider a simple application like a remote login. It has descriptors for reading from and writing to the terminal and a descriptor for the (bidirectional) socket. It needs to read from the terminal keyboard and write those characters to the socket. It also needs to read from the socket and write to the terminal. Reading from a descriptor that has nothing queued causes the application to block until data arrives. The application does not know whether to read from the terminal or the socket and if it guesses wrong will incorrectly block. So select was added to let it find out which descriptor had data ready to read. If neither, select blocks until data arrives on one descriptor and then awakens telling which descriptor has data to read.&lt;/p&gt;

&lt;p&gt;&amp;gt; [...] Non-blocking was added at the same time as select. But using non-blocking when reading descriptors does not work well. Do you go into an infinite loop trying to read each of your input descriptors? If not, do you pause after each pass and if so for how long to remain responsive to input? Select is just far more efficient.&lt;/p&gt;

&lt;p&gt;Select also lets you create a single inetd daemon rather than having to have a separate daemon for every service.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The article then wraps up with an interesting conclusion:
&amp;gt; CSP = Communicating sequential processes&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; In this discussion I was afraid to phrase the core question. Were Unix processes intended to be CSP-style processes? Are file descriptors a CSP-derived "channels"? Is select equivalent to ALT statement?&lt;/p&gt;

&lt;p&gt;&amp;gt; I think: no. Even if there are design similarities, they are accidental. The file-descriptor abstractions were developed well before the original CSP paper.&lt;/p&gt;

&lt;p&gt;&amp;gt; It seems that an operating socket API's evolved totally disconnected from the userspace CSP-alike programming paradigms. It's a pity though. It would be interesting to see an operating system coherent with the programming paradigms of the user land programs.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A long (but good) read, and worth your time if you are interested in the history how modern multiplexing came to be.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://intellij-support.jetbrains.com/hc/en-us/articles/206525024-How-to-start-CLion-on-FreeBSD" target="_blank" rel="nofollow noopener"&gt;How to start CLion on FreeBSD?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;CLion (pronounced "sea lion") is a cross-platform C and C++ IDE&lt;/li&gt;
&lt;li&gt;By default, the Linux version comes bundled with some binaries, which obviously won’t work with the native FreeBSD build&lt;/li&gt;
&lt;li&gt;Rather than using Linux emulation, you can replace these components with native versions

&lt;ul&gt;
&lt;li&gt;pkg install openjdk8 cmake gdb&lt;/li&gt;
&lt;li&gt;Edit clion-2016.3/bin/idea.properties and change run.processes.with.pty=false&lt;/li&gt;
&lt;li&gt;Start CLion and open Settings | Build, Execution, Deployment | Toolchains&lt;/li&gt;
&lt;li&gt;Specify CMake path: /usr/local/bin/cmake and GDB path: /usr/local/bin/gdb&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Without a replacement for fsnotifier, you will get a warning that the IDE may be slow to detect changes to files on disk&lt;/li&gt;
&lt;li&gt;But, someone has already written a version of fsnotifier that works on FreeBSD and OpenBSD&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/idea4bsd/fsnotifier" target="_blank" rel="nofollow noopener"&gt;fsnotifier for OpenBSD and FreeBSD&lt;/a&gt; -- The fsnotifier is used by IntelliJ for detecting file changes. This version supports FreeBSD and OpenBSD via libinotify and is a replacement for the bundled Linux-only version coming with the IntelliJ IDEA Community Edition.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.trueos.org/trueos-pico/" target="_blank" rel="nofollow noopener"&gt;TrueOS Pico – FreeBSD ARM/RPi Thin Clients&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/xaque208/puppet-pkgng" target="_blank" rel="nofollow noopener"&gt;A Puppet package provider for FreeBSD's PkgNG package manager.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://mailman.uk.freebsd.org/pipermail/ukfreebsd/2016-November/014059.html" target="_blank" rel="nofollow noopener"&gt;Notes from November London *BSD meetup&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/semibug/2016-November/000131.html" target="_blank" rel="nofollow noopener"&gt;SemiBug meeting on Dec 20th&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/SMvxur9v" target="_blank" rel="nofollow noopener"&gt; Erno - SSH without password&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/5ETL7nmj" target="_blank" rel="nofollow noopener"&gt; Jonathan - Magical ZFS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/tSVvaV9e" target="_blank" rel="nofollow noopener"&gt; George - TrueOS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/T8nUexd1" target="_blank" rel="nofollow noopener"&gt; Mohammad - Jails IP&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/YssXXp70" target="_blank" rel="nofollow noopener"&gt; Gibheer - BEs&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we’ve got some new info on the talks from EuroBSDCon, a look at sharing a single ZFS pool between Linux and BSD, Sandboxing and much more! Stay tuned for your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2016.eurobsdcon.org/PresentationSlides/" rel="nofollow">EuroBSDcon 2016 Presentation Slides</a></h3>

<ul>
<li>Due to circumstances beyond the control of the organizers of EuroBSDCon, there were not recordings of the talks given at the event.</li>
<li>However, they have collected the slide decks from each of the speakers and assembled them on this page for you</li>
<li>Also, we have some stuff from MeetBSD already:</li>
<li><a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8TAMC2HJLZ7H54edD2BeGWv" rel="nofollow">Youtube Playlist </a> </li>
<li>Not all of the sessions are posted yet, but the rest should appear shortly</li>
<li><a href="https://www.freebsdfoundation.org/blog/meetbsd-2016-trip-report-domagoj-stolfa/" rel="nofollow">MeetBSD 2016 Trip Report: Domagoj Stolfa</a> 
***</li>
</ul>

<h3><a href="https://ericmccorkleblog.wordpress.com/2016/11/15/cohabiting-freebsd-and-gentoo-linux-on-a-common-zfs-volume/" rel="nofollow">Cohabiting FreeBSD and Gentoo Linux on a Common ZFS Volume</a></h3>

<ul>
<li>Eric McCorkle, who has contributed ZFS support to the FreeBSD EFI boot-loader code has posted an in-depth look at how he’s setup dual-boot with FreeBSD and Gentoo on the same ZFS volume.</li>
<li>He starts by giving us some background on how the layout is done. First up, GRUB is used as the boot-loader, allowing boot of both Linux and BSD</li>
<li><p>The next non-typical thing was using /etc/fstab to manage mount-points, instead of the typical ‘zfs mount’ usage, (apart from /home datasets)</p></li>
<li><p>data/home is mounted to /home, with all of its child datasets using the ZFS mountpoint system</p></li>
<li><p>data/freebsd and its child datasets house the FreeBSD system, and all have their mountpoints set to legacy</p></li>
<li><p>data/gentoo and its child datasets house the Gentoo system, and have their mountpoints set to legacy as well</p></li>
<li><p>So, how did he set this up? He helpfully provides an overview of the steps:</p>

<ul>
<li>Use the FreeBSD installer to create the GPT and ZFS pool</li>
<li>Install and configure FreeBSD, with the native FreeBSD boot loader</li>
<li>Boot into FreeBSD, create the Gentoo Linux datasets, install GRUB</li>
<li>Boot into the Gentoo Linux installer, install Gentoo</li>
<li>Boot into Gentoo, finish any configuration tasks</li>
</ul></li>
<li><p>The rest of the article walks us through the individual commands that make up each of those steps, as well as how to craft a GRUB config file capable of booting both systems.</p></li>
<li><p>Personally, since we are using EFI, I would have installed rEFInd, and chain-loaded each systems EFI boot code from there, allowing the use of the BSD loader, but to each their own!</p>

<hr></li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2016-11-27/introducing-safestack" rel="nofollow">HardenedBSD introduces Safestack into base</a></h3>

<ul>
<li>HardenedBSD has integrated SafeStack into its base system and ports tree</li>
<li><a href="http://clang.llvm.org/docs/SafeStack.html" rel="nofollow">SafeStack</a> is part of the Code Pointer Integrity (CPI) project within clang.</li>
<li>“SafeStack is an instrumentation pass that protects programs against attacks based on stack buffer overflows, without introducing any measurable performance overhead. It works by separating the program stack into two distinct regions: the safe stack and the unsafe stack. The safe stack stores return addresses, register spills, and local variables that are always accessed in a safe way, while the unsafe stack stores everything else. This separation ensures that buffer overflows on the unsafe stack cannot be used to overwrite anything on the safe stack.”</li>
<li>“As of 28 November 2016, with clang 3.9.0, SafeStack only supports being applied to applications and not shared libraries. Multiple patches have been submitted to clang by third parties to add support for shared libraries.”</li>
<li>SafeStack is only enabled on AMD64
***</li>
</ul>

<h3><a href="https://learnbchs.org/pledge.html" rel="nofollow">pledge(2)… or, how I learned to love web application sandboxing</a></h3>

<ul>
<li>We’ve talked about OpenBSD’s sandboxing mechanism pledge() in the past, but today we have a great article by Kristaps Dzonsons, about how he grew to love it for Web Sandboxing.
+First up, he gives us his opening argument that should make most of you sit up and listen:</li>
</ul>

<blockquote>
<p>I use application-level sandboxing a lot because I make mistakes a lot;                 and when writing web applications, the price of making mistakes is very dear.             </p>

<p>In the early 2000s, that meant using systrace(4) on OpenBSD and NetBSD.  Then it was seccomp(2) (followed by libseccomp(3)) on Linux.     Then there was capsicum(4) on FreeBSD and sandbox_init(3) on Mac OS X.                         </p>

<p>All of these systems are invoked differently; and for the most part, whenever it came     time to interface with one of them, I longed for sweet release from the nightmare.         Please, try reading seccomp(2). To the end. Aligning web application logic and security policy would require an arduous (and usually trial-and-error or worse, copy-and-paste) process. If there was any process at all — if the burden of writing a policy didn&#39;t cause me to abandon sandboxing at the start.                         </p>

<p>And then there was pledge(2).                         </p>

<p>This document is about pledge(2) and why you should use it and love it. “</p>
</blockquote>

<p>+Not convinced yet? Maybe you should take his challenge:</p>

<blockquote>
<p>Let&#39;s play a drinking game.     The challenge is to stay out of the hospital.             </p>

<p>1.Navigate to seccomp(2).                             </p>

<ol>
<li>Read it to the end.<br></li>
<li>Drink every time you don&#39;t understand.<br></li>
</ol>

<p>For capsicum(4), the    challenge is no less difficult.     To see these in action, navigate no further than OpenSSH, which interfaces with these sandboxes: sandbox-seccomp-filter.c or sandbox-capsicum.c.     (For a history lesson, you can even see sandbox-systrace.c.)         Keep in mind that these do little more than restrict resources to open descriptors and the     usual necessities of memory, signals, timing, etc. Keep that in mind and be horrified.     “</p>
</blockquote>

<ul>
<li>Now Kristaps has his theory on why these are so difficult (NS..), but perhaps there is a better way. He makes the case that pledge() sits right in that sweet-spot, being powerful enough to be useful, but easy enough to implement that developers might actually use it.</li>
<li>All in all, a nice read, check it out! Would love to hear other developer success stories using pledge() as well.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.osnews.com/story/29513/Unix_history_repository_now_on_GitHub" rel="nofollow">Unix history repository, now on GitHub</a></h3>

<ul>
<li><p>OS News has an interesting tidbit on their site today, about the entire commit history of Unix now being available online, starting all the way back in 1970 and bringing us forward to today. </p></li>
<li><p>From the README</p></li>
</ul>

<blockquote>
<p>The history and evolution of the Unix operating system is made available as a revision management repository, covering the period from its inception in 1970 as a 2.5 thousand line kernel and 26 commands, to 2016 as a widely-used 27 million line system. The 1.1GB repository contains about half a million commits and more than two thousand merges. The repository employs Git system for its storage and is hosted on GitHub. It has been created by synthesizing with custom software 24 snapshots of systems developed at Bell Labs, the University of California at Berkeley, and the 386BSD team, two legacy repositories, and the modern repository of the open source FreeBSD system. In total, about one thousand individual contributors are identified, the early ones through primary research. The data set can be used for empirical research in software engineering, information systems, and software archaeology.</p>
</blockquote>

<ul>
<li>This is a fascinating find, especially will be of value to students and historians who wish to look back in time to see how UNIX evolved, and in this repo ultimately turned into modern FreeBSD.
***</li>
</ul>

<h3><a href="https://reviews.freebsd.org/D8526" rel="nofollow">Yandex commits improvements to FreeBSD network stack </a></h3>

<ul>
<li>“Rework ip_tryforward() to use FIB4 KPI.”</li>
<li>This commit brings some code from the experimental routing branch into head</li>
<li>As you can see from the graphs, it offers some sizable improvements in forwarding and firewalled packets per second</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=309257" rel="nofollow">commit </a> 
***</li>
</ul>

<h3><a href="https://idea.popcount.org/2016-11-01-a-brief-history-of-select2/" rel="nofollow">The brief history of Unix socket multiplexing – select(2) system call</a></h3>

<ul>
<li>Ever wondered about the details of socket multiplexing, aka the history of select(2)?</li>
<li>Well Marek today gives a treat, with a quick look back at the history that made today’s modern multiplexing possible.</li>
<li>First, his article starts the way all good ones do, presenting the problem in silent-movie form:</li>
</ul>

<blockquote>
<p>In mid-1960&#39;s time sharing was still a recent invention. Compared to a previous paradigm - batch-processing - time sharing was truly revolutionary. It greatly reduced the time wasted between writing a program and getting its result. Batch-processing meant hours and hours of waiting often to only see a program error. See this film to better understand the problems of 1960&#39;s programmers: &quot;The trials and tribulations of batch processing&quot;.</p>
</blockquote>

<ul>
<li>Enter the wild world of the 1970’s, and we’ve now reached the birth of UNIX which tried to solve the batch processing problem with time-sharing.</li>
</ul>

<blockquote>
<p>These days when a program was executed, it could &quot;stall&quot; (block) only on a couple of things1:</p>

<ul>
<li>wait for CPU</li>
<li>wait for disk I/O</li>
<li>wait for user input (waiting for a shell command) or console (printing data too fast)“</li>
</ul>
</blockquote>

<ul>
<li>Jump forward another dozen years or so, and the world changes yet again:</li>
</ul>

<blockquote>
<p>This all changed in 1983 with the release of 4.2BSD. This revision introduced an early implementation of a TCP/IP stack and most importantly - the BSD Sockets API.Although today we take the BSD sockets API for granted, it wasn&#39;t obvious it was the right API. STREAMS were a competing API design on System V Revision 3.</p>
</blockquote>

<ul>
<li>Coming in along with the sockets API was the select(2) call, which our very own Kirk McKusick gives us some background on:</li>
</ul>

<blockquote>
<p>Select was introduced to allow applications to multiplex their I/O.</p>

<p>Consider a simple application like a remote login. It has descriptors for reading from and writing to the terminal and a descriptor for the (bidirectional) socket. It needs to read from the terminal keyboard and write those characters to the socket. It also needs to read from the socket and write to the terminal. Reading from a descriptor that has nothing queued causes the application to block until data arrives. The application does not know whether to read from the terminal or the socket and if it guesses wrong will incorrectly block. So select was added to let it find out which descriptor had data ready to read. If neither, select blocks until data arrives on one descriptor and then awakens telling which descriptor has data to read.</p>

<p>[...] Non-blocking was added at the same time as select. But using non-blocking when reading descriptors does not work well. Do you go into an infinite loop trying to read each of your input descriptors? If not, do you pause after each pass and if so for how long to remain responsive to input? Select is just far more efficient.</p>
</blockquote>

<p>Select also lets you create a single inetd daemon rather than having to have a separate daemon for every service.</p>

<ul>
<li>The article then wraps up with an interesting conclusion:
&gt; CSP = Communicating sequential processes</li>
</ul>

<blockquote>
<p>In this discussion I was afraid to phrase the core question. Were Unix processes intended to be CSP-style processes? Are file descriptors a CSP-derived &quot;channels&quot;? Is select equivalent to ALT statement?</p>

<p>I think: no. Even if there are design similarities, they are accidental. The file-descriptor abstractions were developed well before the original CSP paper.</p>

<p>It seems that an operating socket API&#39;s evolved totally disconnected from the userspace CSP-alike programming paradigms. It&#39;s a pity though. It would be interesting to see an operating system coherent with the programming paradigms of the user land programs.</p>
</blockquote>

<ul>
<li>A long (but good) read, and worth your time if you are interested in the history how modern multiplexing came to be.
***</li>
</ul>

<h3><a href="https://intellij-support.jetbrains.com/hc/en-us/articles/206525024-How-to-start-CLion-on-FreeBSD" rel="nofollow">How to start CLion on FreeBSD?</a></h3>

<ul>
<li>CLion (pronounced &quot;sea lion&quot;) is a cross-platform C and C++ IDE</li>
<li>By default, the Linux version comes bundled with some binaries, which obviously won’t work with the native FreeBSD build</li>
<li>Rather than using Linux emulation, you can replace these components with native versions

<ul>
<li>pkg install openjdk8 cmake gdb</li>
<li>Edit clion-2016.3/bin/idea.properties and change run.processes.with.pty=false</li>
<li>Start CLion and open Settings | Build, Execution, Deployment | Toolchains</li>
<li>Specify CMake path: /usr/local/bin/cmake and GDB path: /usr/local/bin/gdb</li>
</ul></li>
<li>Without a replacement for fsnotifier, you will get a warning that the IDE may be slow to detect changes to files on disk</li>
<li>But, someone has already written a version of fsnotifier that works on FreeBSD and OpenBSD</li>
<li><a href="https://github.com/idea4bsd/fsnotifier" rel="nofollow">fsnotifier for OpenBSD and FreeBSD</a> -- The fsnotifier is used by IntelliJ for detecting file changes. This version supports FreeBSD and OpenBSD via libinotify and is a replacement for the bundled Linux-only version coming with the IntelliJ IDEA Community Edition.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.trueos.org/trueos-pico/" rel="nofollow">TrueOS Pico – FreeBSD ARM/RPi Thin Clients</a> </p></li>
<li><p><a href="https://github.com/xaque208/puppet-pkgng" rel="nofollow">A Puppet package provider for FreeBSD&#39;s PkgNG package manager.</a></p></li>
<li><p><a href="http://mailman.uk.freebsd.org/pipermail/ukfreebsd/2016-November/014059.html" rel="nofollow">Notes from November London *BSD meetup</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/semibug/2016-November/000131.html" rel="nofollow">SemiBug meeting on Dec 20th</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/SMvxur9v" rel="nofollow"> Erno - SSH without password</a> </li>
<li><a href="http://pastebin.com/5ETL7nmj" rel="nofollow"> Jonathan - Magical ZFS</a> </li>
<li><a href="http://pastebin.com/tSVvaV9e" rel="nofollow"> George - TrueOS</a> </li>
<li><a href="http://pastebin.com/T8nUexd1" rel="nofollow"> Mohammad - Jails IP</a> </li>
<li><a href="http://pastebin.com/YssXXp70" rel="nofollow"> Gibheer - BEs</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we’ve got some new info on the talks from EuroBSDCon, a look at sharing a single ZFS pool between Linux and BSD, Sandboxing and much more! Stay tuned for your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2016.eurobsdcon.org/PresentationSlides/" rel="nofollow">EuroBSDcon 2016 Presentation Slides</a></h3>

<ul>
<li>Due to circumstances beyond the control of the organizers of EuroBSDCon, there were not recordings of the talks given at the event.</li>
<li>However, they have collected the slide decks from each of the speakers and assembled them on this page for you</li>
<li>Also, we have some stuff from MeetBSD already:</li>
<li><a href="https://www.youtube.com/playlist?list=PLb87fdKUIo8TAMC2HJLZ7H54edD2BeGWv" rel="nofollow">Youtube Playlist </a> </li>
<li>Not all of the sessions are posted yet, but the rest should appear shortly</li>
<li><a href="https://www.freebsdfoundation.org/blog/meetbsd-2016-trip-report-domagoj-stolfa/" rel="nofollow">MeetBSD 2016 Trip Report: Domagoj Stolfa</a> 
***</li>
</ul>

<h3><a href="https://ericmccorkleblog.wordpress.com/2016/11/15/cohabiting-freebsd-and-gentoo-linux-on-a-common-zfs-volume/" rel="nofollow">Cohabiting FreeBSD and Gentoo Linux on a Common ZFS Volume</a></h3>

<ul>
<li>Eric McCorkle, who has contributed ZFS support to the FreeBSD EFI boot-loader code has posted an in-depth look at how he’s setup dual-boot with FreeBSD and Gentoo on the same ZFS volume.</li>
<li>He starts by giving us some background on how the layout is done. First up, GRUB is used as the boot-loader, allowing boot of both Linux and BSD</li>
<li><p>The next non-typical thing was using /etc/fstab to manage mount-points, instead of the typical ‘zfs mount’ usage, (apart from /home datasets)</p></li>
<li><p>data/home is mounted to /home, with all of its child datasets using the ZFS mountpoint system</p></li>
<li><p>data/freebsd and its child datasets house the FreeBSD system, and all have their mountpoints set to legacy</p></li>
<li><p>data/gentoo and its child datasets house the Gentoo system, and have their mountpoints set to legacy as well</p></li>
<li><p>So, how did he set this up? He helpfully provides an overview of the steps:</p>

<ul>
<li>Use the FreeBSD installer to create the GPT and ZFS pool</li>
<li>Install and configure FreeBSD, with the native FreeBSD boot loader</li>
<li>Boot into FreeBSD, create the Gentoo Linux datasets, install GRUB</li>
<li>Boot into the Gentoo Linux installer, install Gentoo</li>
<li>Boot into Gentoo, finish any configuration tasks</li>
</ul></li>
<li><p>The rest of the article walks us through the individual commands that make up each of those steps, as well as how to craft a GRUB config file capable of booting both systems.</p></li>
<li><p>Personally, since we are using EFI, I would have installed rEFInd, and chain-loaded each systems EFI boot code from there, allowing the use of the BSD loader, but to each their own!</p>

<hr></li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2016-11-27/introducing-safestack" rel="nofollow">HardenedBSD introduces Safestack into base</a></h3>

<ul>
<li>HardenedBSD has integrated SafeStack into its base system and ports tree</li>
<li><a href="http://clang.llvm.org/docs/SafeStack.html" rel="nofollow">SafeStack</a> is part of the Code Pointer Integrity (CPI) project within clang.</li>
<li>“SafeStack is an instrumentation pass that protects programs against attacks based on stack buffer overflows, without introducing any measurable performance overhead. It works by separating the program stack into two distinct regions: the safe stack and the unsafe stack. The safe stack stores return addresses, register spills, and local variables that are always accessed in a safe way, while the unsafe stack stores everything else. This separation ensures that buffer overflows on the unsafe stack cannot be used to overwrite anything on the safe stack.”</li>
<li>“As of 28 November 2016, with clang 3.9.0, SafeStack only supports being applied to applications and not shared libraries. Multiple patches have been submitted to clang by third parties to add support for shared libraries.”</li>
<li>SafeStack is only enabled on AMD64
***</li>
</ul>

<h3><a href="https://learnbchs.org/pledge.html" rel="nofollow">pledge(2)… or, how I learned to love web application sandboxing</a></h3>

<ul>
<li>We’ve talked about OpenBSD’s sandboxing mechanism pledge() in the past, but today we have a great article by Kristaps Dzonsons, about how he grew to love it for Web Sandboxing.
+First up, he gives us his opening argument that should make most of you sit up and listen:</li>
</ul>

<blockquote>
<p>I use application-level sandboxing a lot because I make mistakes a lot;                 and when writing web applications, the price of making mistakes is very dear.             </p>

<p>In the early 2000s, that meant using systrace(4) on OpenBSD and NetBSD.  Then it was seccomp(2) (followed by libseccomp(3)) on Linux.     Then there was capsicum(4) on FreeBSD and sandbox_init(3) on Mac OS X.                         </p>

<p>All of these systems are invoked differently; and for the most part, whenever it came     time to interface with one of them, I longed for sweet release from the nightmare.         Please, try reading seccomp(2). To the end. Aligning web application logic and security policy would require an arduous (and usually trial-and-error or worse, copy-and-paste) process. If there was any process at all — if the burden of writing a policy didn&#39;t cause me to abandon sandboxing at the start.                         </p>

<p>And then there was pledge(2).                         </p>

<p>This document is about pledge(2) and why you should use it and love it. “</p>
</blockquote>

<p>+Not convinced yet? Maybe you should take his challenge:</p>

<blockquote>
<p>Let&#39;s play a drinking game.     The challenge is to stay out of the hospital.             </p>

<p>1.Navigate to seccomp(2).                             </p>

<ol>
<li>Read it to the end.<br></li>
<li>Drink every time you don&#39;t understand.<br></li>
</ol>

<p>For capsicum(4), the    challenge is no less difficult.     To see these in action, navigate no further than OpenSSH, which interfaces with these sandboxes: sandbox-seccomp-filter.c or sandbox-capsicum.c.     (For a history lesson, you can even see sandbox-systrace.c.)         Keep in mind that these do little more than restrict resources to open descriptors and the     usual necessities of memory, signals, timing, etc. Keep that in mind and be horrified.     “</p>
</blockquote>

<ul>
<li>Now Kristaps has his theory on why these are so difficult (NS..), but perhaps there is a better way. He makes the case that pledge() sits right in that sweet-spot, being powerful enough to be useful, but easy enough to implement that developers might actually use it.</li>
<li>All in all, a nice read, check it out! Would love to hear other developer success stories using pledge() as well.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.osnews.com/story/29513/Unix_history_repository_now_on_GitHub" rel="nofollow">Unix history repository, now on GitHub</a></h3>

<ul>
<li><p>OS News has an interesting tidbit on their site today, about the entire commit history of Unix now being available online, starting all the way back in 1970 and bringing us forward to today. </p></li>
<li><p>From the README</p></li>
</ul>

<blockquote>
<p>The history and evolution of the Unix operating system is made available as a revision management repository, covering the period from its inception in 1970 as a 2.5 thousand line kernel and 26 commands, to 2016 as a widely-used 27 million line system. The 1.1GB repository contains about half a million commits and more than two thousand merges. The repository employs Git system for its storage and is hosted on GitHub. It has been created by synthesizing with custom software 24 snapshots of systems developed at Bell Labs, the University of California at Berkeley, and the 386BSD team, two legacy repositories, and the modern repository of the open source FreeBSD system. In total, about one thousand individual contributors are identified, the early ones through primary research. The data set can be used for empirical research in software engineering, information systems, and software archaeology.</p>
</blockquote>

<ul>
<li>This is a fascinating find, especially will be of value to students and historians who wish to look back in time to see how UNIX evolved, and in this repo ultimately turned into modern FreeBSD.
***</li>
</ul>

<h3><a href="https://reviews.freebsd.org/D8526" rel="nofollow">Yandex commits improvements to FreeBSD network stack </a></h3>

<ul>
<li>“Rework ip_tryforward() to use FIB4 KPI.”</li>
<li>This commit brings some code from the experimental routing branch into head</li>
<li>As you can see from the graphs, it offers some sizable improvements in forwarding and firewalled packets per second</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=309257" rel="nofollow">commit </a> 
***</li>
</ul>

<h3><a href="https://idea.popcount.org/2016-11-01-a-brief-history-of-select2/" rel="nofollow">The brief history of Unix socket multiplexing – select(2) system call</a></h3>

<ul>
<li>Ever wondered about the details of socket multiplexing, aka the history of select(2)?</li>
<li>Well Marek today gives a treat, with a quick look back at the history that made today’s modern multiplexing possible.</li>
<li>First, his article starts the way all good ones do, presenting the problem in silent-movie form:</li>
</ul>

<blockquote>
<p>In mid-1960&#39;s time sharing was still a recent invention. Compared to a previous paradigm - batch-processing - time sharing was truly revolutionary. It greatly reduced the time wasted between writing a program and getting its result. Batch-processing meant hours and hours of waiting often to only see a program error. See this film to better understand the problems of 1960&#39;s programmers: &quot;The trials and tribulations of batch processing&quot;.</p>
</blockquote>

<ul>
<li>Enter the wild world of the 1970’s, and we’ve now reached the birth of UNIX which tried to solve the batch processing problem with time-sharing.</li>
</ul>

<blockquote>
<p>These days when a program was executed, it could &quot;stall&quot; (block) only on a couple of things1:</p>

<ul>
<li>wait for CPU</li>
<li>wait for disk I/O</li>
<li>wait for user input (waiting for a shell command) or console (printing data too fast)“</li>
</ul>
</blockquote>

<ul>
<li>Jump forward another dozen years or so, and the world changes yet again:</li>
</ul>

<blockquote>
<p>This all changed in 1983 with the release of 4.2BSD. This revision introduced an early implementation of a TCP/IP stack and most importantly - the BSD Sockets API.Although today we take the BSD sockets API for granted, it wasn&#39;t obvious it was the right API. STREAMS were a competing API design on System V Revision 3.</p>
</blockquote>

<ul>
<li>Coming in along with the sockets API was the select(2) call, which our very own Kirk McKusick gives us some background on:</li>
</ul>

<blockquote>
<p>Select was introduced to allow applications to multiplex their I/O.</p>

<p>Consider a simple application like a remote login. It has descriptors for reading from and writing to the terminal and a descriptor for the (bidirectional) socket. It needs to read from the terminal keyboard and write those characters to the socket. It also needs to read from the socket and write to the terminal. Reading from a descriptor that has nothing queued causes the application to block until data arrives. The application does not know whether to read from the terminal or the socket and if it guesses wrong will incorrectly block. So select was added to let it find out which descriptor had data ready to read. If neither, select blocks until data arrives on one descriptor and then awakens telling which descriptor has data to read.</p>

<p>[...] Non-blocking was added at the same time as select. But using non-blocking when reading descriptors does not work well. Do you go into an infinite loop trying to read each of your input descriptors? If not, do you pause after each pass and if so for how long to remain responsive to input? Select is just far more efficient.</p>
</blockquote>

<p>Select also lets you create a single inetd daemon rather than having to have a separate daemon for every service.</p>

<ul>
<li>The article then wraps up with an interesting conclusion:
&gt; CSP = Communicating sequential processes</li>
</ul>

<blockquote>
<p>In this discussion I was afraid to phrase the core question. Were Unix processes intended to be CSP-style processes? Are file descriptors a CSP-derived &quot;channels&quot;? Is select equivalent to ALT statement?</p>

<p>I think: no. Even if there are design similarities, they are accidental. The file-descriptor abstractions were developed well before the original CSP paper.</p>

<p>It seems that an operating socket API&#39;s evolved totally disconnected from the userspace CSP-alike programming paradigms. It&#39;s a pity though. It would be interesting to see an operating system coherent with the programming paradigms of the user land programs.</p>
</blockquote>

<ul>
<li>A long (but good) read, and worth your time if you are interested in the history how modern multiplexing came to be.
***</li>
</ul>

<h3><a href="https://intellij-support.jetbrains.com/hc/en-us/articles/206525024-How-to-start-CLion-on-FreeBSD" rel="nofollow">How to start CLion on FreeBSD?</a></h3>

<ul>
<li>CLion (pronounced &quot;sea lion&quot;) is a cross-platform C and C++ IDE</li>
<li>By default, the Linux version comes bundled with some binaries, which obviously won’t work with the native FreeBSD build</li>
<li>Rather than using Linux emulation, you can replace these components with native versions

<ul>
<li>pkg install openjdk8 cmake gdb</li>
<li>Edit clion-2016.3/bin/idea.properties and change run.processes.with.pty=false</li>
<li>Start CLion and open Settings | Build, Execution, Deployment | Toolchains</li>
<li>Specify CMake path: /usr/local/bin/cmake and GDB path: /usr/local/bin/gdb</li>
</ul></li>
<li>Without a replacement for fsnotifier, you will get a warning that the IDE may be slow to detect changes to files on disk</li>
<li>But, someone has already written a version of fsnotifier that works on FreeBSD and OpenBSD</li>
<li><a href="https://github.com/idea4bsd/fsnotifier" rel="nofollow">fsnotifier for OpenBSD and FreeBSD</a> -- The fsnotifier is used by IntelliJ for detecting file changes. This version supports FreeBSD and OpenBSD via libinotify and is a replacement for the bundled Linux-only version coming with the IntelliJ IDEA Community Edition.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.trueos.org/trueos-pico/" rel="nofollow">TrueOS Pico – FreeBSD ARM/RPi Thin Clients</a> </p></li>
<li><p><a href="https://github.com/xaque208/puppet-pkgng" rel="nofollow">A Puppet package provider for FreeBSD&#39;s PkgNG package manager.</a></p></li>
<li><p><a href="http://mailman.uk.freebsd.org/pipermail/ukfreebsd/2016-November/014059.html" rel="nofollow">Notes from November London *BSD meetup</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/semibug/2016-November/000131.html" rel="nofollow">SemiBug meeting on Dec 20th</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/SMvxur9v" rel="nofollow"> Erno - SSH without password</a> </li>
<li><a href="http://pastebin.com/5ETL7nmj" rel="nofollow"> Jonathan - Magical ZFS</a> </li>
<li><a href="http://pastebin.com/tSVvaV9e" rel="nofollow"> George - TrueOS</a> </li>
<li><a href="http://pastebin.com/T8nUexd1" rel="nofollow"> Mohammad - Jails IP</a> </li>
<li><a href="http://pastebin.com/YssXXp70" rel="nofollow"> Gibheer - BEs</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>169: Scheduling your NetBSD</title>
  <link>https://www.bsdnow.tv/169</link>
  <guid isPermaLink="false">4898747c-2845-49b3-9de1-94f72798e48c</guid>
  <pubDate>Wed, 23 Nov 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4898747c-2845-49b3-9de1-94f72798e48c.mp3" length="63095476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On today’s episode, we are loaded and ready to go. Lots of OpenBSD news, a look at LetsEncrypt usage, the NetBSD scheduler (oh my) and much more. Keep it tuned to your place to B...SD!</itunes:subtitle>
  <itunes:duration>1:27:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;On today’s episode, we are loaded and ready to go. Lots of OpenBSD news, a look at LetsEncrypt usage, the NetBSD scheduler (oh my) and much more. Keep it tuned to your place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/production-ready" target="_blank" rel="nofollow noopener"&gt;Production ready&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst brings us a piece on what it means to be Production Ready&lt;/li&gt;
&lt;li&gt;He tells the story of a project he worked on that picked a framework that was “production ready”&lt;/li&gt;
&lt;li&gt;They tested time zones, and it all seemed to work&lt;/li&gt;
&lt;li&gt;They tested the unicode support in english and various european languages, and it was all good&lt;/li&gt;
&lt;li&gt;They sent some emails with it, and it just worked&lt;/li&gt;
&lt;li&gt;The framework said “Production Ready” on the tin, and it passed all the tests. What is the worst that could happen?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Now, we built our product on top of this. Some of the bugs were caught internally. Others were discovered by customers, who were of course a little dismayed. Like, how could you possibly ship this? Indeed. We were doing testing, quite a bit really, but when every possible edge case has a bug, it’s hard to find them all.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A customer from Arizona, which does not observe Daylight Saving Time, crashed the app&lt;/li&gt;
&lt;li&gt;Some less common unicode characters caused a buffer overflow&lt;/li&gt;
&lt;li&gt;The email system did not properly escape a period on its own line, truncating the email&lt;/li&gt;
&lt;li&gt;“Egregious performance because of a naive N&lt;sup&gt;2&lt;/sup&gt; algorithm for growing a buffer.”&lt;/li&gt;
&lt;li&gt;“Egregious performance on some platforms due to using the wrong threading primitives.”&lt;/li&gt;
&lt;li&gt;“Bizarre database connection bugs for some queries that I can’t at all explain.”&lt;/li&gt;
&lt;li&gt;“In short, everything was “works for me” quality. But is that really production quality?”&lt;/li&gt;
&lt;li&gt;“There are some obvious contenders for the title of today’s most “production ready” software, but it’s a more general phenomenon. People who have success don’t know what they don’t know, what they didn’t test, what unused features will crash and burn.”&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://blog.crashed.org/letsencrypt-in-freebsd-org/" target="_blank" rel="nofollow noopener"&gt;Using Let's Encrypt within FreeBSD.org&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; I decided to give Let's Encrypt certificates a shot on my personal web servers earlier this year after a disaster with StartSSL. I'd like to share what I've learned.&lt;/p&gt;

&lt;p&gt;&amp;gt; The biggest gotcha is that people tend to develop bad habits when they only have to deal with certificates once a year or so. The beginning part of the process is manual and the deployment of certificates somehow never quite gets automated, or things get left out.&lt;/p&gt;

&lt;p&gt;&amp;gt; That all changes with Let's Encrypt certificates. Instead of 1-5 year lifetime certificates the Let's Encrypt certificates are only valid for 90 days. Most people will be wanting to renew every 60-80 days. This forces the issue - you really need to automate and make it robust.&lt;/p&gt;

&lt;p&gt;&amp;gt; The Let's Encrypt folks provide tools to do this for you for the common cases. You run it on the actual machine, it manages the certificates and adjusts the server configuration files for you. Their goal is to provide a baseline shake-n-bake solution. I was not willing to give that level of control to a third party tool for my own servers - and it was absolutely out of the question for for the FreeBSD.org cluster.&lt;/p&gt;

&lt;p&gt;&amp;gt; I should probably mention that we do things on the FreeBSD.org cluster that many people would find a bit strange. The biggest problem that we have to deal with is that the traditional model of a firewall/bastion between "us" and "them" does not apply. We design for the assumption that hostile users are already on the "inside" of the network. The cluster is spread over 8 distinct sites with naked internet and no vpn between them. There is actually very little trust between the systems in this network - eg: ssh is for people only - no headless users can ssh. There are no passwords. Sudo can't be used. The command and control systems use signing. We don't trust anything by IPv4/IPv6 address because we have to assume MITM is a thing. And so on. In general, things are constructed to be trigger / polling / pull based.&lt;/p&gt;

&lt;p&gt;&amp;gt; The downside is that this makes automation and integration of Let's Encrypt clients interesting. If server configuration files can't be modified; and replicated web infrastructure is literally read-only (via jails/nullfs); and DNS zone files are static; and headless users can't ssh and therefore cannot do commits, how do you do the verification tokens in an automated fashion? Interesting, indeed.&lt;/p&gt;

&lt;p&gt;&amp;gt; We wanted to be able to use certificates on things like ldap and smtp servers. You can't do http file verification on those so we had to use dns validation of domains.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;First, a signing request is generated, and the acme-challenge is returned&lt;/li&gt;
&lt;li&gt;Peter’s post then walks through how the script adds the required TXT record to prove control of the domain, regenerates the zone file, DNSSEC signs it, and waits for it to be published, then continues the letsencrypt process.&lt;/li&gt;
&lt;li&gt;Letsencrypt then issues the actual certificate&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; We export the fullchain files into a publication location. There is another jail that can read the fullchain certificates via nullfs and they are published with our non-secrets update mechanism&lt;/p&gt;

&lt;p&gt;&amp;gt; Since we are using DNSSEC, here is a good opportunity to maintain signed TLSA fingerprints. The catch with TLSA record updates is managing the update event horizon. You are supposed to have both fingerprints listed across the update cycle. We use 'TLSA 3 1 1' records to avoid issues with propagation delays for now. TLSA 3 0 1 changes with every renewal, while 3 1 1 only changes when you generate a new private key.&lt;/p&gt;

&lt;p&gt;&amp;gt; The majority of TLS/SSL servers require a full restart to re-load the certificates if the filename is unchanged. I found out the hard way.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There is a great deal more detail in the blog post, I recommend you check it out&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;Learning more about the NetBSD scheduler (... than I wanted to know)&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161105_1754.html" target="_blank" rel="nofollow noopener"&gt;Part 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161109_0059.html" target="_blank" rel="nofollow noopener"&gt;Part 2&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161113_0122.html" target="_blank" rel="nofollow noopener"&gt;Part 3&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Today I had a need to do some number crunching using a home-brewn C program. In order to do some manual load balancing, I was firing up some Amazon AWS instances (which is Xen) with NetBSD 7.0. In this case, the system was assigned two CPUs I started two instances of my program, with the intent to have each one use one CPU. Which is not what happened! Here is what I observed, and how I fixed things for now.&lt;/p&gt;

&lt;p&gt;~~&lt;br&gt;
load averages:  2.14,  2.08,  1.83;               up 0+00:45:56        18:01:32&lt;br&gt;
27 processes: 4 runnable, 21 sleeping, 2 on CPU&lt;br&gt;
CPU0 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle&lt;br&gt;
CPU1 states:  0.0% user,  0.0% nice,  0.0% system,  0.0% interrupt,  100% idle&lt;br&gt;
Memory: 119M Act, 7940K Exec, 101M File, 3546M Free&lt;br&gt;
~~&lt;/p&gt;

&lt;p&gt;~~&lt;br&gt;
PID USERNAME PRI NICE   SIZE   RES STATE    TIME   WCPU CPU COMMAND&lt;br&gt;
2791 root   25  0  8816K  964K RUN/0    16:10 54.20% 54.20% myprog&lt;br&gt;
2845 root   26  0  8816K  964K RUN/0    17:10 47.90% 47.90% myprog&lt;br&gt;
~~&lt;/p&gt;

&lt;p&gt;&amp;gt; I expected something like WCPU and CPU being around 100%, assuming that each process was bound to its own CPU. The values I actually saw (and listed above) suggested that both programs were fighting for the same CPU. Huh?! NetBSD allows to create "processor sets", assign CPU(s) to them and then assign processes to the processor sets. Let's have a look!&lt;/p&gt;

&lt;p&gt;~~&lt;br&gt;
  # psrset -c&lt;br&gt;
    1&lt;br&gt;
  # psrset -b 0 2791&lt;br&gt;
  # psrset -b 1 2845&lt;br&gt;
   load averages:  2.02,  2.05,  1.94;               up 0+00:59:32        18:15:08&lt;br&gt;
    27 processes: 1 runnable, 24 sleeping, 2 on CPU&lt;br&gt;
    CPU0 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle&lt;br&gt;
    CPU1 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle&lt;br&gt;
    Memory: 119M Act, 7940K Exec, 101M File, 3546M Free&lt;/p&gt;

&lt;pre&gt;&lt;code&gt;  PID USERNAME PRI NICE   SIZE   RES STATE      TIME   WCPU    CPU COMMAND
 2845 root      25    0  8816K  964K CPU/1     26:14   100%   100% myprog
 2791 root      25    0  8816K  964K RUN/0     25:40   100%   100% myprog
&lt;/code&gt;&lt;/pre&gt;

&lt;p&gt;~~&lt;/p&gt;

&lt;p&gt;&amp;gt; Things are as expected now, with each program being bound to its own CPU. Now why this didn't happen by default is left as an exercise to the reader.&lt;/p&gt;

&lt;p&gt;&amp;gt; I had another look at this today, and was able to reproduce the behaviour using VMWare Fusion with two CPU cores on both NetBSD 7.0_STABLE as well as -current&lt;/p&gt;

&lt;p&gt;&amp;gt; The one hint that I got so far was from Michael van Elst that there may be a rouding error in sched_balance(). Looking at the code, there is not much room for a rounding error. But I am not familiar enough (at all) with the code, so I cannot judge if crucial bits are dropped here, or how that function fits in the whole puzzle.&lt;/p&gt;

&lt;p&gt;&amp;gt; Pondering on the "rounding error", I've setup both VMs with 4 CPUs, and the behaviour shown there is that load is distributed to about 3 and a half CPU - three CPUs under full load, and one not reaching 100%. There's definitely something fishy in there.&lt;/p&gt;

&lt;p&gt;&amp;gt; With multiple CPUs, each CPU has a queue of processes that are either "on the CPU" (running) or waiting to be serviced (run) on that CPU. Those processes count as "migratable" in runqueue_t. Every now and then, the system checks all its run queues to see if a CPU is idle, and can thus "steal" (migrate) processes from a busy CPU. This is done in sched_balance().&lt;/p&gt;

&lt;p&gt;&amp;gt; Such "stealing" (migration) has the positive effect that the process doesn't have to wait for getting serviced on the CPU it's currently waiting on. On the other side, migrating the process has effects on CPU's data and instruction caches, so switching CPUs shouldn't be taken too easy.&lt;/p&gt;

&lt;p&gt;&amp;gt; All in all, I'd say the patch is a good step forward from the current situation, which does not properly distribute pure CPU hogs, at all.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.nas.nasa.gov/SC16/demos/demo9.html" target="_blank" rel="nofollow noopener"&gt;Building Cost-Effective 100-Gbps Firewalls for HPC with FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; The continuous growth of the NASA Center for Climate Simulation (NCCS) requires providing high-performance security tools and enhancing the network capacity. In order to support the requirements of emerging services, including the Advanced Data Analytics Platform (ADAPT) private cloud, the NCCS security team has proposed an architecture to provide extremely cost-effective 100-gigabit-per-second (Gbps) firewalls.&lt;/p&gt;

&lt;p&gt;&amp;gt; The aim of this project is to create a commodity-based platform that can process enough packets per second (pps) to sustain a 100-Gbps workload within the NCCS computational environment. The test domain consists of several existing systems within the NCCS, including switches (Dell S4084), routers (Dell R530s), servers (Dell R420s, and C6100s), and host card adapters (10-Gbps Mellanox ConnectX2 and Intel 8259 x Ethernet cards).&lt;/p&gt;

&lt;p&gt;&amp;gt; Previous NCCS work testing the FreeBSD operating system for high-performance routing reached a maximum of 4 million pps. Building on this work, we are comparing FreeBSD-11.0 and FreeBSD-Current along with implementing the netmap-fwd Application Programming Interface (API) and tuning the 10-gigabit Ethernet cards. We used the tools iperf3, nuttcp, and netperf to monitor the performance of the maximum bandwidth through the cards. Additional testing has involved enabling the Common Address Redundancy Protocol (CARP) to achieve an active/active architecture.&lt;/p&gt;

&lt;p&gt;&amp;gt; The tests have shown that at the optimally tuned and configured FreeBSD system, it is possible to create a system that can manage the huge amounts of pps needed to create a 100-Gbps firewall with commodity components.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Some interesting findings: 

&lt;ul&gt;
&lt;li&gt;FreeBSD was able to send more pps as a client than Centos 6.&lt;/li&gt;
&lt;li&gt;Netmap-fwd increased the pps rate significantly.&lt;/li&gt;
&lt;li&gt;The choice of network card can have a significant impact on pps, tuning, and netmap support.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Further tests will continue verifying the above results with even more capable systems-such as 40-gigabit and 100-gigabit Ethernet cards-to achieve even higher performance. In addition to hardware improvements, updates to the network capabilities in the FreeBSD-Current version will be closely monitored and applied as appropriate. The final result will be a reference architecture with representative hardware and software that will enable the NCCS to build, deploy, and efficiently maintain extremely cost-effective 100-Gbps firewalls.&lt;/p&gt;

&lt;p&gt;&amp;gt; Netflix has already managed to saturate a 100 Gbps interface using only a single CPU Socket (rather than a dual socket server). Forwarding/routing is a bit different, but it is definitely on track to get there. Using a small number of commodity servers to firewall 100 Gbps of traffic just takes some careful planning and load balancing. Soon it will be possible using a single host.&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/bartekrutkowski/iocell" target="_blank" rel="nofollow noopener"&gt;iocell - A FreeBSD jail manager.&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another jail manager has arrived on the scene, iocell, which begins life as a fork of the “classic” iocage.&lt;/li&gt;
&lt;li&gt;Due to its shared heritage, it offers much of the same functionality and flags as iocage users will be familiar with.&lt;/li&gt;
&lt;li&gt;For those who aren’t up to speed with either products, some of those features include: 

&lt;ul&gt;
&lt;li&gt;Templates, clones, basejails, fully independent jails&lt;/li&gt;
&lt;li&gt;Ease of use&lt;/li&gt;
&lt;li&gt;Zero configuration files&lt;/li&gt;
&lt;li&gt;Rapid thin provisioning within seconds&lt;/li&gt;
&lt;li&gt;Automatic package installation&lt;/li&gt;
&lt;li&gt;Virtual networking stacks (vnet)&lt;/li&gt;
&lt;li&gt;Shared IP based jails (non vnet)&lt;/li&gt;
&lt;li&gt;Resource limits (CPU, MEMORY, DISK I/O, etc.)&lt;/li&gt;
&lt;li&gt;Filesystem quotas and reservations&lt;/li&gt;
&lt;li&gt;Dedicated ZFS datasets inside jails&lt;/li&gt;
&lt;li&gt;Transparent ZFS snapshot management&lt;/li&gt;
&lt;li&gt;Binary updates&lt;/li&gt;
&lt;li&gt;Differential jail packaging&lt;/li&gt;
&lt;li&gt;Export and import&lt;/li&gt;
&lt;li&gt;And many more!&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The program makes extensive use of ZFS for performing jail operations, so a zpool will be required (But doesn’t have to be your boot-pool)&lt;/li&gt;
&lt;li&gt;It still looks “very” fresh, even using original iocage filenames in the repo, so a safe guess is that you’ll be able to switch between iocage and iocell with relative ease.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.gordonturner.ca/2016/11/20/fail2ban-on-openbsd-6-0/" target="_blank" rel="nofollow noopener"&gt;Fail2ban on OpenBSD 6.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve used Fail2Ban in PC-BSD before, due to it’s ability to detect and block brute force attempts against a variety of services, including SSH, mail, and others. It even can work to detect jail brute force attempts, blocking IPs on the hosts firewall. &lt;/li&gt;
&lt;li&gt;However what about OpenBSD users? Well, Gordon Turner comes to the rescue today with a great writeup on deploying Fail2Ban specifically for that platform.&lt;/li&gt;
&lt;li&gt;Now, Fail2Ban is a python program, so you’ll need to pkg install Python first, then he provides instructions on how to manually grab the F2B sources and install on OpenBSD.&lt;/li&gt;
&lt;li&gt;Helpfully Gordon gives us some handy links to scripts and modifications to get F2B running via RC as well, which is a bit different since F2B has both a server and client that must run together.&lt;/li&gt;
&lt;li&gt;With the installation bits out of the way, we get to next hit the “fun” stuff, which comes in the way of SSH brute force detection.&lt;/li&gt;
&lt;li&gt;Naturally we will be configuring F2B to use “pf” to do our actual blocking, but the examples shown give us full control over the knobs used to detect, and then ultimately call ‘pfctl’ to do our heavy lifting.&lt;/li&gt;
&lt;li&gt;The last bits of the article give us a runthrough on how to “prime” pf with the correct block tables and performing basic administrative tasks to control F2B in production.&lt;/li&gt;
&lt;li&gt;A great article, and if you run an OpenBSD box exposed to the internet, you may want to bookmark this one.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/openbsd-changes-of-note" target="_blank" rel="nofollow noopener"&gt;openbsd changes of note&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Continuing with our OpenBSD news for the week, we have a new blog post by TedU, which gives us a bunch of notes on the things which have changed over there as of late:&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Some of the notables include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;mcl2k2 pools&lt;/em&gt; and the &lt;em&gt;em conversion&lt;/em&gt;. The details are in the commits, but the short story is that due to hardware limitations, a number of tradeoffs need to be made between performance and memory usage. The em chip can (mostly) only be programmed to write to 2k buffers. However, ethernet payloads are not nicely aligned. They’re two bytes off. Leading to a costly choice. Provide a 2k buffer, and then copy all the data after the fact, which is slow. Or allocate a larger than 2k buffer, and provide em with a pointer that’s 2 bytes offset. Previously, the next size up from 2k was 4k, which is quite wasteful. The new 2k2 buffer size still wastes a bit of memory, but much less.&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;FreeType 2.7 is prettier than ever&lt;/em&gt;. &lt;/li&gt;
&lt;li&gt;
&lt;em&gt;vmm for i386&lt;/em&gt;. &lt;em&gt;Improve security&lt;/em&gt;. vmm is still running with a phenomenal set of privileges, but perhaps some cross-VM attacks may be limited. On the other side of the world, &lt;em&gt;hyperv support is getting better&lt;/em&gt;. &lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Remove setlocale&lt;/em&gt;. setlocale was sprinkled all throughout the code base many years ago, even though it did nothing, in anticipation of a day when it would do something. We’ve since decided that day will never come, and so many setlocale calls can go. &lt;/li&gt;
&lt;li&gt;
&lt;em&gt;syspatch is coming&lt;/em&gt;. Lots of commits actually. Despite the name, it’s more like a system update, since it replaces entire binaries. Then again, replacing a few binaries in a system is like patching small parts of the whole. A syspatch update will be smaller than an entire release. &lt;/li&gt;
&lt;li&gt;
&lt;em&gt;There’s a new build system&lt;/em&gt;. It kind of works like before, but a lot of the details have changed to support less root. Actually, it’d be accurate to say the whole build privilege system has been flipped. Start as root, which drops down to the build user to do the heavy lifting, instead of starting as a user that can elevate to root at any time. This no longer requires the build user to be pseudo-root; in fact, the goal is that the build user can’t elevate. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;There’s several other items on this list, take a look for more details, and he also helpfully provides commit-links if you want to see more about any of these topics.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://media.bemyapp.com/came-bell-labs/#" target="_blank" rel="nofollow noopener"&gt;It came from Bell Labs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A little late for a halloween episode, we have “It came from Bell Labs”, a fascinating article talking about the successor to UNIX, Plan9&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; There was once an operating system that was intended to be the successor to Unix. Plan 9 From Bell Labs was its name, and playing with it for five minutes is like visiting an alternate dimension where computers are done differently. It was so ahead of its time that it would be considered cutting edge, even today. Find out the weird and woolly history to Plan Nine’s inception and eventual consignment as a footnote of operating systems today.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So, if you’ve never heard of Plan 9, how did it exactly differ from the UNIX we know and love today?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Here’s just a few of the key features under Plan 9’s hood + 9P – The distributed file system protocol. Everything runs through this, there is no escaping it. Since everything runs on top of 9P, that makes everything running on a Plan 9 box distributed as well. This means, for example, you can import /dev/audio from another machine on the network to use its sound card when your own machine doesn’t have one. + ndb – The namespace server. In conjunction with 9P, it bosses all the programs around and forces them to comply to the Plan 9 way. + Instead of Unix sockets, all the networking just runs through 9P. Thus, everything from ethernet packets to network cards are all just one more kind of file. + While Unicode is implemented ad-hoc in other systems, it’s baked into Plan 9 from the first int main(). In fact, even users who don’t like Plan 9 have to admit that the character encoding support, together with the beautiful built-in rio font, makes every other operating system look primitive. + The system’s own internal programs are built to be a rounded set of user tools from the ground up. So, for instance, it comes with its own editor, acme, built to be its own weird morphing thing that plays nice with the 9P protocol.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sounds neat, but how did it work in the real world?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The result was a mixture of both breathtaking efficiency and alienating other-worldliness. Trying out the system is like a visit to an alternate reality where time-traveling gremlins changed how computers are made and used. You can execute anycommand anywhere just by typing its name and middle-clicking on it, even in the middle of reading a file. You can type out your blog post in the middle of a man page and save it right there. Screenshots are made by pointing /dev/screen to a file. When you execute a program in a terminal, the terminal morphs into the program you launched instead of running in the background. The window manager, rio, can be invoked within rio to create an instance of itself running inside itself. You can just keep going like that, until, like Inception, you get lost in which layer you’re in. Get used to running Plan 9 long enough, and you will find yourself horribly ill-adapted for dealing with the normal world.&lt;/p&gt;

&lt;p&gt;&amp;gt; While system administrators can’t stop praising it, the average home user won’t see much benefit unless they happen to run about eight desktop machines scattered all over. But to quote legendary hacker tribal bard Eric S. Raymond: “…Plan 9 failed simply because it fell short of being a compelling enough improvement on Unix to displace its ancestor.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A fascinating article, worth your time to read it through, even though we’ve pulled some of the best bits here. Nice look at the alternative dimension that could have been.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.tedunangst.com/flak/post/inks" target="_blank" rel="nofollow noopener"&gt;inks -- Basically Reddit or Hacker News, but without the disagreeable trolls and military industrial complex shills downvoting everything to hide the truth&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://youtu.be/Mc2p6sx2s7k" target="_blank" rel="nofollow noopener"&gt;“PAM is Un-American” talk now online&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2818" target="_blank" rel="nofollow noopener"&gt;Reddit advertising of “PAM Mastery”&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.ixsystems.com/blog/meetbsd-2016-report-michael-dexter/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2016 Report by Michael Dexter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.bsdstore.ru/en/tutorial.html" target="_blank" rel="nofollow noopener"&gt;Various CBSD Tutorials&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/6B96pVcm" target="_blank" rel="nofollow noopener"&gt;Dylan - Kaltura Alt&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/Hrp8qwkP" target="_blank" rel="nofollow noopener"&gt;Scott - ZFS in Low-Mem&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/85q4Q3Xx" target="_blank" rel="nofollow noopener"&gt;J - Mixing Ports / Pkgs&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/RFKY0ERs" target="_blank" rel="nofollow noopener"&gt;Trenton - Dtract &amp;amp; PC-BSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/31uqW6vW" target="_blank" rel="nofollow noopener"&gt;Ivan - ZFS Backups&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;ul&gt;
&lt;li&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On today’s episode, we are loaded and ready to go. Lots of OpenBSD news, a look at LetsEncrypt usage, the NetBSD scheduler (oh my) and much more. Keep it tuned to your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/production-ready" rel="nofollow">Production ready</a></h3>

<ul>
<li>Ted Unangst brings us a piece on what it means to be Production Ready</li>
<li>He tells the story of a project he worked on that picked a framework that was “production ready”</li>
<li>They tested time zones, and it all seemed to work</li>
<li>They tested the unicode support in english and various european languages, and it was all good</li>
<li>They sent some emails with it, and it just worked</li>
<li>The framework said “Production Ready” on the tin, and it passed all the tests. What is the worst that could happen?</li>
</ul>

<blockquote>
<p>Now, we built our product on top of this. Some of the bugs were caught internally. Others were discovered by customers, who were of course a little dismayed. Like, how could you possibly ship this? Indeed. We were doing testing, quite a bit really, but when every possible edge case has a bug, it’s hard to find them all.</p>
</blockquote>

<ul>
<li>A customer from Arizona, which does not observe Daylight Saving Time, crashed the app</li>
<li>Some less common unicode characters caused a buffer overflow</li>
<li>The email system did not properly escape a period on its own line, truncating the email</li>
<li>“Egregious performance because of a naive N<sup>2</sup> algorithm for growing a buffer.”</li>
<li>“Egregious performance on some platforms due to using the wrong threading primitives.”</li>
<li>“Bizarre database connection bugs for some queries that I can’t at all explain.”</li>
<li>“In short, everything was “works for me” quality. But is that really production quality?”</li>
<li>“There are some obvious contenders for the title of today’s most “production ready” software, but it’s a more general phenomenon. People who have success don’t know what they don’t know, what they didn’t test, what unused features will crash and burn.”</li>
</ul>

<hr>

<h3><a href="https://blog.crashed.org/letsencrypt-in-freebsd-org/" rel="nofollow">Using Let&#39;s Encrypt within FreeBSD.org</a></h3>

<blockquote>
<p>I decided to give Let&#39;s Encrypt certificates a shot on my personal web servers earlier this year after a disaster with StartSSL. I&#39;d like to share what I&#39;ve learned.</p>

<p>The biggest gotcha is that people tend to develop bad habits when they only have to deal with certificates once a year or so. The beginning part of the process is manual and the deployment of certificates somehow never quite gets automated, or things get left out.</p>

<p>That all changes with Let&#39;s Encrypt certificates. Instead of 1-5 year lifetime certificates the Let&#39;s Encrypt certificates are only valid for 90 days. Most people will be wanting to renew every 60-80 days. This forces the issue - you really need to automate and make it robust.</p>

<p>The Let&#39;s Encrypt folks provide tools to do this for you for the common cases. You run it on the actual machine, it manages the certificates and adjusts the server configuration files for you. Their goal is to provide a baseline shake-n-bake solution. I was not willing to give that level of control to a third party tool for my own servers - and it was absolutely out of the question for for the FreeBSD.org cluster.</p>

<p>I should probably mention that we do things on the FreeBSD.org cluster that many people would find a bit strange. The biggest problem that we have to deal with is that the traditional model of a firewall/bastion between &quot;us&quot; and &quot;them&quot; does not apply. We design for the assumption that hostile users are already on the &quot;inside&quot; of the network. The cluster is spread over 8 distinct sites with naked internet and no vpn between them. There is actually very little trust between the systems in this network - eg: ssh is for people only - no headless users can ssh. There are no passwords. Sudo can&#39;t be used. The command and control systems use signing. We don&#39;t trust anything by IPv4/IPv6 address because we have to assume MITM is a thing. And so on. In general, things are constructed to be trigger / polling / pull based.</p>

<p>The downside is that this makes automation and integration of Let&#39;s Encrypt clients interesting. If server configuration files can&#39;t be modified; and replicated web infrastructure is literally read-only (via jails/nullfs); and DNS zone files are static; and headless users can&#39;t ssh and therefore cannot do commits, how do you do the verification tokens in an automated fashion? Interesting, indeed.</p>

<p>We wanted to be able to use certificates on things like ldap and smtp servers. You can&#39;t do http file verification on those so we had to use dns validation of domains.</p>
</blockquote>

<ul>
<li>First, a signing request is generated, and the acme-challenge is returned</li>
<li>Peter’s post then walks through how the script adds the required TXT record to prove control of the domain, regenerates the zone file, DNSSEC signs it, and waits for it to be published, then continues the letsencrypt process.</li>
<li>Letsencrypt then issues the actual certificate</li>
</ul>

<blockquote>
<p>We export the fullchain files into a publication location. There is another jail that can read the fullchain certificates via nullfs and they are published with our non-secrets update mechanism</p>

<p>Since we are using DNSSEC, here is a good opportunity to maintain signed TLSA fingerprints. The catch with TLSA record updates is managing the update event horizon. You are supposed to have both fingerprints listed across the update cycle. We use &#39;TLSA 3 1 1&#39; records to avoid issues with propagation delays for now. TLSA 3 0 1 changes with every renewal, while 3 1 1 only changes when you generate a new private key.</p>

<p>The majority of TLS/SSL servers require a full restart to re-load the certificates if the filename is unchanged. I found out the hard way.</p>
</blockquote>

<ul>
<li>There is a great deal more detail in the blog post, I recommend you check it out</li>
</ul>

<hr>

<h3>Learning more about the NetBSD scheduler (... than I wanted to know)</h3>

<ul>
<li><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161105_1754.html" rel="nofollow">Part 1</a></li>
<li><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161109_0059.html" rel="nofollow">Part 2</a></li>
<li><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161113_0122.html" rel="nofollow">Part 3</a></li>
</ul>

<blockquote>
<p>Today I had a need to do some number crunching using a home-brewn C program. In order to do some manual load balancing, I was firing up some Amazon AWS instances (which is Xen) with NetBSD 7.0. In this case, the system was assigned two CPUs I started two instances of my program, with the intent to have each one use one CPU. Which is not what happened! Here is what I observed, and how I fixed things for now.</p>
</blockquote>

<p>~~<br>
load averages:  2.14,  2.08,  1.83;               up 0+00:45:56        18:01:32<br>
27 processes: 4 runnable, 21 sleeping, 2 on CPU<br>
CPU0 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle<br>
CPU1 states:  0.0% user,  0.0% nice,  0.0% system,  0.0% interrupt,  100% idle<br>
Memory: 119M Act, 7940K Exec, 101M File, 3546M Free<br>
~~</p>

<p>~~<br>
PID USERNAME PRI NICE   SIZE   RES STATE    TIME   WCPU CPU COMMAND<br>
2791 root   25  0  8816K  964K RUN/0    16:10 54.20% 54.20% myprog<br>
2845 root   26  0  8816K  964K RUN/0    17:10 47.90% 47.90% myprog<br>
~~</p>

<blockquote>
<p>I expected something like WCPU and CPU being around 100%, assuming that each process was bound to its own CPU. The values I actually saw (and listed above) suggested that both programs were fighting for the same CPU. Huh?! NetBSD allows to create &quot;processor sets&quot;, assign CPU(s) to them and then assign processes to the processor sets. Let&#39;s have a look!</p>
</blockquote>

<p>~~<br>
  # psrset -c<br>
    1<br>
  # psrset -b 0 2791<br>
  # psrset -b 1 2845<br>
   load averages:  2.02,  2.05,  1.94;               up 0+00:59:32        18:15:08<br>
    27 processes: 1 runnable, 24 sleeping, 2 on CPU<br>
    CPU0 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle<br>
    CPU1 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle<br>
    Memory: 119M Act, 7940K Exec, 101M File, 3546M Free</p>

<pre><code>  PID USERNAME PRI NICE   SIZE   RES STATE      TIME   WCPU    CPU COMMAND
 2845 root      25    0  8816K  964K CPU/1     26:14   100%   100% myprog
 2791 root      25    0  8816K  964K RUN/0     25:40   100%   100% myprog
</code></pre>

<p>~~</p>

<blockquote>
<p>Things are as expected now, with each program being bound to its own CPU. Now why this didn&#39;t happen by default is left as an exercise to the reader.</p>

<p>I had another look at this today, and was able to reproduce the behaviour using VMWare Fusion with two CPU cores on both NetBSD 7.0_STABLE as well as -current</p>

<p>The one hint that I got so far was from Michael van Elst that there may be a rouding error in sched_balance(). Looking at the code, there is not much room for a rounding error. But I am not familiar enough (at all) with the code, so I cannot judge if crucial bits are dropped here, or how that function fits in the whole puzzle.</p>

<p>Pondering on the &quot;rounding error&quot;, I&#39;ve setup both VMs with 4 CPUs, and the behaviour shown there is that load is distributed to about 3 and a half CPU - three CPUs under full load, and one not reaching 100%. There&#39;s definitely something fishy in there.</p>

<p>With multiple CPUs, each CPU has a queue of processes that are either &quot;on the CPU&quot; (running) or waiting to be serviced (run) on that CPU. Those processes count as &quot;migratable&quot; in runqueue_t. Every now and then, the system checks all its run queues to see if a CPU is idle, and can thus &quot;steal&quot; (migrate) processes from a busy CPU. This is done in sched_balance().</p>

<p>Such &quot;stealing&quot; (migration) has the positive effect that the process doesn&#39;t have to wait for getting serviced on the CPU it&#39;s currently waiting on. On the other side, migrating the process has effects on CPU&#39;s data and instruction caches, so switching CPUs shouldn&#39;t be taken too easy.</p>

<p>All in all, I&#39;d say the patch is a good step forward from the current situation, which does not properly distribute pure CPU hogs, at all.</p>
</blockquote>

<hr>

<h3><a href="https://www.nas.nasa.gov/SC16/demos/demo9.html" rel="nofollow">Building Cost-Effective 100-Gbps Firewalls for HPC with FreeBSD</a></h3>

<blockquote>
<p>The continuous growth of the NASA Center for Climate Simulation (NCCS) requires providing high-performance security tools and enhancing the network capacity. In order to support the requirements of emerging services, including the Advanced Data Analytics Platform (ADAPT) private cloud, the NCCS security team has proposed an architecture to provide extremely cost-effective 100-gigabit-per-second (Gbps) firewalls.</p>

<p>The aim of this project is to create a commodity-based platform that can process enough packets per second (pps) to sustain a 100-Gbps workload within the NCCS computational environment. The test domain consists of several existing systems within the NCCS, including switches (Dell S4084), routers (Dell R530s), servers (Dell R420s, and C6100s), and host card adapters (10-Gbps Mellanox ConnectX2 and Intel 8259 x Ethernet cards).</p>

<p>Previous NCCS work testing the FreeBSD operating system for high-performance routing reached a maximum of 4 million pps. Building on this work, we are comparing FreeBSD-11.0 and FreeBSD-Current along with implementing the netmap-fwd Application Programming Interface (API) and tuning the 10-gigabit Ethernet cards. We used the tools iperf3, nuttcp, and netperf to monitor the performance of the maximum bandwidth through the cards. Additional testing has involved enabling the Common Address Redundancy Protocol (CARP) to achieve an active/active architecture.</p>

<p>The tests have shown that at the optimally tuned and configured FreeBSD system, it is possible to create a system that can manage the huge amounts of pps needed to create a 100-Gbps firewall with commodity components.</p>
</blockquote>

<ul>
<li>Some interesting findings: 

<ul>
<li>FreeBSD was able to send more pps as a client than Centos 6.</li>
<li>Netmap-fwd increased the pps rate significantly.</li>
<li>The choice of network card can have a significant impact on pps, tuning, and netmap support.</li>
</ul></li>
</ul>

<blockquote>
<p>Further tests will continue verifying the above results with even more capable systems-such as 40-gigabit and 100-gigabit Ethernet cards-to achieve even higher performance. In addition to hardware improvements, updates to the network capabilities in the FreeBSD-Current version will be closely monitored and applied as appropriate. The final result will be a reference architecture with representative hardware and software that will enable the NCCS to build, deploy, and efficiently maintain extremely cost-effective 100-Gbps firewalls.</p>

<p>Netflix has already managed to saturate a 100 Gbps interface using only a single CPU Socket (rather than a dual socket server). Forwarding/routing is a bit different, but it is definitely on track to get there. Using a small number of commodity servers to firewall 100 Gbps of traffic just takes some careful planning and load balancing. Soon it will be possible using a single host.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/bartekrutkowski/iocell" rel="nofollow">iocell - A FreeBSD jail manager.</a></h3>

<ul>
<li>Another jail manager has arrived on the scene, iocell, which begins life as a fork of the “classic” iocage.</li>
<li>Due to its shared heritage, it offers much of the same functionality and flags as iocage users will be familiar with.</li>
<li>For those who aren’t up to speed with either products, some of those features include: 

<ul>
<li>Templates, clones, basejails, fully independent jails</li>
<li>Ease of use</li>
<li>Zero configuration files</li>
<li>Rapid thin provisioning within seconds</li>
<li>Automatic package installation</li>
<li>Virtual networking stacks (vnet)</li>
<li>Shared IP based jails (non vnet)</li>
<li>Resource limits (CPU, MEMORY, DISK I/O, etc.)</li>
<li>Filesystem quotas and reservations</li>
<li>Dedicated ZFS datasets inside jails</li>
<li>Transparent ZFS snapshot management</li>
<li>Binary updates</li>
<li>Differential jail packaging</li>
<li>Export and import</li>
<li>And many more!</li>
</ul></li>
<li>The program makes extensive use of ZFS for performing jail operations, so a zpool will be required (But doesn’t have to be your boot-pool)</li>
<li>It still looks “very” fresh, even using original iocage filenames in the repo, so a safe guess is that you’ll be able to switch between iocage and iocell with relative ease.</li>
</ul>

<hr>

<h3><a href="http://blog.gordonturner.ca/2016/11/20/fail2ban-on-openbsd-6-0/" rel="nofollow">Fail2ban on OpenBSD 6.0</a></h3>

<ul>
<li>We’ve used Fail2Ban in PC-BSD before, due to it’s ability to detect and block brute force attempts against a variety of services, including SSH, mail, and others. It even can work to detect jail brute force attempts, blocking IPs on the hosts firewall. </li>
<li>However what about OpenBSD users? Well, Gordon Turner comes to the rescue today with a great writeup on deploying Fail2Ban specifically for that platform.</li>
<li>Now, Fail2Ban is a python program, so you’ll need to pkg install Python first, then he provides instructions on how to manually grab the F2B sources and install on OpenBSD.</li>
<li>Helpfully Gordon gives us some handy links to scripts and modifications to get F2B running via RC as well, which is a bit different since F2B has both a server and client that must run together.</li>
<li>With the installation bits out of the way, we get to next hit the “fun” stuff, which comes in the way of SSH brute force detection.</li>
<li>Naturally we will be configuring F2B to use “pf” to do our actual blocking, but the examples shown give us full control over the knobs used to detect, and then ultimately call ‘pfctl’ to do our heavy lifting.</li>
<li>The last bits of the article give us a runthrough on how to “prime” pf with the correct block tables and performing basic administrative tasks to control F2B in production.</li>
<li>A great article, and if you run an OpenBSD box exposed to the internet, you may want to bookmark this one.</li>
</ul>

<hr>

<h3><a href="http://www.tedunangst.com/flak/post/openbsd-changes-of-note" rel="nofollow">openbsd changes of note</a></h3>

<ul>
<li>Continuing with our OpenBSD news for the week, we have a new blog post by TedU, which gives us a bunch of notes on the things which have changed over there as of late:</li>
<li><p>Some of the notables include:</p>

<ul>
<li><em>mcl2k2 pools</em> and the <em>em conversion</em>. The details are in the commits, but the short story is that due to hardware limitations, a number of tradeoffs need to be made between performance and memory usage. The em chip can (mostly) only be programmed to write to 2k buffers. However, ethernet payloads are not nicely aligned. They’re two bytes off. Leading to a costly choice. Provide a 2k buffer, and then copy all the data after the fact, which is slow. Or allocate a larger than 2k buffer, and provide em with a pointer that’s 2 bytes offset. Previously, the next size up from 2k was 4k, which is quite wasteful. The new 2k2 buffer size still wastes a bit of memory, but much less.<br></li>
<li><em>FreeType 2.7 is prettier than ever</em>. </li>
<li><em>vmm for i386</em>. <em>Improve security</em>. vmm is still running with a phenomenal set of privileges, but perhaps some cross-VM attacks may be limited. On the other side of the world, <em>hyperv support is getting better</em>. </li>
<li><em>Remove setlocale</em>. setlocale was sprinkled all throughout the code base many years ago, even though it did nothing, in anticipation of a day when it would do something. We’ve since decided that day will never come, and so many setlocale calls can go. </li>
<li><em>syspatch is coming</em>. Lots of commits actually. Despite the name, it’s more like a system update, since it replaces entire binaries. Then again, replacing a few binaries in a system is like patching small parts of the whole. A syspatch update will be smaller than an entire release. </li>
<li><em>There’s a new build system</em>. It kind of works like before, but a lot of the details have changed to support less root. Actually, it’d be accurate to say the whole build privilege system has been flipped. Start as root, which drops down to the build user to do the heavy lifting, instead of starting as a user that can elevate to root at any time. This no longer requires the build user to be pseudo-root; in fact, the goal is that the build user can’t elevate. </li>
</ul></li>
<li><p>There’s several other items on this list, take a look for more details, and he also helpfully provides commit-links if you want to see more about any of these topics.</p></li>
</ul>

<hr>

<h3><a href="http://media.bemyapp.com/came-bell-labs/#" rel="nofollow">It came from Bell Labs</a></h3>

<ul>
<li>A little late for a halloween episode, we have “It came from Bell Labs”, a fascinating article talking about the successor to UNIX, Plan9</li>
</ul>

<blockquote>
<p>There was once an operating system that was intended to be the successor to Unix. Plan 9 From Bell Labs was its name, and playing with it for five minutes is like visiting an alternate dimension where computers are done differently. It was so ahead of its time that it would be considered cutting edge, even today. Find out the weird and woolly history to Plan Nine’s inception and eventual consignment as a footnote of operating systems today.</p>
</blockquote>

<ul>
<li>So, if you’ve never heard of Plan 9, how did it exactly differ from the UNIX we know and love today?</li>
</ul>

<blockquote>
<p>Here’s just a few of the key features under Plan 9’s hood + 9P – The distributed file system protocol. Everything runs through this, there is no escaping it. Since everything runs on top of 9P, that makes everything running on a Plan 9 box distributed as well. This means, for example, you can import /dev/audio from another machine on the network to use its sound card when your own machine doesn’t have one. + ndb – The namespace server. In conjunction with 9P, it bosses all the programs around and forces them to comply to the Plan 9 way. + Instead of Unix sockets, all the networking just runs through 9P. Thus, everything from ethernet packets to network cards are all just one more kind of file. + While Unicode is implemented ad-hoc in other systems, it’s baked into Plan 9 from the first int main(). In fact, even users who don’t like Plan 9 have to admit that the character encoding support, together with the beautiful built-in rio font, makes every other operating system look primitive. + The system’s own internal programs are built to be a rounded set of user tools from the ground up. So, for instance, it comes with its own editor, acme, built to be its own weird morphing thing that plays nice with the 9P protocol.</p>
</blockquote>

<ul>
<li>Sounds neat, but how did it work in the real world?</li>
</ul>

<blockquote>
<p>The result was a mixture of both breathtaking efficiency and alienating other-worldliness. Trying out the system is like a visit to an alternate reality where time-traveling gremlins changed how computers are made and used. You can execute anycommand anywhere just by typing its name and middle-clicking on it, even in the middle of reading a file. You can type out your blog post in the middle of a man page and save it right there. Screenshots are made by pointing /dev/screen to a file. When you execute a program in a terminal, the terminal morphs into the program you launched instead of running in the background. The window manager, rio, can be invoked within rio to create an instance of itself running inside itself. You can just keep going like that, until, like Inception, you get lost in which layer you’re in. Get used to running Plan 9 long enough, and you will find yourself horribly ill-adapted for dealing with the normal world.</p>

<p>While system administrators can’t stop praising it, the average home user won’t see much benefit unless they happen to run about eight desktop machines scattered all over. But to quote legendary hacker tribal bard Eric S. Raymond: “…Plan 9 failed simply because it fell short of being a compelling enough improvement on Unix to displace its ancestor.”</p>
</blockquote>

<ul>
<li>A fascinating article, worth your time to read it through, even though we’ve pulled some of the best bits here. Nice look at the alternative dimension that could have been.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.tedunangst.com/flak/post/inks" rel="nofollow">inks -- Basically Reddit or Hacker News, but without the disagreeable trolls and military industrial complex shills downvoting everything to hide the truth</a></li>
<li><a href="https://youtu.be/Mc2p6sx2s7k" rel="nofollow">“PAM is Un-American” talk now online</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2818" rel="nofollow">Reddit advertising of “PAM Mastery”</a></li>
<li><a href="https://www.ixsystems.com/blog/meetbsd-2016-report-michael-dexter/" rel="nofollow">MeetBSD 2016 Report by Michael Dexter</a></li>
<li><a href="https://www.bsdstore.ru/en/tutorial.html" rel="nofollow">Various CBSD Tutorials</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/6B96pVcm" rel="nofollow">Dylan - Kaltura Alt</a></li>
<li><a href="http://pastebin.com/Hrp8qwkP" rel="nofollow">Scott - ZFS in Low-Mem</a></li>
<li><a href="http://pastebin.com/85q4Q3Xx" rel="nofollow">J - Mixing Ports / Pkgs</a> </li>
<li><a href="http://pastebin.com/RFKY0ERs" rel="nofollow">Trenton - Dtract &amp; PC-BSD</a></li>
<li><a href="http://pastebin.com/31uqW6vW" rel="nofollow">Ivan - ZFS Backups</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On today’s episode, we are loaded and ready to go. Lots of OpenBSD news, a look at LetsEncrypt usage, the NetBSD scheduler (oh my) and much more. Keep it tuned to your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/production-ready" rel="nofollow">Production ready</a></h3>

<ul>
<li>Ted Unangst brings us a piece on what it means to be Production Ready</li>
<li>He tells the story of a project he worked on that picked a framework that was “production ready”</li>
<li>They tested time zones, and it all seemed to work</li>
<li>They tested the unicode support in english and various european languages, and it was all good</li>
<li>They sent some emails with it, and it just worked</li>
<li>The framework said “Production Ready” on the tin, and it passed all the tests. What is the worst that could happen?</li>
</ul>

<blockquote>
<p>Now, we built our product on top of this. Some of the bugs were caught internally. Others were discovered by customers, who were of course a little dismayed. Like, how could you possibly ship this? Indeed. We were doing testing, quite a bit really, but when every possible edge case has a bug, it’s hard to find them all.</p>
</blockquote>

<ul>
<li>A customer from Arizona, which does not observe Daylight Saving Time, crashed the app</li>
<li>Some less common unicode characters caused a buffer overflow</li>
<li>The email system did not properly escape a period on its own line, truncating the email</li>
<li>“Egregious performance because of a naive N<sup>2</sup> algorithm for growing a buffer.”</li>
<li>“Egregious performance on some platforms due to using the wrong threading primitives.”</li>
<li>“Bizarre database connection bugs for some queries that I can’t at all explain.”</li>
<li>“In short, everything was “works for me” quality. But is that really production quality?”</li>
<li>“There are some obvious contenders for the title of today’s most “production ready” software, but it’s a more general phenomenon. People who have success don’t know what they don’t know, what they didn’t test, what unused features will crash and burn.”</li>
</ul>

<hr>

<h3><a href="https://blog.crashed.org/letsencrypt-in-freebsd-org/" rel="nofollow">Using Let&#39;s Encrypt within FreeBSD.org</a></h3>

<blockquote>
<p>I decided to give Let&#39;s Encrypt certificates a shot on my personal web servers earlier this year after a disaster with StartSSL. I&#39;d like to share what I&#39;ve learned.</p>

<p>The biggest gotcha is that people tend to develop bad habits when they only have to deal with certificates once a year or so. The beginning part of the process is manual and the deployment of certificates somehow never quite gets automated, or things get left out.</p>

<p>That all changes with Let&#39;s Encrypt certificates. Instead of 1-5 year lifetime certificates the Let&#39;s Encrypt certificates are only valid for 90 days. Most people will be wanting to renew every 60-80 days. This forces the issue - you really need to automate and make it robust.</p>

<p>The Let&#39;s Encrypt folks provide tools to do this for you for the common cases. You run it on the actual machine, it manages the certificates and adjusts the server configuration files for you. Their goal is to provide a baseline shake-n-bake solution. I was not willing to give that level of control to a third party tool for my own servers - and it was absolutely out of the question for for the FreeBSD.org cluster.</p>

<p>I should probably mention that we do things on the FreeBSD.org cluster that many people would find a bit strange. The biggest problem that we have to deal with is that the traditional model of a firewall/bastion between &quot;us&quot; and &quot;them&quot; does not apply. We design for the assumption that hostile users are already on the &quot;inside&quot; of the network. The cluster is spread over 8 distinct sites with naked internet and no vpn between them. There is actually very little trust between the systems in this network - eg: ssh is for people only - no headless users can ssh. There are no passwords. Sudo can&#39;t be used. The command and control systems use signing. We don&#39;t trust anything by IPv4/IPv6 address because we have to assume MITM is a thing. And so on. In general, things are constructed to be trigger / polling / pull based.</p>

<p>The downside is that this makes automation and integration of Let&#39;s Encrypt clients interesting. If server configuration files can&#39;t be modified; and replicated web infrastructure is literally read-only (via jails/nullfs); and DNS zone files are static; and headless users can&#39;t ssh and therefore cannot do commits, how do you do the verification tokens in an automated fashion? Interesting, indeed.</p>

<p>We wanted to be able to use certificates on things like ldap and smtp servers. You can&#39;t do http file verification on those so we had to use dns validation of domains.</p>
</blockquote>

<ul>
<li>First, a signing request is generated, and the acme-challenge is returned</li>
<li>Peter’s post then walks through how the script adds the required TXT record to prove control of the domain, regenerates the zone file, DNSSEC signs it, and waits for it to be published, then continues the letsencrypt process.</li>
<li>Letsencrypt then issues the actual certificate</li>
</ul>

<blockquote>
<p>We export the fullchain files into a publication location. There is another jail that can read the fullchain certificates via nullfs and they are published with our non-secrets update mechanism</p>

<p>Since we are using DNSSEC, here is a good opportunity to maintain signed TLSA fingerprints. The catch with TLSA record updates is managing the update event horizon. You are supposed to have both fingerprints listed across the update cycle. We use &#39;TLSA 3 1 1&#39; records to avoid issues with propagation delays for now. TLSA 3 0 1 changes with every renewal, while 3 1 1 only changes when you generate a new private key.</p>

<p>The majority of TLS/SSL servers require a full restart to re-load the certificates if the filename is unchanged. I found out the hard way.</p>
</blockquote>

<ul>
<li>There is a great deal more detail in the blog post, I recommend you check it out</li>
</ul>

<hr>

<h3>Learning more about the NetBSD scheduler (... than I wanted to know)</h3>

<ul>
<li><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161105_1754.html" rel="nofollow">Part 1</a></li>
<li><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161109_0059.html" rel="nofollow">Part 2</a></li>
<li><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20161113_0122.html" rel="nofollow">Part 3</a></li>
</ul>

<blockquote>
<p>Today I had a need to do some number crunching using a home-brewn C program. In order to do some manual load balancing, I was firing up some Amazon AWS instances (which is Xen) with NetBSD 7.0. In this case, the system was assigned two CPUs I started two instances of my program, with the intent to have each one use one CPU. Which is not what happened! Here is what I observed, and how I fixed things for now.</p>
</blockquote>

<p>~~<br>
load averages:  2.14,  2.08,  1.83;               up 0+00:45:56        18:01:32<br>
27 processes: 4 runnable, 21 sleeping, 2 on CPU<br>
CPU0 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle<br>
CPU1 states:  0.0% user,  0.0% nice,  0.0% system,  0.0% interrupt,  100% idle<br>
Memory: 119M Act, 7940K Exec, 101M File, 3546M Free<br>
~~</p>

<p>~~<br>
PID USERNAME PRI NICE   SIZE   RES STATE    TIME   WCPU CPU COMMAND<br>
2791 root   25  0  8816K  964K RUN/0    16:10 54.20% 54.20% myprog<br>
2845 root   26  0  8816K  964K RUN/0    17:10 47.90% 47.90% myprog<br>
~~</p>

<blockquote>
<p>I expected something like WCPU and CPU being around 100%, assuming that each process was bound to its own CPU. The values I actually saw (and listed above) suggested that both programs were fighting for the same CPU. Huh?! NetBSD allows to create &quot;processor sets&quot;, assign CPU(s) to them and then assign processes to the processor sets. Let&#39;s have a look!</p>
</blockquote>

<p>~~<br>
  # psrset -c<br>
    1<br>
  # psrset -b 0 2791<br>
  # psrset -b 1 2845<br>
   load averages:  2.02,  2.05,  1.94;               up 0+00:59:32        18:15:08<br>
    27 processes: 1 runnable, 24 sleeping, 2 on CPU<br>
    CPU0 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle<br>
    CPU1 states:  100% user,  0.0% nice,  0.0% system,  0.0% interrupt,  0.0% idle<br>
    Memory: 119M Act, 7940K Exec, 101M File, 3546M Free</p>

<pre><code>  PID USERNAME PRI NICE   SIZE   RES STATE      TIME   WCPU    CPU COMMAND
 2845 root      25    0  8816K  964K CPU/1     26:14   100%   100% myprog
 2791 root      25    0  8816K  964K RUN/0     25:40   100%   100% myprog
</code></pre>

<p>~~</p>

<blockquote>
<p>Things are as expected now, with each program being bound to its own CPU. Now why this didn&#39;t happen by default is left as an exercise to the reader.</p>

<p>I had another look at this today, and was able to reproduce the behaviour using VMWare Fusion with two CPU cores on both NetBSD 7.0_STABLE as well as -current</p>

<p>The one hint that I got so far was from Michael van Elst that there may be a rouding error in sched_balance(). Looking at the code, there is not much room for a rounding error. But I am not familiar enough (at all) with the code, so I cannot judge if crucial bits are dropped here, or how that function fits in the whole puzzle.</p>

<p>Pondering on the &quot;rounding error&quot;, I&#39;ve setup both VMs with 4 CPUs, and the behaviour shown there is that load is distributed to about 3 and a half CPU - three CPUs under full load, and one not reaching 100%. There&#39;s definitely something fishy in there.</p>

<p>With multiple CPUs, each CPU has a queue of processes that are either &quot;on the CPU&quot; (running) or waiting to be serviced (run) on that CPU. Those processes count as &quot;migratable&quot; in runqueue_t. Every now and then, the system checks all its run queues to see if a CPU is idle, and can thus &quot;steal&quot; (migrate) processes from a busy CPU. This is done in sched_balance().</p>

<p>Such &quot;stealing&quot; (migration) has the positive effect that the process doesn&#39;t have to wait for getting serviced on the CPU it&#39;s currently waiting on. On the other side, migrating the process has effects on CPU&#39;s data and instruction caches, so switching CPUs shouldn&#39;t be taken too easy.</p>

<p>All in all, I&#39;d say the patch is a good step forward from the current situation, which does not properly distribute pure CPU hogs, at all.</p>
</blockquote>

<hr>

<h3><a href="https://www.nas.nasa.gov/SC16/demos/demo9.html" rel="nofollow">Building Cost-Effective 100-Gbps Firewalls for HPC with FreeBSD</a></h3>

<blockquote>
<p>The continuous growth of the NASA Center for Climate Simulation (NCCS) requires providing high-performance security tools and enhancing the network capacity. In order to support the requirements of emerging services, including the Advanced Data Analytics Platform (ADAPT) private cloud, the NCCS security team has proposed an architecture to provide extremely cost-effective 100-gigabit-per-second (Gbps) firewalls.</p>

<p>The aim of this project is to create a commodity-based platform that can process enough packets per second (pps) to sustain a 100-Gbps workload within the NCCS computational environment. The test domain consists of several existing systems within the NCCS, including switches (Dell S4084), routers (Dell R530s), servers (Dell R420s, and C6100s), and host card adapters (10-Gbps Mellanox ConnectX2 and Intel 8259 x Ethernet cards).</p>

<p>Previous NCCS work testing the FreeBSD operating system for high-performance routing reached a maximum of 4 million pps. Building on this work, we are comparing FreeBSD-11.0 and FreeBSD-Current along with implementing the netmap-fwd Application Programming Interface (API) and tuning the 10-gigabit Ethernet cards. We used the tools iperf3, nuttcp, and netperf to monitor the performance of the maximum bandwidth through the cards. Additional testing has involved enabling the Common Address Redundancy Protocol (CARP) to achieve an active/active architecture.</p>

<p>The tests have shown that at the optimally tuned and configured FreeBSD system, it is possible to create a system that can manage the huge amounts of pps needed to create a 100-Gbps firewall with commodity components.</p>
</blockquote>

<ul>
<li>Some interesting findings: 

<ul>
<li>FreeBSD was able to send more pps as a client than Centos 6.</li>
<li>Netmap-fwd increased the pps rate significantly.</li>
<li>The choice of network card can have a significant impact on pps, tuning, and netmap support.</li>
</ul></li>
</ul>

<blockquote>
<p>Further tests will continue verifying the above results with even more capable systems-such as 40-gigabit and 100-gigabit Ethernet cards-to achieve even higher performance. In addition to hardware improvements, updates to the network capabilities in the FreeBSD-Current version will be closely monitored and applied as appropriate. The final result will be a reference architecture with representative hardware and software that will enable the NCCS to build, deploy, and efficiently maintain extremely cost-effective 100-Gbps firewalls.</p>

<p>Netflix has already managed to saturate a 100 Gbps interface using only a single CPU Socket (rather than a dual socket server). Forwarding/routing is a bit different, but it is definitely on track to get there. Using a small number of commodity servers to firewall 100 Gbps of traffic just takes some careful planning and load balancing. Soon it will be possible using a single host.</p>
</blockquote>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/bartekrutkowski/iocell" rel="nofollow">iocell - A FreeBSD jail manager.</a></h3>

<ul>
<li>Another jail manager has arrived on the scene, iocell, which begins life as a fork of the “classic” iocage.</li>
<li>Due to its shared heritage, it offers much of the same functionality and flags as iocage users will be familiar with.</li>
<li>For those who aren’t up to speed with either products, some of those features include: 

<ul>
<li>Templates, clones, basejails, fully independent jails</li>
<li>Ease of use</li>
<li>Zero configuration files</li>
<li>Rapid thin provisioning within seconds</li>
<li>Automatic package installation</li>
<li>Virtual networking stacks (vnet)</li>
<li>Shared IP based jails (non vnet)</li>
<li>Resource limits (CPU, MEMORY, DISK I/O, etc.)</li>
<li>Filesystem quotas and reservations</li>
<li>Dedicated ZFS datasets inside jails</li>
<li>Transparent ZFS snapshot management</li>
<li>Binary updates</li>
<li>Differential jail packaging</li>
<li>Export and import</li>
<li>And many more!</li>
</ul></li>
<li>The program makes extensive use of ZFS for performing jail operations, so a zpool will be required (But doesn’t have to be your boot-pool)</li>
<li>It still looks “very” fresh, even using original iocage filenames in the repo, so a safe guess is that you’ll be able to switch between iocage and iocell with relative ease.</li>
</ul>

<hr>

<h3><a href="http://blog.gordonturner.ca/2016/11/20/fail2ban-on-openbsd-6-0/" rel="nofollow">Fail2ban on OpenBSD 6.0</a></h3>

<ul>
<li>We’ve used Fail2Ban in PC-BSD before, due to it’s ability to detect and block brute force attempts against a variety of services, including SSH, mail, and others. It even can work to detect jail brute force attempts, blocking IPs on the hosts firewall. </li>
<li>However what about OpenBSD users? Well, Gordon Turner comes to the rescue today with a great writeup on deploying Fail2Ban specifically for that platform.</li>
<li>Now, Fail2Ban is a python program, so you’ll need to pkg install Python first, then he provides instructions on how to manually grab the F2B sources and install on OpenBSD.</li>
<li>Helpfully Gordon gives us some handy links to scripts and modifications to get F2B running via RC as well, which is a bit different since F2B has both a server and client that must run together.</li>
<li>With the installation bits out of the way, we get to next hit the “fun” stuff, which comes in the way of SSH brute force detection.</li>
<li>Naturally we will be configuring F2B to use “pf” to do our actual blocking, but the examples shown give us full control over the knobs used to detect, and then ultimately call ‘pfctl’ to do our heavy lifting.</li>
<li>The last bits of the article give us a runthrough on how to “prime” pf with the correct block tables and performing basic administrative tasks to control F2B in production.</li>
<li>A great article, and if you run an OpenBSD box exposed to the internet, you may want to bookmark this one.</li>
</ul>

<hr>

<h3><a href="http://www.tedunangst.com/flak/post/openbsd-changes-of-note" rel="nofollow">openbsd changes of note</a></h3>

<ul>
<li>Continuing with our OpenBSD news for the week, we have a new blog post by TedU, which gives us a bunch of notes on the things which have changed over there as of late:</li>
<li><p>Some of the notables include:</p>

<ul>
<li><em>mcl2k2 pools</em> and the <em>em conversion</em>. The details are in the commits, but the short story is that due to hardware limitations, a number of tradeoffs need to be made between performance and memory usage. The em chip can (mostly) only be programmed to write to 2k buffers. However, ethernet payloads are not nicely aligned. They’re two bytes off. Leading to a costly choice. Provide a 2k buffer, and then copy all the data after the fact, which is slow. Or allocate a larger than 2k buffer, and provide em with a pointer that’s 2 bytes offset. Previously, the next size up from 2k was 4k, which is quite wasteful. The new 2k2 buffer size still wastes a bit of memory, but much less.<br></li>
<li><em>FreeType 2.7 is prettier than ever</em>. </li>
<li><em>vmm for i386</em>. <em>Improve security</em>. vmm is still running with a phenomenal set of privileges, but perhaps some cross-VM attacks may be limited. On the other side of the world, <em>hyperv support is getting better</em>. </li>
<li><em>Remove setlocale</em>. setlocale was sprinkled all throughout the code base many years ago, even though it did nothing, in anticipation of a day when it would do something. We’ve since decided that day will never come, and so many setlocale calls can go. </li>
<li><em>syspatch is coming</em>. Lots of commits actually. Despite the name, it’s more like a system update, since it replaces entire binaries. Then again, replacing a few binaries in a system is like patching small parts of the whole. A syspatch update will be smaller than an entire release. </li>
<li><em>There’s a new build system</em>. It kind of works like before, but a lot of the details have changed to support less root. Actually, it’d be accurate to say the whole build privilege system has been flipped. Start as root, which drops down to the build user to do the heavy lifting, instead of starting as a user that can elevate to root at any time. This no longer requires the build user to be pseudo-root; in fact, the goal is that the build user can’t elevate. </li>
</ul></li>
<li><p>There’s several other items on this list, take a look for more details, and he also helpfully provides commit-links if you want to see more about any of these topics.</p></li>
</ul>

<hr>

<h3><a href="http://media.bemyapp.com/came-bell-labs/#" rel="nofollow">It came from Bell Labs</a></h3>

<ul>
<li>A little late for a halloween episode, we have “It came from Bell Labs”, a fascinating article talking about the successor to UNIX, Plan9</li>
</ul>

<blockquote>
<p>There was once an operating system that was intended to be the successor to Unix. Plan 9 From Bell Labs was its name, and playing with it for five minutes is like visiting an alternate dimension where computers are done differently. It was so ahead of its time that it would be considered cutting edge, even today. Find out the weird and woolly history to Plan Nine’s inception and eventual consignment as a footnote of operating systems today.</p>
</blockquote>

<ul>
<li>So, if you’ve never heard of Plan 9, how did it exactly differ from the UNIX we know and love today?</li>
</ul>

<blockquote>
<p>Here’s just a few of the key features under Plan 9’s hood + 9P – The distributed file system protocol. Everything runs through this, there is no escaping it. Since everything runs on top of 9P, that makes everything running on a Plan 9 box distributed as well. This means, for example, you can import /dev/audio from another machine on the network to use its sound card when your own machine doesn’t have one. + ndb – The namespace server. In conjunction with 9P, it bosses all the programs around and forces them to comply to the Plan 9 way. + Instead of Unix sockets, all the networking just runs through 9P. Thus, everything from ethernet packets to network cards are all just one more kind of file. + While Unicode is implemented ad-hoc in other systems, it’s baked into Plan 9 from the first int main(). In fact, even users who don’t like Plan 9 have to admit that the character encoding support, together with the beautiful built-in rio font, makes every other operating system look primitive. + The system’s own internal programs are built to be a rounded set of user tools from the ground up. So, for instance, it comes with its own editor, acme, built to be its own weird morphing thing that plays nice with the 9P protocol.</p>
</blockquote>

<ul>
<li>Sounds neat, but how did it work in the real world?</li>
</ul>

<blockquote>
<p>The result was a mixture of both breathtaking efficiency and alienating other-worldliness. Trying out the system is like a visit to an alternate reality where time-traveling gremlins changed how computers are made and used. You can execute anycommand anywhere just by typing its name and middle-clicking on it, even in the middle of reading a file. You can type out your blog post in the middle of a man page and save it right there. Screenshots are made by pointing /dev/screen to a file. When you execute a program in a terminal, the terminal morphs into the program you launched instead of running in the background. The window manager, rio, can be invoked within rio to create an instance of itself running inside itself. You can just keep going like that, until, like Inception, you get lost in which layer you’re in. Get used to running Plan 9 long enough, and you will find yourself horribly ill-adapted for dealing with the normal world.</p>

<p>While system administrators can’t stop praising it, the average home user won’t see much benefit unless they happen to run about eight desktop machines scattered all over. But to quote legendary hacker tribal bard Eric S. Raymond: “…Plan 9 failed simply because it fell short of being a compelling enough improvement on Unix to displace its ancestor.”</p>
</blockquote>

<ul>
<li>A fascinating article, worth your time to read it through, even though we’ve pulled some of the best bits here. Nice look at the alternative dimension that could have been.</li>
</ul>

<hr>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.tedunangst.com/flak/post/inks" rel="nofollow">inks -- Basically Reddit or Hacker News, but without the disagreeable trolls and military industrial complex shills downvoting everything to hide the truth</a></li>
<li><a href="https://youtu.be/Mc2p6sx2s7k" rel="nofollow">“PAM is Un-American” talk now online</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2818" rel="nofollow">Reddit advertising of “PAM Mastery”</a></li>
<li><a href="https://www.ixsystems.com/blog/meetbsd-2016-report-michael-dexter/" rel="nofollow">MeetBSD 2016 Report by Michael Dexter</a></li>
<li><a href="https://www.bsdstore.ru/en/tutorial.html" rel="nofollow">Various CBSD Tutorials</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/6B96pVcm" rel="nofollow">Dylan - Kaltura Alt</a></li>
<li><a href="http://pastebin.com/Hrp8qwkP" rel="nofollow">Scott - ZFS in Low-Mem</a></li>
<li><a href="http://pastebin.com/85q4Q3Xx" rel="nofollow">J - Mixing Ports / Pkgs</a> </li>
<li><a href="http://pastebin.com/RFKY0ERs" rel="nofollow">Trenton - Dtract &amp; PC-BSD</a></li>
<li><a href="http://pastebin.com/31uqW6vW" rel="nofollow">Ivan - ZFS Backups</a></li>
</ul>

<hr>

<ul>
<li>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>168: The Post Show Show</title>
  <link>https://www.bsdnow.tv/168</link>
  <guid isPermaLink="false">776e1141-a95a-47ca-b5cd-308ad59d32f9</guid>
  <pubDate>Wed, 16 Nov 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/776e1141-a95a-47ca-b5cd-308ad59d32f9.mp3" length="60620116" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow. Allan and I are back from MeetBSD! A good time was had by all, lots to discuss, so let’s jump right into it on your place to B...SD!</itunes:subtitle>
  <itunes:duration>1:24:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow. Allan and I are back from MeetBSD! A good time was had by all, lots to discuss, so let’s jump right into it on your place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://raymii.org/s/tutorials/FreeBSD_11.0-release_Openstack_Image.html" target="_blank" rel="nofollow noopener"&gt;Build a FreeBSD 11.0-release Openstack Image with bsd-cloudinit&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; We are going to prepare a FreeBSD image for Openstack deployment. We do this by creating a FreeBSD 11.0-RELEASE instance, installing it and converting it using bsd-cloudinit. We'll use the CloudVPS public Openstack cloud for this. Create an account there and install the Openstack command line tools, like nova, cinder and glance.&lt;/p&gt;

&lt;p&gt;&amp;gt; A FreeBSD image with Cloud Init will automatically resize the disk to the size of the flavor and it will add your SSH key right at boot. You can use Cloud Config to execute a script at first boot, for example, to bootstrap your system into Puppet or Ansible. If you use Ansible to manage OpenStack instances you can integrate it without manually logging in or doing anything manually.&lt;/p&gt;

&lt;p&gt;&amp;gt; Since FreeBSD 10.2-RELEASE there is an rc script which, when the file /firstboot exists, expands the root filesystem to the full disk. While bsd-cloudinit does this as well, if you don't need the whole cloudinit stack, (when you use a static ssh key for example), you can touch that file to make sure the disk is expanded at the first boot&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A detailed tutorial that shows how to create customized cloud images using the FreeBSD install media&lt;/li&gt;
&lt;li&gt;There is also the option of using the FreeBSD release tools to build custom cloud images in a more headless fashion&lt;/li&gt;
&lt;li&gt;Someone should make a tutorial out of that
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.ixsystems.com/blog/ixsystems-announces-trueos-launch/" target="_blank" rel="nofollow noopener"&gt;iXsystems Announces TrueOS Launch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As loyal listeners to this show, you’ve no doubt heard by now that we are in the middle of undergoing a shift in moving PC-BSD -&amp;gt; TrueOS.&lt;/li&gt;
&lt;li&gt;Last week during MeetBSD this was made “official” with iX issuing our press release and I was able to give a talk detailing many of the reasons and things going on with this change.&lt;/li&gt;
&lt;li&gt;The talk should be available online here soon(ish), but for a quick recap:&lt;/li&gt;
&lt;li&gt;TrueOS is moving to a rolling-release model based on FreeBSD -CURRENT&lt;/li&gt;
&lt;li&gt;Lumina has become the default desktop for TrueOS&lt;/li&gt;
&lt;li&gt;LibreSSL is enabled top to bottom&lt;/li&gt;
&lt;li&gt;We are in the middle of working on conversion to OpenRC for run-control replacement&lt;/li&gt;
&lt;li&gt;The TrueOS pico was announced, which is our “Thin-Client” solution, right now allowing you to use a TrueOS server pared with a RPI2 device. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://vzaigrin.wordpress.com/2016/10/16/running-freebsd-11-on-raspberry-pi/" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD 11 on Raspberry Pi&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This article covers some of the changes you will notice if you upgrade your RPI to FreeBSD 11.0&lt;/li&gt;
&lt;li&gt;It covers some of the changes to WiFi in 11.0&lt;/li&gt;
&lt;li&gt;Pro Tip: you can get a list of WiFi devices by doing: sysctl net.wlan.devices&lt;/li&gt;
&lt;li&gt;There are official binary packages for ARM with 11.0, so you can just ‘pkg install’ your favourite apps&lt;/li&gt;
&lt;li&gt;Many of the LEDs are exposed via the /dev/led/ interface, which you can just echo 0 or 1 to, or use morse(6) to send a message&lt;/li&gt;
&lt;li&gt;gpioctl can be used to control the various GPIO pins&lt;/li&gt;
&lt;li&gt;The post also covers how to setup the real-time clock on the Raspberry Pi&lt;/li&gt;
&lt;li&gt;There is also limited support for adjusting the CPU frequency of the Pi&lt;/li&gt;
&lt;li&gt;There are also tips on configuring a one-wire temperature sensor
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/cyclaero/void-zones-tools" target="_blank" rel="nofollow noopener"&gt;void-zones-tools for FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adblock has been in the news a bit recently, with some of the more popular browser plugins now accepting brib&lt;sup&gt;...contributions&lt;/sup&gt; to permit specific ads through.&lt;/li&gt;
&lt;li&gt;Well today the ad-blockers strike back. We have a great tutorial up on GitHub which demonstrates one of the useful features of using Unbound in FreeBSD to do your own ad-blocking with void-zones.&lt;/li&gt;
&lt;li&gt;Specifically, void-zones are a way to return NXDOMAIN when DNS requests are made to known malicious or spam sites.&lt;/li&gt;
&lt;li&gt;Using void-zones-tools software will make managing this easy, by being able to pull in known lists of sites to block from several 3rd party curators.&lt;/li&gt;
&lt;li&gt;When coupled with our past tutorials on setting up your own FreeBSD router, this may become very useful for a lot of folks who want to do ad-blocking ad at a lower level, allowing it to filter smart-phones or any other devices on a network.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://raw.githubusercontent.com/sustrik/dsock/master/rfc/sock-api-revamp-01.txt" target="_blank" rel="nofollow noopener"&gt;BSD Socket API Revamp&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Martin Sustrik has started a draft RFC to revamp the BSD Sockets API:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The progress in the area of network protocols is distinctively lagging behind.  While every hobbyist new to the art of programming writes and publishes their small JavaScript libraries, there's no such thing going on with network protocols.  Indeed, it looks like the field of network protocols is dominated by big companies and academia, just like programming as a whole used to be before the advent of personal computers.&lt;/p&gt;

&lt;p&gt;&amp;gt; the API proposed in this document doesn't try to virtualize all possible aspects of all possible protocols and provide a single set of functions to deal with all of them.  Instead, it acknowledges how varied the protocol landscape is and how much the requirements for individual protocols differ.  Therefore, it lets each protocol define its own API and asks only for bare minimum of standardised behaviour needed to implement protocol composability.&lt;/p&gt;

&lt;p&gt;&amp;gt; As a consequence, the new API is much more lightweight and flexible than BSD socket API and allows to decompose today's monolithic protocol monsters into small single-purpose microprotocols that can be easily combined together to achieve desired functionality.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The idea behind the new design is to allow the software author to define their own protocols via a generic interface, and easily stack them on top of the existing network protocols, be they the basic protocols like TCP/IP, or a layer 7 protocol like HTTP&lt;/li&gt;
&lt;li&gt;   Example of creating a stack of four protocols:
~~
   int s1 = tcp_connect("192.168.0.111:5555");
   int s2 = foo_start(s1, arg1, arg2, arg3);
   int s3 = bar_start(s2);
   int s4 = baz_start(s3, arg4, arg5);
~~&lt;/li&gt;
&lt;li&gt;It also allows applying generic transformations to the protocols:
~~
   int tcps = tcp_connect("192.168.0.111:80");
   /* Websockets is a connected protocol. &lt;em&gt;/
   int ws = websock_connect(tcps);
   uint16_t compression_algoritm;
   mrecv(ws, &amp;amp;compression_algorithm, 2, -1);
   /&lt;/em&gt; Compression socket is unconnected. &lt;em&gt;/
   int cs = compress_start(ws, compression_algorithm);
~~
*&lt;/em&gt;*&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-November/313140.html" target="_blank" rel="nofollow noopener"&gt;Updated version of re(4) for DragonflyBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sephe over at the Dragonfly project has issued a CFT for a newer version of the “re” driver&lt;/li&gt;
&lt;li&gt;For those who don’t know, that is for Realtek nics, specifically his updates add features:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I have made an updated version of re(4), which leverages Realtek driver's chip/PHY reset/initialization code.  I hope it can resolve all kinds of weirdness we encountered on this chip so far.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Testers, you know what to do! Give this a whirl and let him know if you run into any new issues, or better yet, give feedback if it fixes some long-standing problems you’ve run into in the past.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Hackathon reports from OpenBSD’s B2K16&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20161112112023" target="_blank" rel="nofollow noopener"&gt;b2k16 hackathon report: Jeremy Evans on ports cleaning, progress on postgres, nginx, ruby and more&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20161112095902" target="_blank" rel="nofollow noopener"&gt;b2k16 hackathon report: Landry Breuil on various ports progress&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20161109030623" target="_blank" rel="nofollow noopener"&gt;b2k16 hackathon report: Antoine Jacoutot on GNOME's path forward, various ports progress&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;We have a trio of hackathon reports from OpenBSD’s B2K16 (Recently held in Budapest)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;First up - Jeremy Evans give us his rundown which starts with sweeping some of the cruft out of the barn:&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I started off b2k16 by channeling tedu@, and removing a lot of ports, including lang/ruby/2.0, lang/io, convertors/ruby-json, databases/dbic++, databases/ruby-swift, databases/ruby-jdbc-*, x11/ruby-profiligacy, and mail/ruby-mailfactory.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After that, he talks about improvements made to postgres, nginx and ruby ports, fixing things such as pg_upgrade support, breaking nginx down into sub-packages and a major ruby update to about 50% of the packages.&lt;/li&gt;
&lt;li&gt;Next up - Landry Breuil tells us about his trip, which also started with some major ports pruning, including some stale XFCE bits and drupal6. &lt;/li&gt;
&lt;li&gt;One of the things he mentions is the Tor browser:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Found finally some time again to review properly the pending port for Tor Browser, even if i don't like the way it is developed (600+ patches against upstream firefox-esr !? even if relationship is improving..) nor will endorse its use, i feel that the time that was spent on porting it and updating it and maintaining it shouldn't be lost, and it should get commited - there are only some portswise minor tweaks to fix. Had a bit of discussions about that with other porters... &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Lastly, Antoine Jacoutot gives us a smaller update on his work:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; First task of this hackathon was for Jasper and I to upgrade to GNOME 3.22.1 (version 3.22.2 hit the ports tree since). As usual I already updated the core libraries a few days before so that we could start with a nice set of fully updated packages. It ended up being the fastest GNOME update ever, it all went very smoothly. We're still debating the future of GNOME on OpenBSD though. More and more features require systemd interfaces and without a replacement it may not make sense to keep it around. Implementing these interfaces requires time which Jasper and I don't really have these days... Anyway, we'll see.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All-n-all, a good trip it sounds like with some much needed hacking taking place. Good to see the cruft getting cleaned up, along with some new exciting ports landing.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2016-07-2016-09.html" target="_blank" rel="nofollow noopener"&gt;July to September 2016 Status Report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The latest FreeBSD quarterly status report is out&lt;/li&gt;
&lt;li&gt;It includes the induction of the new Core team, and reports from all of the other teams, including Release Engineering, Port Manager, and the FreeBSD Foundation&lt;/li&gt;
&lt;li&gt;Some other highlights:&lt;/li&gt;
&lt;li&gt;Capsicum Update

&lt;ul&gt;
&lt;li&gt;The Graphics Stack on FreeBSD&lt;/li&gt;
&lt;li&gt;Using lld, the LLVM Linker, to Link FreeBSD&lt;/li&gt;
&lt;li&gt;VirtualBox Shared Folders Filesystem&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;evdev support (better mouse, keyboard, and multi-touch support)

&lt;ul&gt;
&lt;li&gt;ZFS Code Sync with Latest OpenZFS/Illumos

&lt;ul&gt;
&lt;li&gt;The ARC now mostly stores compressed data, the same as is stored on disk, decompressing them on demand.&lt;/li&gt;
&lt;li&gt;The L2ARC now stores the same (compressed) data as the ARC without recompression, and its RAM usage was further reduced.&lt;/li&gt;
&lt;li&gt;The largest size of indirect block possible has been increased from 16KB to 128KB, and speculative prefetching of indirect blocks is now performed.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Improved ordering of space allocation.&lt;/li&gt;
&lt;li&gt;The SHA-512t256 and Skein hashing algorithms are now supported.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.cs.cmu.edu/afs/cs/user/predragp/www/git.html" target="_blank" rel="nofollow noopener"&gt;How to Host Your Own Private GitHub with Gogs&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://yro.slashdot.org/story/16/11/07/1427257/nvidia-adds-telemetry-to-latest-drivers" target="_blank" rel="nofollow noopener"&gt;Nvidia Adds Telemetry To Latest Drivers&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://knoxbug.org/2016-11-29" target="_blank" rel="nofollow noopener"&gt;KnoxBUG Upcoming Meeting&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/skvEgkLK" target="_blank" rel="nofollow noopener"&gt; William - Show Music&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/nMDeSFGM" target="_blank" rel="nofollow noopener"&gt; Ray - Mounting a Cell Phone&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/p5bC1jKU" target="_blank" rel="nofollow noopener"&gt; Ron - TrueOS + Radeon&lt;/a&gt;  (Follow-up - He used nvidia card)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ud9vEK2C" target="_blank" rel="nofollow noopener"&gt; Kurt - ZFS Migration&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/VPQfsUks" target="_blank" rel="nofollow noopener"&gt; Matt Dillon (Yes that Matt Dillon) - vkernels&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow. Allan and I are back from MeetBSD! A good time was had by all, lots to discuss, so let’s jump right into it on your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_11.0-release_Openstack_Image.html" rel="nofollow">Build a FreeBSD 11.0-release Openstack Image with bsd-cloudinit</a></h3>

<blockquote>
<p>We are going to prepare a FreeBSD image for Openstack deployment. We do this by creating a FreeBSD 11.0-RELEASE instance, installing it and converting it using bsd-cloudinit. We&#39;ll use the CloudVPS public Openstack cloud for this. Create an account there and install the Openstack command line tools, like nova, cinder and glance.</p>

<p>A FreeBSD image with Cloud Init will automatically resize the disk to the size of the flavor and it will add your SSH key right at boot. You can use Cloud Config to execute a script at first boot, for example, to bootstrap your system into Puppet or Ansible. If you use Ansible to manage OpenStack instances you can integrate it without manually logging in or doing anything manually.</p>

<p>Since FreeBSD 10.2-RELEASE there is an rc script which, when the file /firstboot exists, expands the root filesystem to the full disk. While bsd-cloudinit does this as well, if you don&#39;t need the whole cloudinit stack, (when you use a static ssh key for example), you can touch that file to make sure the disk is expanded at the first boot</p>
</blockquote>

<ul>
<li>A detailed tutorial that shows how to create customized cloud images using the FreeBSD install media</li>
<li>There is also the option of using the FreeBSD release tools to build custom cloud images in a more headless fashion</li>
<li>Someone should make a tutorial out of that
***</li>
</ul>

<h3><a href="https://www.ixsystems.com/blog/ixsystems-announces-trueos-launch/" rel="nofollow">iXsystems Announces TrueOS Launch</a></h3>

<ul>
<li>As loyal listeners to this show, you’ve no doubt heard by now that we are in the middle of undergoing a shift in moving PC-BSD -&gt; TrueOS.</li>
<li>Last week during MeetBSD this was made “official” with iX issuing our press release and I was able to give a talk detailing many of the reasons and things going on with this change.</li>
<li>The talk should be available online here soon(ish), but for a quick recap:</li>
<li>TrueOS is moving to a rolling-release model based on FreeBSD -CURRENT</li>
<li>Lumina has become the default desktop for TrueOS</li>
<li>LibreSSL is enabled top to bottom</li>
<li>We are in the middle of working on conversion to OpenRC for run-control replacement</li>
<li>The TrueOS pico was announced, which is our “Thin-Client” solution, right now allowing you to use a TrueOS server pared with a RPI2 device. 
***</li>
</ul>

<h3><a href="https://vzaigrin.wordpress.com/2016/10/16/running-freebsd-11-on-raspberry-pi/" rel="nofollow">Running FreeBSD 11 on Raspberry Pi</a></h3>

<ul>
<li>This article covers some of the changes you will notice if you upgrade your RPI to FreeBSD 11.0</li>
<li>It covers some of the changes to WiFi in 11.0</li>
<li>Pro Tip: you can get a list of WiFi devices by doing: sysctl net.wlan.devices</li>
<li>There are official binary packages for ARM with 11.0, so you can just ‘pkg install’ your favourite apps</li>
<li>Many of the LEDs are exposed via the /dev/led/<name> interface, which you can just echo 0 or 1 to, or use morse(6) to send a message</li>
<li>gpioctl can be used to control the various GPIO pins</li>
<li>The post also covers how to setup the real-time clock on the Raspberry Pi</li>
<li>There is also limited support for adjusting the CPU frequency of the Pi</li>
<li>There are also tips on configuring a one-wire temperature sensor
***</li>
</ul>

<h3><a href="https://github.com/cyclaero/void-zones-tools" rel="nofollow">void-zones-tools for FreeBSD</a></h3>

<ul>
<li>Adblock has been in the news a bit recently, with some of the more popular browser plugins now accepting brib<sup>...contributions</sup> to permit specific ads through.</li>
<li>Well today the ad-blockers strike back. We have a great tutorial up on GitHub which demonstrates one of the useful features of using Unbound in FreeBSD to do your own ad-blocking with void-zones.</li>
<li>Specifically, void-zones are a way to return NXDOMAIN when DNS requests are made to known malicious or spam sites.</li>
<li>Using void-zones-tools software will make managing this easy, by being able to pull in known lists of sites to block from several 3rd party curators.</li>
<li>When coupled with our past tutorials on setting up your own FreeBSD router, this may become very useful for a lot of folks who want to do ad-blocking ad at a lower level, allowing it to filter smart-phones or any other devices on a network.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://raw.githubusercontent.com/sustrik/dsock/master/rfc/sock-api-revamp-01.txt" rel="nofollow">BSD Socket API Revamp</a></h3>

<ul>
<li>Martin Sustrik has started a draft RFC to revamp the BSD Sockets API:</li>
</ul>

<blockquote>
<p>The progress in the area of network protocols is distinctively lagging behind.  While every hobbyist new to the art of programming writes and publishes their small JavaScript libraries, there&#39;s no such thing going on with network protocols.  Indeed, it looks like the field of network protocols is dominated by big companies and academia, just like programming as a whole used to be before the advent of personal computers.</p>

<p>the API proposed in this document doesn&#39;t try to virtualize all possible aspects of all possible protocols and provide a single set of functions to deal with all of them.  Instead, it acknowledges how varied the protocol landscape is and how much the requirements for individual protocols differ.  Therefore, it lets each protocol define its own API and asks only for bare minimum of standardised behaviour needed to implement protocol composability.</p>

<p>As a consequence, the new API is much more lightweight and flexible than BSD socket API and allows to decompose today&#39;s monolithic protocol monsters into small single-purpose microprotocols that can be easily combined together to achieve desired functionality.</p>
</blockquote>

<ul>
<li>The idea behind the new design is to allow the software author to define their own protocols via a generic interface, and easily stack them on top of the existing network protocols, be they the basic protocols like TCP/IP, or a layer 7 protocol like HTTP</li>
<li>   Example of creating a stack of four protocols:
~~
   int s1 = tcp_connect(&quot;192.168.0.111:5555&quot;);
   int s2 = foo_start(s1, arg1, arg2, arg3);
   int s3 = bar_start(s2);
   int s4 = baz_start(s3, arg4, arg5);
~~</li>
<li>It also allows applying generic transformations to the protocols:
~~
   int tcps = tcp_connect(&quot;192.168.0.111:80&quot;);
   /* Websockets is a connected protocol. <em>/
   int ws = websock_connect(tcps);
   uint16_t compression_algoritm;
   mrecv(ws, &amp;compression_algorithm, 2, -1);
   /</em> Compression socket is unconnected. <em>/
   int cs = compress_start(ws, compression_algorithm);
~~
*</em>*</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-November/313140.html" rel="nofollow">Updated version of re(4) for DragonflyBSD</a></h3>

<ul>
<li>Sephe over at the Dragonfly project has issued a CFT for a newer version of the “re” driver</li>
<li>For those who don’t know, that is for Realtek nics, specifically his updates add features:</li>
</ul>

<blockquote>
<p>I have made an updated version of re(4), which leverages Realtek driver&#39;s chip/PHY reset/initialization code.  I hope it can resolve all kinds of weirdness we encountered on this chip so far.</p>
</blockquote>

<ul>
<li>Testers, you know what to do! Give this a whirl and let him know if you run into any new issues, or better yet, give feedback if it fixes some long-standing problems you’ve run into in the past.
***</li>
</ul>

<h3>Hackathon reports from OpenBSD’s B2K16</h3>

<ul>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161112112023" rel="nofollow">b2k16 hackathon report: Jeremy Evans on ports cleaning, progress on postgres, nginx, ruby and more</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161112095902" rel="nofollow">b2k16 hackathon report: Landry Breuil on various ports progress</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161109030623" rel="nofollow">b2k16 hackathon report: Antoine Jacoutot on GNOME&#39;s path forward, various ports progress</a></p></li>
<li><p>We have a trio of hackathon reports from OpenBSD’s B2K16 (Recently held in Budapest)</p></li>
<li><p>First up - Jeremy Evans give us his rundown which starts with sweeping some of the cruft out of the barn:</p></li>
</ul>

<blockquote>
<p>I started off b2k16 by channeling tedu@, and removing a lot of ports, including lang/ruby/2.0, lang/io, convertors/ruby-json, databases/dbic++, databases/ruby-swift, databases/ruby-jdbc-*, x11/ruby-profiligacy, and mail/ruby-mailfactory.</p>
</blockquote>

<ul>
<li>After that, he talks about improvements made to postgres, nginx and ruby ports, fixing things such as pg_upgrade support, breaking nginx down into sub-packages and a major ruby update to about 50% of the packages.</li>
<li>Next up - Landry Breuil tells us about his trip, which also started with some major ports pruning, including some stale XFCE bits and drupal6. </li>
<li>One of the things he mentions is the Tor browser:</li>
</ul>

<blockquote>
<p>Found finally some time again to review properly the pending port for Tor Browser, even if i don&#39;t like the way it is developed (600+ patches against upstream firefox-esr !? even if relationship is improving..) nor will endorse its use, i feel that the time that was spent on porting it and updating it and maintaining it shouldn&#39;t be lost, and it should get commited - there are only some portswise minor tweaks to fix. Had a bit of discussions about that with other porters... </p>
</blockquote>

<ul>
<li>Lastly, Antoine Jacoutot gives us a smaller update on his work:</li>
</ul>

<blockquote>
<p>First task of this hackathon was for Jasper and I to upgrade to GNOME 3.22.1 (version 3.22.2 hit the ports tree since). As usual I already updated the core libraries a few days before so that we could start with a nice set of fully updated packages. It ended up being the fastest GNOME update ever, it all went very smoothly. We&#39;re still debating the future of GNOME on OpenBSD though. More and more features require systemd interfaces and without a replacement it may not make sense to keep it around. Implementing these interfaces requires time which Jasper and I don&#39;t really have these days... Anyway, we&#39;ll see.</p>
</blockquote>

<ul>
<li>All-n-all, a good trip it sounds like with some much needed hacking taking place. Good to see the cruft getting cleaned up, along with some new exciting ports landing.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2016-07-2016-09.html" rel="nofollow">July to September 2016 Status Report</a></h3>

<ul>
<li>The latest FreeBSD quarterly status report is out</li>
<li>It includes the induction of the new Core team, and reports from all of the other teams, including Release Engineering, Port Manager, and the FreeBSD Foundation</li>
<li>Some other highlights:</li>
<li>Capsicum Update

<ul>
<li>The Graphics Stack on FreeBSD</li>
<li>Using lld, the LLVM Linker, to Link FreeBSD</li>
<li>VirtualBox Shared Folders Filesystem</li>
</ul></li>
<li>evdev support (better mouse, keyboard, and multi-touch support)

<ul>
<li>ZFS Code Sync with Latest OpenZFS/Illumos

<ul>
<li>The ARC now mostly stores compressed data, the same as is stored on disk, decompressing them on demand.</li>
<li>The L2ARC now stores the same (compressed) data as the ARC without recompression, and its RAM usage was further reduced.</li>
<li>The largest size of indirect block possible has been increased from 16KB to 128KB, and speculative prefetching of indirect blocks is now performed.</li>
</ul></li>
</ul></li>
<li>Improved ordering of space allocation.</li>
<li>The SHA-512t256 and Skein hashing algorithms are now supported.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.cs.cmu.edu/afs/cs/user/predragp/www/git.html" rel="nofollow">How to Host Your Own Private GitHub with Gogs</a></li>
<li><a href="https://yro.slashdot.org/story/16/11/07/1427257/nvidia-adds-telemetry-to-latest-drivers" rel="nofollow">Nvidia Adds Telemetry To Latest Drivers</a></li>
<li><a href="http://knoxbug.org/2016-11-29" rel="nofollow">KnoxBUG Upcoming Meeting</a> </li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/skvEgkLK" rel="nofollow"> William - Show Music</a> </li>
<li><a href="http://pastebin.com/nMDeSFGM" rel="nofollow"> Ray - Mounting a Cell Phone</a> </li>
<li><a href="http://pastebin.com/p5bC1jKU" rel="nofollow"> Ron - TrueOS + Radeon</a>  (Follow-up - He used nvidia card)</li>
<li><a href="http://pastebin.com/ud9vEK2C" rel="nofollow"> Kurt - ZFS Migration</a> </li>
<li><a href="http://pastebin.com/VPQfsUks" rel="nofollow"> Matt Dillon (Yes that Matt Dillon) - vkernels</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow. Allan and I are back from MeetBSD! A good time was had by all, lots to discuss, so let’s jump right into it on your place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_11.0-release_Openstack_Image.html" rel="nofollow">Build a FreeBSD 11.0-release Openstack Image with bsd-cloudinit</a></h3>

<blockquote>
<p>We are going to prepare a FreeBSD image for Openstack deployment. We do this by creating a FreeBSD 11.0-RELEASE instance, installing it and converting it using bsd-cloudinit. We&#39;ll use the CloudVPS public Openstack cloud for this. Create an account there and install the Openstack command line tools, like nova, cinder and glance.</p>

<p>A FreeBSD image with Cloud Init will automatically resize the disk to the size of the flavor and it will add your SSH key right at boot. You can use Cloud Config to execute a script at first boot, for example, to bootstrap your system into Puppet or Ansible. If you use Ansible to manage OpenStack instances you can integrate it without manually logging in or doing anything manually.</p>

<p>Since FreeBSD 10.2-RELEASE there is an rc script which, when the file /firstboot exists, expands the root filesystem to the full disk. While bsd-cloudinit does this as well, if you don&#39;t need the whole cloudinit stack, (when you use a static ssh key for example), you can touch that file to make sure the disk is expanded at the first boot</p>
</blockquote>

<ul>
<li>A detailed tutorial that shows how to create customized cloud images using the FreeBSD install media</li>
<li>There is also the option of using the FreeBSD release tools to build custom cloud images in a more headless fashion</li>
<li>Someone should make a tutorial out of that
***</li>
</ul>

<h3><a href="https://www.ixsystems.com/blog/ixsystems-announces-trueos-launch/" rel="nofollow">iXsystems Announces TrueOS Launch</a></h3>

<ul>
<li>As loyal listeners to this show, you’ve no doubt heard by now that we are in the middle of undergoing a shift in moving PC-BSD -&gt; TrueOS.</li>
<li>Last week during MeetBSD this was made “official” with iX issuing our press release and I was able to give a talk detailing many of the reasons and things going on with this change.</li>
<li>The talk should be available online here soon(ish), but for a quick recap:</li>
<li>TrueOS is moving to a rolling-release model based on FreeBSD -CURRENT</li>
<li>Lumina has become the default desktop for TrueOS</li>
<li>LibreSSL is enabled top to bottom</li>
<li>We are in the middle of working on conversion to OpenRC for run-control replacement</li>
<li>The TrueOS pico was announced, which is our “Thin-Client” solution, right now allowing you to use a TrueOS server pared with a RPI2 device. 
***</li>
</ul>

<h3><a href="https://vzaigrin.wordpress.com/2016/10/16/running-freebsd-11-on-raspberry-pi/" rel="nofollow">Running FreeBSD 11 on Raspberry Pi</a></h3>

<ul>
<li>This article covers some of the changes you will notice if you upgrade your RPI to FreeBSD 11.0</li>
<li>It covers some of the changes to WiFi in 11.0</li>
<li>Pro Tip: you can get a list of WiFi devices by doing: sysctl net.wlan.devices</li>
<li>There are official binary packages for ARM with 11.0, so you can just ‘pkg install’ your favourite apps</li>
<li>Many of the LEDs are exposed via the /dev/led/<name> interface, which you can just echo 0 or 1 to, or use morse(6) to send a message</li>
<li>gpioctl can be used to control the various GPIO pins</li>
<li>The post also covers how to setup the real-time clock on the Raspberry Pi</li>
<li>There is also limited support for adjusting the CPU frequency of the Pi</li>
<li>There are also tips on configuring a one-wire temperature sensor
***</li>
</ul>

<h3><a href="https://github.com/cyclaero/void-zones-tools" rel="nofollow">void-zones-tools for FreeBSD</a></h3>

<ul>
<li>Adblock has been in the news a bit recently, with some of the more popular browser plugins now accepting brib<sup>...contributions</sup> to permit specific ads through.</li>
<li>Well today the ad-blockers strike back. We have a great tutorial up on GitHub which demonstrates one of the useful features of using Unbound in FreeBSD to do your own ad-blocking with void-zones.</li>
<li>Specifically, void-zones are a way to return NXDOMAIN when DNS requests are made to known malicious or spam sites.</li>
<li>Using void-zones-tools software will make managing this easy, by being able to pull in known lists of sites to block from several 3rd party curators.</li>
<li>When coupled with our past tutorials on setting up your own FreeBSD router, this may become very useful for a lot of folks who want to do ad-blocking ad at a lower level, allowing it to filter smart-phones or any other devices on a network.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://raw.githubusercontent.com/sustrik/dsock/master/rfc/sock-api-revamp-01.txt" rel="nofollow">BSD Socket API Revamp</a></h3>

<ul>
<li>Martin Sustrik has started a draft RFC to revamp the BSD Sockets API:</li>
</ul>

<blockquote>
<p>The progress in the area of network protocols is distinctively lagging behind.  While every hobbyist new to the art of programming writes and publishes their small JavaScript libraries, there&#39;s no such thing going on with network protocols.  Indeed, it looks like the field of network protocols is dominated by big companies and academia, just like programming as a whole used to be before the advent of personal computers.</p>

<p>the API proposed in this document doesn&#39;t try to virtualize all possible aspects of all possible protocols and provide a single set of functions to deal with all of them.  Instead, it acknowledges how varied the protocol landscape is and how much the requirements for individual protocols differ.  Therefore, it lets each protocol define its own API and asks only for bare minimum of standardised behaviour needed to implement protocol composability.</p>

<p>As a consequence, the new API is much more lightweight and flexible than BSD socket API and allows to decompose today&#39;s monolithic protocol monsters into small single-purpose microprotocols that can be easily combined together to achieve desired functionality.</p>
</blockquote>

<ul>
<li>The idea behind the new design is to allow the software author to define their own protocols via a generic interface, and easily stack them on top of the existing network protocols, be they the basic protocols like TCP/IP, or a layer 7 protocol like HTTP</li>
<li>   Example of creating a stack of four protocols:
~~
   int s1 = tcp_connect(&quot;192.168.0.111:5555&quot;);
   int s2 = foo_start(s1, arg1, arg2, arg3);
   int s3 = bar_start(s2);
   int s4 = baz_start(s3, arg4, arg5);
~~</li>
<li>It also allows applying generic transformations to the protocols:
~~
   int tcps = tcp_connect(&quot;192.168.0.111:80&quot;);
   /* Websockets is a connected protocol. <em>/
   int ws = websock_connect(tcps);
   uint16_t compression_algoritm;
   mrecv(ws, &amp;compression_algorithm, 2, -1);
   /</em> Compression socket is unconnected. <em>/
   int cs = compress_start(ws, compression_algorithm);
~~
*</em>*</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-November/313140.html" rel="nofollow">Updated version of re(4) for DragonflyBSD</a></h3>

<ul>
<li>Sephe over at the Dragonfly project has issued a CFT for a newer version of the “re” driver</li>
<li>For those who don’t know, that is for Realtek nics, specifically his updates add features:</li>
</ul>

<blockquote>
<p>I have made an updated version of re(4), which leverages Realtek driver&#39;s chip/PHY reset/initialization code.  I hope it can resolve all kinds of weirdness we encountered on this chip so far.</p>
</blockquote>

<ul>
<li>Testers, you know what to do! Give this a whirl and let him know if you run into any new issues, or better yet, give feedback if it fixes some long-standing problems you’ve run into in the past.
***</li>
</ul>

<h3>Hackathon reports from OpenBSD’s B2K16</h3>

<ul>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161112112023" rel="nofollow">b2k16 hackathon report: Jeremy Evans on ports cleaning, progress on postgres, nginx, ruby and more</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161112095902" rel="nofollow">b2k16 hackathon report: Landry Breuil on various ports progress</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20161109030623" rel="nofollow">b2k16 hackathon report: Antoine Jacoutot on GNOME&#39;s path forward, various ports progress</a></p></li>
<li><p>We have a trio of hackathon reports from OpenBSD’s B2K16 (Recently held in Budapest)</p></li>
<li><p>First up - Jeremy Evans give us his rundown which starts with sweeping some of the cruft out of the barn:</p></li>
</ul>

<blockquote>
<p>I started off b2k16 by channeling tedu@, and removing a lot of ports, including lang/ruby/2.0, lang/io, convertors/ruby-json, databases/dbic++, databases/ruby-swift, databases/ruby-jdbc-*, x11/ruby-profiligacy, and mail/ruby-mailfactory.</p>
</blockquote>

<ul>
<li>After that, he talks about improvements made to postgres, nginx and ruby ports, fixing things such as pg_upgrade support, breaking nginx down into sub-packages and a major ruby update to about 50% of the packages.</li>
<li>Next up - Landry Breuil tells us about his trip, which also started with some major ports pruning, including some stale XFCE bits and drupal6. </li>
<li>One of the things he mentions is the Tor browser:</li>
</ul>

<blockquote>
<p>Found finally some time again to review properly the pending port for Tor Browser, even if i don&#39;t like the way it is developed (600+ patches against upstream firefox-esr !? even if relationship is improving..) nor will endorse its use, i feel that the time that was spent on porting it and updating it and maintaining it shouldn&#39;t be lost, and it should get commited - there are only some portswise minor tweaks to fix. Had a bit of discussions about that with other porters... </p>
</blockquote>

<ul>
<li>Lastly, Antoine Jacoutot gives us a smaller update on his work:</li>
</ul>

<blockquote>
<p>First task of this hackathon was for Jasper and I to upgrade to GNOME 3.22.1 (version 3.22.2 hit the ports tree since). As usual I already updated the core libraries a few days before so that we could start with a nice set of fully updated packages. It ended up being the fastest GNOME update ever, it all went very smoothly. We&#39;re still debating the future of GNOME on OpenBSD though. More and more features require systemd interfaces and without a replacement it may not make sense to keep it around. Implementing these interfaces requires time which Jasper and I don&#39;t really have these days... Anyway, we&#39;ll see.</p>
</blockquote>

<ul>
<li>All-n-all, a good trip it sounds like with some much needed hacking taking place. Good to see the cruft getting cleaned up, along with some new exciting ports landing.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2016-07-2016-09.html" rel="nofollow">July to September 2016 Status Report</a></h3>

<ul>
<li>The latest FreeBSD quarterly status report is out</li>
<li>It includes the induction of the new Core team, and reports from all of the other teams, including Release Engineering, Port Manager, and the FreeBSD Foundation</li>
<li>Some other highlights:</li>
<li>Capsicum Update

<ul>
<li>The Graphics Stack on FreeBSD</li>
<li>Using lld, the LLVM Linker, to Link FreeBSD</li>
<li>VirtualBox Shared Folders Filesystem</li>
</ul></li>
<li>evdev support (better mouse, keyboard, and multi-touch support)

<ul>
<li>ZFS Code Sync with Latest OpenZFS/Illumos

<ul>
<li>The ARC now mostly stores compressed data, the same as is stored on disk, decompressing them on demand.</li>
<li>The L2ARC now stores the same (compressed) data as the ARC without recompression, and its RAM usage was further reduced.</li>
<li>The largest size of indirect block possible has been increased from 16KB to 128KB, and speculative prefetching of indirect blocks is now performed.</li>
</ul></li>
</ul></li>
<li>Improved ordering of space allocation.</li>
<li>The SHA-512t256 and Skein hashing algorithms are now supported.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://www.cs.cmu.edu/afs/cs/user/predragp/www/git.html" rel="nofollow">How to Host Your Own Private GitHub with Gogs</a></li>
<li><a href="https://yro.slashdot.org/story/16/11/07/1427257/nvidia-adds-telemetry-to-latest-drivers" rel="nofollow">Nvidia Adds Telemetry To Latest Drivers</a></li>
<li><a href="http://knoxbug.org/2016-11-29" rel="nofollow">KnoxBUG Upcoming Meeting</a> </li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/skvEgkLK" rel="nofollow"> William - Show Music</a> </li>
<li><a href="http://pastebin.com/nMDeSFGM" rel="nofollow"> Ray - Mounting a Cell Phone</a> </li>
<li><a href="http://pastebin.com/p5bC1jKU" rel="nofollow"> Ron - TrueOS + Radeon</a>  (Follow-up - He used nvidia card)</li>
<li><a href="http://pastebin.com/ud9vEK2C" rel="nofollow"> Kurt - ZFS Migration</a> </li>
<li><a href="http://pastebin.com/VPQfsUks" rel="nofollow"> Matt Dillon (Yes that Matt Dillon) - vkernels</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>167: Playing the Long Game</title>
  <link>https://www.bsdnow.tv/167</link>
  <guid isPermaLink="false">ebe3203d-b267-46aa-84af-9a1a3f861c02</guid>
  <pubDate>Wed, 09 Nov 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ebe3203d-b267-46aa-84af-9a1a3f861c02.mp3" length="34410964" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, Allan &amp; Kris are out at MeetBSD, but we never forget our loyal listeners. We have a great interview Allan did with Scott Long of Netflix &amp; FreeBSD fame, as well as your questions on the place to B...SD!</itunes:subtitle>
  <itunes:duration>47:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, Allan &amp;amp; Kris are out at MeetBSD, but we never forget our loyal listeners. We have a great interview Allan did with Scott Long of Netflix &amp;amp; FreeBSD fame, as well as your questions on the place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Scott Long - &lt;a href="mailto:scottl@freebsd.org" target="_blank" rel="nofollow noopener"&gt;scottl@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD &amp;amp; Netflix
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/u77LE0Md" target="_blank" rel="nofollow noopener"&gt;Zack - USB Config&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/8KwDK6ay" target="_blank" rel="nofollow noopener"&gt;Jens - VMs, Jails and Containers&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Kie3EcjN" target="_blank" rel="nofollow noopener"&gt;Ranko - Tarsnap Keys&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/nRJQ7UPZ" target="_blank" rel="nofollow noopener"&gt;Alex - OpenBSD in Hyper-V&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ndx25pQA" target="_blank" rel="nofollow noopener"&gt;Curt - Discussion Segment&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, Allan &amp; Kris are out at MeetBSD, but we never forget our loyal listeners. We have a great interview Allan did with Scott Long of Netflix &amp; FreeBSD fame, as well as your questions on the place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Scott Long - <a href="mailto:scottl@freebsd.org" rel="nofollow">scottl@freebsd.org</a></h2>

<ul>
<li>FreeBSD &amp; Netflix
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/u77LE0Md" rel="nofollow">Zack - USB Config</a> </li>
<li><a href="http://pastebin.com/8KwDK6ay" rel="nofollow">Jens - VMs, Jails and Containers</a> </li>
<li><a href="http://pastebin.com/Kie3EcjN" rel="nofollow">Ranko - Tarsnap Keys</a> </li>
<li><a href="http://pastebin.com/nRJQ7UPZ" rel="nofollow">Alex - OpenBSD in Hyper-V</a> </li>
<li><a href="http://pastebin.com/ndx25pQA" rel="nofollow">Curt - Discussion Segment</a> </li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, Allan &amp; Kris are out at MeetBSD, but we never forget our loyal listeners. We have a great interview Allan did with Scott Long of Netflix &amp; FreeBSD fame, as well as your questions on the place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Scott Long - <a href="mailto:scottl@freebsd.org" rel="nofollow">scottl@freebsd.org</a></h2>

<ul>
<li>FreeBSD &amp; Netflix
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/u77LE0Md" rel="nofollow">Zack - USB Config</a> </li>
<li><a href="http://pastebin.com/8KwDK6ay" rel="nofollow">Jens - VMs, Jails and Containers</a> </li>
<li><a href="http://pastebin.com/Kie3EcjN" rel="nofollow">Ranko - Tarsnap Keys</a> </li>
<li><a href="http://pastebin.com/nRJQ7UPZ" rel="nofollow">Alex - OpenBSD in Hyper-V</a> </li>
<li><a href="http://pastebin.com/ndx25pQA" rel="nofollow">Curt - Discussion Segment</a> </li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>166: Pass that UNIX Pipe</title>
  <link>https://www.bsdnow.tv/166</link>
  <guid isPermaLink="false">13a56673-8f9c-4198-9f01-4f28143ec2f9</guid>
  <pubDate>Wed, 02 Nov 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/13a56673-8f9c-4198-9f01-4f28143ec2f9.mp3" length="39795412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we’re loaded up with great stories ranging from System call fuzzing, a history of UNIX Pipes, speeding up MySQL imports and more. Stay tuned, BSDNow is coming your way right now.</itunes:subtitle>
  <itunes:duration>55:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we’re loaded up with great stories ranging from System call fuzzing, a history of UNIX Pipes, speeding up MySQL imports and more. Stay tuned, BSDNow is coming your way right now.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/nccgroup/TriforceOpenBSDFuzzer" target="_blank" rel="nofollow noopener"&gt;System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NCCGroup did a series of fuzz testing against the OpenBSD syscall interface, during which they found a number of vulnerabilities, we covered this back in the early summer&lt;/li&gt;
&lt;li&gt;What we didn’t notice, is that they also made the tools they used available.&lt;/li&gt;
&lt;li&gt;A combination of AFL (American Fuzzy Lop), QEMU, OpenBSD’s FlashRD image generation tool, and the “Triforce” driver&lt;/li&gt;
&lt;li&gt;The other requirement is “a Linux box as host to run the fuzzer (other fuzzer hosts may work as well, we've only run TriforceAFL from a Linux host, specifically Debian/Ubuntu”&lt;/li&gt;
&lt;li&gt;It would be interesting to see if someone could get this to run from a BSD host&lt;/li&gt;
&lt;li&gt;It would also be interesting to run the same tests against the other BSDs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://people.fas.harvard.edu/%7Elib113/reference/unix/unix2.html" target="_blank" rel="nofollow noopener"&gt;On the Early History and Impact of Unix: the Introduction of Pipes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Pipes are something we just take for granted today, but there was a time before pipes (How did anything get done?)&lt;/li&gt;
&lt;li&gt;Ronda Hauben writes up a great look back at the beginning of UNIX, and specifically at how pipes were born:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; One of the important developments in Unix was the introduction of pipes. Pipes had been suggested by McIlroy during the early days of creating Unix. Ritchie explains how "the idea, explained one afternoon on a blackboard, intrigued us but failed to ignite any immediate action. There were several objections to the idea as put....What a failure of imagination," he admits.(35) McIlroy concurs, describing how the initial effort to add pipes to Unix occurred about the same time in 1969 that Ritchie, Thompson and Canaday were outlining ideas for a file system. "That was when," he writes, "the simple pipeline as a way to combine programs, with data notationally propagating along a chain of (not necessarily concurrent) filters was articulated."(36) However, pipes weren't implemented in Unix until 1972. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We also have a great quote from McIlroy on the day pipes were first introduced:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Open Systems! Our Systems! How well those who were there remember the pipe-festooned garret where Unix took form. The excitement of creation drew people to work there amidst the whine of the computer's cool- ing fans, even though almost the same computer ac- cess, could be had from one's office or from home. Those raw quarters saw a procession of memorable events. The advent of software pipes precipitated a day-long orgy of one-liners....As people reveled in the power of functional composition in the large, which is even today unavailable to users of other systems.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The paper goes on to talk about the invention of other important tools, such as “grep”, “diff” and more. Well worth your time if you want a glimpse into the history of UNIX
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.feld.me/posts/2016/09/speeding-up-mysql-import-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;Speeding up MySQL Import on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Mark Felder writes a blog post explaining how to speed up MySQL bulk data imports&lt;/li&gt;
&lt;li&gt;“I was recently tasked with rebuilding a readonly slave database server which only slaves a couple of the available databases. The backup/dump is straightforward and fast, but the restore was being excruciatingly slow. I didn't want to wait a week for this thing to finish, so I had to compile a list of optimizations that would speed up the process. This is the best way to do it on FreeBSD, assuming you're working with InnoDB. Additional optimizations may be required if you're using a different database engine.”&lt;/li&gt;
&lt;li&gt;“Please note this is assuming no other databases are running on this MySQL instance. Some of these are rather dangerous and you wouldn't want to put other live data at risk.”&lt;/li&gt;
&lt;li&gt;Most of the changes are meant to be temporary, used on a new server to import a dump of the database, then the settings are to be turned off.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Specifically:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;sync_binlog = 0&lt;/li&gt;
&lt;li&gt;innodb_flush_log_at_trx_commit = 0&lt;/li&gt;
&lt;li&gt;innodb-doublewrite = 0&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;He also prepends the following but of SQL before importing the data:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;set sql_log_bin=0; set autocommit=0; set unique_checks=0; set foreign_key_checks=0;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;You can also help yourself if your MySQL database lives on ZFS&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;zfs set recordsize=16k pool/var/db/mysql&lt;/li&gt;
&lt;li&gt;zfs set redundant_metadata=most pool/var/db/mysql&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Remember, this tuning is ONLY for the initial import, leaving these settings on long term risks losing 5-10 seconds of your data if the server reboots unexpectedly&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;zfs set sync=disabled pool/var/db/mysql&lt;/li&gt;
&lt;li&gt;zfs set logbias=throughput pool/var/db/mysql
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://cwharton.com/blog/2016/10/postgresql-and-freebsd-quick-start/" target="_blank" rel="nofollow noopener"&gt;PostgreSQL and FreeBSD Quick Start&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There’s lots of databases to choose from, but Postgres always has a special place on FreeBSD. Today we have a look at a ‘getting started’ guide for those taking the plunge and using it for the first time.&lt;/li&gt;
&lt;li&gt;Naturally getting started will look familiar to many, a couple simple “pkg” and “sysrc” commands later, and you’ll be set.&lt;/li&gt;
&lt;li&gt;After starting the service (With the “service” command) you’ll be ready to start setting up your postgres instance.&lt;/li&gt;
&lt;li&gt;Next up you’ll need to create your initial user/password combo, and a database with access granted to this particular user.&lt;/li&gt;
&lt;li&gt;If you plan to enable remote access to this DB server, you’ll need to make some adjustments to one of the .conf files, allowing other IP’s to connect. (If you are hosting something on the same system, this may not be needed)&lt;/li&gt;
&lt;li&gt;Now yous should be good to go! Enjoy using your brand new Postgres database. If this is your first rodeo, maybe start with something easy, like Apache or Nginx + Wordpress to try it out.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=KE_7E1pXy5c" target="_blank" rel="nofollow noopener"&gt;OpenBSD vmm hypervisor test drive&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As we asked for a week or two ago, someone has taken OpenBSD’s vmm for a test drive, and made a video of it&lt;/li&gt;
&lt;li&gt;The command line interface for vmm, vmctl, looks quite easy to use. It takes an approach much closer to some of the bhyve management frameworks, rather than bhyve’s rather confusing set of switches&lt;/li&gt;
&lt;li&gt;It also has a config file, the format of which looks very similar to what I designed for bhyveucl, and my first effort to integrate a config file into bhyve itself.&lt;/li&gt;
&lt;li&gt;The video also looks at accessing the console, configuring the networking, and doing an OpenBSD install in a fresh VM&lt;/li&gt;
&lt;li&gt;Currently vmm only supports running OpenBSD VMs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/wp-content/uploads/2016/10/FreeBSD-Foundation-October-2016-Update.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation October 2016 Update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Wow, November is already upon us with the Holidays just around the corner. Before things get lost in the noise we wanted to highlight this update from the FreeBSD foundation.&lt;/li&gt;
&lt;li&gt;Before getting into the stories, they helpfully provide a list of upcoming conferences for this fall/winter, which includes a couple of USENIX gatherings, and the Developer Summit / MeetBSD next week.
+The foundation gives us a quick hardware update initially, discussing some of the new ThunderX Cavium servers which are deployed (ARMv8 64Bit) and yes I’m drooling a bit. They also mention that work is ongoing for the RPi3 platform and PINE64.&lt;/li&gt;
&lt;li&gt;GNN also has an article reprinted from the FreeBSD journal, talking about the achievement of making it to 11.0 over the span of 23 years now. Of course he mentions that the foundation is open to all, and welcomes donations to continue to keep up this tradition of good work being done.&lt;/li&gt;
&lt;li&gt;Deb Goodkin gives us an update on the “Grace Hopper” convention that took place in Houston TX several weeks back. Roughly 14k women in Tech attended, which is a great turnout, and FreeBSD was well represented there.&lt;/li&gt;
&lt;li&gt;Next we have a call to potential speakers, don’t forget that there are plenty of places you can help present about FreeBSD, not just at *BSD centered conferences, but the SCALES of the world as well.&lt;/li&gt;
&lt;li&gt;We wrap up with a look at EuroBSDCon 2016, quite a nice writeup, again brought to us by Deb at the foundation, and includes a list of some of those recognized for their contributions to FreeBSD.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/adhokku/adhokku" target="_blank" rel="nofollow noopener"&gt;Adhokku – a toy PaaS powered by FreeBSD jails and Ansible&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Described as a toy Platform-as-a-Service, Adhokku is an ansible based automated jail creation framework&lt;/li&gt;
&lt;li&gt;Based on the concept of Dokku, a single-host open source PaaS for Linux powered by Docker&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; When you deploy an application using Adhokku, Adhokku creates a new jail on the remote host and provisions it from a fixed clean state using the instructions in the Jailfile in your Git repository. All jails sit behind a reverse proxy that directs traffic to one of them based on the domain name or the IP address in the HTTP request. When a new jail has been provisioned for an application, Adhokku seamlessly reconfigures the reverse proxy to send traffic to it instead of the one currently active for that application.&lt;/p&gt;

&lt;p&gt;&amp;gt; The following instructions show how to get Adhokku and an example application running in a VM on your development machine using Vagrant. This process should require no FreeBSD-specific knowledge, through modifying the Jailfile to customize the application may.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This seems like an interesting project, and it is good to see people developing workflows so users familiar with docker etc, can easily use BSD instead
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sohcahtoa.org.uk/openbsd.html" target="_blank" rel="nofollow noopener"&gt;Installing OpenBSD 6.0 on your laptop is really hard (not)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD on a laptop? Difficult? Not hardly.&lt;/li&gt;
&lt;li&gt;We have a great walkthrough by Keith Burnett, which demonstrates just how easy it can be to get up and running with an XFCE desktop from a fresh OpenBSD installation.&lt;/li&gt;
&lt;li&gt;For those curious,this was all done with a Thinkpad X60 and 120GB SSD and OpenBSD 6.0.&lt;/li&gt;
&lt;li&gt;He doesn’t really cover the install process itself, that is well covered by the link to the OpenBSD FAQ pages.&lt;/li&gt;
&lt;li&gt;Once the system is up and running though, we start with the most important portion, getting working internet access (Via wifi)&lt;/li&gt;
&lt;li&gt;Really just a few ‘ifconfig’ commands later and we are in business.&lt;/li&gt;
&lt;li&gt;Step 2 was getting the package configuration going. (I’ve never understood why this is still a thing, but no fret, its easy enough to do)&lt;/li&gt;
&lt;li&gt;With package repos available, now you can grab the binaries for XFCE and friends with just a few simple “pkg_add” commands&lt;/li&gt;
&lt;li&gt;Steps 4-6 are some specific bits to enable XFCE services, and some handy things such as setting doas permissions to get USB mounting working (For graphical mount/unmount)&lt;/li&gt;
&lt;li&gt;Lastly, keeping the system updated is important, so we have a nice tutorial on how to do that as well, using a handy “openup” script, which takes some of the guesswork out of it.&lt;/li&gt;
&lt;li&gt;Bonus! Steps for doing FDE as also included, which isn’t for everyone, but you may want it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/gvnn3/status/791475373380804608" target="_blank" rel="nofollow noopener"&gt;Pi-top with RPi-3 and FreeBSD HEAD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/netbsd_7_0_1_released1" target="_blank" rel="nofollow noopener"&gt;NetBSD 7.0.2 released&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624851.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD - git: kernel - Fix mmcsd read/write issues&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/rafael-santiago/dev-enigma" target="_blank" rel="nofollow noopener"&gt;A char device which implements an Enigma machine (FreeBSD &amp;amp; Linux)&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ayzvCuaq" target="_blank" rel="nofollow noopener"&gt; Matt - System Monitoring&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/r5axPSE7" target="_blank" rel="nofollow noopener"&gt; Tony - LLVM License&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/MNxCvUtX" target="_blank" rel="nofollow noopener"&gt; Ben - Thanks&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/RswFASqW" target="_blank" rel="nofollow noopener"&gt; David - Write Cache &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/e317a32f" target="_blank" rel="nofollow noopener"&gt; Charles - Fonts&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we’re loaded up with great stories ranging from System call fuzzing, a history of UNIX Pipes, speeding up MySQL imports and more. Stay tuned, BSDNow is coming your way right now.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://github.com/nccgroup/TriforceOpenBSDFuzzer" rel="nofollow">System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)</a></h3>

<ul>
<li>The NCCGroup did a series of fuzz testing against the OpenBSD syscall interface, during which they found a number of vulnerabilities, we covered this back in the early summer</li>
<li>What we didn’t notice, is that they also made the tools they used available.</li>
<li>A combination of AFL (American Fuzzy Lop), QEMU, OpenBSD’s FlashRD image generation tool, and the “Triforce” driver</li>
<li>The other requirement is “a Linux box as host to run the fuzzer (other fuzzer hosts may work as well, we&#39;ve only run TriforceAFL from a Linux host, specifically Debian/Ubuntu”</li>
<li>It would be interesting to see if someone could get this to run from a BSD host</li>
<li>It would also be interesting to run the same tests against the other BSDs
***</li>
</ul>

<h3><a href="http://people.fas.harvard.edu/%7Elib113/reference/unix/unix2.html" rel="nofollow">On the Early History and Impact of Unix: the Introduction of Pipes</a></h3>

<ul>
<li>Pipes are something we just take for granted today, but there was a time before pipes (How did anything get done?)</li>
<li>Ronda Hauben writes up a great look back at the beginning of UNIX, and specifically at how pipes were born:</li>
</ul>

<blockquote>
<p>One of the important developments in Unix was the introduction of pipes. Pipes had been suggested by McIlroy during the early days of creating Unix. Ritchie explains how &quot;the idea, explained one afternoon on a blackboard, intrigued us but failed to ignite any immediate action. There were several objections to the idea as put....What a failure of imagination,&quot; he admits.(35) McIlroy concurs, describing how the initial effort to add pipes to Unix occurred about the same time in 1969 that Ritchie, Thompson and Canaday were outlining ideas for a file system. &quot;That was when,&quot; he writes, &quot;the simple pipeline as a way to combine programs, with data notationally propagating along a chain of (not necessarily concurrent) filters was articulated.&quot;(36) However, pipes weren&#39;t implemented in Unix until 1972. </p>
</blockquote>

<ul>
<li>We also have a great quote from McIlroy on the day pipes were first introduced:</li>
</ul>

<blockquote>
<p>Open Systems! Our Systems! How well those who were there remember the pipe-festooned garret where Unix took form. The excitement of creation drew people to work there amidst the whine of the computer&#39;s cool- ing fans, even though almost the same computer ac- cess, could be had from one&#39;s office or from home. Those raw quarters saw a procession of memorable events. The advent of software pipes precipitated a day-long orgy of one-liners....As people reveled in the power of functional composition in the large, which is even today unavailable to users of other systems.</p>
</blockquote>

<ul>
<li>The paper goes on to talk about the invention of other important tools, such as “grep”, “diff” and more. Well worth your time if you want a glimpse into the history of UNIX
***</li>
</ul>

<h3><a href="https://blog.feld.me/posts/2016/09/speeding-up-mysql-import-on-freebsd/" rel="nofollow">Speeding up MySQL Import on FreeBSD</a></h3>

<ul>
<li>Mark Felder writes a blog post explaining how to speed up MySQL bulk data imports</li>
<li>“I was recently tasked with rebuilding a readonly slave database server which only slaves a couple of the available databases. The backup/dump is straightforward and fast, but the restore was being excruciatingly slow. I didn&#39;t want to wait a week for this thing to finish, so I had to compile a list of optimizations that would speed up the process. This is the best way to do it on FreeBSD, assuming you&#39;re working with InnoDB. Additional optimizations may be required if you&#39;re using a different database engine.”</li>
<li>“Please note this is assuming no other databases are running on this MySQL instance. Some of these are rather dangerous and you wouldn&#39;t want to put other live data at risk.”</li>
<li>Most of the changes are meant to be temporary, used on a new server to import a dump of the database, then the settings are to be turned off.</li>
<li><p>Specifically:</p>

<ul>
<li>sync_binlog = 0</li>
<li>innodb_flush_log_at_trx_commit = 0</li>
<li>innodb-doublewrite = 0</li>
</ul></li>
<li><p>He also prepends the following but of SQL before importing the data:</p>

<ul>
<li>set sql_log_bin=0; set autocommit=0; set unique_checks=0; set foreign_key_checks=0;</li>
</ul></li>
<li><p>You can also help yourself if your MySQL database lives on ZFS</p>

<ul>
<li>zfs set recordsize=16k pool/var/db/mysql</li>
<li>zfs set redundant_metadata=most pool/var/db/mysql</li>
</ul></li>
<li><p>Remember, this tuning is ONLY for the initial import, leaving these settings on long term risks losing 5-10 seconds of your data if the server reboots unexpectedly</p>

<ul>
<li>zfs set sync=disabled pool/var/db/mysql</li>
<li>zfs set logbias=throughput pool/var/db/mysql
***</li>
</ul></li>
</ul>

<h3><a href="https://cwharton.com/blog/2016/10/postgresql-and-freebsd-quick-start/" rel="nofollow">PostgreSQL and FreeBSD Quick Start</a></h3>

<ul>
<li>There’s lots of databases to choose from, but Postgres always has a special place on FreeBSD. Today we have a look at a ‘getting started’ guide for those taking the plunge and using it for the first time.</li>
<li>Naturally getting started will look familiar to many, a couple simple “pkg” and “sysrc” commands later, and you’ll be set.</li>
<li>After starting the service (With the “service” command) you’ll be ready to start setting up your postgres instance.</li>
<li>Next up you’ll need to create your initial user/password combo, and a database with access granted to this particular user.</li>
<li>If you plan to enable remote access to this DB server, you’ll need to make some adjustments to one of the .conf files, allowing other IP’s to connect. (If you are hosting something on the same system, this may not be needed)</li>
<li>Now yous should be good to go! Enjoy using your brand new Postgres database. If this is your first rodeo, maybe start with something easy, like Apache or Nginx + Wordpress to try it out.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=KE_7E1pXy5c" rel="nofollow">OpenBSD vmm hypervisor test drive</a></h3>

<ul>
<li>As we asked for a week or two ago, someone has taken OpenBSD’s vmm for a test drive, and made a video of it</li>
<li>The command line interface for vmm, vmctl, looks quite easy to use. It takes an approach much closer to some of the bhyve management frameworks, rather than bhyve’s rather confusing set of switches</li>
<li>It also has a config file, the format of which looks very similar to what I designed for bhyveucl, and my first effort to integrate a config file into bhyve itself.</li>
<li>The video also looks at accessing the console, configuring the networking, and doing an OpenBSD install in a fresh VM</li>
<li>Currently vmm only supports running OpenBSD VMs
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/wp-content/uploads/2016/10/FreeBSD-Foundation-October-2016-Update.pdf" rel="nofollow">FreeBSD Foundation October 2016 Update</a></h3>

<ul>
<li>Wow, November is already upon us with the Holidays just around the corner. Before things get lost in the noise we wanted to highlight this update from the FreeBSD foundation.</li>
<li>Before getting into the stories, they helpfully provide a list of upcoming conferences for this fall/winter, which includes a couple of USENIX gatherings, and the Developer Summit / MeetBSD next week.
+The foundation gives us a quick hardware update initially, discussing some of the new ThunderX Cavium servers which are deployed (ARMv8 64Bit) and yes I’m drooling a bit. They also mention that work is ongoing for the RPi3 platform and PINE64.</li>
<li>GNN also has an article reprinted from the FreeBSD journal, talking about the achievement of making it to 11.0 over the span of 23 years now. Of course he mentions that the foundation is open to all, and welcomes donations to continue to keep up this tradition of good work being done.</li>
<li>Deb Goodkin gives us an update on the “Grace Hopper” convention that took place in Houston TX several weeks back. Roughly 14k women in Tech attended, which is a great turnout, and FreeBSD was well represented there.</li>
<li>Next we have a call to potential speakers, don’t forget that there are plenty of places you can help present about FreeBSD, not just at *BSD centered conferences, but the SCALES of the world as well.</li>
<li>We wrap up with a look at EuroBSDCon 2016, quite a nice writeup, again brought to us by Deb at the foundation, and includes a list of some of those recognized for their contributions to FreeBSD.
***</li>
</ul>

<h3><a href="https://github.com/adhokku/adhokku" rel="nofollow">Adhokku – a toy PaaS powered by FreeBSD jails and Ansible</a></h3>

<ul>
<li>Described as a toy Platform-as-a-Service, Adhokku is an ansible based automated jail creation framework</li>
<li>Based on the concept of Dokku, a single-host open source PaaS for Linux powered by Docker</li>
</ul>

<blockquote>
<p>When you deploy an application using Adhokku, Adhokku creates a new jail on the remote host and provisions it from a fixed clean state using the instructions in the Jailfile in your Git repository. All jails sit behind a reverse proxy that directs traffic to one of them based on the domain name or the IP address in the HTTP request. When a new jail has been provisioned for an application, Adhokku seamlessly reconfigures the reverse proxy to send traffic to it instead of the one currently active for that application.</p>

<p>The following instructions show how to get Adhokku and an example application running in a VM on your development machine using Vagrant. This process should require no FreeBSD-specific knowledge, through modifying the Jailfile to customize the application may.</p>
</blockquote>

<ul>
<li>This seems like an interesting project, and it is good to see people developing workflows so users familiar with docker etc, can easily use BSD instead
***</li>
</ul>

<h3><a href="http://sohcahtoa.org.uk/openbsd.html" rel="nofollow">Installing OpenBSD 6.0 on your laptop is really hard (not)</a></h3>

<ul>
<li>OpenBSD on a laptop? Difficult? Not hardly.</li>
<li>We have a great walkthrough by Keith Burnett, which demonstrates just how easy it can be to get up and running with an XFCE desktop from a fresh OpenBSD installation.</li>
<li>For those curious,this was all done with a Thinkpad X60 and 120GB SSD and OpenBSD 6.0.</li>
<li>He doesn’t really cover the install process itself, that is well covered by the link to the OpenBSD FAQ pages.</li>
<li>Once the system is up and running though, we start with the most important portion, getting working internet access (Via wifi)</li>
<li>Really just a few ‘ifconfig’ commands later and we are in business.</li>
<li>Step 2 was getting the package configuration going. (I’ve never understood why this is still a thing, but no fret, its easy enough to do)</li>
<li>With package repos available, now you can grab the binaries for XFCE and friends with just a few simple “pkg_add” commands</li>
<li>Steps 4-6 are some specific bits to enable XFCE services, and some handy things such as setting doas permissions to get USB mounting working (For graphical mount/unmount)</li>
<li>Lastly, keeping the system updated is important, so we have a nice tutorial on how to do that as well, using a handy “openup” script, which takes some of the guesswork out of it.</li>
<li>Bonus! Steps for doing FDE as also included, which isn’t for everyone, but you may want it
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/gvnn3/status/791475373380804608" rel="nofollow">Pi-top with RPi-3 and FreeBSD HEAD</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/netbsd_7_0_1_released1" rel="nofollow">NetBSD 7.0.2 released</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624851.html" rel="nofollow">DragonflyBSD - git: kernel - Fix mmcsd read/write issues</a></li>
<li><a href="https://github.com/rafael-santiago/dev-enigma" rel="nofollow">A char device which implements an Enigma machine (FreeBSD &amp; Linux)</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ayzvCuaq" rel="nofollow"> Matt - System Monitoring</a> </li>
<li><a href="http://pastebin.com/r5axPSE7" rel="nofollow"> Tony - LLVM License</a> </li>
<li><a href="http://pastebin.com/MNxCvUtX" rel="nofollow"> Ben - Thanks</a> </li>
<li><a href="http://pastebin.com/RswFASqW" rel="nofollow"> David - Write Cache </a> </li>
<li><a href="http://pastebin.com/e317a32f" rel="nofollow"> Charles - Fonts</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we’re loaded up with great stories ranging from System call fuzzing, a history of UNIX Pipes, speeding up MySQL imports and more. Stay tuned, BSDNow is coming your way right now.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://github.com/nccgroup/TriforceOpenBSDFuzzer" rel="nofollow">System call fuzzing of OpenBSD amd64 using TriforceAFL (i.e. AFL and QEMU)</a></h3>

<ul>
<li>The NCCGroup did a series of fuzz testing against the OpenBSD syscall interface, during which they found a number of vulnerabilities, we covered this back in the early summer</li>
<li>What we didn’t notice, is that they also made the tools they used available.</li>
<li>A combination of AFL (American Fuzzy Lop), QEMU, OpenBSD’s FlashRD image generation tool, and the “Triforce” driver</li>
<li>The other requirement is “a Linux box as host to run the fuzzer (other fuzzer hosts may work as well, we&#39;ve only run TriforceAFL from a Linux host, specifically Debian/Ubuntu”</li>
<li>It would be interesting to see if someone could get this to run from a BSD host</li>
<li>It would also be interesting to run the same tests against the other BSDs
***</li>
</ul>

<h3><a href="http://people.fas.harvard.edu/%7Elib113/reference/unix/unix2.html" rel="nofollow">On the Early History and Impact of Unix: the Introduction of Pipes</a></h3>

<ul>
<li>Pipes are something we just take for granted today, but there was a time before pipes (How did anything get done?)</li>
<li>Ronda Hauben writes up a great look back at the beginning of UNIX, and specifically at how pipes were born:</li>
</ul>

<blockquote>
<p>One of the important developments in Unix was the introduction of pipes. Pipes had been suggested by McIlroy during the early days of creating Unix. Ritchie explains how &quot;the idea, explained one afternoon on a blackboard, intrigued us but failed to ignite any immediate action. There were several objections to the idea as put....What a failure of imagination,&quot; he admits.(35) McIlroy concurs, describing how the initial effort to add pipes to Unix occurred about the same time in 1969 that Ritchie, Thompson and Canaday were outlining ideas for a file system. &quot;That was when,&quot; he writes, &quot;the simple pipeline as a way to combine programs, with data notationally propagating along a chain of (not necessarily concurrent) filters was articulated.&quot;(36) However, pipes weren&#39;t implemented in Unix until 1972. </p>
</blockquote>

<ul>
<li>We also have a great quote from McIlroy on the day pipes were first introduced:</li>
</ul>

<blockquote>
<p>Open Systems! Our Systems! How well those who were there remember the pipe-festooned garret where Unix took form. The excitement of creation drew people to work there amidst the whine of the computer&#39;s cool- ing fans, even though almost the same computer ac- cess, could be had from one&#39;s office or from home. Those raw quarters saw a procession of memorable events. The advent of software pipes precipitated a day-long orgy of one-liners....As people reveled in the power of functional composition in the large, which is even today unavailable to users of other systems.</p>
</blockquote>

<ul>
<li>The paper goes on to talk about the invention of other important tools, such as “grep”, “diff” and more. Well worth your time if you want a glimpse into the history of UNIX
***</li>
</ul>

<h3><a href="https://blog.feld.me/posts/2016/09/speeding-up-mysql-import-on-freebsd/" rel="nofollow">Speeding up MySQL Import on FreeBSD</a></h3>

<ul>
<li>Mark Felder writes a blog post explaining how to speed up MySQL bulk data imports</li>
<li>“I was recently tasked with rebuilding a readonly slave database server which only slaves a couple of the available databases. The backup/dump is straightforward and fast, but the restore was being excruciatingly slow. I didn&#39;t want to wait a week for this thing to finish, so I had to compile a list of optimizations that would speed up the process. This is the best way to do it on FreeBSD, assuming you&#39;re working with InnoDB. Additional optimizations may be required if you&#39;re using a different database engine.”</li>
<li>“Please note this is assuming no other databases are running on this MySQL instance. Some of these are rather dangerous and you wouldn&#39;t want to put other live data at risk.”</li>
<li>Most of the changes are meant to be temporary, used on a new server to import a dump of the database, then the settings are to be turned off.</li>
<li><p>Specifically:</p>

<ul>
<li>sync_binlog = 0</li>
<li>innodb_flush_log_at_trx_commit = 0</li>
<li>innodb-doublewrite = 0</li>
</ul></li>
<li><p>He also prepends the following but of SQL before importing the data:</p>

<ul>
<li>set sql_log_bin=0; set autocommit=0; set unique_checks=0; set foreign_key_checks=0;</li>
</ul></li>
<li><p>You can also help yourself if your MySQL database lives on ZFS</p>

<ul>
<li>zfs set recordsize=16k pool/var/db/mysql</li>
<li>zfs set redundant_metadata=most pool/var/db/mysql</li>
</ul></li>
<li><p>Remember, this tuning is ONLY for the initial import, leaving these settings on long term risks losing 5-10 seconds of your data if the server reboots unexpectedly</p>

<ul>
<li>zfs set sync=disabled pool/var/db/mysql</li>
<li>zfs set logbias=throughput pool/var/db/mysql
***</li>
</ul></li>
</ul>

<h3><a href="https://cwharton.com/blog/2016/10/postgresql-and-freebsd-quick-start/" rel="nofollow">PostgreSQL and FreeBSD Quick Start</a></h3>

<ul>
<li>There’s lots of databases to choose from, but Postgres always has a special place on FreeBSD. Today we have a look at a ‘getting started’ guide for those taking the plunge and using it for the first time.</li>
<li>Naturally getting started will look familiar to many, a couple simple “pkg” and “sysrc” commands later, and you’ll be set.</li>
<li>After starting the service (With the “service” command) you’ll be ready to start setting up your postgres instance.</li>
<li>Next up you’ll need to create your initial user/password combo, and a database with access granted to this particular user.</li>
<li>If you plan to enable remote access to this DB server, you’ll need to make some adjustments to one of the .conf files, allowing other IP’s to connect. (If you are hosting something on the same system, this may not be needed)</li>
<li>Now yous should be good to go! Enjoy using your brand new Postgres database. If this is your first rodeo, maybe start with something easy, like Apache or Nginx + Wordpress to try it out.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=KE_7E1pXy5c" rel="nofollow">OpenBSD vmm hypervisor test drive</a></h3>

<ul>
<li>As we asked for a week or two ago, someone has taken OpenBSD’s vmm for a test drive, and made a video of it</li>
<li>The command line interface for vmm, vmctl, looks quite easy to use. It takes an approach much closer to some of the bhyve management frameworks, rather than bhyve’s rather confusing set of switches</li>
<li>It also has a config file, the format of which looks very similar to what I designed for bhyveucl, and my first effort to integrate a config file into bhyve itself.</li>
<li>The video also looks at accessing the console, configuring the networking, and doing an OpenBSD install in a fresh VM</li>
<li>Currently vmm only supports running OpenBSD VMs
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/wp-content/uploads/2016/10/FreeBSD-Foundation-October-2016-Update.pdf" rel="nofollow">FreeBSD Foundation October 2016 Update</a></h3>

<ul>
<li>Wow, November is already upon us with the Holidays just around the corner. Before things get lost in the noise we wanted to highlight this update from the FreeBSD foundation.</li>
<li>Before getting into the stories, they helpfully provide a list of upcoming conferences for this fall/winter, which includes a couple of USENIX gatherings, and the Developer Summit / MeetBSD next week.
+The foundation gives us a quick hardware update initially, discussing some of the new ThunderX Cavium servers which are deployed (ARMv8 64Bit) and yes I’m drooling a bit. They also mention that work is ongoing for the RPi3 platform and PINE64.</li>
<li>GNN also has an article reprinted from the FreeBSD journal, talking about the achievement of making it to 11.0 over the span of 23 years now. Of course he mentions that the foundation is open to all, and welcomes donations to continue to keep up this tradition of good work being done.</li>
<li>Deb Goodkin gives us an update on the “Grace Hopper” convention that took place in Houston TX several weeks back. Roughly 14k women in Tech attended, which is a great turnout, and FreeBSD was well represented there.</li>
<li>Next we have a call to potential speakers, don’t forget that there are plenty of places you can help present about FreeBSD, not just at *BSD centered conferences, but the SCALES of the world as well.</li>
<li>We wrap up with a look at EuroBSDCon 2016, quite a nice writeup, again brought to us by Deb at the foundation, and includes a list of some of those recognized for their contributions to FreeBSD.
***</li>
</ul>

<h3><a href="https://github.com/adhokku/adhokku" rel="nofollow">Adhokku – a toy PaaS powered by FreeBSD jails and Ansible</a></h3>

<ul>
<li>Described as a toy Platform-as-a-Service, Adhokku is an ansible based automated jail creation framework</li>
<li>Based on the concept of Dokku, a single-host open source PaaS for Linux powered by Docker</li>
</ul>

<blockquote>
<p>When you deploy an application using Adhokku, Adhokku creates a new jail on the remote host and provisions it from a fixed clean state using the instructions in the Jailfile in your Git repository. All jails sit behind a reverse proxy that directs traffic to one of them based on the domain name or the IP address in the HTTP request. When a new jail has been provisioned for an application, Adhokku seamlessly reconfigures the reverse proxy to send traffic to it instead of the one currently active for that application.</p>

<p>The following instructions show how to get Adhokku and an example application running in a VM on your development machine using Vagrant. This process should require no FreeBSD-specific knowledge, through modifying the Jailfile to customize the application may.</p>
</blockquote>

<ul>
<li>This seems like an interesting project, and it is good to see people developing workflows so users familiar with docker etc, can easily use BSD instead
***</li>
</ul>

<h3><a href="http://sohcahtoa.org.uk/openbsd.html" rel="nofollow">Installing OpenBSD 6.0 on your laptop is really hard (not)</a></h3>

<ul>
<li>OpenBSD on a laptop? Difficult? Not hardly.</li>
<li>We have a great walkthrough by Keith Burnett, which demonstrates just how easy it can be to get up and running with an XFCE desktop from a fresh OpenBSD installation.</li>
<li>For those curious,this was all done with a Thinkpad X60 and 120GB SSD and OpenBSD 6.0.</li>
<li>He doesn’t really cover the install process itself, that is well covered by the link to the OpenBSD FAQ pages.</li>
<li>Once the system is up and running though, we start with the most important portion, getting working internet access (Via wifi)</li>
<li>Really just a few ‘ifconfig’ commands later and we are in business.</li>
<li>Step 2 was getting the package configuration going. (I’ve never understood why this is still a thing, but no fret, its easy enough to do)</li>
<li>With package repos available, now you can grab the binaries for XFCE and friends with just a few simple “pkg_add” commands</li>
<li>Steps 4-6 are some specific bits to enable XFCE services, and some handy things such as setting doas permissions to get USB mounting working (For graphical mount/unmount)</li>
<li>Lastly, keeping the system updated is important, so we have a nice tutorial on how to do that as well, using a handy “openup” script, which takes some of the guesswork out of it.</li>
<li>Bonus! Steps for doing FDE as also included, which isn’t for everyone, but you may want it
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://twitter.com/gvnn3/status/791475373380804608" rel="nofollow">Pi-top with RPi-3 and FreeBSD HEAD</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/netbsd_7_0_1_released1" rel="nofollow">NetBSD 7.0.2 released</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624851.html" rel="nofollow">DragonflyBSD - git: kernel - Fix mmcsd read/write issues</a></li>
<li><a href="https://github.com/rafael-santiago/dev-enigma" rel="nofollow">A char device which implements an Enigma machine (FreeBSD &amp; Linux)</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ayzvCuaq" rel="nofollow"> Matt - System Monitoring</a> </li>
<li><a href="http://pastebin.com/r5axPSE7" rel="nofollow"> Tony - LLVM License</a> </li>
<li><a href="http://pastebin.com/MNxCvUtX" rel="nofollow"> Ben - Thanks</a> </li>
<li><a href="http://pastebin.com/RswFASqW" rel="nofollow"> David - Write Cache </a> </li>
<li><a href="http://pastebin.com/e317a32f" rel="nofollow"> Charles - Fonts</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>165: Vote4BSD</title>
  <link>https://www.bsdnow.tv/165</link>
  <guid isPermaLink="false">9091a6e8-1975-46fa-b095-2894d40db0bb</guid>
  <pubDate>Wed, 26 Oct 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9091a6e8-1975-46fa-b095-2894d40db0bb.mp3" length="52474324" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we’ve got voting news for you (No not *that* election), a closer look at</itunes:subtitle>
  <itunes:duration>1:12:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we’ve got voting news for you (No not &lt;em&gt;that&lt;/em&gt; election), a closer look at&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise &amp;lt;br&amp;gt;
Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the &amp;lt;br&amp;gt;
Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2016-October/016878.html" target="_blank" rel="nofollow noopener"&gt;ARIN 38 involvement, vote!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Isaac (.Ike) Levy, one of our interview guests from earlier this year, is running for a seat on the 15 person ARIN Advisory Council&lt;/li&gt;
&lt;li&gt;His goal is to represent the entire *BSD community at this important body that makes decisions about how IP addresses are allocated and managed&lt;/li&gt;
&lt;li&gt;Biographies and statements for all of the candidates are &lt;a href="https://www.arin.net/participate/elections/candidate_bios.pdf" target="_blank" rel="nofollow noopener"&gt;available here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The election ends Friday October 28th&lt;/li&gt;
&lt;li&gt;If elected, Ike will be looking for input from the community
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2016/10/19/18794.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL not just available but default (DragonFlyBSD)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly has become the latest BSD to join the growing LibreSSL family. As mentioned a few weeks back, they were in the process of wiring it up as a replacement for OpenSSL.&lt;/li&gt;
&lt;li&gt;With this latest commit, you can now build the entire base and OpenSSL isn’t built at all.&lt;/li&gt;
&lt;li&gt;Congrats, and hopefully more BSDs (and Linux) jump on the bandwagon &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624734.html" target="_blank" rel="nofollow noopener"&gt;Compat_43 is gone&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;RiP 4.3 Compat support.. Well for DragonFly anyway.&lt;/li&gt;
&lt;li&gt;This commit finally puts out to pasture the 4.3 support, which has been disabled by default in DragonFly for almost 5 years now. &lt;/li&gt;
&lt;li&gt;This is a nice cleanup of their tree, removing more than a thousand lines of code and some of the old cruft still lingering from 4.3.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://meltmes.kiloreux.me/create-your-first-freebsd-kernel-module/" target="_blank" rel="nofollow noopener"&gt;Create your first FreeBSD kernel module&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is an interesting tutorial from Abdelhadi Khiati, who is currently a master's student in AI and robotics&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I have been lucky enough to participate in Google Summer of Code with the FreeBSD foundation. I was amazed by the community surrounding it which was noob friendly and very helpful (Thank you FreeBSD &amp;lt;3)&lt;/p&gt;

&lt;p&gt;&amp;gt; I wanted to make a starting tutorial for people to write a simple module for kernel before diving inside more complicated kernel shizzle&lt;/p&gt;

&lt;p&gt;&amp;gt; The kernel module that we will be working on is a simple event handler for the kernel. It will be composed of 2 parts, the event handling function, and the module declaration&lt;/p&gt;

&lt;p&gt;&amp;gt; The module event handler is a function that handles different events for the module. Like the module being loaded, unloaded or on system shutdown&lt;/p&gt;

&lt;p&gt;&amp;gt; Now that we have the events handling function ready. We need to declare the moduledata_t to be able to use it inside DECLARE_MODULE macro and load it into the kernel. It has the module name and a pointer to the event handling function&lt;/p&gt;

&lt;p&gt;&amp;gt; Lastly, we need to declare the module using the DECLARE_MODULE macro. Which has the following structure:&lt;/p&gt;

&lt;p&gt;~~&lt;br&gt;
DECLARE_MODULE(name, moduledata_t data, sub, order);&lt;br&gt;
~~&lt;/p&gt;

&lt;p&gt;&amp;gt; name: The module name that will be used in the SYSINIT() call to identify the module.&lt;br&gt;
&amp;gt; data: The moduledata_t structure that we already presented.&lt;br&gt;
&amp;gt; sub : Since we are using a driver here so the value will be SI_SUB_DRIVERS this argument specify the type of system startup interface.&lt;br&gt;
&amp;gt; order : Represents the order of initialization within the subsystem, we will us the SI_ORDER_MIDDLE value here.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;To compile the previous file you need to use a Makefile as following:&lt;br&gt;
~~&lt;br&gt;
KMOD=hello&lt;br&gt;
SRCS=module.c&lt;br&gt;
.include&lt;br&gt;
~~&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;We look forward to a future post where more functionality is added to the kernel module&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pr1ntf.xyz/windows10.html" target="_blank" rel="nofollow noopener"&gt;Installing Windows 10 Under the bhyve Hypervisor.&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for your Bhyve fix? If so, then Trent (Of iohyve fame) has a nice blog post today with a detailed look at how to get Windows 10 up and running in bhyve.&lt;/li&gt;
&lt;li&gt;First up, Trent gives us a nice look back at how far we’ve come in only a single year. Just a year ago, initial support for UEFI was landing, there was no VNC option, leaving us to only serial console goodness. Fast-forward to today and Windows 10 + Bhyve + Vnc is a go.&lt;/li&gt;
&lt;li&gt;He immediately jumps us into the good stuff, talking about what you’ll need to follow along. His tutorial was written on 12-CURRENT, but running 11.0-RELEASE should work as well.&lt;/li&gt;
&lt;li&gt;Of course, he does mention that before starting on this quest, make sure to read the bhyve handbook, specifically check that your CPU is supported. If you are running something without the correct Vt extensions, then your journey will end prematurely in sadness.&lt;/li&gt;
&lt;li&gt;Next up is some of the prep work needed to get your box ready to run VM’s. Loading the kernel module, creating “tap” devices for networking and such are detailed.&lt;/li&gt;
&lt;li&gt;If you are lazy (like me) then you’ll want to copy-n-paste his handy scripts which automate this process for you.&lt;/li&gt;
&lt;li&gt;With the system prepped, we get to the good stuff. You’ll need to install the bhyve-firmware package (which enables UEFI booting) and get your handy Windows 10 ISO.&lt;/li&gt;
&lt;li&gt;From here Trent has helpfully again provided us with handy scripts to both do the bhyve startup, as well as enabling VNC support over a SSH tunnel.&lt;/li&gt;
&lt;li&gt;At this point you are good to go, fire up your VNC client and you should be greeted with the typical Windows “Press any key to boot from CD” message. No, he doesn’t provide instructions on how to install / Use / Like Windows, but we’ll leave that up to you.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lumina-desktop.org/version-1-1-0-released/" target="_blank" rel="nofollow noopener"&gt;Lumina version 1.1.0 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new version of Lumina has just landed! 1.1.0 brings with it some important fixes, as well as new utilities that make your desktop computing easier than ever.&lt;/li&gt;
&lt;li&gt;First up, all i18n files have been re-worked, instead of needing to install another package, they are included with the build when WITH_I18N is set.&lt;/li&gt;
&lt;li&gt;A handy new “start-lumina-desktop” command has been added, which makes it easy to get lumina running from your Login Manager or even manually in .xinitrc or the like.&lt;/li&gt;
&lt;li&gt;A bunch of internals related to how it tracks installed Applications and start-menu entries has been re-worked, fixing some memory issues and speeding things up.&lt;/li&gt;
&lt;li&gt;The default “Insight” file-manager has been given an overhaul, which includes some new features like “git” support.&lt;/li&gt;
&lt;li&gt;A new Qt5 “lumina-calculator” has also joined the family, which means not needing to use kcalc or xcalc on TrueOS anymore.&lt;/li&gt;
&lt;li&gt;A nice “TrueOS” specific option has also landed. Specifically now when System Updates are waiting to install at shutdown, Lumina will detect and prompt if you want to install or skip the update. Handy when on the road, or if you don’t have the time to wait for an update to complete.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bad.network/openbgpd-large-communities.html" target="_blank" rel="nofollow noopener"&gt;OpenBGPD Large Communities support in –current&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A blog post from OpenBSD’s Peter Hessler:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; On Friday, I committed support for Large Communities to OpenBGPD. This is a draft-RFC that I am pretty excited about.&lt;/p&gt;

&lt;p&gt;&amp;gt; Back in the early days of The Internet, when routers rode dinosaurs to work and nerds weren't cool, we wanted to signal to our network neighbours certain information about routes. To be fair, we still do. But, back then everyone had 16 bit ASNs, so there was a simple concept called 'communities'. This was a 32bit opaque value, that was traditionally split into two 16bit values. Conveniently, we were able to encode an "us" and a "them", and perform actions based on what our neighbours told us.&lt;/p&gt;

&lt;p&gt;&amp;gt;But, 16bits is pretty limiting. There could only be ~65'000 possible networks on The Internet total? Eeek. So, we created 32bit ASNs. 4 billion networks is seen as a quite reasonable limitation. However, you can't really encode a 32bit "us" and a 32bit "them" value into 32bits of total space. Something called "Extended Communities" was invented, but it tries to solve everything except the case of a 32bit ASN signalling to another 32bit ASN.&lt;/p&gt;

&lt;p&gt;&amp;gt; Enter Large Communities. This is 3 32bit values. The first one is the "owner" of the namespace. Normally, you would put in your own ASN, or the ASN that you wish to signal. The second two 32bit values are opaque and only have meaning from the originating operator, but normally people will use "myasn":"verb":"noun" Or "myasn":"noun":"verb". Either way, it fits very nicely.&lt;/p&gt;

&lt;p&gt;&amp;gt; Having previously ran a 32bit ASN, it became quickly obvious the lack of suitable communities was a critical problem. It was even the way to request an "old style" 16bit ASN from RIPE, "I need to use communities". Even the ability to say "do this to that ASN" was ugly, since you couldn't really communicate who the community was supposed to matter to. Clearly, we The Internet Community screwed up by not addressing this need earlier.&lt;/p&gt;

&lt;p&gt;&amp;gt; OpenBGPD in OpenBSD -current has support for Large Communities, and this will be available in the 6.1 release and later. This was based partially on a patch from Job Snijders, thanks!&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://mezzantrop.files.wordpress.com/2016/10/first-look-at-the-renewed-ctl-high-availability-implementation-in-freebsd-v1-1.pdf" target="_blank" rel="nofollow noopener"&gt;First look at the renewed CTL High Availability implementation in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Following up on a previous post about making a high availability dual head storage controller, the new post looks at using FreeBSD’s CTL HA implementation, and FreeBSD 11.0 to do that:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; This enhancement looks extremely important for the BeaST storage system as implementation of high available native ALUA in FreeBSD can potentially replace the BeaST arbitration mechanism (“Arbitrator”), which is completely described in the papers on the BeaST project page&lt;/p&gt;

&lt;p&gt;&amp;gt; ALUA in storage world terminology means Asymmetric Logical Unit Assignment. In simple words this set of technologies allows a host to access any LUN via both controllers of a storage system&lt;/p&gt;

&lt;p&gt;&amp;gt; As I still do not have any real hardware drive-enclosures, we will use Oracle Virtual Box and iSCSI protocol. I have already deployed this environment for the BeaST development, so we can use the similar, yet more simplified template for the renewed CTL HA testing purpose.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If anyone has access to hardware of this nature (a storage shelf with 2 heads connected to it), that they could lend the author to help validate the design on real hardware, that would be most helpful.
&amp;gt; We will run two storage controllers (ctrl-a, ctrl-b) and a host (cln-1). A virtual SAS drive (da0) of 256 MB is configured as “shareable” in Virtual Media Manager and simultaneously connected with both storage controllers&lt;/li&gt;
&lt;li&gt;The basic settings are applied to both controllers&lt;/li&gt;
&lt;li&gt;&lt;p&gt;One interesting setting is:&lt;br&gt;
&amp;gt; kern.cam.ctl.ha_role – configures default role for the node. So ctrl-a is set as 0 (primary node), ctrl-b – 1 (secondary node). The role also can be specified on per-LUN basis which allows to distribute LUNs over both controllers evenly.&lt;br&gt;
&amp;gt; Note, kern.cam.ctl.ha_id and kern.cam.ctl.ha_mode are read-only parameters and must be set only via the /boot/loader.conf file.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Once kern.cam.ctl.ha_peer is set, and the peers connect to each other, the log messages should reflect this:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CTL: HA link status changed from 0 to 1&lt;/li&gt;
&lt;li&gt;CTL: HA link status changed from 1 to 2&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The link states can be: 0 – not configured, 1 – configured but not established and 2 – established&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Then ctld is configured to export /dev/da0 on each of the controllers&lt;/li&gt;
&lt;li&gt;Then the client is booted, and uses iscsid to connect to each of the exposed targets&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; sysctl kern.iscsi.fail_on_disconnection=1 on the client is needed to drop connection with one of the controllers in case of its failure&lt;/p&gt;

&lt;p&gt;&amp;gt; As we know that da0 and da1 on the client are the same drive, we can put them under multipathing control: gmultipath create -A HA /dev/da0 /dev/da1&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The document them shows a file being copied continuously to simulate load. Because the multipath is configured in ‘active/active’ mode, the traffic is split between the two controllers&lt;/li&gt;
&lt;li&gt;Then the secondary controller is turned off, and iscsi disconnects that path, and gmultipath adapts and sends all of the traffic over the primary path.&lt;/li&gt;
&lt;li&gt;When the secondary node is brought back up, but the primary is taken down, traffic stops&lt;/li&gt;
&lt;li&gt;The console on the client is filled with errors: “Logical unit not accessible, asymmetric access state transition”&lt;/li&gt;
&lt;li&gt;The ctl(4) man page explains: 
&amp;gt; If there is no primary node (both nodes are secondary, or secondary node has no connection to primary one), secondary node(s) report Transitioning state.
&amp;gt; Therefore, it looks like a “normal” behavior of CTL HA cluster in a case of disaster and loss of the primary node. It also means that a very lucky administrator can restore the failed primary controller before timeouts are elapsed.&lt;/li&gt;
&lt;li&gt;If the primary is down, the secondary needs to be promoted by some other process (CARP maybe?): sysctl kern.cam.ctl.ha_role=0&lt;/li&gt;
&lt;li&gt;Then traffic follows again&lt;/li&gt;
&lt;li&gt;This is a very interesting look at this new feature, and I hope to see more about it in the future
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2016/10/is-spf-simply-too-hard-for-application.html" target="_blank" rel="nofollow noopener"&gt;Is SPF Simply Too Hard for Application Developers?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Peter Hansteen asks an interesting question:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The Sender Policy Framework (SPF) is unloved by some, because it conflicts with some long-established SMTP email use cases. But is it also just too hard to understand and to use correctly for application developers?&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He tells a story about trying to file his Norwegian taxes, and running into a bug&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Then in August 2016, I tried to report a bug via the contact form at Altinn.no, the main tax authorities web site.&lt;/p&gt;

&lt;p&gt;&amp;gt; The report in itself was fairly trivial: The SMS alert I had just received about an invoice for taxes due contained one date, which turned out to be my birth date rather than the invoice due date. Not a major issue, but potentially confusing to the recipient until you actually log in and download the invoice as PDF and read the actual due date and other specifics.&lt;/p&gt;

&lt;p&gt;&amp;gt; The next time I checked my mail at bsdly.net, I found this bounce:&lt;/p&gt;

&lt;p&gt;&amp;gt; &lt;a href="mailto:support@altinn.no" target="_blank" rel="nofollow noopener"&gt;support@altinn.no&lt;/a&gt;: SMTP error from remote mail server after RCPT TO:: host mx.isp.as2116.net [193.75.104.7]: 550 5.7.23 SPF validation failed    &lt;/p&gt;

&lt;p&gt;&amp;gt; which means that somebody, somewhere tried to send a message to &lt;a href="mailto:support@altinn.no" target="_blank" rel="nofollow noopener"&gt;support@altinn.no&lt;/a&gt;, but the message could not be delivered because the sending machine did not match the published SPF data for the sender domain.&lt;/p&gt;

&lt;p&gt;&amp;gt; What happened is actually quite clear even from the part quoted above: the host mx.isp.as2116.net [193.75.104.7] tried to deliver mail on my behalf (I received the bounce, remember), and since I have no agreement for mail delivery with the owners and operators of that host, it is not in bsdly.net's SPF record either, and the delivery fails.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After having a bunch of other problems, he finally gets a message back from the tax authority support staff:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; It looks like you have Sender Policy Framework (SPF) enabled on your mailserver, It is a known weakness of our contact form that mailervers with SPF are not supported.&lt;/p&gt;

&lt;p&gt;&amp;gt; The obvious answer should be, as you will agree if you're still reading: The form's developer should place the user's email address in the Reply-To: field, and send the message as its own, valid local user. That would solve the problem.&lt;/p&gt;

&lt;p&gt;&amp;gt; Yes, I'm well aware that SPF also breaks traditional forwarding of the type generally used by mailing lists and a few other use cases. Just how afraid should we be when those same developers come to do battle with the followup specifications such as DKIM and (shudder) the full DMARC specification?&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-jobs/2016-October/000930.html" target="_blank" rel="nofollow noopener"&gt;Looking for a very part-time SysAdmin&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/qb1t/status/789610796380598272" target="_blank" rel="nofollow noopener"&gt;If anyone wants to build the latest nodejs on OpenBSD...&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://marc.info/?l=openbsd-misc&amp;amp;m=147680858507662&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;IBM considers donating Power8 servers to OpenBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://galaxy.ansible.com/vbotka/freebsd-dns/" target="_blank" rel="nofollow noopener"&gt;Install and configure DNS server in FreeBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:32.bhyve.asc" target="_blank" rel="nofollow noopener"&gt;bhyve vulnerability in FreeBSD 11.0 &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/8hwDVQjL" target="_blank" rel="nofollow noopener"&gt; Larry - Pkg Issue&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/3nswwk90" target="_blank" rel="nofollow noopener"&gt; Larry - Followup &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/pjfYWdXs" target="_blank" rel="nofollow noopener"&gt; Jason - TrueOS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/2tAmR5Wz" target="_blank" rel="nofollow noopener"&gt; Matias - ZFS HALP!&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/7vWvUr8K" target="_blank" rel="nofollow noopener"&gt; Robroy - User/Group&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we’ve got voting news for you (No not <em>that</em> election), a closer look at</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise <br>
Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the <br>
Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2016-October/016878.html" rel="nofollow">ARIN 38 involvement, vote!</a></h3>

<ul>
<li>Isaac (.Ike) Levy, one of our interview guests from earlier this year, is running for a seat on the 15 person ARIN Advisory Council</li>
<li>His goal is to represent the entire *BSD community at this important body that makes decisions about how IP addresses are allocated and managed</li>
<li>Biographies and statements for all of the candidates are <a href="https://www.arin.net/participate/elections/candidate_bios.pdf" rel="nofollow">available here</a></li>
<li>The election ends Friday October 28th</li>
<li>If elected, Ike will be looking for input from the community
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2016/10/19/18794.html" rel="nofollow">LibreSSL not just available but default (DragonFlyBSD)</a></h3>

<ul>
<li>DragonFly has become the latest BSD to join the growing LibreSSL family. As mentioned a few weeks back, they were in the process of wiring it up as a replacement for OpenSSL.</li>
<li>With this latest commit, you can now build the entire base and OpenSSL isn’t built at all.</li>
<li>Congrats, and hopefully more BSDs (and Linux) jump on the bandwagon <a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624734.html" rel="nofollow">Compat_43 is gone</a></li>
<li>RiP 4.3 Compat support.. Well for DragonFly anyway.</li>
<li>This commit finally puts out to pasture the 4.3 support, which has been disabled by default in DragonFly for almost 5 years now. </li>
<li>This is a nice cleanup of their tree, removing more than a thousand lines of code and some of the old cruft still lingering from 4.3.
***</li>
</ul>

<h3><a href="http://meltmes.kiloreux.me/create-your-first-freebsd-kernel-module/" rel="nofollow">Create your first FreeBSD kernel module</a></h3>

<ul>
<li>This is an interesting tutorial from Abdelhadi Khiati, who is currently a master&#39;s student in AI and robotics</li>
</ul>

<blockquote>
<p>I have been lucky enough to participate in Google Summer of Code with the FreeBSD foundation. I was amazed by the community surrounding it which was noob friendly and very helpful (Thank you FreeBSD &lt;3)</p>

<p>I wanted to make a starting tutorial for people to write a simple module for kernel before diving inside more complicated kernel shizzle</p>

<p>The kernel module that we will be working on is a simple event handler for the kernel. It will be composed of 2 parts, the event handling function, and the module declaration</p>

<p>The module event handler is a function that handles different events for the module. Like the module being loaded, unloaded or on system shutdown</p>

<p>Now that we have the events handling function ready. We need to declare the moduledata_t to be able to use it inside DECLARE_MODULE macro and load it into the kernel. It has the module name and a pointer to the event handling function</p>

<p>Lastly, we need to declare the module using the DECLARE_MODULE macro. Which has the following structure:</p>
</blockquote>

<p>~~<br>
DECLARE_MODULE(name, moduledata_t data, sub, order);<br>
~~</p>

<blockquote>
<p>name: The module name that will be used in the SYSINIT() call to identify the module.<br>
data: The moduledata_t structure that we already presented.<br>
sub : Since we are using a driver here so the value will be SI_SUB_DRIVERS this argument specify the type of system startup interface.<br>
order : Represents the order of initialization within the subsystem, we will us the SI_ORDER_MIDDLE value here.</p>
</blockquote>

<ul>
<li><p>To compile the previous file you need to use a Makefile as following:<br>
~~<br>
KMOD=hello<br>
SRCS=module.c<br>
.include<bsd.kmod.mk><br>
~~</p></li>
<li><p>We look forward to a future post where more functionality is added to the kernel module</p>

<hr></li>
</ul>

<h3><a href="http://pr1ntf.xyz/windows10.html" rel="nofollow">Installing Windows 10 Under the bhyve Hypervisor.</a></h3>

<ul>
<li>Looking for your Bhyve fix? If so, then Trent (Of iohyve fame) has a nice blog post today with a detailed look at how to get Windows 10 up and running in bhyve.</li>
<li>First up, Trent gives us a nice look back at how far we’ve come in only a single year. Just a year ago, initial support for UEFI was landing, there was no VNC option, leaving us to only serial console goodness. Fast-forward to today and Windows 10 + Bhyve + Vnc is a go.</li>
<li>He immediately jumps us into the good stuff, talking about what you’ll need to follow along. His tutorial was written on 12-CURRENT, but running 11.0-RELEASE should work as well.</li>
<li>Of course, he does mention that before starting on this quest, make sure to read the bhyve handbook, specifically check that your CPU is supported. If you are running something without the correct Vt extensions, then your journey will end prematurely in sadness.</li>
<li>Next up is some of the prep work needed to get your box ready to run VM’s. Loading the kernel module, creating “tap” devices for networking and such are detailed.</li>
<li>If you are lazy (like me) then you’ll want to copy-n-paste his handy scripts which automate this process for you.</li>
<li>With the system prepped, we get to the good stuff. You’ll need to install the bhyve-firmware package (which enables UEFI booting) and get your handy Windows 10 ISO.</li>
<li>From here Trent has helpfully again provided us with handy scripts to both do the bhyve startup, as well as enabling VNC support over a SSH tunnel.</li>
<li>At this point you are good to go, fire up your VNC client and you should be greeted with the typical Windows “Press any key to boot from CD” message. No, he doesn’t provide instructions on how to install / Use / Like Windows, but we’ll leave that up to you.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://lumina-desktop.org/version-1-1-0-released/" rel="nofollow">Lumina version 1.1.0 Released</a></h3>

<ul>
<li>A new version of Lumina has just landed! 1.1.0 brings with it some important fixes, as well as new utilities that make your desktop computing easier than ever.</li>
<li>First up, all i18n files have been re-worked, instead of needing to install another package, they are included with the build when WITH_I18N is set.</li>
<li>A handy new “start-lumina-desktop” command has been added, which makes it easy to get lumina running from your Login Manager or even manually in .xinitrc or the like.</li>
<li>A bunch of internals related to how it tracks installed Applications and start-menu entries has been re-worked, fixing some memory issues and speeding things up.</li>
<li>The default “Insight” file-manager has been given an overhaul, which includes some new features like “git” support.</li>
<li>A new Qt5 “lumina-calculator” has also joined the family, which means not needing to use kcalc or xcalc on TrueOS anymore.</li>
<li>A nice “TrueOS” specific option has also landed. Specifically now when System Updates are waiting to install at shutdown, Lumina will detect and prompt if you want to install or skip the update. Handy when on the road, or if you don’t have the time to wait for an update to complete.
***</li>
</ul>

<h3><a href="http://bad.network/openbgpd-large-communities.html" rel="nofollow">OpenBGPD Large Communities support in –current</a></h3>

<ul>
<li>A blog post from OpenBSD’s Peter Hessler:</li>
</ul>

<blockquote>
<p>On Friday, I committed support for Large Communities to OpenBGPD. This is a draft-RFC that I am pretty excited about.</p>

<p>Back in the early days of The Internet, when routers rode dinosaurs to work and nerds weren&#39;t cool, we wanted to signal to our network neighbours certain information about routes. To be fair, we still do. But, back then everyone had 16 bit ASNs, so there was a simple concept called &#39;communities&#39;. This was a 32bit opaque value, that was traditionally split into two 16bit values. Conveniently, we were able to encode an &quot;us&quot; and a &quot;them&quot;, and perform actions based on what our neighbours told us.</p>

<p>But, 16bits is pretty limiting. There could only be ~65&#39;000 possible networks on The Internet total? Eeek. So, we created 32bit ASNs. 4 billion networks is seen as a quite reasonable limitation. However, you can&#39;t really encode a 32bit &quot;us&quot; and a 32bit &quot;them&quot; value into 32bits of total space. Something called &quot;Extended Communities&quot; was invented, but it tries to solve everything except the case of a 32bit ASN signalling to another 32bit ASN.</p>

<p>Enter Large Communities. This is 3 32bit values. The first one is the &quot;owner&quot; of the namespace. Normally, you would put in your own ASN, or the ASN that you wish to signal. The second two 32bit values are opaque and only have meaning from the originating operator, but normally people will use &quot;myasn&quot;:&quot;verb&quot;:&quot;noun&quot; Or &quot;myasn&quot;:&quot;noun&quot;:&quot;verb&quot;. Either way, it fits very nicely.</p>

<p>Having previously ran a 32bit ASN, it became quickly obvious the lack of suitable communities was a critical problem. It was even the way to request an &quot;old style&quot; 16bit ASN from RIPE, &quot;I need to use communities&quot;. Even the ability to say &quot;do this to that ASN&quot; was ugly, since you couldn&#39;t really communicate who the community was supposed to matter to. Clearly, we The Internet Community screwed up by not addressing this need earlier.</p>

<p>OpenBGPD in OpenBSD -current has support for Large Communities, and this will be available in the 6.1 release and later. This was based partially on a patch from Job Snijders, thanks!</p>

<hr>
</blockquote>

<h3><a href="https://mezzantrop.files.wordpress.com/2016/10/first-look-at-the-renewed-ctl-high-availability-implementation-in-freebsd-v1-1.pdf" rel="nofollow">First look at the renewed CTL High Availability implementation in FreeBSD</a></h3>

<ul>
<li>Following up on a previous post about making a high availability dual head storage controller, the new post looks at using FreeBSD’s CTL HA implementation, and FreeBSD 11.0 to do that:</li>
</ul>

<blockquote>
<p>This enhancement looks extremely important for the BeaST storage system as implementation of high available native ALUA in FreeBSD can potentially replace the BeaST arbitration mechanism (“Arbitrator”), which is completely described in the papers on the BeaST project page</p>

<p>ALUA in storage world terminology means Asymmetric Logical Unit Assignment. In simple words this set of technologies allows a host to access any LUN via both controllers of a storage system</p>

<p>As I still do not have any real hardware drive-enclosures, we will use Oracle Virtual Box and iSCSI protocol. I have already deployed this environment for the BeaST development, so we can use the similar, yet more simplified template for the renewed CTL HA testing purpose.</p>
</blockquote>

<ul>
<li>If anyone has access to hardware of this nature (a storage shelf with 2 heads connected to it), that they could lend the author to help validate the design on real hardware, that would be most helpful.
&gt; We will run two storage controllers (ctrl-a, ctrl-b) and a host (cln-1). A virtual SAS drive (da0) of 256 MB is configured as “shareable” in Virtual Media Manager and simultaneously connected with both storage controllers</li>
<li>The basic settings are applied to both controllers</li>
<li><p>One interesting setting is:</p>

<blockquote>
<p>kern.cam.ctl.ha_role – configures default role for the node. So ctrl-a is set as 0 (primary node), ctrl-b – 1 (secondary node). The role also can be specified on per-LUN basis which allows to distribute LUNs over both controllers evenly.<br>
Note, kern.cam.ctl.ha_id and kern.cam.ctl.ha_mode are read-only parameters and must be set only via the /boot/loader.conf file.</p>
</blockquote></li>
<li><p>Once kern.cam.ctl.ha_peer is set, and the peers connect to each other, the log messages should reflect this:</p>

<ul>
<li>CTL: HA link status changed from 0 to 1</li>
<li>CTL: HA link status changed from 1 to 2</li>
</ul></li>
</ul>

<blockquote>
<p>The link states can be: 0 – not configured, 1 – configured but not established and 2 – established</p>
</blockquote>

<ul>
<li>Then ctld is configured to export /dev/da0 on each of the controllers</li>
<li>Then the client is booted, and uses iscsid to connect to each of the exposed targets</li>
</ul>

<blockquote>
<p>sysctl kern.iscsi.fail_on_disconnection=1 on the client is needed to drop connection with one of the controllers in case of its failure</p>

<p>As we know that da0 and da1 on the client are the same drive, we can put them under multipathing control: gmultipath create -A HA /dev/da0 /dev/da1</p>
</blockquote>

<ul>
<li>The document them shows a file being copied continuously to simulate load. Because the multipath is configured in ‘active/active’ mode, the traffic is split between the two controllers</li>
<li>Then the secondary controller is turned off, and iscsi disconnects that path, and gmultipath adapts and sends all of the traffic over the primary path.</li>
<li>When the secondary node is brought back up, but the primary is taken down, traffic stops</li>
<li>The console on the client is filled with errors: “Logical unit not accessible, asymmetric access state transition”</li>
<li>The ctl(4) man page explains: 
&gt; If there is no primary node (both nodes are secondary, or secondary node has no connection to primary one), secondary node(s) report Transitioning state.
&gt; Therefore, it looks like a “normal” behavior of CTL HA cluster in a case of disaster and loss of the primary node. It also means that a very lucky administrator can restore the failed primary controller before timeouts are elapsed.</li>
<li>If the primary is down, the secondary needs to be promoted by some other process (CARP maybe?): sysctl kern.cam.ctl.ha_role=0</li>
<li>Then traffic follows again</li>
<li>This is a very interesting look at this new feature, and I hope to see more about it in the future
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2016/10/is-spf-simply-too-hard-for-application.html" rel="nofollow">Is SPF Simply Too Hard for Application Developers?</a></h3>

<ul>
<li>Peter Hansteen asks an interesting question:</li>
</ul>

<blockquote>
<p>The Sender Policy Framework (SPF) is unloved by some, because it conflicts with some long-established SMTP email use cases. But is it also just too hard to understand and to use correctly for application developers?</p>
</blockquote>

<ul>
<li>He tells a story about trying to file his Norwegian taxes, and running into a bug</li>
</ul>

<blockquote>
<p>Then in August 2016, I tried to report a bug via the contact form at Altinn.no, the main tax authorities web site.</p>

<p>The report in itself was fairly trivial: The SMS alert I had just received about an invoice for taxes due contained one date, which turned out to be my birth date rather than the invoice due date. Not a major issue, but potentially confusing to the recipient until you actually log in and download the invoice as PDF and read the actual due date and other specifics.</p>

<p>The next time I checked my mail at bsdly.net, I found this bounce:</p>

<p><a href="mailto:support@altinn.no" rel="nofollow">support@altinn.no</a>: SMTP error from remote mail server after RCPT TO:: host mx.isp.as2116.net [193.75.104.7]: 550 5.7.23 SPF validation failed    </p>

<p>which means that somebody, somewhere tried to send a message to <a href="mailto:support@altinn.no" rel="nofollow">support@altinn.no</a>, but the message could not be delivered because the sending machine did not match the published SPF data for the sender domain.</p>

<p>What happened is actually quite clear even from the part quoted above: the host mx.isp.as2116.net [193.75.104.7] tried to deliver mail on my behalf (I received the bounce, remember), and since I have no agreement for mail delivery with the owners and operators of that host, it is not in bsdly.net&#39;s SPF record either, and the delivery fails.</p>
</blockquote>

<ul>
<li>After having a bunch of other problems, he finally gets a message back from the tax authority support staff:</li>
</ul>

<blockquote>
<p>It looks like you have Sender Policy Framework (SPF) enabled on your mailserver, It is a known weakness of our contact form that mailervers with SPF are not supported.</p>

<p>The obvious answer should be, as you will agree if you&#39;re still reading: The form&#39;s developer should place the user&#39;s email address in the Reply-To: field, and send the message as its own, valid local user. That would solve the problem.</p>

<p>Yes, I&#39;m well aware that SPF also breaks traditional forwarding of the type generally used by mailing lists and a few other use cases. Just how afraid should we be when those same developers come to do battle with the followup specifications such as DKIM and (shudder) the full DMARC specification?</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://lists.freebsd.org/pipermail/freebsd-jobs/2016-October/000930.html" rel="nofollow">Looking for a very part-time SysAdmin</a></p></li>
<li><p><a href="https://twitter.com/qb1t/status/789610796380598272" rel="nofollow">If anyone wants to build the latest nodejs on OpenBSD...</a></p></li>
<li><p><a href="https://marc.info/?l=openbsd-misc&m=147680858507662&w=2" rel="nofollow">IBM considers donating Power8 servers to OpenBSD</a></p></li>
<li><p><a href="https://galaxy.ansible.com/vbotka/freebsd-dns/" rel="nofollow">Install and configure DNS server in FreeBSD</a></p></li>
<li><p><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:32.bhyve.asc" rel="nofollow">bhyve vulnerability in FreeBSD 11.0 </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/8hwDVQjL" rel="nofollow"> Larry - Pkg Issue</a> </li>
<li><a href="http://pastebin.com/3nswwk90" rel="nofollow"> Larry - Followup </a> </li>
<li><a href="http://pastebin.com/pjfYWdXs" rel="nofollow"> Jason - TrueOS</a> </li>
<li><a href="http://pastebin.com/2tAmR5Wz" rel="nofollow"> Matias - ZFS HALP!</a> </li>
<li><a href="http://pastebin.com/7vWvUr8K" rel="nofollow"> Robroy - User/Group</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we’ve got voting news for you (No not <em>that</em> election), a closer look at</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise <br>
Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the <br>
Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2016-October/016878.html" rel="nofollow">ARIN 38 involvement, vote!</a></h3>

<ul>
<li>Isaac (.Ike) Levy, one of our interview guests from earlier this year, is running for a seat on the 15 person ARIN Advisory Council</li>
<li>His goal is to represent the entire *BSD community at this important body that makes decisions about how IP addresses are allocated and managed</li>
<li>Biographies and statements for all of the candidates are <a href="https://www.arin.net/participate/elections/candidate_bios.pdf" rel="nofollow">available here</a></li>
<li>The election ends Friday October 28th</li>
<li>If elected, Ike will be looking for input from the community
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2016/10/19/18794.html" rel="nofollow">LibreSSL not just available but default (DragonFlyBSD)</a></h3>

<ul>
<li>DragonFly has become the latest BSD to join the growing LibreSSL family. As mentioned a few weeks back, they were in the process of wiring it up as a replacement for OpenSSL.</li>
<li>With this latest commit, you can now build the entire base and OpenSSL isn’t built at all.</li>
<li>Congrats, and hopefully more BSDs (and Linux) jump on the bandwagon <a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624734.html" rel="nofollow">Compat_43 is gone</a></li>
<li>RiP 4.3 Compat support.. Well for DragonFly anyway.</li>
<li>This commit finally puts out to pasture the 4.3 support, which has been disabled by default in DragonFly for almost 5 years now. </li>
<li>This is a nice cleanup of their tree, removing more than a thousand lines of code and some of the old cruft still lingering from 4.3.
***</li>
</ul>

<h3><a href="http://meltmes.kiloreux.me/create-your-first-freebsd-kernel-module/" rel="nofollow">Create your first FreeBSD kernel module</a></h3>

<ul>
<li>This is an interesting tutorial from Abdelhadi Khiati, who is currently a master&#39;s student in AI and robotics</li>
</ul>

<blockquote>
<p>I have been lucky enough to participate in Google Summer of Code with the FreeBSD foundation. I was amazed by the community surrounding it which was noob friendly and very helpful (Thank you FreeBSD &lt;3)</p>

<p>I wanted to make a starting tutorial for people to write a simple module for kernel before diving inside more complicated kernel shizzle</p>

<p>The kernel module that we will be working on is a simple event handler for the kernel. It will be composed of 2 parts, the event handling function, and the module declaration</p>

<p>The module event handler is a function that handles different events for the module. Like the module being loaded, unloaded or on system shutdown</p>

<p>Now that we have the events handling function ready. We need to declare the moduledata_t to be able to use it inside DECLARE_MODULE macro and load it into the kernel. It has the module name and a pointer to the event handling function</p>

<p>Lastly, we need to declare the module using the DECLARE_MODULE macro. Which has the following structure:</p>
</blockquote>

<p>~~<br>
DECLARE_MODULE(name, moduledata_t data, sub, order);<br>
~~</p>

<blockquote>
<p>name: The module name that will be used in the SYSINIT() call to identify the module.<br>
data: The moduledata_t structure that we already presented.<br>
sub : Since we are using a driver here so the value will be SI_SUB_DRIVERS this argument specify the type of system startup interface.<br>
order : Represents the order of initialization within the subsystem, we will us the SI_ORDER_MIDDLE value here.</p>
</blockquote>

<ul>
<li><p>To compile the previous file you need to use a Makefile as following:<br>
~~<br>
KMOD=hello<br>
SRCS=module.c<br>
.include<bsd.kmod.mk><br>
~~</p></li>
<li><p>We look forward to a future post where more functionality is added to the kernel module</p>

<hr></li>
</ul>

<h3><a href="http://pr1ntf.xyz/windows10.html" rel="nofollow">Installing Windows 10 Under the bhyve Hypervisor.</a></h3>

<ul>
<li>Looking for your Bhyve fix? If so, then Trent (Of iohyve fame) has a nice blog post today with a detailed look at how to get Windows 10 up and running in bhyve.</li>
<li>First up, Trent gives us a nice look back at how far we’ve come in only a single year. Just a year ago, initial support for UEFI was landing, there was no VNC option, leaving us to only serial console goodness. Fast-forward to today and Windows 10 + Bhyve + Vnc is a go.</li>
<li>He immediately jumps us into the good stuff, talking about what you’ll need to follow along. His tutorial was written on 12-CURRENT, but running 11.0-RELEASE should work as well.</li>
<li>Of course, he does mention that before starting on this quest, make sure to read the bhyve handbook, specifically check that your CPU is supported. If you are running something without the correct Vt extensions, then your journey will end prematurely in sadness.</li>
<li>Next up is some of the prep work needed to get your box ready to run VM’s. Loading the kernel module, creating “tap” devices for networking and such are detailed.</li>
<li>If you are lazy (like me) then you’ll want to copy-n-paste his handy scripts which automate this process for you.</li>
<li>With the system prepped, we get to the good stuff. You’ll need to install the bhyve-firmware package (which enables UEFI booting) and get your handy Windows 10 ISO.</li>
<li>From here Trent has helpfully again provided us with handy scripts to both do the bhyve startup, as well as enabling VNC support over a SSH tunnel.</li>
<li>At this point you are good to go, fire up your VNC client and you should be greeted with the typical Windows “Press any key to boot from CD” message. No, he doesn’t provide instructions on how to install / Use / Like Windows, but we’ll leave that up to you.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://lumina-desktop.org/version-1-1-0-released/" rel="nofollow">Lumina version 1.1.0 Released</a></h3>

<ul>
<li>A new version of Lumina has just landed! 1.1.0 brings with it some important fixes, as well as new utilities that make your desktop computing easier than ever.</li>
<li>First up, all i18n files have been re-worked, instead of needing to install another package, they are included with the build when WITH_I18N is set.</li>
<li>A handy new “start-lumina-desktop” command has been added, which makes it easy to get lumina running from your Login Manager or even manually in .xinitrc or the like.</li>
<li>A bunch of internals related to how it tracks installed Applications and start-menu entries has been re-worked, fixing some memory issues and speeding things up.</li>
<li>The default “Insight” file-manager has been given an overhaul, which includes some new features like “git” support.</li>
<li>A new Qt5 “lumina-calculator” has also joined the family, which means not needing to use kcalc or xcalc on TrueOS anymore.</li>
<li>A nice “TrueOS” specific option has also landed. Specifically now when System Updates are waiting to install at shutdown, Lumina will detect and prompt if you want to install or skip the update. Handy when on the road, or if you don’t have the time to wait for an update to complete.
***</li>
</ul>

<h3><a href="http://bad.network/openbgpd-large-communities.html" rel="nofollow">OpenBGPD Large Communities support in –current</a></h3>

<ul>
<li>A blog post from OpenBSD’s Peter Hessler:</li>
</ul>

<blockquote>
<p>On Friday, I committed support for Large Communities to OpenBGPD. This is a draft-RFC that I am pretty excited about.</p>

<p>Back in the early days of The Internet, when routers rode dinosaurs to work and nerds weren&#39;t cool, we wanted to signal to our network neighbours certain information about routes. To be fair, we still do. But, back then everyone had 16 bit ASNs, so there was a simple concept called &#39;communities&#39;. This was a 32bit opaque value, that was traditionally split into two 16bit values. Conveniently, we were able to encode an &quot;us&quot; and a &quot;them&quot;, and perform actions based on what our neighbours told us.</p>

<p>But, 16bits is pretty limiting. There could only be ~65&#39;000 possible networks on The Internet total? Eeek. So, we created 32bit ASNs. 4 billion networks is seen as a quite reasonable limitation. However, you can&#39;t really encode a 32bit &quot;us&quot; and a 32bit &quot;them&quot; value into 32bits of total space. Something called &quot;Extended Communities&quot; was invented, but it tries to solve everything except the case of a 32bit ASN signalling to another 32bit ASN.</p>

<p>Enter Large Communities. This is 3 32bit values. The first one is the &quot;owner&quot; of the namespace. Normally, you would put in your own ASN, or the ASN that you wish to signal. The second two 32bit values are opaque and only have meaning from the originating operator, but normally people will use &quot;myasn&quot;:&quot;verb&quot;:&quot;noun&quot; Or &quot;myasn&quot;:&quot;noun&quot;:&quot;verb&quot;. Either way, it fits very nicely.</p>

<p>Having previously ran a 32bit ASN, it became quickly obvious the lack of suitable communities was a critical problem. It was even the way to request an &quot;old style&quot; 16bit ASN from RIPE, &quot;I need to use communities&quot;. Even the ability to say &quot;do this to that ASN&quot; was ugly, since you couldn&#39;t really communicate who the community was supposed to matter to. Clearly, we The Internet Community screwed up by not addressing this need earlier.</p>

<p>OpenBGPD in OpenBSD -current has support for Large Communities, and this will be available in the 6.1 release and later. This was based partially on a patch from Job Snijders, thanks!</p>

<hr>
</blockquote>

<h3><a href="https://mezzantrop.files.wordpress.com/2016/10/first-look-at-the-renewed-ctl-high-availability-implementation-in-freebsd-v1-1.pdf" rel="nofollow">First look at the renewed CTL High Availability implementation in FreeBSD</a></h3>

<ul>
<li>Following up on a previous post about making a high availability dual head storage controller, the new post looks at using FreeBSD’s CTL HA implementation, and FreeBSD 11.0 to do that:</li>
</ul>

<blockquote>
<p>This enhancement looks extremely important for the BeaST storage system as implementation of high available native ALUA in FreeBSD can potentially replace the BeaST arbitration mechanism (“Arbitrator”), which is completely described in the papers on the BeaST project page</p>

<p>ALUA in storage world terminology means Asymmetric Logical Unit Assignment. In simple words this set of technologies allows a host to access any LUN via both controllers of a storage system</p>

<p>As I still do not have any real hardware drive-enclosures, we will use Oracle Virtual Box and iSCSI protocol. I have already deployed this environment for the BeaST development, so we can use the similar, yet more simplified template for the renewed CTL HA testing purpose.</p>
</blockquote>

<ul>
<li>If anyone has access to hardware of this nature (a storage shelf with 2 heads connected to it), that they could lend the author to help validate the design on real hardware, that would be most helpful.
&gt; We will run two storage controllers (ctrl-a, ctrl-b) and a host (cln-1). A virtual SAS drive (da0) of 256 MB is configured as “shareable” in Virtual Media Manager and simultaneously connected with both storage controllers</li>
<li>The basic settings are applied to both controllers</li>
<li><p>One interesting setting is:</p>

<blockquote>
<p>kern.cam.ctl.ha_role – configures default role for the node. So ctrl-a is set as 0 (primary node), ctrl-b – 1 (secondary node). The role also can be specified on per-LUN basis which allows to distribute LUNs over both controllers evenly.<br>
Note, kern.cam.ctl.ha_id and kern.cam.ctl.ha_mode are read-only parameters and must be set only via the /boot/loader.conf file.</p>
</blockquote></li>
<li><p>Once kern.cam.ctl.ha_peer is set, and the peers connect to each other, the log messages should reflect this:</p>

<ul>
<li>CTL: HA link status changed from 0 to 1</li>
<li>CTL: HA link status changed from 1 to 2</li>
</ul></li>
</ul>

<blockquote>
<p>The link states can be: 0 – not configured, 1 – configured but not established and 2 – established</p>
</blockquote>

<ul>
<li>Then ctld is configured to export /dev/da0 on each of the controllers</li>
<li>Then the client is booted, and uses iscsid to connect to each of the exposed targets</li>
</ul>

<blockquote>
<p>sysctl kern.iscsi.fail_on_disconnection=1 on the client is needed to drop connection with one of the controllers in case of its failure</p>

<p>As we know that da0 and da1 on the client are the same drive, we can put them under multipathing control: gmultipath create -A HA /dev/da0 /dev/da1</p>
</blockquote>

<ul>
<li>The document them shows a file being copied continuously to simulate load. Because the multipath is configured in ‘active/active’ mode, the traffic is split between the two controllers</li>
<li>Then the secondary controller is turned off, and iscsi disconnects that path, and gmultipath adapts and sends all of the traffic over the primary path.</li>
<li>When the secondary node is brought back up, but the primary is taken down, traffic stops</li>
<li>The console on the client is filled with errors: “Logical unit not accessible, asymmetric access state transition”</li>
<li>The ctl(4) man page explains: 
&gt; If there is no primary node (both nodes are secondary, or secondary node has no connection to primary one), secondary node(s) report Transitioning state.
&gt; Therefore, it looks like a “normal” behavior of CTL HA cluster in a case of disaster and loss of the primary node. It also means that a very lucky administrator can restore the failed primary controller before timeouts are elapsed.</li>
<li>If the primary is down, the secondary needs to be promoted by some other process (CARP maybe?): sysctl kern.cam.ctl.ha_role=0</li>
<li>Then traffic follows again</li>
<li>This is a very interesting look at this new feature, and I hope to see more about it in the future
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2016/10/is-spf-simply-too-hard-for-application.html" rel="nofollow">Is SPF Simply Too Hard for Application Developers?</a></h3>

<ul>
<li>Peter Hansteen asks an interesting question:</li>
</ul>

<blockquote>
<p>The Sender Policy Framework (SPF) is unloved by some, because it conflicts with some long-established SMTP email use cases. But is it also just too hard to understand and to use correctly for application developers?</p>
</blockquote>

<ul>
<li>He tells a story about trying to file his Norwegian taxes, and running into a bug</li>
</ul>

<blockquote>
<p>Then in August 2016, I tried to report a bug via the contact form at Altinn.no, the main tax authorities web site.</p>

<p>The report in itself was fairly trivial: The SMS alert I had just received about an invoice for taxes due contained one date, which turned out to be my birth date rather than the invoice due date. Not a major issue, but potentially confusing to the recipient until you actually log in and download the invoice as PDF and read the actual due date and other specifics.</p>

<p>The next time I checked my mail at bsdly.net, I found this bounce:</p>

<p><a href="mailto:support@altinn.no" rel="nofollow">support@altinn.no</a>: SMTP error from remote mail server after RCPT TO:: host mx.isp.as2116.net [193.75.104.7]: 550 5.7.23 SPF validation failed    </p>

<p>which means that somebody, somewhere tried to send a message to <a href="mailto:support@altinn.no" rel="nofollow">support@altinn.no</a>, but the message could not be delivered because the sending machine did not match the published SPF data for the sender domain.</p>

<p>What happened is actually quite clear even from the part quoted above: the host mx.isp.as2116.net [193.75.104.7] tried to deliver mail on my behalf (I received the bounce, remember), and since I have no agreement for mail delivery with the owners and operators of that host, it is not in bsdly.net&#39;s SPF record either, and the delivery fails.</p>
</blockquote>

<ul>
<li>After having a bunch of other problems, he finally gets a message back from the tax authority support staff:</li>
</ul>

<blockquote>
<p>It looks like you have Sender Policy Framework (SPF) enabled on your mailserver, It is a known weakness of our contact form that mailervers with SPF are not supported.</p>

<p>The obvious answer should be, as you will agree if you&#39;re still reading: The form&#39;s developer should place the user&#39;s email address in the Reply-To: field, and send the message as its own, valid local user. That would solve the problem.</p>

<p>Yes, I&#39;m well aware that SPF also breaks traditional forwarding of the type generally used by mailing lists and a few other use cases. Just how afraid should we be when those same developers come to do battle with the followup specifications such as DKIM and (shudder) the full DMARC specification?</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://lists.freebsd.org/pipermail/freebsd-jobs/2016-October/000930.html" rel="nofollow">Looking for a very part-time SysAdmin</a></p></li>
<li><p><a href="https://twitter.com/qb1t/status/789610796380598272" rel="nofollow">If anyone wants to build the latest nodejs on OpenBSD...</a></p></li>
<li><p><a href="https://marc.info/?l=openbsd-misc&m=147680858507662&w=2" rel="nofollow">IBM considers donating Power8 servers to OpenBSD</a></p></li>
<li><p><a href="https://galaxy.ansible.com/vbotka/freebsd-dns/" rel="nofollow">Install and configure DNS server in FreeBSD</a></p></li>
<li><p><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:32.bhyve.asc" rel="nofollow">bhyve vulnerability in FreeBSD 11.0 </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/8hwDVQjL" rel="nofollow"> Larry - Pkg Issue</a> </li>
<li><a href="http://pastebin.com/3nswwk90" rel="nofollow"> Larry - Followup </a> </li>
<li><a href="http://pastebin.com/pjfYWdXs" rel="nofollow"> Jason - TrueOS</a> </li>
<li><a href="http://pastebin.com/2tAmR5Wz" rel="nofollow"> Matias - ZFS HALP!</a> </li>
<li><a href="http://pastebin.com/7vWvUr8K" rel="nofollow"> Robroy - User/Group</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>164: Virtualized COW / PI?</title>
  <link>https://www.bsdnow.tv/164</link>
  <guid isPermaLink="false">485bcb56-a447-4684-8af7-a5b0285230af</guid>
  <pubDate>Wed, 19 Oct 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/485bcb56-a447-4684-8af7-a5b0285230af.mp3" length="72447988" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we’ve got all sorts of goodies to discuss. Starting with, vmm, vkernels, raspberry pi and much more! Some iX folks are visiting from out of</itunes:subtitle>
  <itunes:duration>1:40:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we’ve got all sorts of goodies to discuss. Starting with, vmm, vkernels, raspberry pi and much more! Some iX folks are visiting from out of&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20161012092516&amp;amp;mode=flat&amp;amp;count=15" target="_blank" rel="nofollow noopener"&gt;vmm enabled &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;VMM, the OpenBSD hypervisor, has been imported into current&lt;/li&gt;
&lt;li&gt;It has similar hardware requirements to bhyve, a Intel Nehalem or newer CPU with the hardware virtualization features enabled in the BIOS&lt;/li&gt;
&lt;li&gt;AMD support has not been started yet&lt;/li&gt;
&lt;li&gt;OpenBSD is the only supported guest&lt;/li&gt;
&lt;li&gt;It would be interesting to hear from viewers that have tried it, and hear how it does, and what still needs more work
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624675.html" target="_blank" rel="nofollow noopener"&gt;vkernels go COW&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The DragonflyBSD feature, vkernels, has gained a new Copy-On-Write functionality&lt;/li&gt;
&lt;li&gt;Disk images can now be mounted RO or RW, but changes will not be written back to the image file&lt;/li&gt;
&lt;li&gt;This allows multiple vkernels to share the same disk image&lt;/li&gt;
&lt;li&gt;“Note that when the vkernel operates on an image in this mode, modifications will eat up system memory and swap, so the user should be cognizant of the use-case.  Still, the flexibility of being able to mount the image R+W should not be underestimated.”&lt;/li&gt;
&lt;li&gt;This is another feature we’d love to hear from viewers that have tried it out.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/arm64/rpi3" target="_blank" rel="nofollow noopener"&gt;Basic support for the RPI3 has landed in FreeBSD-CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The long awaited bits to allow FreeBSD to boot on the Raspberry Pi 3 have landed&lt;/li&gt;
&lt;li&gt;There is still a bit of work to be done, some of the as mentioned in Oleksandr’s blog post:&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://kernelnomicon.org/?p=690" target="_blank" rel="nofollow noopener"&gt;Raspberry Pi support in HEAD&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Raspberry Pi 3 limited support was committed to HEAD. Most of drivers should work with upstream dtb, RNG requires attention because callout mode seems to be broken and there is no IRQ in upstream device tree file. SMP is work in progress. There are some compatibility issue with VCHIQ driver due to some assumptions that are true only for ARM platform. “&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This is exciting work. No HDMI support (yet), so if you plan on trying this out make sure you have your USB-&amp;gt;Serial adapter cables ready to go.&lt;/li&gt;
&lt;li&gt;Full Instructions to get started with your RPI 3 can be found on the &lt;a href="https://wiki.freebsd.org/arm64/rpi3" target="_blank" rel="nofollow noopener"&gt;FreeBSD Wiki&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Relatively soon, I imagine there will be a RaspBSD build for the RPI3 to make it easier to get started&lt;/li&gt;
&lt;li&gt;Eventually there will be official FreeBSD images as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/openbsd/src/commit/2ba69c71e92471fe05f305bfa35aeac543ebec1f" target="_blank" rel="nofollow noopener"&gt;OpenBSD switches softraid crypto from PKCS5 PBKDF2 to bcrypt PBKDF.&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After the discussion a few weeks ago when a user wrote a tool to brute force their forgotten OpenBSD Full Disk Encryption password (from a password list of possible variations of their password), it was discovered that OpenBSD defaulted to using just 8192 iterations of PKCSv5 for the key derivation function with a SHA1-HMAC&lt;/li&gt;
&lt;li&gt;The number of iterations can be manually controlled by the user when creating the softraid volume&lt;/li&gt;
&lt;li&gt;By comparison, FreeBSDs GELI full disk encryption used a benchmark to pick a number of iterations that would take more than 2 seconds to complete, generally resulting in a number of iterations over 1 million on most modern hardware. The algorithm is based on a SHA512-HMAC&lt;/li&gt;
&lt;li&gt;However, inefficiency in the implementation of PKCSv5 in GELI resulted in the implementation being 50% slower than some other implementations, meaning the effective security was only about 1 second per attempt, rather than the intended 2 seconds. The improved PKCSv5 implementation is out for review currently.&lt;/li&gt;
&lt;li&gt;This commit to OpenBSD changes the default key derivation function to be based on bcrypt and a SHA512-HMAC instead.&lt;/li&gt;
&lt;li&gt;OpenBSD also now uses a benchmark to pick a number of of iterations that will take approximately 1 second per attempt&lt;/li&gt;
&lt;li&gt;“One weakness of PBKDF2 is that while its number of iterations can be adjusted to make it take an arbitrarily large amount of computing time, it can be implemented with a small circuit and very little RAM, which makes brute-force attacks using application-specific integrated circuits or graphics processing units relatively cheap. The bcrypt key derivation function requires a larger amount of RAM (but still not tunable separately, i. e. fixed for a given amount of CPU time) and is slightly stronger against such attacks, while the more modern scrypt key derivation function can use arbitrarily large amounts of memory and is therefore more resistant to ASIC and GPU attacks.”&lt;/li&gt;
&lt;li&gt;The upgrade to the bcrypt, which has proven to be quite resistant to cracking by GPUs is a significant enhancement to OpenBSDs encrypted softraid feature
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Josh Paetzel - &lt;a href="mailto:email@email" target="_blank" rel="nofollow noopener"&gt;email@email&lt;/a&gt; / &lt;a href="https://twitter.com/bsdunix4ever" target="_blank" rel="nofollow noopener"&gt;@bsdunix4ever&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;MeetBSD&lt;/li&gt;
&lt;li&gt;ZFS Panel&lt;/li&gt;
&lt;li&gt;FreeNAS - graceful network reload&lt;/li&gt;
&lt;li&gt;Pxeboot
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2016-10-09-EC2s-most-dangerous-feature.html" target="_blank" rel="nofollow noopener"&gt;EC2's most dangerous feature&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Colin Percival, FreeBSD’s unofficial EC2 maintainer, has published a blog post about “EC2's most dangerous feature”&lt;/li&gt;
&lt;li&gt;“As a FreeBSD developer — and someone who writes in C — I believe strongly in the idea of "tools, not policy". If you want to shoot yourself in the foot, I'll help you deliver the bullet to your foot as efficiently and reliably as possible. UNIX has always been built around the idea that systems administrators are better equipped to figure out what they want than the developers of the OS, and it's almost impossible to prevent foot-shooting without also limiting useful functionality. The most powerful tools are inevitably dangerous, and often the best solution is to simply ensure that they come with sufficient warning labels attached; but occasionally I see tools which not only lack important warning labels, but are also designed in a way which makes them far more dangerous than necessary. Such a case is IAM Roles for Amazon EC2.”&lt;/li&gt;
&lt;li&gt;“A review for readers unfamiliar with this feature: Amazon IAM (Identity and Access Management) is a service which allows for the creation of access credentials which are limited in scope; for example, you can have keys which can read objects from Amazon S3 but cannot write any objects. IAM Roles for EC2 are a mechanism for automatically creating such credentials and distributing them to EC2 instances; you specify a policy and launch an EC2 instance with that Role attached, and magic happens making time-limited credentials available via the EC2 instance metadata. This simplifies the task of creating and distributing credentials and is very convenient; I use it in my FreeBSD AMI Builder AMI, for example. Despite being convenient, there are two rather scary problems with this feature which severely limit the situations where I'd recommend using it.”&lt;/li&gt;
&lt;li&gt;“The first problem is one of configuration: The language used to specify IAM Policies is not sufficient to allow for EC2 instances to be properly limited in their powers. For example, suppose you want to allow EC2 instances to create, attach, detach, and delete Elastic Block Store volumes automatically — useful if you want to have filesystems automatically scaling up and down depending on the amount of data which they contain. The obvious way to do this is would be to "tag" the volumes belonging to an EC2 instance and provide a Role which can only act on volumes tagged to the instance where the Role was provided; while the second part of this (limiting actions to tagged volumes) seems to be possible, there is no way to require specific API call parameters on all permitted CreateVolume calls, as would be necessary to require that a tag is applied to any new volumes being created by the instance.”&lt;/li&gt;
&lt;li&gt;“As problematic as the configuration is, a far larger problem with IAM Roles for Amazon EC2 is access control — or, to be more precise, the lack thereof. As I mentioned earlier, IAM Role credentials are exposed to EC2 instances via the EC2 instance metadata system: In other words, they're available from &lt;a href="http://169.254.169.254/" target="_blank" rel="nofollow noopener"&gt;http://169.254.169.254/&lt;/a&gt;. (I presume that the "EC2ws" HTTP server which responds is running in another Xen domain on the same physical hardware, but that implementation detail is unimportant.) This makes the credentials easy for programs to obtain... unfortunately, too easy for programs to obtain. UNIX is designed as a multi-user operating system, with multiple users and groups and permission flags and often even more sophisticated ACLs — but there are very few systems which control the ability to make outgoing HTTP requests. We write software which relies on privilege separation to reduce the likelihood that a bug will result in a full system compromise; but if a process which is running as user nobody and chrooted into /var/empty is still able to fetch AWS keys which can read every one of the objects you have stored in S3, do you really have any meaningful privilege separation? To borrow a phrase from Ted Unangst, the way that IAM Roles expose credentials to EC2 instances makes them a very effective exploit mitigation mitigation technique.”&lt;/li&gt;
&lt;li&gt;“To make it worse, exposing credentials — and other metadata, for that matter — via HTTP is completely unnecessary. EC2 runs on Xen, which already has a perfectly good key-value data store for conveying metadata between the host and guest instances. It would be absolutely trivial for Amazon to place EC2 metadata, including IAM credentials, into XenStore; and almost as trivial for EC2 instances to expose XenStore as a filesystem to which standard UNIX permissions could be applied, providing IAM Role credentials with the full range of access control functionality which UNIX affords to files stored on disk. Of course, there is a lot of code out there which relies on fetching EC2 instance metadata over HTTP, and trivial or not it would still take time to write code for pushing EC2 metadata into XenStore and exposing it via a filesystem inside instances; so even if someone at AWS reads this blog post and immediately says "hey, we should fix this", I'm sure we'll be stuck with the problems in IAM Roles for years to come.”&lt;/li&gt;
&lt;li&gt;“So consider this a warning label: IAM Roles for EC2 may seem like a gun which you can use to efficiently and reliably shoot yourself in the foot; but in fact it's more like a gun which is difficult to aim and might be fired by someone on the other side of the room snapping his fingers. Handle with care!”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.theregister.co.uk/2016/10/18/truenas_review/" target="_blank" rel="nofollow noopener"&gt;Open-source storage that doesn't suck? Our man tries to break TrueNAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The storage reviewer over at TheRegister got their hands on a TrueNAS and gave it a try&lt;/li&gt;
&lt;li&gt;“Data storage is difficult, and ZFS-based storage doubly so. There's a lot of money to be made if you can do storage right, so it's uncommon to see a storage company with an open-source model deliver storage that doesn't suck.”&lt;/li&gt;
&lt;li&gt;“To become TrueNAS, FreeNAS's code is feature-frozen and tested rigorously. Bleeding-edge development continues with FreeNAS, and FreeNAS comes with far fewer guarantees than does TrueNAS.”&lt;/li&gt;
&lt;li&gt;“iXsystems provided a Z20 hybrid storage array. The Z20 is a dual-controller, SAS-based, high-availability, hybrid storage array. The testing unit came with a 2x 10GbE NIC per controller and retails around US$24k. The unit shipped with 10x 300GB 10k RPM magnetic hard drives, an 8GB ZIL SSD and a 200GB L2ARC SSD. 50GiB of RAM was dedicated to the ARC by the system's autotune feature.”&lt;/li&gt;
&lt;li&gt;The review tests the performance of the TrueNAS, which they found acceptable for spinning rust, but they also tested the HA features&lt;/li&gt;
&lt;li&gt;While the look of the UI didn’t impress them, the functionality and built in help did&lt;/li&gt;
&lt;li&gt;“The UI contains truly excellent mouseover tooltips that provide detailed information and rationale for almost every setting. An experienced sysadmin will be able to navigate the TrueNAS UI with ease. An experienced storage admin who knows what all the terms mean won't have to refer to a wiki or the more traditional help manual, but the same can't be said for the uninitiated.”&lt;/li&gt;
&lt;li&gt;“After a lot of testing, I'd trust my data to the TrueNAS. I am convinced that it will ensure the availability of my data to within any reasonable test, and do so as a high availability solution. That's more than I can say for a lot of storage out there.”&lt;/li&gt;
&lt;li&gt;“iXsystems produce a storage array that is decent enough to entice away some existing users of the likes of EMC, NetApp, Dell or HP. Honestly, that's not something I thought possible going into this review. It's a nice surprise.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/openbsd" target="_blank" rel="nofollow noopener"&gt;OpenBSD now officially on GitHub&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Got a couple of new OpenBSD items to bring to your attention today.&lt;/li&gt;
&lt;li&gt;First up, for those who didn’t know, OpenBSD development has (always?) taken place in CVS, similar to NetBSD and previously FreeBSD. &lt;/li&gt;
&lt;li&gt;However today, Git fans can rejoice, since there is now an “official” read-only github mirror of their sources for public consumption.&lt;/li&gt;
&lt;li&gt;Since this is read-only, I will assume (unless told otherwise) that pull-requests and whatnot aren’t taken. But this will come in handy for the “git-enabled” among us who need an easier way to checkout OpenBSD sources.&lt;/li&gt;
&lt;li&gt;There is also not yet a guarantee about the stability of the exporter. If you base a fork on the github branch, and something goes wrong with the exporter, the data may be reexported with different hashes, making it difficult to rebase your fork.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://libreboot.org/docs/bsd/openbsd.html" target="_blank" rel="nofollow noopener"&gt;How to install LibertyBSD or OpenBSD on a libreboot system&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For the second part of our OpenBSD stories, we have a pretty detailed document posted over at LibreBoot.org with details on how to boot-strap OpenBSD (Or LibertyBSD) using their open-source bios replacement.&lt;/li&gt;
&lt;li&gt;We’ve covered blog posts and other tidbits about this process in the past, but this seems to be the definitive version  (so far)  to reference.&lt;/li&gt;
&lt;li&gt;Some of the niceties include instructions on getting the USB image formatted not just on OpenBSD, but also FreeBSD, Linux and NetBSD.&lt;/li&gt;
&lt;li&gt;Instructions on how to boot without full-disk-encryption are provided, with a mention that so far Libreboot + Grub does not support FDE (yet). I would imagine somebody will need to port over the openBSD FDE crypto support to GRUB, as was done with GELI at some point.&lt;/li&gt;
&lt;li&gt;Lastly some instructions on how to configure grub, and troubleshoot if something goes wrong will help round-out this story. Give it a whirl, let us know if you run into issues.&lt;/li&gt;
&lt;li&gt;Editorial Aside - Personally I find the libreboot stuff fascinating. It really is one of the last areas that we don’t have full control of our systems with open-source. With the growth of EFI, it seems we rely on a closed-source binary / mini-OS of sorts just to boot our Open Source solutions, which needs to be addressed. Hats off to the LibreBoot folks for taking on this important challenge.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=wqSH_uQSArQ" target="_blank" rel="nofollow noopener"&gt;FreeNAS 9.10 – LAGG &amp;amp; VLAN Overview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A video tutorial on FreeNAS’s official YouTube Channel&lt;/li&gt;
&lt;li&gt;Covers the advanced networking features, Link Aggregation and VLANs&lt;/li&gt;
&lt;li&gt;Covers what the features do, and in the case of LAGG, how each of the modes work and when you might want to use it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.cybercoders.com/bsd-developer-remote-job-305206" target="_blank" rel="nofollow noopener"&gt;Remote BSD Developer Position is up for grabs&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/jeamland/status/785965716717441024" target="_blank" rel="nofollow noopener"&gt;Isilon is hiring for a FreeBSD Security position &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/google/web-bsd-hunt" target="_blank" rel="nofollow noopener"&gt;Google has ported the Networked real-time multi-player BSD game&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.vincentdelft.be" target="_blank" rel="nofollow noopener"&gt;A bunch of OpenBSD Tips&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.ebay.com/itm/-/332000602939" target="_blank" rel="nofollow noopener"&gt;The last OpenBSD 6.0 Limited Edition CD has sold&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/DLangille/status/788477000876892162" target="_blank" rel="nofollow noopener"&gt;Dan spots George Neville-Neil on TV at the Airport &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=h7zlxgtBA6o" target="_blank" rel="nofollow noopener"&gt;gnn on CNN&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://solobsd.blogspot.com/2016/10/release-solobsd-60-openbsd-edition.html" target="_blank" rel="nofollow noopener"&gt;SoloBSD releases v 6.0 built upon OpenBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://knoxbug.org/content/2016-10-25" target="_blank" rel="nofollow noopener"&gt;Upcoming KnoxBug looks at PacBSD - Oct 25th&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Kr9ykKTu" target="_blank" rel="nofollow noopener"&gt; Morgan - Ports and Packages&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/EwpTpp6D" target="_blank" rel="nofollow noopener"&gt; Mat - ZFS Memory&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/HYMPtfjz" target="_blank" rel="nofollow noopener"&gt; Thomas - FreeBSD Path Length&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/vGxZHMWE" target="_blank" rel="nofollow noopener"&gt; Cy - OpenBSD and NetHogs&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/5FMz116T" target="_blank" rel="nofollow noopener"&gt; Lars - Editors&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we’ve got all sorts of goodies to discuss. Starting with, vmm, vkernels, raspberry pi and much more! Some iX folks are visiting from out of</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20161012092516&mode=flat&count=15" rel="nofollow">vmm enabled </a></h3>

<ul>
<li>VMM, the OpenBSD hypervisor, has been imported into current</li>
<li>It has similar hardware requirements to bhyve, a Intel Nehalem or newer CPU with the hardware virtualization features enabled in the BIOS</li>
<li>AMD support has not been started yet</li>
<li>OpenBSD is the only supported guest</li>
<li>It would be interesting to hear from viewers that have tried it, and hear how it does, and what still needs more work
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624675.html" rel="nofollow">vkernels go COW</a></h3>

<ul>
<li>The DragonflyBSD feature, vkernels, has gained a new Copy-On-Write functionality</li>
<li>Disk images can now be mounted RO or RW, but changes will not be written back to the image file</li>
<li>This allows multiple vkernels to share the same disk image</li>
<li>“Note that when the vkernel operates on an image in this mode, modifications will eat up system memory and swap, so the user should be cognizant of the use-case.  Still, the flexibility of being able to mount the image R+W should not be underestimated.”</li>
<li>This is another feature we’d love to hear from viewers that have tried it out.
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/arm64/rpi3" rel="nofollow">Basic support for the RPI3 has landed in FreeBSD-CURRENT</a></h3>

<ul>
<li>The long awaited bits to allow FreeBSD to boot on the Raspberry Pi 3 have landed</li>
<li>There is still a bit of work to be done, some of the as mentioned in Oleksandr’s blog post:</li>
<li><a href="https://kernelnomicon.org/?p=690" rel="nofollow">Raspberry Pi support in HEAD</a> </li>
</ul>

<blockquote>
<p>“Raspberry Pi 3 limited support was committed to HEAD. Most of drivers should work with upstream dtb, RNG requires attention because callout mode seems to be broken and there is no IRQ in upstream device tree file. SMP is work in progress. There are some compatibility issue with VCHIQ driver due to some assumptions that are true only for ARM platform. “</p>
</blockquote>

<ul>
<li>This is exciting work. No HDMI support (yet), so if you plan on trying this out make sure you have your USB-&gt;Serial adapter cables ready to go.</li>
<li>Full Instructions to get started with your RPI 3 can be found on the <a href="https://wiki.freebsd.org/arm64/rpi3" rel="nofollow">FreeBSD Wiki</a></li>
<li>Relatively soon, I imagine there will be a RaspBSD build for the RPI3 to make it easier to get started</li>
<li>Eventually there will be official FreeBSD images as well
***</li>
</ul>

<h3><a href="https://github.com/openbsd/src/commit/2ba69c71e92471fe05f305bfa35aeac543ebec1f" rel="nofollow">OpenBSD switches softraid crypto from PKCS5 PBKDF2 to bcrypt PBKDF.</a></h3>

<ul>
<li>After the discussion a few weeks ago when a user wrote a tool to brute force their forgotten OpenBSD Full Disk Encryption password (from a password list of possible variations of their password), it was discovered that OpenBSD defaulted to using just 8192 iterations of PKCSv5 for the key derivation function with a SHA1-HMAC</li>
<li>The number of iterations can be manually controlled by the user when creating the softraid volume</li>
<li>By comparison, FreeBSDs GELI full disk encryption used a benchmark to pick a number of iterations that would take more than 2 seconds to complete, generally resulting in a number of iterations over 1 million on most modern hardware. The algorithm is based on a SHA512-HMAC</li>
<li>However, inefficiency in the implementation of PKCSv5 in GELI resulted in the implementation being 50% slower than some other implementations, meaning the effective security was only about 1 second per attempt, rather than the intended 2 seconds. The improved PKCSv5 implementation is out for review currently.</li>
<li>This commit to OpenBSD changes the default key derivation function to be based on bcrypt and a SHA512-HMAC instead.</li>
<li>OpenBSD also now uses a benchmark to pick a number of of iterations that will take approximately 1 second per attempt</li>
<li>“One weakness of PBKDF2 is that while its number of iterations can be adjusted to make it take an arbitrarily large amount of computing time, it can be implemented with a small circuit and very little RAM, which makes brute-force attacks using application-specific integrated circuits or graphics processing units relatively cheap. The bcrypt key derivation function requires a larger amount of RAM (but still not tunable separately, i. e. fixed for a given amount of CPU time) and is slightly stronger against such attacks, while the more modern scrypt key derivation function can use arbitrarily large amounts of memory and is therefore more resistant to ASIC and GPU attacks.”</li>
<li>The upgrade to the bcrypt, which has proven to be quite resistant to cracking by GPUs is a significant enhancement to OpenBSDs encrypted softraid feature
***</li>
</ul>

<h2>Interview - Josh Paetzel - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<ul>
<li>MeetBSD</li>
<li>ZFS Panel</li>
<li>FreeNAS - graceful network reload</li>
<li>Pxeboot
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2016-10-09-EC2s-most-dangerous-feature.html" rel="nofollow">EC2&#39;s most dangerous feature</a></h3>

<ul>
<li>Colin Percival, FreeBSD’s unofficial EC2 maintainer, has published a blog post about “EC2&#39;s most dangerous feature”</li>
<li>“As a FreeBSD developer — and someone who writes in C — I believe strongly in the idea of &quot;tools, not policy&quot;. If you want to shoot yourself in the foot, I&#39;ll help you deliver the bullet to your foot as efficiently and reliably as possible. UNIX has always been built around the idea that systems administrators are better equipped to figure out what they want than the developers of the OS, and it&#39;s almost impossible to prevent foot-shooting without also limiting useful functionality. The most powerful tools are inevitably dangerous, and often the best solution is to simply ensure that they come with sufficient warning labels attached; but occasionally I see tools which not only lack important warning labels, but are also designed in a way which makes them far more dangerous than necessary. Such a case is IAM Roles for Amazon EC2.”</li>
<li>“A review for readers unfamiliar with this feature: Amazon IAM (Identity and Access Management) is a service which allows for the creation of access credentials which are limited in scope; for example, you can have keys which can read objects from Amazon S3 but cannot write any objects. IAM Roles for EC2 are a mechanism for automatically creating such credentials and distributing them to EC2 instances; you specify a policy and launch an EC2 instance with that Role attached, and magic happens making time-limited credentials available via the EC2 instance metadata. This simplifies the task of creating and distributing credentials and is very convenient; I use it in my FreeBSD AMI Builder AMI, for example. Despite being convenient, there are two rather scary problems with this feature which severely limit the situations where I&#39;d recommend using it.”</li>
<li>“The first problem is one of configuration: The language used to specify IAM Policies is not sufficient to allow for EC2 instances to be properly limited in their powers. For example, suppose you want to allow EC2 instances to create, attach, detach, and delete Elastic Block Store volumes automatically — useful if you want to have filesystems automatically scaling up and down depending on the amount of data which they contain. The obvious way to do this is would be to &quot;tag&quot; the volumes belonging to an EC2 instance and provide a Role which can only act on volumes tagged to the instance where the Role was provided; while the second part of this (limiting actions to tagged volumes) seems to be possible, there is no way to require specific API call parameters on all permitted CreateVolume calls, as would be necessary to require that a tag is applied to any new volumes being created by the instance.”</li>
<li>“As problematic as the configuration is, a far larger problem with IAM Roles for Amazon EC2 is access control — or, to be more precise, the lack thereof. As I mentioned earlier, IAM Role credentials are exposed to EC2 instances via the EC2 instance metadata system: In other words, they&#39;re available from <a href="http://169.254.169.254/" rel="nofollow">http://169.254.169.254/</a>. (I presume that the &quot;EC2ws&quot; HTTP server which responds is running in another Xen domain on the same physical hardware, but that implementation detail is unimportant.) This makes the credentials easy for programs to obtain... unfortunately, too easy for programs to obtain. UNIX is designed as a multi-user operating system, with multiple users and groups and permission flags and often even more sophisticated ACLs — but there are very few systems which control the ability to make outgoing HTTP requests. We write software which relies on privilege separation to reduce the likelihood that a bug will result in a full system compromise; but if a process which is running as user nobody and chrooted into /var/empty is still able to fetch AWS keys which can read every one of the objects you have stored in S3, do you really have any meaningful privilege separation? To borrow a phrase from Ted Unangst, the way that IAM Roles expose credentials to EC2 instances makes them a very effective exploit mitigation mitigation technique.”</li>
<li>“To make it worse, exposing credentials — and other metadata, for that matter — via HTTP is completely unnecessary. EC2 runs on Xen, which already has a perfectly good key-value data store for conveying metadata between the host and guest instances. It would be absolutely trivial for Amazon to place EC2 metadata, including IAM credentials, into XenStore; and almost as trivial for EC2 instances to expose XenStore as a filesystem to which standard UNIX permissions could be applied, providing IAM Role credentials with the full range of access control functionality which UNIX affords to files stored on disk. Of course, there is a lot of code out there which relies on fetching EC2 instance metadata over HTTP, and trivial or not it would still take time to write code for pushing EC2 metadata into XenStore and exposing it via a filesystem inside instances; so even if someone at AWS reads this blog post and immediately says &quot;hey, we should fix this&quot;, I&#39;m sure we&#39;ll be stuck with the problems in IAM Roles for years to come.”</li>
<li>“So consider this a warning label: IAM Roles for EC2 may seem like a gun which you can use to efficiently and reliably shoot yourself in the foot; but in fact it&#39;s more like a gun which is difficult to aim and might be fired by someone on the other side of the room snapping his fingers. Handle with care!”
***</li>
</ul>

<h3><a href="http://www.theregister.co.uk/2016/10/18/truenas_review/" rel="nofollow">Open-source storage that doesn&#39;t suck? Our man tries to break TrueNAS</a></h3>

<ul>
<li>The storage reviewer over at TheRegister got their hands on a TrueNAS and gave it a try</li>
<li>“Data storage is difficult, and ZFS-based storage doubly so. There&#39;s a lot of money to be made if you can do storage right, so it&#39;s uncommon to see a storage company with an open-source model deliver storage that doesn&#39;t suck.”</li>
<li>“To become TrueNAS, FreeNAS&#39;s code is feature-frozen and tested rigorously. Bleeding-edge development continues with FreeNAS, and FreeNAS comes with far fewer guarantees than does TrueNAS.”</li>
<li>“iXsystems provided a Z20 hybrid storage array. The Z20 is a dual-controller, SAS-based, high-availability, hybrid storage array. The testing unit came with a 2x 10GbE NIC per controller and retails around US$24k. The unit shipped with 10x 300GB 10k RPM magnetic hard drives, an 8GB ZIL SSD and a 200GB L2ARC SSD. 50GiB of RAM was dedicated to the ARC by the system&#39;s autotune feature.”</li>
<li>The review tests the performance of the TrueNAS, which they found acceptable for spinning rust, but they also tested the HA features</li>
<li>While the look of the UI didn’t impress them, the functionality and built in help did</li>
<li>“The UI contains truly excellent mouseover tooltips that provide detailed information and rationale for almost every setting. An experienced sysadmin will be able to navigate the TrueNAS UI with ease. An experienced storage admin who knows what all the terms mean won&#39;t have to refer to a wiki or the more traditional help manual, but the same can&#39;t be said for the uninitiated.”</li>
<li>“After a lot of testing, I&#39;d trust my data to the TrueNAS. I am convinced that it will ensure the availability of my data to within any reasonable test, and do so as a high availability solution. That&#39;s more than I can say for a lot of storage out there.”</li>
<li>“iXsystems produce a storage array that is decent enough to entice away some existing users of the likes of EMC, NetApp, Dell or HP. Honestly, that&#39;s not something I thought possible going into this review. It&#39;s a nice surprise.”
***</li>
</ul>

<h3><a href="https://github.com/openbsd" rel="nofollow">OpenBSD now officially on GitHub</a></h3>

<ul>
<li>Got a couple of new OpenBSD items to bring to your attention today.</li>
<li>First up, for those who didn’t know, OpenBSD development has (always?) taken place in CVS, similar to NetBSD and previously FreeBSD. </li>
<li>However today, Git fans can rejoice, since there is now an “official” read-only github mirror of their sources for public consumption.</li>
<li>Since this is read-only, I will assume (unless told otherwise) that pull-requests and whatnot aren’t taken. But this will come in handy for the “git-enabled” among us who need an easier way to checkout OpenBSD sources.</li>
<li>There is also not yet a guarantee about the stability of the exporter. If you base a fork on the github branch, and something goes wrong with the exporter, the data may be reexported with different hashes, making it difficult to rebase your fork.</li>
</ul>

<h3><a href="https://libreboot.org/docs/bsd/openbsd.html" rel="nofollow">How to install LibertyBSD or OpenBSD on a libreboot system</a></h3>

<ul>
<li>For the second part of our OpenBSD stories, we have a pretty detailed document posted over at LibreBoot.org with details on how to boot-strap OpenBSD (Or LibertyBSD) using their open-source bios replacement.</li>
<li>We’ve covered blog posts and other tidbits about this process in the past, but this seems to be the definitive version  (so far)  to reference.</li>
<li>Some of the niceties include instructions on getting the USB image formatted not just on OpenBSD, but also FreeBSD, Linux and NetBSD.</li>
<li>Instructions on how to boot without full-disk-encryption are provided, with a mention that so far Libreboot + Grub does not support FDE (yet). I would imagine somebody will need to port over the openBSD FDE crypto support to GRUB, as was done with GELI at some point.</li>
<li>Lastly some instructions on how to configure grub, and troubleshoot if something goes wrong will help round-out this story. Give it a whirl, let us know if you run into issues.</li>
<li>Editorial Aside - Personally I find the libreboot stuff fascinating. It really is one of the last areas that we don’t have full control of our systems with open-source. With the growth of EFI, it seems we rely on a closed-source binary / mini-OS of sorts just to boot our Open Source solutions, which needs to be addressed. Hats off to the LibreBoot folks for taking on this important challenge.
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wqSH_uQSArQ" rel="nofollow">FreeNAS 9.10 – LAGG &amp; VLAN Overview</a></h3>

<ul>
<li>A video tutorial on FreeNAS’s official YouTube Channel</li>
<li>Covers the advanced networking features, Link Aggregation and VLANs</li>
<li>Covers what the features do, and in the case of LAGG, how each of the modes work and when you might want to use it
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.cybercoders.com/bsd-developer-remote-job-305206" rel="nofollow">Remote BSD Developer Position is up for grabs</a></p></li>
<li><p><a href="https://twitter.com/jeamland/status/785965716717441024" rel="nofollow">Isilon is hiring for a FreeBSD Security position </a></p></li>
<li><p><a href="https://github.com/google/web-bsd-hunt" rel="nofollow">Google has ported the Networked real-time multi-player BSD game</a></p></li>
<li><p><a href="http://www.vincentdelft.be" rel="nofollow">A bunch of OpenBSD Tips</a></p></li>
<li><p><a href="http://www.ebay.com/itm/-/332000602939" rel="nofollow">The last OpenBSD 6.0 Limited Edition CD has sold</a></p></li>
<li><p><a href="https://twitter.com/DLangille/status/788477000876892162" rel="nofollow">Dan spots George Neville-Neil on TV at the Airport </a> </p></li>
<li><p><a href="https://www.youtube.com/watch?v=h7zlxgtBA6o" rel="nofollow">gnn on CNN</a> </p></li>
<li><p><a href="http://solobsd.blogspot.com/2016/10/release-solobsd-60-openbsd-edition.html" rel="nofollow">SoloBSD releases v 6.0 built upon OpenBSD</a></p></li>
<li><p><a href="http://knoxbug.org/content/2016-10-25" rel="nofollow">Upcoming KnoxBug looks at PacBSD - Oct 25th</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/Kr9ykKTu" rel="nofollow"> Morgan - Ports and Packages</a> </li>
<li><a href="http://pastebin.com/EwpTpp6D" rel="nofollow"> Mat - ZFS Memory</a> </li>
<li><a href="http://pastebin.com/HYMPtfjz" rel="nofollow"> Thomas - FreeBSD Path Length</a> </li>
<li><a href="http://pastebin.com/vGxZHMWE" rel="nofollow"> Cy - OpenBSD and NetHogs</a> </li>
<li><a href="http://pastebin.com/5FMz116T" rel="nofollow"> Lars - Editors</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we’ve got all sorts of goodies to discuss. Starting with, vmm, vkernels, raspberry pi and much more! Some iX folks are visiting from out of</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20161012092516&mode=flat&count=15" rel="nofollow">vmm enabled </a></h3>

<ul>
<li>VMM, the OpenBSD hypervisor, has been imported into current</li>
<li>It has similar hardware requirements to bhyve, a Intel Nehalem or newer CPU with the hardware virtualization features enabled in the BIOS</li>
<li>AMD support has not been started yet</li>
<li>OpenBSD is the only supported guest</li>
<li>It would be interesting to hear from viewers that have tried it, and hear how it does, and what still needs more work
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624675.html" rel="nofollow">vkernels go COW</a></h3>

<ul>
<li>The DragonflyBSD feature, vkernels, has gained a new Copy-On-Write functionality</li>
<li>Disk images can now be mounted RO or RW, but changes will not be written back to the image file</li>
<li>This allows multiple vkernels to share the same disk image</li>
<li>“Note that when the vkernel operates on an image in this mode, modifications will eat up system memory and swap, so the user should be cognizant of the use-case.  Still, the flexibility of being able to mount the image R+W should not be underestimated.”</li>
<li>This is another feature we’d love to hear from viewers that have tried it out.
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/arm64/rpi3" rel="nofollow">Basic support for the RPI3 has landed in FreeBSD-CURRENT</a></h3>

<ul>
<li>The long awaited bits to allow FreeBSD to boot on the Raspberry Pi 3 have landed</li>
<li>There is still a bit of work to be done, some of the as mentioned in Oleksandr’s blog post:</li>
<li><a href="https://kernelnomicon.org/?p=690" rel="nofollow">Raspberry Pi support in HEAD</a> </li>
</ul>

<blockquote>
<p>“Raspberry Pi 3 limited support was committed to HEAD. Most of drivers should work with upstream dtb, RNG requires attention because callout mode seems to be broken and there is no IRQ in upstream device tree file. SMP is work in progress. There are some compatibility issue with VCHIQ driver due to some assumptions that are true only for ARM platform. “</p>
</blockquote>

<ul>
<li>This is exciting work. No HDMI support (yet), so if you plan on trying this out make sure you have your USB-&gt;Serial adapter cables ready to go.</li>
<li>Full Instructions to get started with your RPI 3 can be found on the <a href="https://wiki.freebsd.org/arm64/rpi3" rel="nofollow">FreeBSD Wiki</a></li>
<li>Relatively soon, I imagine there will be a RaspBSD build for the RPI3 to make it easier to get started</li>
<li>Eventually there will be official FreeBSD images as well
***</li>
</ul>

<h3><a href="https://github.com/openbsd/src/commit/2ba69c71e92471fe05f305bfa35aeac543ebec1f" rel="nofollow">OpenBSD switches softraid crypto from PKCS5 PBKDF2 to bcrypt PBKDF.</a></h3>

<ul>
<li>After the discussion a few weeks ago when a user wrote a tool to brute force their forgotten OpenBSD Full Disk Encryption password (from a password list of possible variations of their password), it was discovered that OpenBSD defaulted to using just 8192 iterations of PKCSv5 for the key derivation function with a SHA1-HMAC</li>
<li>The number of iterations can be manually controlled by the user when creating the softraid volume</li>
<li>By comparison, FreeBSDs GELI full disk encryption used a benchmark to pick a number of iterations that would take more than 2 seconds to complete, generally resulting in a number of iterations over 1 million on most modern hardware. The algorithm is based on a SHA512-HMAC</li>
<li>However, inefficiency in the implementation of PKCSv5 in GELI resulted in the implementation being 50% slower than some other implementations, meaning the effective security was only about 1 second per attempt, rather than the intended 2 seconds. The improved PKCSv5 implementation is out for review currently.</li>
<li>This commit to OpenBSD changes the default key derivation function to be based on bcrypt and a SHA512-HMAC instead.</li>
<li>OpenBSD also now uses a benchmark to pick a number of of iterations that will take approximately 1 second per attempt</li>
<li>“One weakness of PBKDF2 is that while its number of iterations can be adjusted to make it take an arbitrarily large amount of computing time, it can be implemented with a small circuit and very little RAM, which makes brute-force attacks using application-specific integrated circuits or graphics processing units relatively cheap. The bcrypt key derivation function requires a larger amount of RAM (but still not tunable separately, i. e. fixed for a given amount of CPU time) and is slightly stronger against such attacks, while the more modern scrypt key derivation function can use arbitrarily large amounts of memory and is therefore more resistant to ASIC and GPU attacks.”</li>
<li>The upgrade to the bcrypt, which has proven to be quite resistant to cracking by GPUs is a significant enhancement to OpenBSDs encrypted softraid feature
***</li>
</ul>

<h2>Interview - Josh Paetzel - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<ul>
<li>MeetBSD</li>
<li>ZFS Panel</li>
<li>FreeNAS - graceful network reload</li>
<li>Pxeboot
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2016-10-09-EC2s-most-dangerous-feature.html" rel="nofollow">EC2&#39;s most dangerous feature</a></h3>

<ul>
<li>Colin Percival, FreeBSD’s unofficial EC2 maintainer, has published a blog post about “EC2&#39;s most dangerous feature”</li>
<li>“As a FreeBSD developer — and someone who writes in C — I believe strongly in the idea of &quot;tools, not policy&quot;. If you want to shoot yourself in the foot, I&#39;ll help you deliver the bullet to your foot as efficiently and reliably as possible. UNIX has always been built around the idea that systems administrators are better equipped to figure out what they want than the developers of the OS, and it&#39;s almost impossible to prevent foot-shooting without also limiting useful functionality. The most powerful tools are inevitably dangerous, and often the best solution is to simply ensure that they come with sufficient warning labels attached; but occasionally I see tools which not only lack important warning labels, but are also designed in a way which makes them far more dangerous than necessary. Such a case is IAM Roles for Amazon EC2.”</li>
<li>“A review for readers unfamiliar with this feature: Amazon IAM (Identity and Access Management) is a service which allows for the creation of access credentials which are limited in scope; for example, you can have keys which can read objects from Amazon S3 but cannot write any objects. IAM Roles for EC2 are a mechanism for automatically creating such credentials and distributing them to EC2 instances; you specify a policy and launch an EC2 instance with that Role attached, and magic happens making time-limited credentials available via the EC2 instance metadata. This simplifies the task of creating and distributing credentials and is very convenient; I use it in my FreeBSD AMI Builder AMI, for example. Despite being convenient, there are two rather scary problems with this feature which severely limit the situations where I&#39;d recommend using it.”</li>
<li>“The first problem is one of configuration: The language used to specify IAM Policies is not sufficient to allow for EC2 instances to be properly limited in their powers. For example, suppose you want to allow EC2 instances to create, attach, detach, and delete Elastic Block Store volumes automatically — useful if you want to have filesystems automatically scaling up and down depending on the amount of data which they contain. The obvious way to do this is would be to &quot;tag&quot; the volumes belonging to an EC2 instance and provide a Role which can only act on volumes tagged to the instance where the Role was provided; while the second part of this (limiting actions to tagged volumes) seems to be possible, there is no way to require specific API call parameters on all permitted CreateVolume calls, as would be necessary to require that a tag is applied to any new volumes being created by the instance.”</li>
<li>“As problematic as the configuration is, a far larger problem with IAM Roles for Amazon EC2 is access control — or, to be more precise, the lack thereof. As I mentioned earlier, IAM Role credentials are exposed to EC2 instances via the EC2 instance metadata system: In other words, they&#39;re available from <a href="http://169.254.169.254/" rel="nofollow">http://169.254.169.254/</a>. (I presume that the &quot;EC2ws&quot; HTTP server which responds is running in another Xen domain on the same physical hardware, but that implementation detail is unimportant.) This makes the credentials easy for programs to obtain... unfortunately, too easy for programs to obtain. UNIX is designed as a multi-user operating system, with multiple users and groups and permission flags and often even more sophisticated ACLs — but there are very few systems which control the ability to make outgoing HTTP requests. We write software which relies on privilege separation to reduce the likelihood that a bug will result in a full system compromise; but if a process which is running as user nobody and chrooted into /var/empty is still able to fetch AWS keys which can read every one of the objects you have stored in S3, do you really have any meaningful privilege separation? To borrow a phrase from Ted Unangst, the way that IAM Roles expose credentials to EC2 instances makes them a very effective exploit mitigation mitigation technique.”</li>
<li>“To make it worse, exposing credentials — and other metadata, for that matter — via HTTP is completely unnecessary. EC2 runs on Xen, which already has a perfectly good key-value data store for conveying metadata between the host and guest instances. It would be absolutely trivial for Amazon to place EC2 metadata, including IAM credentials, into XenStore; and almost as trivial for EC2 instances to expose XenStore as a filesystem to which standard UNIX permissions could be applied, providing IAM Role credentials with the full range of access control functionality which UNIX affords to files stored on disk. Of course, there is a lot of code out there which relies on fetching EC2 instance metadata over HTTP, and trivial or not it would still take time to write code for pushing EC2 metadata into XenStore and exposing it via a filesystem inside instances; so even if someone at AWS reads this blog post and immediately says &quot;hey, we should fix this&quot;, I&#39;m sure we&#39;ll be stuck with the problems in IAM Roles for years to come.”</li>
<li>“So consider this a warning label: IAM Roles for EC2 may seem like a gun which you can use to efficiently and reliably shoot yourself in the foot; but in fact it&#39;s more like a gun which is difficult to aim and might be fired by someone on the other side of the room snapping his fingers. Handle with care!”
***</li>
</ul>

<h3><a href="http://www.theregister.co.uk/2016/10/18/truenas_review/" rel="nofollow">Open-source storage that doesn&#39;t suck? Our man tries to break TrueNAS</a></h3>

<ul>
<li>The storage reviewer over at TheRegister got their hands on a TrueNAS and gave it a try</li>
<li>“Data storage is difficult, and ZFS-based storage doubly so. There&#39;s a lot of money to be made if you can do storage right, so it&#39;s uncommon to see a storage company with an open-source model deliver storage that doesn&#39;t suck.”</li>
<li>“To become TrueNAS, FreeNAS&#39;s code is feature-frozen and tested rigorously. Bleeding-edge development continues with FreeNAS, and FreeNAS comes with far fewer guarantees than does TrueNAS.”</li>
<li>“iXsystems provided a Z20 hybrid storage array. The Z20 is a dual-controller, SAS-based, high-availability, hybrid storage array. The testing unit came with a 2x 10GbE NIC per controller and retails around US$24k. The unit shipped with 10x 300GB 10k RPM magnetic hard drives, an 8GB ZIL SSD and a 200GB L2ARC SSD. 50GiB of RAM was dedicated to the ARC by the system&#39;s autotune feature.”</li>
<li>The review tests the performance of the TrueNAS, which they found acceptable for spinning rust, but they also tested the HA features</li>
<li>While the look of the UI didn’t impress them, the functionality and built in help did</li>
<li>“The UI contains truly excellent mouseover tooltips that provide detailed information and rationale for almost every setting. An experienced sysadmin will be able to navigate the TrueNAS UI with ease. An experienced storage admin who knows what all the terms mean won&#39;t have to refer to a wiki or the more traditional help manual, but the same can&#39;t be said for the uninitiated.”</li>
<li>“After a lot of testing, I&#39;d trust my data to the TrueNAS. I am convinced that it will ensure the availability of my data to within any reasonable test, and do so as a high availability solution. That&#39;s more than I can say for a lot of storage out there.”</li>
<li>“iXsystems produce a storage array that is decent enough to entice away some existing users of the likes of EMC, NetApp, Dell or HP. Honestly, that&#39;s not something I thought possible going into this review. It&#39;s a nice surprise.”
***</li>
</ul>

<h3><a href="https://github.com/openbsd" rel="nofollow">OpenBSD now officially on GitHub</a></h3>

<ul>
<li>Got a couple of new OpenBSD items to bring to your attention today.</li>
<li>First up, for those who didn’t know, OpenBSD development has (always?) taken place in CVS, similar to NetBSD and previously FreeBSD. </li>
<li>However today, Git fans can rejoice, since there is now an “official” read-only github mirror of their sources for public consumption.</li>
<li>Since this is read-only, I will assume (unless told otherwise) that pull-requests and whatnot aren’t taken. But this will come in handy for the “git-enabled” among us who need an easier way to checkout OpenBSD sources.</li>
<li>There is also not yet a guarantee about the stability of the exporter. If you base a fork on the github branch, and something goes wrong with the exporter, the data may be reexported with different hashes, making it difficult to rebase your fork.</li>
</ul>

<h3><a href="https://libreboot.org/docs/bsd/openbsd.html" rel="nofollow">How to install LibertyBSD or OpenBSD on a libreboot system</a></h3>

<ul>
<li>For the second part of our OpenBSD stories, we have a pretty detailed document posted over at LibreBoot.org with details on how to boot-strap OpenBSD (Or LibertyBSD) using their open-source bios replacement.</li>
<li>We’ve covered blog posts and other tidbits about this process in the past, but this seems to be the definitive version  (so far)  to reference.</li>
<li>Some of the niceties include instructions on getting the USB image formatted not just on OpenBSD, but also FreeBSD, Linux and NetBSD.</li>
<li>Instructions on how to boot without full-disk-encryption are provided, with a mention that so far Libreboot + Grub does not support FDE (yet). I would imagine somebody will need to port over the openBSD FDE crypto support to GRUB, as was done with GELI at some point.</li>
<li>Lastly some instructions on how to configure grub, and troubleshoot if something goes wrong will help round-out this story. Give it a whirl, let us know if you run into issues.</li>
<li>Editorial Aside - Personally I find the libreboot stuff fascinating. It really is one of the last areas that we don’t have full control of our systems with open-source. With the growth of EFI, it seems we rely on a closed-source binary / mini-OS of sorts just to boot our Open Source solutions, which needs to be addressed. Hats off to the LibreBoot folks for taking on this important challenge.
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wqSH_uQSArQ" rel="nofollow">FreeNAS 9.10 – LAGG &amp; VLAN Overview</a></h3>

<ul>
<li>A video tutorial on FreeNAS’s official YouTube Channel</li>
<li>Covers the advanced networking features, Link Aggregation and VLANs</li>
<li>Covers what the features do, and in the case of LAGG, how each of the modes work and when you might want to use it
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.cybercoders.com/bsd-developer-remote-job-305206" rel="nofollow">Remote BSD Developer Position is up for grabs</a></p></li>
<li><p><a href="https://twitter.com/jeamland/status/785965716717441024" rel="nofollow">Isilon is hiring for a FreeBSD Security position </a></p></li>
<li><p><a href="https://github.com/google/web-bsd-hunt" rel="nofollow">Google has ported the Networked real-time multi-player BSD game</a></p></li>
<li><p><a href="http://www.vincentdelft.be" rel="nofollow">A bunch of OpenBSD Tips</a></p></li>
<li><p><a href="http://www.ebay.com/itm/-/332000602939" rel="nofollow">The last OpenBSD 6.0 Limited Edition CD has sold</a></p></li>
<li><p><a href="https://twitter.com/DLangille/status/788477000876892162" rel="nofollow">Dan spots George Neville-Neil on TV at the Airport </a> </p></li>
<li><p><a href="https://www.youtube.com/watch?v=h7zlxgtBA6o" rel="nofollow">gnn on CNN</a> </p></li>
<li><p><a href="http://solobsd.blogspot.com/2016/10/release-solobsd-60-openbsd-edition.html" rel="nofollow">SoloBSD releases v 6.0 built upon OpenBSD</a></p></li>
<li><p><a href="http://knoxbug.org/content/2016-10-25" rel="nofollow">Upcoming KnoxBug looks at PacBSD - Oct 25th</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/Kr9ykKTu" rel="nofollow"> Morgan - Ports and Packages</a> </li>
<li><a href="http://pastebin.com/EwpTpp6D" rel="nofollow"> Mat - ZFS Memory</a> </li>
<li><a href="http://pastebin.com/HYMPtfjz" rel="nofollow"> Thomas - FreeBSD Path Length</a> </li>
<li><a href="http://pastebin.com/vGxZHMWE" rel="nofollow"> Cy - OpenBSD and NetHogs</a> </li>
<li><a href="http://pastebin.com/5FMz116T" rel="nofollow"> Lars - Editors</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>163: Return of the Cantrill</title>
  <link>https://www.bsdnow.tv/163</link>
  <guid isPermaLink="false">da2fb252-95f1-407c-a537-6124802c6003</guid>
  <pubDate>Wed, 12 Oct 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/da2fb252-95f1-407c-a537-6124802c6003.mp3" length="94687348" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The wait is over, 11.0 of FreeBSD has (officially) launched. We’ll have coverage of this, plus a couple looks back at UNIX history, and a crowd-favorite guest today.</itunes:subtitle>
  <itunes:duration>2:11:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;The wait is over, 11.0 of FreeBSD has (officially) launched. We’ll have coverage of this, plus a couple looks back at UNIX history, and a crowd-favorite guest today.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2016-October/001760.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 11.0-RELEASE Now Available&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD 11.0-RELEASE is now officially out.&lt;/li&gt;
&lt;li&gt;A last minute reroll to pickup OpenSSL updates and a number of other security fixes meant the release was a little behind schedule, and shipped as 11.0-RELEASE-p1, but the release is better for it&lt;/li&gt;
&lt;li&gt;Improved support for 802.11n and various wifi drivers&lt;/li&gt;
&lt;li&gt;Support for the AArch64 (arm64) architecture has been added.&lt;/li&gt;
&lt;li&gt;Native graphics support has been added to the bhyve(8) hypervisor.&lt;/li&gt;
&lt;li&gt;A new flag, “onifconsole” has been added to /etc/ttys. This allows the system to provide a login prompt via serial console if the device is an active kernel console, otherwise it is equivalent to off.&lt;/li&gt;
&lt;li&gt;The xz(1) utility has been updated to support multi-threaded compression.&lt;/li&gt;
&lt;li&gt;A number of kernel panics related to VNET have been fixed&lt;/li&gt;
&lt;li&gt;The IMAGACT_BINMISC kernel configuration option has been enabled by default, which enables application execution through emulators, such as QEMU via binmiscctl(8).&lt;/li&gt;
&lt;li&gt;The GENERIC kernel configuration has been updated to include the IPSEC option by default.&lt;/li&gt;
&lt;li&gt;The kern.osrelease and kern.osreldate are now configurable jail(8) parameters&lt;/li&gt;
&lt;li&gt;A new sysctl(8), kern.racct.enable, has been added, which when set to a non-zero value allows using rctl(8) with the GENERIC kernel. A new kernel configuration option, RACCT_DISABLED has also been added.&lt;/li&gt;
&lt;li&gt;The minimum (arc_min) and maximum (arc_max) values for the ZFS adaptive replacement cache can be modified at runtime.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Changes to watch out for&lt;/strong&gt;:

&lt;ul&gt;
&lt;li&gt;OpenSSH DSA key generation has been disabled by default. It is important to update OpenSSH keys prior to upgrading. Additionally, Protocol 1 support has been removed.&lt;/li&gt;
&lt;li&gt;By default, the ifconfig(8) utility will set the default regulatory domain to FCC on wireless interfaces. As a result, newly created wireless interfaces with default settings will have less chance to violate country-specific regulations.&lt;/li&gt;
&lt;li&gt;An issue was discovered with Amazon® EC2™ images which would cause the virtual machine to hang during boot when upgrading from previous FreeBSD versions. New EC2™ installations are not affected, but existing installations running earlier releases are advised to wait until the issue is resolved in an Errata Notice before upgrading. An Errata Notice to address this is planned following the release.
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/process-listing-consistency" target="_blank" rel="nofollow noopener"&gt;process listing consistency&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst asks: how consistent is the output of ps(1)?&lt;/li&gt;
&lt;li&gt;If processes are starting and exiting constantly, and you run ps(1), is the output guaranteed to reflect that exact moment in time, or might it include some processes that have gone away before ps(1) exited, and include some processes that did not exist when ps(1) was started?&lt;/li&gt;
&lt;li&gt;Ted provides a little example chicken/egg program to try to create such an inconsistency, so you can test out your OS&lt;/li&gt;
&lt;li&gt;On OpenBSD ps(1) was switched away from the reading kernel memory directly, and instead uses the KERN_PROC_ALL sysctl&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Thus sysctl can iterate over the entire process list, copying out information to ps(1), without blocking. If we prevent processes from forking or exiting during this time, we get a consistent snapshot. The snapshot may be stale, but it will never show us a viewpoint that never happened.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So, OpenBSD will always be consistent, or will it?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Is there a way to trick ps on OpenBSD? Not everything is consistent. There’s a separate sysctl, KERN_PROC_ARGV, that reads the command line arguments for a process, but it only works on one process at a time. Processes can modify their own argv at any time.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;A second test program changes the process title of both the chicken and the egg, and if you run ps(1), you can get back a result that never actually happened.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The argv of the first program is read by ps(1), and in the meantime, it changes to a different value. The second program also changes its value, so now when ps(1) reads it, it sees the new value, not the original value from when ps(1) was started.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;So the output is not that consistent, but is it worth the effort to try to make it so?&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624673.html" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD - if_iwm - Add basic powermanagement support via ifconfig wlan0 powersave&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;WiFi can often be one of the biggest drains on your laptop battery, so anything we can do to improve the situation should be embraced. &lt;/li&gt;
&lt;li&gt;Imre VadÃ¡sz over at the DragonFly project has done that, porting over a new set of power management support from Linux to the if_iwm driver. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; if_iwm - Add basic powermanagement support via ifconfig wlan0 powersave.&lt;/p&gt;

&lt;p&gt;&amp;gt;  + The DEVICE_POWER_FLAGS_CAM_MSK flag was removed in the upstream iwlwifi in Linux commit ceef91c89480dd18bb3ac51e91280a233d0ca41f.&lt;/p&gt;

&lt;p&gt;&amp;gt;  + Add sc_ps_disabled flag to struct iwm_softc, which corresponds to mvm-&amp;gt;ps_disabled in struct iwl_mvm in Linux iwlwifi.&lt;/p&gt;

&lt;p&gt;&amp;gt;  + Adds a hw.iwm.power_scheme tunable which corresponds to the power_scheme module parameter in Linux iwlwifi. Set this to 1 for completely disabling power management, 2 (default) for balanced powermanagement, and 3 for lowerpower mode (which does dtim period skipping).&lt;/p&gt;

&lt;p&gt;&amp;gt; + Imports the constants.h file from iwlwifi as if_iwm_constants.h.&lt;/p&gt;

&lt;p&gt;&amp;gt; + This doesn't allow changing the powermanagement setting while connected,&lt;br&gt;
      also one can only choose between enabled and disabled powersaving with&lt;br&gt;
      ifconfig (so switching between balanced and low-power mode requires&lt;br&gt;
      rebooting to change the tunable).&lt;/p&gt;

&lt;p&gt;&amp;gt; + After any changes to powermanagement (i.e. "ifconfig wlan0 powersave" to&lt;br&gt;
      enable powermanagement, or "ifconfig wlan0 -powersave" for disabling&lt;br&gt;
      powermanagement), one has to disconnect and reconnect to the accespoint&lt;br&gt;
      for the change to take effect.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Good stuff! These positive changes need to happen more often and sooner, so we can all eek out every drop of power from our respective laptops.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://functionallyparanoid.com/2016/10/03/helping-out-an-internet-friend/" target="_blank" rel="nofollow noopener"&gt;Helping out an Internet Friend…Dual boot OpenBSD &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Dual-booting OpenBSD and Linux, via UEFI. A year ago we wouldn’t be discussing this, but today we have an article where somebody has done exactly that.&lt;/li&gt;
&lt;li&gt;This Journey was undertaken by Brian Everly (Indiana Bug), partly due to a friend who wanted to dual-boot his laptop which already has an existing UEFI install on it.&lt;/li&gt;
&lt;li&gt;As a proof of concept, he began by replicating the setup in VMware with UEFI&lt;/li&gt;
&lt;li&gt;He started by throwing Ubuntu into the VM, with some special attention paid to partitioning to ensure enough room left-over for OpenBSD later.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;I created a 64MB EFI partition at the front of the disk. Next, I created a 20GB primary partition at the beginning of the space, mounted as the root (/) filesystem.&lt;/p&gt;

&lt;p&gt;&amp;gt; I then added a 4096MB swap partition for Ubuntu. Finally, I used the rest of the free space to create a Reserved BIOS Boot Area FAT32 partition that was not associated with a mount point – this is where I will be installing OpenBSD.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;With that done, he wrapped up the Ubuntu installation and then turned over to to the OpenBSD side. Some manual partitioning was required to install to the “Reserved FAT32” partition.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I mashed through the defaults in the OpenBSD installer until I got to the disk partitioning.  Since I told VMWare to make my hard drive an IDE one, I knew I was playing around with wd0 and not sd0 (my USB key).  I dumped into fdisk by selecting to (E)dit the partition scheme and saw my setup from Linux.  First was the EFI partition (I am guessing I’ll have to copy my bootx64.efi file to that at some point), second was the Linux etx4 partition, third was my Linux swap partition and fourth was a weird looking one that is the “Reserved BIOS Boot” partition.  That’s the one I’ll fiddle with.&lt;/p&gt;

&lt;p&gt;&amp;gt; Issuing the command “edit 3” allowed me to fiddle with that partition #3 (remember, we start counting at zero).  I set it’s type to “A6” (OpenBSD) and then took the defaults with the exception of naming it “OpenBSD”.  A quick “write” followed by a “quit” allowed me to update my new partition and get back to the installer.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Once the installation was wrapped up (OpenBSD helpfully already created the /boot/EFI partition with the correct EFI loader installed) he was able to reboot and select between the two systems at the UEFI bios screen.&lt;/li&gt;
&lt;li&gt;For kicks, he lastly went into Ubuntu and grabbed refind. Installing refind provided a fancy graphical selector between the two systems without too much trouble.&lt;/li&gt;
&lt;li&gt;Next step will be to replicate this process on his friend’s laptop. Wishing you luck with that journey!&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Bryan Cantrill - &lt;a href="mailto:email@email" target="_blank" rel="nofollow noopener"&gt;email@email&lt;/a&gt; / &lt;a href="https://twitter.com/user" target="_blank" rel="nofollow noopener"&gt;@twitter&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;CTO of Joyent
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://bsd.slashdot.org/story/16/10/09/0230203/after-22-years-386bsd-gets-an-update" target="_blank" rel="nofollow noopener"&gt;After 22 Years, 386BSD Gets An Update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Slashdot brings us an interesting mention this week, specifically that after 22 years, we now have an update to 386BSD.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; 386BSD was last released back in 1994 with a series of articles in Dr. Dobb's Journal -- but then developers for this BSD-based operating system started migrating to both FreeBSD and NetBSD. An anonymous Slashdot reader writes: The last known public release was version 0.1. Until Wednesday, when Lynne Jolitz, one of the co-authors of 386BSD, released the source code to version 1.0 as well as 2.0 on Github.&lt;/p&gt;

&lt;p&gt;&amp;gt; 386BSD takes us back to the days when you could count every file in your Unix distribution and more importantly, read and understand all of your OS source code. 386BSD is also the missing link between BSD and Linux. One can find fragments of Linus Torvalds's math emulation code in the source code of 386BSD. To quote Linus: "If 386BSD had been available when I started on Linux, Linux would probably never had happened.”&lt;/p&gt;

&lt;p&gt;&amp;gt; Though it was designed for Intel 80386 microprocessors, there's already instructions for launching it on the hosted hardware virtualization service Qemu.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There you have it! Go grab the new hotness that is 386BSD and run it in 2016! Or perhaps you want FreeBSD 11, but to each their own.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160929230557&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;Progress of the OpenBSD Limited Edition Signed CD set&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An update from a story last week! We mentioned the “very” limited edition OpenBSD 6.0 signed CD sets that had gone up for Auction on Ebay. (With proceeds to support for Foundation)&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;As of today, here’s where we stand:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;CD set #1 (Sep 29th + 5 days) &lt;a href="http://www.ebay.com/itm/-/331985953783" target="_blank" rel="nofollow noopener"&gt;sold for $4200&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CD set #2 (Oct 4th + 3 days) &lt;a href="http://www.ebay.com/itm/-/331990536246" target="_blank" rel="nofollow noopener"&gt;sold for $3000&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CD set #3 (Oct 8th + 3 days) &lt;a href="http://www.ebay.com/itm/-/331994217419" target="_blank" rel="nofollow noopener"&gt;sold for $817&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;CD set #4 (Oct 11th + 3 days) is &lt;a href="http://www.ebay.com/itm/-/331997031152" target="_blank" rel="nofollow noopener"&gt;currently up for bidding&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;There you have it! The 4th set is almost wrapped up bidding, and the 5th and last set is not far behind. Be sure to grab your piece of BSD history before its gone!&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/3ofcoins/jetpack" target="_blank" rel="nofollow noopener"&gt;&lt;strong&gt;PROTOTYPE&lt;/strong&gt; FreeBSD Jail/ZFS based implementation of the Application Container Specification&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; “Jetpack is an experimental and incomplete implementation of the App Container Specification for FreeBSD. It uses jails as isolation mechanism, and ZFS for layered storage.”&lt;br&gt;
&amp;gt; “This document uses some language used in Rocket, the reference implementation of the App Container Specification. While the documentation will be expanded in the future, currently you need to be familiar at least with Rocket's README to understand everything.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A standard with multiple implementations, that allow substitution of components, such as FreeBSD Jails instead of docker/lxc etc, and ZFS instead of overlayfs etc, is very exciting
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://fossbytes.com/xenix-history-microsoft-unix-operating-system/" target="_blank" rel="nofollow noopener"&gt;Microsoft’s Forgotten Unix-based Operating System&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Do you remember the good old days. You know, when Microsoft was the driving force behind UNIX? Wait, what did you say you may be thinking? It’s true, and lets sit back and let FossBytes tell us a tale of what once was reality.&lt;/li&gt;
&lt;li&gt;The story begins sometime in the late 70’s:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Turning back the pages to the late 1970’s, Microsoft entered into an agreement with AT&amp;amp;T Corporation to license Unix from AT&amp;amp;T. While the company didn’t sell the OS to public, it licensed it to other OEM vendors like Intel, SCO, and Tandy.&lt;/p&gt;

&lt;p&gt;&amp;gt; As Microsoft had to face legal trouble due to “Unix” name, the company renamed it and came up with its own Unix distribution. So, AT&amp;amp;T licensed Unix to Redmond that was passed on to other OEMs as Xenix.&lt;/p&gt;

&lt;p&gt;&amp;gt; It’s interesting to recall a time when Microsoft enabled people to run Unix — an operating system originally designed for large and multiuser systems — on a microcomputer. Even though it came first, Unix was probably more powerful than MS-DOS.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So whatever happened to this microsoft-flavored UNIX you may ask? Sadly it was ditched for DOS due to $REASONS:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; In early 1980’s, IBM was looking for an OS to power its PC. As IBM didn’t want to maintain any ties with the recently split AT&amp;amp;T, Xenix was automatically rejected. To fulfill, the tech giant’s demand, Microsoft bought 86-DOS from Seattle Computer Products and managed to convince IBM to use it in their systems.&lt;/p&gt;

&lt;p&gt;&amp;gt; Slowly, Microsoft started losing interest in Xenix and traded the full rights of Xenix with SCO, a Xenix partner company. The company filed bankruptcy in 2007 before taking the Xenix legacy to the 21st century in the form of Open Server, previously known as SCO Unix and SCO Open Desktop.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An interesting chapter in UNIX history to be sure, and funny enough may come full-circle someday with Microsoft beginning to show interest in UNIX and BSD once again.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2791" target="_blank" rel="nofollow noopener"&gt;Ohio LinuxFest 2016 wrap-up&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://learnxinyminutes.com/docs/zfs/" target="_blank" rel="nofollow noopener"&gt;Learn X in Y minutes Where X=zfs&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=306430" target="_blank" rel="nofollow noopener"&gt;Add touchscreen support for the official 7" RPi touch display &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://kernelnomicon.org/?p=682" target="_blank" rel="nofollow noopener"&gt;64-bit U-Boot on Raspberry Pi 3 &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.ixsystems.com/blog/snia-sdc-2016-recap-michael-dexter/" target="_blank" rel="nofollow noopener"&gt;SNIA SDC 2016 Recap: Michael Dexter&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.ixsystems.com/blog/openzfs-devsummit-2016/" target="_blank" rel="nofollow noopener"&gt;OpenZFS: Stronger than ever&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://nvlpubs.nist.gov/nistpubs/jres/121/jres.121.023.pdf" target="_blank" rel="nofollow noopener"&gt;Accurate, Traceable, and Verifiable Time Synchronization for World Financial Markets&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.ietf.org/rfc/ien/ien137.txt" target="_blank" rel="nofollow noopener"&gt;ON HOLY WARS AND A PLEA FOR PEACE&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/CYcqmW7P" target="_blank" rel="nofollow noopener"&gt; Morgan - Zero-Filling an VM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/12mNW57h" target="_blank" rel="nofollow noopener"&gt; Charlie - ZFS Bit-Rot&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/NfYWt2cu" target="_blank" rel="nofollow noopener"&gt; Matias - TrueOS / Launchd&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/UvKh2WcF" target="_blank" rel="nofollow noopener"&gt; Dale - DO Feedback&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/0cdMc88U" target="_blank" rel="nofollow noopener"&gt; James - DO / FreeBSD Locks?&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The wait is over, 11.0 of FreeBSD has (officially) launched. We’ll have coverage of this, plus a couple looks back at UNIX history, and a crowd-favorite guest today.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2016-October/001760.html" rel="nofollow">FreeBSD 11.0-RELEASE Now Available</a></h3>

<ul>
<li>FreeBSD 11.0-RELEASE is now officially out.</li>
<li>A last minute reroll to pickup OpenSSL updates and a number of other security fixes meant the release was a little behind schedule, and shipped as 11.0-RELEASE-p1, but the release is better for it</li>
<li>Improved support for 802.11n and various wifi drivers</li>
<li>Support for the AArch64 (arm64) architecture has been added.</li>
<li>Native graphics support has been added to the bhyve(8) hypervisor.</li>
<li>A new flag, “onifconsole” has been added to /etc/ttys. This allows the system to provide a login prompt via serial console if the device is an active kernel console, otherwise it is equivalent to off.</li>
<li>The xz(1) utility has been updated to support multi-threaded compression.</li>
<li>A number of kernel panics related to VNET have been fixed</li>
<li>The IMAGACT_BINMISC kernel configuration option has been enabled by default, which enables application execution through emulators, such as QEMU via binmiscctl(8).</li>
<li>The GENERIC kernel configuration has been updated to include the IPSEC option by default.</li>
<li>The kern.osrelease and kern.osreldate are now configurable jail(8) parameters</li>
<li>A new sysctl(8), kern.racct.enable, has been added, which when set to a non-zero value allows using rctl(8) with the GENERIC kernel. A new kernel configuration option, RACCT_DISABLED has also been added.</li>
<li>The minimum (arc_min) and maximum (arc_max) values for the ZFS adaptive replacement cache can be modified at runtime.</li>
<li><strong>Changes to watch out for</strong>:

<ul>
<li>OpenSSH DSA key generation has been disabled by default. It is important to update OpenSSH keys prior to upgrading. Additionally, Protocol 1 support has been removed.</li>
<li>By default, the ifconfig(8) utility will set the default regulatory domain to FCC on wireless interfaces. As a result, newly created wireless interfaces with default settings will have less chance to violate country-specific regulations.</li>
<li>An issue was discovered with Amazon® EC2™ images which would cause the virtual machine to hang during boot when upgrading from previous FreeBSD versions. New EC2™ installations are not affected, but existing installations running earlier releases are advised to wait until the issue is resolved in an Errata Notice before upgrading. An Errata Notice to address this is planned following the release.
***</li>
</ul></li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/process-listing-consistency" rel="nofollow">process listing consistency</a></h3>

<ul>
<li>Ted Unangst asks: how consistent is the output of ps(1)?</li>
<li>If processes are starting and exiting constantly, and you run ps(1), is the output guaranteed to reflect that exact moment in time, or might it include some processes that have gone away before ps(1) exited, and include some processes that did not exist when ps(1) was started?</li>
<li>Ted provides a little example chicken/egg program to try to create such an inconsistency, so you can test out your OS</li>
<li>On OpenBSD ps(1) was switched away from the reading kernel memory directly, and instead uses the KERN_PROC_ALL sysctl</li>
</ul>

<blockquote>
<p>Thus sysctl can iterate over the entire process list, copying out information to ps(1), without blocking. If we prevent processes from forking or exiting during this time, we get a consistent snapshot. The snapshot may be stale, but it will never show us a viewpoint that never happened.</p>
</blockquote>

<ul>
<li>So, OpenBSD will always be consistent, or will it?</li>
</ul>

<blockquote>
<p>Is there a way to trick ps on OpenBSD? Not everything is consistent. There’s a separate sysctl, KERN_PROC_ARGV, that reads the command line arguments for a process, but it only works on one process at a time. Processes can modify their own argv at any time.</p>
</blockquote>

<ul>
<li><p>A second test program changes the process title of both the chicken and the egg, and if you run ps(1), you can get back a result that never actually happened.</p></li>
<li><p>The argv of the first program is read by ps(1), and in the meantime, it changes to a different value. The second program also changes its value, so now when ps(1) reads it, it sees the new value, not the original value from when ps(1) was started.</p></li>
<li><p>So the output is not that consistent, but is it worth the effort to try to make it so?</p>

<hr></li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624673.html" rel="nofollow">DragonFlyBSD - if_iwm - Add basic powermanagement support via ifconfig wlan0 powersave</a></h3>

<ul>
<li>WiFi can often be one of the biggest drains on your laptop battery, so anything we can do to improve the situation should be embraced. </li>
<li>Imre VadÃ¡sz over at the DragonFly project has done that, porting over a new set of power management support from Linux to the if_iwm driver. </li>
</ul>

<blockquote>
<p>if_iwm - Add basic powermanagement support via ifconfig wlan0 powersave.</p>

<ul>
<li><p>The DEVICE_POWER_FLAGS_CAM_MSK flag was removed in the upstream iwlwifi in Linux commit ceef91c89480dd18bb3ac51e91280a233d0ca41f.</p></li>
<li><p>Add sc_ps_disabled flag to struct iwm_softc, which corresponds to mvm-&gt;ps_disabled in struct iwl_mvm in Linux iwlwifi.</p></li>
<li><p>Adds a hw.iwm.power_scheme tunable which corresponds to the power_scheme module parameter in Linux iwlwifi. Set this to 1 for completely disabling power management, 2 (default) for balanced powermanagement, and 3 for lowerpower mode (which does dtim period skipping).</p>

<ul>
<li>Imports the constants.h file from iwlwifi as if_iwm_constants.h.</li>
<li>This doesn&#39;t allow changing the powermanagement setting while connected,
also one can only choose between enabled and disabled powersaving with
ifconfig (so switching between balanced and low-power mode requires
rebooting to change the tunable).</li>
<li>After any changes to powermanagement (i.e. &quot;ifconfig wlan0 powersave&quot; to
enable powermanagement, or &quot;ifconfig wlan0 -powersave&quot; for disabling
powermanagement), one has to disconnect and reconnect to the accespoint
for the change to take effect.“</li>
</ul></li>
</ul>
</blockquote>

<ul>
<li>Good stuff! These positive changes need to happen more often and sooner, so we can all eek out every drop of power from our respective laptops.
***</li>
</ul>

<h3><a href="https://functionallyparanoid.com/2016/10/03/helping-out-an-internet-friend/" rel="nofollow">Helping out an Internet Friend…Dual boot OpenBSD </a></h3>

<ul>
<li>Dual-booting OpenBSD and Linux, via UEFI. A year ago we wouldn’t be discussing this, but today we have an article where somebody has done exactly that.</li>
<li>This Journey was undertaken by Brian Everly (Indiana Bug), partly due to a friend who wanted to dual-boot his laptop which already has an existing UEFI install on it.</li>
<li>As a proof of concept, he began by replicating the setup in VMware with UEFI</li>
<li>He started by throwing Ubuntu into the VM, with some special attention paid to partitioning to ensure enough room left-over for OpenBSD later.</li>
</ul>

<blockquote>
<p>I created a 64MB EFI partition at the front of the disk. Next, I created a 20GB primary partition at the beginning of the space, mounted as the root (/) filesystem.</p>

<p>I then added a 4096MB swap partition for Ubuntu. Finally, I used the rest of the free space to create a Reserved BIOS Boot Area FAT32 partition that was not associated with a mount point – this is where I will be installing OpenBSD.</p>
</blockquote>

<ul>
<li>With that done, he wrapped up the Ubuntu installation and then turned over to to the OpenBSD side. Some manual partitioning was required to install to the “Reserved FAT32” partition.</li>
</ul>

<blockquote>
<p>I mashed through the defaults in the OpenBSD installer until I got to the disk partitioning.  Since I told VMWare to make my hard drive an IDE one, I knew I was playing around with wd0 and not sd0 (my USB key).  I dumped into fdisk by selecting to (E)dit the partition scheme and saw my setup from Linux.  First was the EFI partition (I am guessing I’ll have to copy my bootx64.efi file to that at some point), second was the Linux etx4 partition, third was my Linux swap partition and fourth was a weird looking one that is the “Reserved BIOS Boot” partition.  That’s the one I’ll fiddle with.</p>

<p>Issuing the command “edit 3” allowed me to fiddle with that partition #3 (remember, we start counting at zero).  I set it’s type to “A6” (OpenBSD) and then took the defaults with the exception of naming it “OpenBSD”.  A quick “write” followed by a “quit” allowed me to update my new partition and get back to the installer.</p>
</blockquote>

<ul>
<li>Once the installation was wrapped up (OpenBSD helpfully already created the /boot/EFI partition with the correct EFI loader installed) he was able to reboot and select between the two systems at the UEFI bios screen.</li>
<li>For kicks, he lastly went into Ubuntu and grabbed refind. Installing refind provided a fancy graphical selector between the two systems without too much trouble.</li>
<li>Next step will be to replicate this process on his friend’s laptop. Wishing you luck with that journey!</li>
</ul>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<ul>
<li>CTO of Joyent
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://bsd.slashdot.org/story/16/10/09/0230203/after-22-years-386bsd-gets-an-update" rel="nofollow">After 22 Years, 386BSD Gets An Update</a></h3>

<ul>
<li>Slashdot brings us an interesting mention this week, specifically that after 22 years, we now have an update to 386BSD.</li>
</ul>

<blockquote>
<p>386BSD was last released back in 1994 with a series of articles in Dr. Dobb&#39;s Journal -- but then developers for this BSD-based operating system started migrating to both FreeBSD and NetBSD. An anonymous Slashdot reader writes: The last known public release was version 0.1. Until Wednesday, when Lynne Jolitz, one of the co-authors of 386BSD, released the source code to version 1.0 as well as 2.0 on Github.</p>

<p>386BSD takes us back to the days when you could count every file in your Unix distribution and more importantly, read and understand all of your OS source code. 386BSD is also the missing link between BSD and Linux. One can find fragments of Linus Torvalds&#39;s math emulation code in the source code of 386BSD. To quote Linus: &quot;If 386BSD had been available when I started on Linux, Linux would probably never had happened.”</p>

<p>Though it was designed for Intel 80386 microprocessors, there&#39;s already instructions for launching it on the hosted hardware virtualization service Qemu.</p>
</blockquote>

<ul>
<li>There you have it! Go grab the new hotness that is 386BSD and run it in 2016! Or perhaps you want FreeBSD 11, but to each their own.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160929230557&mode=expanded" rel="nofollow">Progress of the OpenBSD Limited Edition Signed CD set</a></h3>

<ul>
<li>An update from a story last week! We mentioned the “very” limited edition OpenBSD 6.0 signed CD sets that had gone up for Auction on Ebay. (With proceeds to support for Foundation)</li>
<li><p>As of today, here’s where we stand:</p>

<ul>
<li>CD set #1 (Sep 29th + 5 days) <a href="http://www.ebay.com/itm/-/331985953783" rel="nofollow">sold for $4200</a></li>
<li>CD set #2 (Oct 4th + 3 days) <a href="http://www.ebay.com/itm/-/331990536246" rel="nofollow">sold for $3000</a></li>
<li>CD set #3 (Oct 8th + 3 days) <a href="http://www.ebay.com/itm/-/331994217419" rel="nofollow">sold for $817</a></li>
<li>CD set #4 (Oct 11th + 3 days) is <a href="http://www.ebay.com/itm/-/331997031152" rel="nofollow">currently up for bidding</a></li>
</ul></li>
<li><p>There you have it! The 4th set is almost wrapped up bidding, and the 5th and last set is not far behind. Be sure to grab your piece of BSD history before its gone!</p>

<hr></li>
</ul>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow"><strong>PROTOTYPE</strong> FreeBSD Jail/ZFS based implementation of the Application Container Specification</a></h3>

<blockquote>
<p>“Jetpack is an experimental and incomplete implementation of the App Container Specification for FreeBSD. It uses jails as isolation mechanism, and ZFS for layered storage.”<br>
“This document uses some language used in Rocket, the reference implementation of the App Container Specification. While the documentation will be expanded in the future, currently you need to be familiar at least with Rocket&#39;s README to understand everything.”</p>

<ul>
<li>A standard with multiple implementations, that allow substitution of components, such as FreeBSD Jails instead of docker/lxc etc, and ZFS instead of overlayfs etc, is very exciting
***</li>
</ul>
</blockquote>

<h3><a href="https://fossbytes.com/xenix-history-microsoft-unix-operating-system/" rel="nofollow">Microsoft’s Forgotten Unix-based Operating System</a></h3>

<ul>
<li>Do you remember the good old days. You know, when Microsoft was the driving force behind UNIX? Wait, what did you say you may be thinking? It’s true, and lets sit back and let FossBytes tell us a tale of what once was reality.</li>
<li>The story begins sometime in the late 70’s:</li>
</ul>

<blockquote>
<p>Turning back the pages to the late 1970’s, Microsoft entered into an agreement with AT&amp;T Corporation to license Unix from AT&amp;T. While the company didn’t sell the OS to public, it licensed it to other OEM vendors like Intel, SCO, and Tandy.</p>

<p>As Microsoft had to face legal trouble due to “Unix” name, the company renamed it and came up with its own Unix distribution. So, AT&amp;T licensed Unix to Redmond that was passed on to other OEMs as Xenix.</p>

<p>It’s interesting to recall a time when Microsoft enabled people to run Unix — an operating system originally designed for large and multiuser systems — on a microcomputer. Even though it came first, Unix was probably more powerful than MS-DOS.</p>
</blockquote>

<ul>
<li>So whatever happened to this microsoft-flavored UNIX you may ask? Sadly it was ditched for DOS due to $REASONS:</li>
</ul>

<blockquote>
<p>In early 1980’s, IBM was looking for an OS to power its PC. As IBM didn’t want to maintain any ties with the recently split AT&amp;T, Xenix was automatically rejected. To fulfill, the tech giant’s demand, Microsoft bought 86-DOS from Seattle Computer Products and managed to convince IBM to use it in their systems.</p>

<p>Slowly, Microsoft started losing interest in Xenix and traded the full rights of Xenix with SCO, a Xenix partner company. The company filed bankruptcy in 2007 before taking the Xenix legacy to the 21st century in the form of Open Server, previously known as SCO Unix and SCO Open Desktop.</p>
</blockquote>

<ul>
<li>An interesting chapter in UNIX history to be sure, and funny enough may come full-circle someday with Microsoft beginning to show interest in UNIX and BSD once again.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://blather.michaelwlucas.com/archives/2791" rel="nofollow">Ohio LinuxFest 2016 wrap-up</a></p></li>
<li><p><a href="https://learnxinyminutes.com/docs/zfs/" rel="nofollow">Learn X in Y minutes Where X=zfs</a></p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=306430" rel="nofollow">Add touchscreen support for the official 7&quot; RPi touch display </a> </p></li>
<li><p><a href="https://kernelnomicon.org/?p=682" rel="nofollow">64-bit U-Boot on Raspberry Pi 3 </a></p></li>
<li><p><a href="https://www.ixsystems.com/blog/snia-sdc-2016-recap-michael-dexter/" rel="nofollow">SNIA SDC 2016 Recap: Michael Dexter</a></p></li>
<li><p><a href="https://www.ixsystems.com/blog/openzfs-devsummit-2016/" rel="nofollow">OpenZFS: Stronger than ever</a> </p></li>
<li><p><a href="http://nvlpubs.nist.gov/nistpubs/jres/121/jres.121.023.pdf" rel="nofollow">Accurate, Traceable, and Verifiable Time Synchronization for World Financial Markets</a> </p></li>
<li><p><a href="https://www.ietf.org/rfc/ien/ien137.txt" rel="nofollow">ON HOLY WARS AND A PLEA FOR PEACE</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/CYcqmW7P" rel="nofollow"> Morgan - Zero-Filling an VM</a> </li>
<li><a href="http://pastebin.com/12mNW57h" rel="nofollow"> Charlie - ZFS Bit-Rot</a> </li>
<li><a href="http://pastebin.com/NfYWt2cu" rel="nofollow"> Matias - TrueOS / Launchd</a> </li>
<li><a href="http://pastebin.com/UvKh2WcF" rel="nofollow"> Dale - DO Feedback</a> </li>
<li><a href="http://pastebin.com/0cdMc88U" rel="nofollow"> James - DO / FreeBSD Locks?</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The wait is over, 11.0 of FreeBSD has (officially) launched. We’ll have coverage of this, plus a couple looks back at UNIX history, and a crowd-favorite guest today.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2016-October/001760.html" rel="nofollow">FreeBSD 11.0-RELEASE Now Available</a></h3>

<ul>
<li>FreeBSD 11.0-RELEASE is now officially out.</li>
<li>A last minute reroll to pickup OpenSSL updates and a number of other security fixes meant the release was a little behind schedule, and shipped as 11.0-RELEASE-p1, but the release is better for it</li>
<li>Improved support for 802.11n and various wifi drivers</li>
<li>Support for the AArch64 (arm64) architecture has been added.</li>
<li>Native graphics support has been added to the bhyve(8) hypervisor.</li>
<li>A new flag, “onifconsole” has been added to /etc/ttys. This allows the system to provide a login prompt via serial console if the device is an active kernel console, otherwise it is equivalent to off.</li>
<li>The xz(1) utility has been updated to support multi-threaded compression.</li>
<li>A number of kernel panics related to VNET have been fixed</li>
<li>The IMAGACT_BINMISC kernel configuration option has been enabled by default, which enables application execution through emulators, such as QEMU via binmiscctl(8).</li>
<li>The GENERIC kernel configuration has been updated to include the IPSEC option by default.</li>
<li>The kern.osrelease and kern.osreldate are now configurable jail(8) parameters</li>
<li>A new sysctl(8), kern.racct.enable, has been added, which when set to a non-zero value allows using rctl(8) with the GENERIC kernel. A new kernel configuration option, RACCT_DISABLED has also been added.</li>
<li>The minimum (arc_min) and maximum (arc_max) values for the ZFS adaptive replacement cache can be modified at runtime.</li>
<li><strong>Changes to watch out for</strong>:

<ul>
<li>OpenSSH DSA key generation has been disabled by default. It is important to update OpenSSH keys prior to upgrading. Additionally, Protocol 1 support has been removed.</li>
<li>By default, the ifconfig(8) utility will set the default regulatory domain to FCC on wireless interfaces. As a result, newly created wireless interfaces with default settings will have less chance to violate country-specific regulations.</li>
<li>An issue was discovered with Amazon® EC2™ images which would cause the virtual machine to hang during boot when upgrading from previous FreeBSD versions. New EC2™ installations are not affected, but existing installations running earlier releases are advised to wait until the issue is resolved in an Errata Notice before upgrading. An Errata Notice to address this is planned following the release.
***</li>
</ul></li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/process-listing-consistency" rel="nofollow">process listing consistency</a></h3>

<ul>
<li>Ted Unangst asks: how consistent is the output of ps(1)?</li>
<li>If processes are starting and exiting constantly, and you run ps(1), is the output guaranteed to reflect that exact moment in time, or might it include some processes that have gone away before ps(1) exited, and include some processes that did not exist when ps(1) was started?</li>
<li>Ted provides a little example chicken/egg program to try to create such an inconsistency, so you can test out your OS</li>
<li>On OpenBSD ps(1) was switched away from the reading kernel memory directly, and instead uses the KERN_PROC_ALL sysctl</li>
</ul>

<blockquote>
<p>Thus sysctl can iterate over the entire process list, copying out information to ps(1), without blocking. If we prevent processes from forking or exiting during this time, we get a consistent snapshot. The snapshot may be stale, but it will never show us a viewpoint that never happened.</p>
</blockquote>

<ul>
<li>So, OpenBSD will always be consistent, or will it?</li>
</ul>

<blockquote>
<p>Is there a way to trick ps on OpenBSD? Not everything is consistent. There’s a separate sysctl, KERN_PROC_ARGV, that reads the command line arguments for a process, but it only works on one process at a time. Processes can modify their own argv at any time.</p>
</blockquote>

<ul>
<li><p>A second test program changes the process title of both the chicken and the egg, and if you run ps(1), you can get back a result that never actually happened.</p></li>
<li><p>The argv of the first program is read by ps(1), and in the meantime, it changes to a different value. The second program also changes its value, so now when ps(1) reads it, it sees the new value, not the original value from when ps(1) was started.</p></li>
<li><p>So the output is not that consistent, but is it worth the effort to try to make it so?</p>

<hr></li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-October/624673.html" rel="nofollow">DragonFlyBSD - if_iwm - Add basic powermanagement support via ifconfig wlan0 powersave</a></h3>

<ul>
<li>WiFi can often be one of the biggest drains on your laptop battery, so anything we can do to improve the situation should be embraced. </li>
<li>Imre VadÃ¡sz over at the DragonFly project has done that, porting over a new set of power management support from Linux to the if_iwm driver. </li>
</ul>

<blockquote>
<p>if_iwm - Add basic powermanagement support via ifconfig wlan0 powersave.</p>

<ul>
<li><p>The DEVICE_POWER_FLAGS_CAM_MSK flag was removed in the upstream iwlwifi in Linux commit ceef91c89480dd18bb3ac51e91280a233d0ca41f.</p></li>
<li><p>Add sc_ps_disabled flag to struct iwm_softc, which corresponds to mvm-&gt;ps_disabled in struct iwl_mvm in Linux iwlwifi.</p></li>
<li><p>Adds a hw.iwm.power_scheme tunable which corresponds to the power_scheme module parameter in Linux iwlwifi. Set this to 1 for completely disabling power management, 2 (default) for balanced powermanagement, and 3 for lowerpower mode (which does dtim period skipping).</p>

<ul>
<li>Imports the constants.h file from iwlwifi as if_iwm_constants.h.</li>
<li>This doesn&#39;t allow changing the powermanagement setting while connected,
also one can only choose between enabled and disabled powersaving with
ifconfig (so switching between balanced and low-power mode requires
rebooting to change the tunable).</li>
<li>After any changes to powermanagement (i.e. &quot;ifconfig wlan0 powersave&quot; to
enable powermanagement, or &quot;ifconfig wlan0 -powersave&quot; for disabling
powermanagement), one has to disconnect and reconnect to the accespoint
for the change to take effect.“</li>
</ul></li>
</ul>
</blockquote>

<ul>
<li>Good stuff! These positive changes need to happen more often and sooner, so we can all eek out every drop of power from our respective laptops.
***</li>
</ul>

<h3><a href="https://functionallyparanoid.com/2016/10/03/helping-out-an-internet-friend/" rel="nofollow">Helping out an Internet Friend…Dual boot OpenBSD </a></h3>

<ul>
<li>Dual-booting OpenBSD and Linux, via UEFI. A year ago we wouldn’t be discussing this, but today we have an article where somebody has done exactly that.</li>
<li>This Journey was undertaken by Brian Everly (Indiana Bug), partly due to a friend who wanted to dual-boot his laptop which already has an existing UEFI install on it.</li>
<li>As a proof of concept, he began by replicating the setup in VMware with UEFI</li>
<li>He started by throwing Ubuntu into the VM, with some special attention paid to partitioning to ensure enough room left-over for OpenBSD later.</li>
</ul>

<blockquote>
<p>I created a 64MB EFI partition at the front of the disk. Next, I created a 20GB primary partition at the beginning of the space, mounted as the root (/) filesystem.</p>

<p>I then added a 4096MB swap partition for Ubuntu. Finally, I used the rest of the free space to create a Reserved BIOS Boot Area FAT32 partition that was not associated with a mount point – this is where I will be installing OpenBSD.</p>
</blockquote>

<ul>
<li>With that done, he wrapped up the Ubuntu installation and then turned over to to the OpenBSD side. Some manual partitioning was required to install to the “Reserved FAT32” partition.</li>
</ul>

<blockquote>
<p>I mashed through the defaults in the OpenBSD installer until I got to the disk partitioning.  Since I told VMWare to make my hard drive an IDE one, I knew I was playing around with wd0 and not sd0 (my USB key).  I dumped into fdisk by selecting to (E)dit the partition scheme and saw my setup from Linux.  First was the EFI partition (I am guessing I’ll have to copy my bootx64.efi file to that at some point), second was the Linux etx4 partition, third was my Linux swap partition and fourth was a weird looking one that is the “Reserved BIOS Boot” partition.  That’s the one I’ll fiddle with.</p>

<p>Issuing the command “edit 3” allowed me to fiddle with that partition #3 (remember, we start counting at zero).  I set it’s type to “A6” (OpenBSD) and then took the defaults with the exception of naming it “OpenBSD”.  A quick “write” followed by a “quit” allowed me to update my new partition and get back to the installer.</p>
</blockquote>

<ul>
<li>Once the installation was wrapped up (OpenBSD helpfully already created the /boot/EFI partition with the correct EFI loader installed) he was able to reboot and select between the two systems at the UEFI bios screen.</li>
<li>For kicks, he lastly went into Ubuntu and grabbed refind. Installing refind provided a fancy graphical selector between the two systems without too much trouble.</li>
<li>Next step will be to replicate this process on his friend’s laptop. Wishing you luck with that journey!</li>
</ul>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<ul>
<li>CTO of Joyent
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://bsd.slashdot.org/story/16/10/09/0230203/after-22-years-386bsd-gets-an-update" rel="nofollow">After 22 Years, 386BSD Gets An Update</a></h3>

<ul>
<li>Slashdot brings us an interesting mention this week, specifically that after 22 years, we now have an update to 386BSD.</li>
</ul>

<blockquote>
<p>386BSD was last released back in 1994 with a series of articles in Dr. Dobb&#39;s Journal -- but then developers for this BSD-based operating system started migrating to both FreeBSD and NetBSD. An anonymous Slashdot reader writes: The last known public release was version 0.1. Until Wednesday, when Lynne Jolitz, one of the co-authors of 386BSD, released the source code to version 1.0 as well as 2.0 on Github.</p>

<p>386BSD takes us back to the days when you could count every file in your Unix distribution and more importantly, read and understand all of your OS source code. 386BSD is also the missing link between BSD and Linux. One can find fragments of Linus Torvalds&#39;s math emulation code in the source code of 386BSD. To quote Linus: &quot;If 386BSD had been available when I started on Linux, Linux would probably never had happened.”</p>

<p>Though it was designed for Intel 80386 microprocessors, there&#39;s already instructions for launching it on the hosted hardware virtualization service Qemu.</p>
</blockquote>

<ul>
<li>There you have it! Go grab the new hotness that is 386BSD and run it in 2016! Or perhaps you want FreeBSD 11, but to each their own.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160929230557&mode=expanded" rel="nofollow">Progress of the OpenBSD Limited Edition Signed CD set</a></h3>

<ul>
<li>An update from a story last week! We mentioned the “very” limited edition OpenBSD 6.0 signed CD sets that had gone up for Auction on Ebay. (With proceeds to support for Foundation)</li>
<li><p>As of today, here’s where we stand:</p>

<ul>
<li>CD set #1 (Sep 29th + 5 days) <a href="http://www.ebay.com/itm/-/331985953783" rel="nofollow">sold for $4200</a></li>
<li>CD set #2 (Oct 4th + 3 days) <a href="http://www.ebay.com/itm/-/331990536246" rel="nofollow">sold for $3000</a></li>
<li>CD set #3 (Oct 8th + 3 days) <a href="http://www.ebay.com/itm/-/331994217419" rel="nofollow">sold for $817</a></li>
<li>CD set #4 (Oct 11th + 3 days) is <a href="http://www.ebay.com/itm/-/331997031152" rel="nofollow">currently up for bidding</a></li>
</ul></li>
<li><p>There you have it! The 4th set is almost wrapped up bidding, and the 5th and last set is not far behind. Be sure to grab your piece of BSD history before its gone!</p>

<hr></li>
</ul>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow"><strong>PROTOTYPE</strong> FreeBSD Jail/ZFS based implementation of the Application Container Specification</a></h3>

<blockquote>
<p>“Jetpack is an experimental and incomplete implementation of the App Container Specification for FreeBSD. It uses jails as isolation mechanism, and ZFS for layered storage.”<br>
“This document uses some language used in Rocket, the reference implementation of the App Container Specification. While the documentation will be expanded in the future, currently you need to be familiar at least with Rocket&#39;s README to understand everything.”</p>

<ul>
<li>A standard with multiple implementations, that allow substitution of components, such as FreeBSD Jails instead of docker/lxc etc, and ZFS instead of overlayfs etc, is very exciting
***</li>
</ul>
</blockquote>

<h3><a href="https://fossbytes.com/xenix-history-microsoft-unix-operating-system/" rel="nofollow">Microsoft’s Forgotten Unix-based Operating System</a></h3>

<ul>
<li>Do you remember the good old days. You know, when Microsoft was the driving force behind UNIX? Wait, what did you say you may be thinking? It’s true, and lets sit back and let FossBytes tell us a tale of what once was reality.</li>
<li>The story begins sometime in the late 70’s:</li>
</ul>

<blockquote>
<p>Turning back the pages to the late 1970’s, Microsoft entered into an agreement with AT&amp;T Corporation to license Unix from AT&amp;T. While the company didn’t sell the OS to public, it licensed it to other OEM vendors like Intel, SCO, and Tandy.</p>

<p>As Microsoft had to face legal trouble due to “Unix” name, the company renamed it and came up with its own Unix distribution. So, AT&amp;T licensed Unix to Redmond that was passed on to other OEMs as Xenix.</p>

<p>It’s interesting to recall a time when Microsoft enabled people to run Unix — an operating system originally designed for large and multiuser systems — on a microcomputer. Even though it came first, Unix was probably more powerful than MS-DOS.</p>
</blockquote>

<ul>
<li>So whatever happened to this microsoft-flavored UNIX you may ask? Sadly it was ditched for DOS due to $REASONS:</li>
</ul>

<blockquote>
<p>In early 1980’s, IBM was looking for an OS to power its PC. As IBM didn’t want to maintain any ties with the recently split AT&amp;T, Xenix was automatically rejected. To fulfill, the tech giant’s demand, Microsoft bought 86-DOS from Seattle Computer Products and managed to convince IBM to use it in their systems.</p>

<p>Slowly, Microsoft started losing interest in Xenix and traded the full rights of Xenix with SCO, a Xenix partner company. The company filed bankruptcy in 2007 before taking the Xenix legacy to the 21st century in the form of Open Server, previously known as SCO Unix and SCO Open Desktop.</p>
</blockquote>

<ul>
<li>An interesting chapter in UNIX history to be sure, and funny enough may come full-circle someday with Microsoft beginning to show interest in UNIX and BSD once again.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://blather.michaelwlucas.com/archives/2791" rel="nofollow">Ohio LinuxFest 2016 wrap-up</a></p></li>
<li><p><a href="https://learnxinyminutes.com/docs/zfs/" rel="nofollow">Learn X in Y minutes Where X=zfs</a></p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=306430" rel="nofollow">Add touchscreen support for the official 7&quot; RPi touch display </a> </p></li>
<li><p><a href="https://kernelnomicon.org/?p=682" rel="nofollow">64-bit U-Boot on Raspberry Pi 3 </a></p></li>
<li><p><a href="https://www.ixsystems.com/blog/snia-sdc-2016-recap-michael-dexter/" rel="nofollow">SNIA SDC 2016 Recap: Michael Dexter</a></p></li>
<li><p><a href="https://www.ixsystems.com/blog/openzfs-devsummit-2016/" rel="nofollow">OpenZFS: Stronger than ever</a> </p></li>
<li><p><a href="http://nvlpubs.nist.gov/nistpubs/jres/121/jres.121.023.pdf" rel="nofollow">Accurate, Traceable, and Verifiable Time Synchronization for World Financial Markets</a> </p></li>
<li><p><a href="https://www.ietf.org/rfc/ien/ien137.txt" rel="nofollow">ON HOLY WARS AND A PLEA FOR PEACE</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/CYcqmW7P" rel="nofollow"> Morgan - Zero-Filling an VM</a> </li>
<li><a href="http://pastebin.com/12mNW57h" rel="nofollow"> Charlie - ZFS Bit-Rot</a> </li>
<li><a href="http://pastebin.com/NfYWt2cu" rel="nofollow"> Matias - TrueOS / Launchd</a> </li>
<li><a href="http://pastebin.com/UvKh2WcF" rel="nofollow"> Dale - DO Feedback</a> </li>
<li><a href="http://pastebin.com/0cdMc88U" rel="nofollow"> James - DO / FreeBSD Locks?</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>162: The Foundation of NetBSD</title>
  <link>https://www.bsdnow.tv/162</link>
  <guid isPermaLink="false">bb8662b1-5fa2-4df9-b2bc-c4caa37567b3</guid>
  <pubDate>Wed, 05 Oct 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/bb8662b1-5fa2-4df9-b2bc-c4caa37567b3.mp3" length="76463572" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we’ll be talking to Petra about the NetBSD foundation, about how they operate and assist NetBSD behind the scenes. That plus lots of news</itunes:subtitle>
  <itunes:duration>1:46:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we’ll be talking to Petra about the NetBSD foundation, about how they operate and assist NetBSD behind the scenes. That plus lots of news&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2016-10-03-FreeBSD-EC2-11-0-RELEASE.html" target="_blank" rel="nofollow noopener"&gt;What is new on EC2 for FreeBSD 11.0-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“FreeBSD 11.0-RELEASE is just around the corner, and it will be bringing a long list of new features and improvements — far too many for me to list here. I think there are 
some improvements in FreeBSD 11.0 which are particularly noteworthy for EC2 users.”&lt;/li&gt;
&lt;li&gt;“First, the EC2 Console Screenshot functionality now works with FreeBSD. This provides a "VGA" output as opposed to the traditional "serial port" which EC2 has exposed as 
"console output" for the past decade, and is useful largely because the "VGA" output becomes available immediately whereas the "serial port" output can lag by several minutes. This 
improvement is a simple configuration change — older releases didn't waste time writing to a non-serial console because it didn't go anywhere until Amazon added support on their 
side — and can be enabled on older FreeBSD releases by changing the line console="comconsole" to boot_multicons="YES" in /boot/loader.conf.”&lt;/li&gt;
&lt;li&gt;“The second notable change is support for EC2 "Enhanced Networking" using Intel 82599 hardware; on the C3, C4, R3, I2, D2, and M4 (excluding m4.16xlarge) families, this 
provides increased network throughput and reduced latency and jitter, since it allows FreeBSD to talk directly to the networking hardware rather than via a Xen paravirtual interface. 
Getting this working took much longer than I had hoped, but the final problem turned out not to be in FreeBSD at all — we were tickling an interrupt-routing bug in a version of 
Xen used in EC2. Unfortunately FreeBSD does not yet have support for the new "Elastic Network Adapter" enhanced networking used in P2 and X1 instance families and the m4.16xlarge 
instance type; I'm hoping that we'll have a driver for that before FreeBSD 11.1 arrives.”&lt;/li&gt;
&lt;li&gt;“The third notable change is an improvement in EC2 disk throughput. This comes thanks to enabling indirect segment I/Os in FreeBSD's blkfront driver; while the support was 
present in 10.3, I had it turned off by default due to performance anomalies on some EC2 instances. (Those EC2 performance problems have been resolved, and disk I/O performance in 
EC2 on FreeBSD 10.3 can now be safely improved by removing the line hw.xbd.xbd_enable_indirect="0" from /boot/loader.conf.)”&lt;/li&gt;
&lt;li&gt;“Finally, FreeBSD now supports all 128 CPUs in the x1.32xlarge instance type. This improvement comes thanks to two changes: The FreeBSD default kernel was modified in 2014 to 
support up to 256 CPUs (up from 64), but that resulted in a (fixed-size) section of preallocated memory being exhausted early in the boot process on systems with 92 or more CPUs; a 
few months ago I changed that value to tune automatically so that FreeBSD can now boot and not immediately panic with an out-of-the-box setup on such large systems.”&lt;/li&gt;
&lt;li&gt;“I think FreeBSD/EC2 users will be very happy with FreeBSD 11.0-RELEASE; but I'd like to end with an important reminder: No matter what you might see on FTP servers, in EC2, or 
available via freebsd-update, the new release has not been released until you see a GPG-signed email from the release engineer. This is not just a theoretical point: In my time as a 
FreeBSD developer I've seen multiple instances of last-minute release re-rolls happening due to problems being discovered very late, so the fact that you can see bits doesn't 
necessarily mean that they are ready to be downloaded. I hope you're looking forward to 11.0-RELEASE, but please be patient.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=213196" target="_blank" rel="nofollow noopener"&gt;Upgrading Amazon EC2 instance from 10.3 to 11.0-PRERELEASE results in hang at boot &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As if to underscore that last point, a last minute bug was found on sunday night&lt;/li&gt;
&lt;li&gt;A user reported that they used freebsd-update to upgrade an EC2 instance from 10.3 to 11.0 and it started hanging during boot&lt;/li&gt;
&lt;li&gt;After some quick investigation by Colin, the problem was reproduced&lt;/li&gt;
&lt;li&gt;Since I had done a lot of work in the loader recently, I helped Colin build a version of the loader with a lot of the debugging enabled, and some more added to try to isolate where 
in the loader the freeze was happening&lt;/li&gt;
&lt;li&gt;Colin and I worked late into the night, but eventually found the read from disk that was causing the hang&lt;/li&gt;
&lt;li&gt;Unlike most of the other reads, that were going into the heap, this read was into a very low memory address, right near the 640kb border. This initially distracted us from the real 
cause of the problem&lt;/li&gt;
&lt;li&gt;With more debugging added, it was determined that the problem was in the GELIBoot code, when reading the last sector of each partition to determine if it is encrypted. In cases 
where the partition is not 4k aligned, and butts up against the end of the disk, the formula used could result in a read past the end of the disk&lt;/li&gt;
&lt;li&gt;The formula rounds the last sector byte address down to the nearest factor of 4096, then reads 4096 bytes. Then that buffer is examined to determine if the partition is encrypted. 
If it is a 512b sector drive, the metadata will be in the last 512 bytes of that 4096 byte buffer.&lt;/li&gt;
&lt;li&gt;However, if the partition is not 4k aligned, the rounding will produce a value that is less than 4096 bytes from the end of the disk, and attempting to read 4096 bytes, will read 
past the end of the disk&lt;/li&gt;
&lt;li&gt;Normally this isn’t that big of a problem, the BIOS will just return an error. The loader will retry up to three times, then give up and move on, continuing to boot normally.&lt;/li&gt;
&lt;li&gt;Some BIOSes are buggy, and will initiate their own retries, and the combination might result in a stall of up to 30 seconds for each attempt to read past the end of the disk&lt;/li&gt;
&lt;li&gt;But it seems that Amazon EC2 instances, (and possibly other virtual instances), will just hang in this case.&lt;/li&gt;
&lt;li&gt;This bug has existed for 6 months, but was not caught because almost all installations are 4k aligned thanks to changes made to the installer over the last few years, and most 
hardware continues to boot with no sign of a problem&lt;/li&gt;
&lt;li&gt;Even the EC2 snapshot images of 11.0 do not have the problem, as they use a newer disk layout that is 4k aligned by default now. The problem only seems to happen when older disk 
images are upgraded&lt;/li&gt;
&lt;li&gt;The fix has been committed and will be merged the the branches over the next few days&lt;/li&gt;
&lt;li&gt;An Errata notice will be issues, and the fix will be available via freebsd-update&lt;/li&gt;
&lt;li&gt;It is recommended that EC2 users, and anyone who wants to be especially cautious, wait until this errata notice goes out before attempting to upgrade from FreeBSD 10.3 to 11.0&lt;/li&gt;
&lt;li&gt;You can determine if your partitions are 4k aligned by running ‘gpart show’. If there is free space after your last partition, you won’t have any issues.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160929230557&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.0 Limited Edition CD set (signed by developers)&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://www.ebay.com/itm/-/331985953783" target="_blank" rel="nofollow noopener"&gt;The first one went for .$4,200.00&lt;/a&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Looking for your piece of OpenBSD history? At the recent g2k16 hackathon in Cambridge UK, 40 OpenBSD developers put pen to paper and signed 5 copies of the new 6.0 release.&lt;/li&gt;
&lt;li&gt;Each of these will be auctioned off on ebay, with the proceeds to benefit the OpenBSD foundation.&lt;/li&gt;
&lt;li&gt;The first auction has already ended, and CD set went for a whopping $4200!&lt;/li&gt;
&lt;li&gt;The next set only has 2 days left, and currently stands at $3000! (&lt;a href="http://www.ebay.com/itm/-/331990536246" target="_blank" rel="nofollow noopener"&gt;http://www.ebay.com/itm/-/331990536246&lt;/a&gt;) &lt;/li&gt;
&lt;li&gt;Get your bids in soon, these are VERY unique, the odds of getting the same 40 developers in a room together and signing a new .0 release may make this a once-in-a-lifetime 
opportunity.&lt;/li&gt;
&lt;li&gt;Additionally, if you are just starting your OpenBSD collection, here’s a nice image to make you envious: &lt;a href="http://i.imgur.com/OrE0Gsa.png" target="_blank" rel="nofollow noopener"&gt;A nice collection of OpenBSD CD Sets&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;[What typing &lt;sup&gt;D&lt;/sup&gt; really does on Unix&lt;/h3&gt;

&lt;p&gt;](&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/TypingEOFEffects" target="_blank" rel="nofollow noopener"&gt;https://utcc.utoronto.ca/~cks/space/blog/unix/TypingEOFEffects&lt;/a&gt;)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;How often have you used a &lt;sup&gt;D&lt;/sup&gt; to generate an EOF? Do you really know what that does?&lt;/li&gt;
&lt;li&gt;Chris Siebenmann has posted a look at this on his blog, which might not be what you think&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Typing &lt;sup&gt;D&lt;/sup&gt; causes the tty driver to immediately finish a read().”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He continues on:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;Normally doing a read() from a terminal is line-buffered inside the tty driver; your program only wakes up when the tty driver sees the newline, at which point you get back the full &lt;br&gt;
line. (Note that this buffering is distinct from anything that your language's IO system may be doing.)&lt;/p&gt;

&lt;p&gt;&amp;gt; Typing &lt;sup&gt;D&lt;/sup&gt; causes the tty driver to stop waiting for a newline and immediately return from the read() with however much of the line has been accumulated to date. If you haven't &lt;br&gt;
typed anything on the line yet, there is nothing accumulated and the read() will return 0 bytes, which is conveniently the signal for end of file. If you have typed something the &lt;br&gt;
program will get it; because it doesn't have a trailing newline, the program's own line-buffering may take over and keep read()ing to get the rest of the line.&lt;/p&gt;

&lt;p&gt;&amp;gt; (Other programs will immediately process the partial line with no buffering; cat is one example of this.)&lt;/p&gt;

&lt;p&gt;&amp;gt; Once you've typed &lt;sup&gt;D&lt;/sup&gt; on a partial line, that portion of the line is immutable because it's already been given to the program. Most Unixes won't let you backspace over such partial &lt;br&gt;
lines; effectively they become output, not input.&lt;/p&gt;

&lt;p&gt;&amp;gt; (Note that modern shells are not good examples of this, because they don't do line-buffered input; to support command line editing, they switch terminal input into an uninterpreted &lt;br&gt;
mode. So they get the raw &lt;sup&gt;D&lt;/sup&gt; and can do whatever they want with it, and they can let you edit as much of the pending line as they want.)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fascinating stuff, and interesting to see behind the curtain at exactly what’s going on with your programs buffering and tty driver interaction.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Petra Zeidler - &lt;a href="mailto:spz@netbsd.org" target="_blank" rel="nofollow noopener"&gt;spz@netbsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD Foundation
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://erouault.blogspot.com/2016/09/running-freebsd-in-travis-ci.html" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD in Travis-CI Thanks to KQEmu&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Travis-CI is the most popular testing framework on Github, but it doesn’t support any of the BSDs&lt;/li&gt;
&lt;li&gt;This didn’t discourage Even Rouault, who managed to run FreeBSD in KQEMU on the Linux instances provided by Travis-CI&lt;/li&gt;
&lt;li&gt;“Travis-CI has a free offer for software having public repository at GitHub. Travis-CI provides cloud instances running Linux or Mac OS X. To increase portability tests of 
GDAL, I wondered if it was somehow possible to run another operating system with Travis-CI, for example FreeBSD. A search lead me to this 
&lt;a href="https://github.com/travis-ci/travis-ci/issues/1818" target="_blank" rel="nofollow noopener"&gt;question&lt;/a&gt; in their bug tracker but the outcome seems to be that it is not possible, nor in their medium or long term plans.”&lt;/li&gt;
&lt;li&gt;“One idea that came quickly to mind was to use the QEMU machine emulator that can simulate full machines, of several hardware architectures.”&lt;/li&gt;
&lt;li&gt;They found an existing image of FreeBSD 9.2 and configured the Travis job to download it and fire it up in QEMU.&lt;/li&gt;
&lt;li&gt;“Here we go: ./configure &amp;amp;&amp;amp; make ! That works, but 50 minutes later (the maximum length of a Travis-CI job), our job is killed with perhaps only 10% of the GDAL code base being 
compiled. The reason is that we used the pure software emulation mode of QEMU that involves on-the-fly disassembling of the code to be run and re-assembling.”&lt;/li&gt;
&lt;li&gt;Travis-CI runs in Google Compute Engine, which does not allow nested virtualization, so hardware virtualization is not an option to speed up QEMU&lt;/li&gt;
&lt;li&gt;“Here comes the time for good old memories and a bit of software archeology. QEMU was started by Fabrice Bellard. If you didn't know his name yet, F. Bellard created FFMPEG and 
QEMU, holds a world record for the number of decimals of Pi computed on a COTS PC, has ported QEMU in JavaScript to run the Linux kernel in your browser, devised BPG, a new 
compression based on HEVC, etc....”&lt;/li&gt;
&lt;li&gt;“At the time where his interest was focused on QEMU, he created KQemu, a kernel module (for Linux, Windows, FreeBSD hosts), that could significantly enhance QEMU performance 
when the guest and hosts are x86/x86_64 and does not require (nor use) hardware virtualization instructions.”&lt;/li&gt;
&lt;li&gt;“Running it on Travis-CI was successful too, with the compilation being done in 20 minutes, so probably half of the speed of bare metal, which is good enough.”&lt;/li&gt;
&lt;li&gt;“I could also have potentially tried VirtualBox because, as mentioned above, it supports software virtualization with acceleration. But that is only for 32 bit guests (and I 
didn't find a ready-made FreeBSD 32bit image that you can directly ssh into). For 64 bit guests, VirtualBox require hardware virtualization to be available in the host. To the best 
of my knowledge, KQemu is (was) the only solution to enable acceleration of 64 bit guests without hardware requirements.”&lt;/li&gt;
&lt;li&gt;It will be interesting to see if enough people do this hack, maybe Travis-CI will consider properly supporting FreeBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.openbsd.org/events.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD EuroBSDcon 2016 Papers are online&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Slides from the OpenBSD talks at EuroBSDCon are online now

&lt;ul&gt;
&lt;li&gt;Landry Breuil, &lt;a href="https://rhaalovely.net/%7Elandry/eurobsdcon2016/" target="_blank" rel="nofollow noopener"&gt;Building packages on exotic architectures&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Peter Hessler, &lt;a href="https://www.openbsd.org/papers/eurobsdcon2016-bfd.pdf" target="_blank" rel="nofollow noopener"&gt;Bidirectional Forwarding Detection (BFD) implementation and support in OpenBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ingo Schwarze, &lt;a href="https://www.openbsd.org/papers/eurobsdcon2016-utf8.pdf" target="_blank" rel="nofollow noopener"&gt;Why and how you ought to keep multibyte character support simple&lt;/a&gt; (roff/mm/gpresent &lt;a href="https://www.openbsd.org/papers/eurobsdcon2016-utf8.roff" target="_blank" rel="nofollow noopener"&gt;source 
code&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Stefan Sperling, &lt;a href="https://www.openbsd.org/papers/eurobsdcon2016-openbsd-11n.pdf" target="_blank" rel="nofollow noopener"&gt;OpenBSD meets 802.11n&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Antoine Jacoutot, &lt;a href="https://www.bsdfrog.org/pub/events/openbsd-rcd-EuroBSDcon2016.pdf" target="_blank" rel="nofollow noopener"&gt;OpenBSD rc.d(8)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Marc Espie, &lt;a href="https://www.openbsd.org/papers/eurobsdcon2016-privsep.pdf" target="_blank" rel="nofollow noopener"&gt;Retrofitting privsep into dpb and pkg_add&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Martin Pieuchot, &lt;a href="https://www.openbsd.org/papers/eurobsdcon2016-embracingbsdrt.pdf" target="_blank" rel="nofollow noopener"&gt;Embracing the BSD routing table&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;I am working to build a similar website for the FreeBSD project, but there is still a lot of work to do&lt;/li&gt;
&lt;li&gt;I also managed to find the slides from the keynotes:&lt;/li&gt;
&lt;li&gt;&lt;a href="https://papers.freebsd.org/2016/EuroBSDCon/LookingBackwards.pdf" target="_blank" rel="nofollow noopener"&gt;Opening Keynote: George Neville-Neil: Looking Backwards: The coming decades of BSD &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.monobsd.com/files/16_ddos_and_consequences.pptx" target="_blank" rel="nofollow noopener"&gt;Closing Keynote: Gert Döring: Internet Attacks, Self-Governance, and the Consequences &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://kernelnomicon.org/?p=650" target="_blank" rel="nofollow noopener"&gt;VirtualBox Shared Folders on FreeBSD: progress report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In the past month or so, VirtualBox in the FreeBSD ports tree got bumped to version 5, which while bringing new features, did cause a regression in Shared Folders.&lt;/li&gt;
&lt;li&gt;FreeBSD developer gonzo@ (Oleksandr Tymoshenko) has been tackling this issue in recent days and provides us with a look behind the curtain at the challenges involved.&lt;/li&gt;
&lt;li&gt;Specifically he started by implementing the various needed VOPs: “lookup, access, readdir, read, getattr, readlink, remove, rmdir, symlink, close, create, open, write.”&lt;/li&gt;
&lt;li&gt;He then continues with details about how complete this is:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;““Kind of implemented” means that I was able to mount directory, traverse it, read file, calculate md5 sums and compare with host’s md5sum, create/remove directories, &lt;br&gt;
unzip zip file, etc but I doubt it would survive stress-test. Locking is all wrong at the moment and read/write VOPs allocate buffers for every operation.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The bigger issue faced is with the rename VOP though:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I hit a roadblock with rename VOP: it involves some non-trivial locking logic and also there is a problem with cached paths. VBox hypervisor operates on full paths so we cache them &lt;br&gt;
in vboxfs nodes, but if one of parent directories is renamed, all cached names should be modified accordingly. I am going to tackle these two problems once I have long enough stretch &lt;br&gt;
of time time sit and concentrate on task.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;We wish him luck in getting those issues solved. I know quite a few of our users rely on shared folders as well.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://support.rossw.net/FreeBSD-Issue1.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD News Issue #1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Issue #1 of FreeBSD News, from summer of 1997&lt;/li&gt;
&lt;li&gt;Contains an article by Yahoo! co-founder David Filo about their early use of FreeBSD, on 100mhz Pentium machines with 64MB of ram&lt;/li&gt;
&lt;li&gt;Java Development Kit 1.0.2 ported to FreeBSD&lt;/li&gt;
&lt;li&gt;What is FreeBSD?&lt;/li&gt;
&lt;li&gt;Running the world’s busiest FTP site (cdrom.com) on FreeBSD&lt;/li&gt;
&lt;li&gt;Xi Graphics announces the release of CDE Business Desktop, the first and only integrated desktop for FreeBSD, on AcceleratedX, a fully supported commercial grade X display server&lt;/li&gt;
&lt;li&gt;Get FreeBSD 2.2.2 Today!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/current-users/2016/09/21/msg030183.html" target="_blank" rel="nofollow noopener"&gt;Call for testing: newly MPSAFE nvme(4)&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-September/313061.html" target="_blank" rel="nofollow noopener"&gt;Thinking about starting a BUG in Indianapolis, IN USA&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://medium.com/bradfield-cs/the-cost-of-forsaking-c-113986438784#.o2m5gv8y7" target="_blank" rel="nofollow noopener"&gt;The cost of forsaking C: Why students still need to learn C &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://blog.jasper.la/openbsd-uefi-bootloader-howto/" target="_blank" rel="nofollow noopener"&gt;OpenBSD (U)EFI bootloader howto&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2780" target="_blank" rel="nofollow noopener"&gt;Michael Lucas sets his eyes on OpenBSD's web stack for his next book&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.0-relnotes.txt" target="_blank" rel="nofollow noopener"&gt;LibreSSL 2.5.0 released&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://opnsense.org/opnsense-16-7-5-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.7.5 released&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/XeJhK0AJ" target="_blank" rel="nofollow noopener"&gt; Jonas - ZFS on DO &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Z9JRjcvb" target="_blank" rel="nofollow noopener"&gt; Ricardo - OpenBSD Encrypted Disk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/XAD0UevP" target="_blank" rel="nofollow noopener"&gt; WiskerTickle - Storage Benchmark &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/N52JhYru" target="_blank" rel="nofollow noopener"&gt; Phil - Thanks&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/57qS0wrx" target="_blank" rel="nofollow noopener"&gt; Luis - Misc Questions&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we’ll be talking to Petra about the NetBSD foundation, about how they operate and assist NetBSD behind the scenes. That plus lots of news</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.daemonology.net/blog/2016-10-03-FreeBSD-EC2-11-0-RELEASE.html" rel="nofollow">What is new on EC2 for FreeBSD 11.0-RELEASE</a></h3>

<ul>
<li>“FreeBSD 11.0-RELEASE is just around the corner, and it will be bringing a long list of new features and improvements — far too many for me to list here. I think there are 
some improvements in FreeBSD 11.0 which are particularly noteworthy for EC2 users.”</li>
<li>“First, the EC2 Console Screenshot functionality now works with FreeBSD. This provides a &quot;VGA&quot; output as opposed to the traditional &quot;serial port&quot; which EC2 has exposed as 
&quot;console output&quot; for the past decade, and is useful largely because the &quot;VGA&quot; output becomes available immediately whereas the &quot;serial port&quot; output can lag by several minutes. This 
improvement is a simple configuration change — older releases didn&#39;t waste time writing to a non-serial console because it didn&#39;t go anywhere until Amazon added support on their 
side — and can be enabled on older FreeBSD releases by changing the line console=&quot;comconsole&quot; to boot_multicons=&quot;YES&quot; in /boot/loader.conf.”</li>
<li>“The second notable change is support for EC2 &quot;Enhanced Networking&quot; using Intel 82599 hardware; on the C3, C4, R3, I2, D2, and M4 (excluding m4.16xlarge) families, this 
provides increased network throughput and reduced latency and jitter, since it allows FreeBSD to talk directly to the networking hardware rather than via a Xen paravirtual interface. 
Getting this working took much longer than I had hoped, but the final problem turned out not to be in FreeBSD at all — we were tickling an interrupt-routing bug in a version of 
Xen used in EC2. Unfortunately FreeBSD does not yet have support for the new &quot;Elastic Network Adapter&quot; enhanced networking used in P2 and X1 instance families and the m4.16xlarge 
instance type; I&#39;m hoping that we&#39;ll have a driver for that before FreeBSD 11.1 arrives.”</li>
<li>“The third notable change is an improvement in EC2 disk throughput. This comes thanks to enabling indirect segment I/Os in FreeBSD&#39;s blkfront driver; while the support was 
present in 10.3, I had it turned off by default due to performance anomalies on some EC2 instances. (Those EC2 performance problems have been resolved, and disk I/O performance in 
EC2 on FreeBSD 10.3 can now be safely improved by removing the line hw.xbd.xbd_enable_indirect=&quot;0&quot; from /boot/loader.conf.)”</li>
<li>“Finally, FreeBSD now supports all 128 CPUs in the x1.32xlarge instance type. This improvement comes thanks to two changes: The FreeBSD default kernel was modified in 2014 to 
support up to 256 CPUs (up from 64), but that resulted in a (fixed-size) section of preallocated memory being exhausted early in the boot process on systems with 92 or more CPUs; a 
few months ago I changed that value to tune automatically so that FreeBSD can now boot and not immediately panic with an out-of-the-box setup on such large systems.”</li>
<li>“I think FreeBSD/EC2 users will be very happy with FreeBSD 11.0-RELEASE; but I&#39;d like to end with an important reminder: No matter what you might see on FTP servers, in EC2, or 
available via freebsd-update, the new release has not been released until you see a GPG-signed email from the release engineer. This is not just a theoretical point: In my time as a 
FreeBSD developer I&#39;ve seen multiple instances of last-minute release re-rolls happening due to problems being discovered very late, so the fact that you can see bits doesn&#39;t 
necessarily mean that they are ready to be downloaded. I hope you&#39;re looking forward to 11.0-RELEASE, but please be patient.”
***</li>
</ul>

<h3><a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=213196" rel="nofollow">Upgrading Amazon EC2 instance from 10.3 to 11.0-PRERELEASE results in hang at boot </a></h3>

<ul>
<li>As if to underscore that last point, a last minute bug was found on sunday night</li>
<li>A user reported that they used freebsd-update to upgrade an EC2 instance from 10.3 to 11.0 and it started hanging during boot</li>
<li>After some quick investigation by Colin, the problem was reproduced</li>
<li>Since I had done a lot of work in the loader recently, I helped Colin build a version of the loader with a lot of the debugging enabled, and some more added to try to isolate where 
in the loader the freeze was happening</li>
<li>Colin and I worked late into the night, but eventually found the read from disk that was causing the hang</li>
<li>Unlike most of the other reads, that were going into the heap, this read was into a very low memory address, right near the 640kb border. This initially distracted us from the real 
cause of the problem</li>
<li>With more debugging added, it was determined that the problem was in the GELIBoot code, when reading the last sector of each partition to determine if it is encrypted. In cases 
where the partition is not 4k aligned, and butts up against the end of the disk, the formula used could result in a read past the end of the disk</li>
<li>The formula rounds the last sector byte address down to the nearest factor of 4096, then reads 4096 bytes. Then that buffer is examined to determine if the partition is encrypted. 
If it is a 512b sector drive, the metadata will be in the last 512 bytes of that 4096 byte buffer.</li>
<li>However, if the partition is not 4k aligned, the rounding will produce a value that is less than 4096 bytes from the end of the disk, and attempting to read 4096 bytes, will read 
past the end of the disk</li>
<li>Normally this isn’t that big of a problem, the BIOS will just return an error. The loader will retry up to three times, then give up and move on, continuing to boot normally.</li>
<li>Some BIOSes are buggy, and will initiate their own retries, and the combination might result in a stall of up to 30 seconds for each attempt to read past the end of the disk</li>
<li>But it seems that Amazon EC2 instances, (and possibly other virtual instances), will just hang in this case.</li>
<li>This bug has existed for 6 months, but was not caught because almost all installations are 4k aligned thanks to changes made to the installer over the last few years, and most 
hardware continues to boot with no sign of a problem</li>
<li>Even the EC2 snapshot images of 11.0 do not have the problem, as they use a newer disk layout that is 4k aligned by default now. The problem only seems to happen when older disk 
images are upgraded</li>
<li>The fix has been committed and will be merged the the branches over the next few days</li>
<li>An Errata notice will be issues, and the fix will be available via freebsd-update</li>
<li>It is recommended that EC2 users, and anyone who wants to be especially cautious, wait until this errata notice goes out before attempting to upgrade from FreeBSD 10.3 to 11.0</li>
<li>You can determine if your partitions are 4k aligned by running ‘gpart show’. If there is free space after your last partition, you won’t have any issues.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160929230557&mode=expanded" rel="nofollow">OpenBSD 6.0 Limited Edition CD set (signed by developers)</a></h3>

<p><a href="http://www.ebay.com/itm/-/331985953783" rel="nofollow">The first one went for .$4,200.00</a> </p>

<ul>
<li>Looking for your piece of OpenBSD history? At the recent g2k16 hackathon in Cambridge UK, 40 OpenBSD developers put pen to paper and signed 5 copies of the new 6.0 release.</li>
<li>Each of these will be auctioned off on ebay, with the proceeds to benefit the OpenBSD foundation.</li>
<li>The first auction has already ended, and CD set went for a whopping $4200!</li>
<li>The next set only has 2 days left, and currently stands at $3000! (<a href="http://www.ebay.com/itm/-/331990536246" rel="nofollow">http://www.ebay.com/itm/-/331990536246</a>) </li>
<li>Get your bids in soon, these are VERY unique, the odds of getting the same 40 developers in a room together and signing a new .0 release may make this a once-in-a-lifetime 
opportunity.</li>
<li>Additionally, if you are just starting your OpenBSD collection, here’s a nice image to make you envious: <a href="http://i.imgur.com/OrE0Gsa.png" rel="nofollow">A nice collection of OpenBSD CD Sets</a> 
***</li>
</ul>

<h3>[What typing <sup>D</sup> really does on Unix</h3>

<p>](<a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/TypingEOFEffects" rel="nofollow">https://utcc.utoronto.ca/~cks/space/blog/unix/TypingEOFEffects</a>)</p>

<ul>
<li>How often have you used a <sup>D</sup> to generate an EOF? Do you really know what that does?</li>
<li>Chris Siebenmann has posted a look at this on his blog, which might not be what you think</li>
</ul>

<blockquote>
<p>“Typing <sup>D</sup> causes the tty driver to immediately finish a read().”</p>
</blockquote>

<ul>
<li>He continues on:</li>
</ul>

<blockquote>
<p>Normally doing a read() from a terminal is line-buffered inside the tty driver; your program only wakes up when the tty driver sees the newline, at which point you get back the full <br>
line. (Note that this buffering is distinct from anything that your language&#39;s IO system may be doing.)</p>

<p>Typing <sup>D</sup> causes the tty driver to stop waiting for a newline and immediately return from the read() with however much of the line has been accumulated to date. If you haven&#39;t <br>
typed anything on the line yet, there is nothing accumulated and the read() will return 0 bytes, which is conveniently the signal for end of file. If you have typed something the <br>
program will get it; because it doesn&#39;t have a trailing newline, the program&#39;s own line-buffering may take over and keep read()ing to get the rest of the line.</p>

<p>(Other programs will immediately process the partial line with no buffering; cat is one example of this.)</p>

<p>Once you&#39;ve typed <sup>D</sup> on a partial line, that portion of the line is immutable because it&#39;s already been given to the program. Most Unixes won&#39;t let you backspace over such partial <br>
lines; effectively they become output, not input.</p>

<p>(Note that modern shells are not good examples of this, because they don&#39;t do line-buffered input; to support command line editing, they switch terminal input into an uninterpreted <br>
mode. So they get the raw <sup>D</sup> and can do whatever they want with it, and they can let you edit as much of the pending line as they want.)</p>
</blockquote>

<ul>
<li>Fascinating stuff, and interesting to see behind the curtain at exactly what’s going on with your programs buffering and tty driver interaction.</li>
</ul>

<hr>

<h2>Interview - Petra Zeidler - <a href="mailto:spz@netbsd.org" rel="nofollow">spz@netbsd.org</a></h2>

<ul>
<li>NetBSD Foundation
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://erouault.blogspot.com/2016/09/running-freebsd-in-travis-ci.html" rel="nofollow">Running FreeBSD in Travis-CI Thanks to KQEmu</a></h3>

<ul>
<li>Travis-CI is the most popular testing framework on Github, but it doesn’t support any of the BSDs</li>
<li>This didn’t discourage Even Rouault, who managed to run FreeBSD in KQEMU on the Linux instances provided by Travis-CI</li>
<li>“Travis-CI has a free offer for software having public repository at GitHub. Travis-CI provides cloud instances running Linux or Mac OS X. To increase portability tests of 
GDAL, I wondered if it was somehow possible to run another operating system with Travis-CI, for example FreeBSD. A search lead me to this 
<a href="https://github.com/travis-ci/travis-ci/issues/1818" rel="nofollow">question</a> in their bug tracker but the outcome seems to be that it is not possible, nor in their medium or long term plans.”</li>
<li>“One idea that came quickly to mind was to use the QEMU machine emulator that can simulate full machines, of several hardware architectures.”</li>
<li>They found an existing image of FreeBSD 9.2 and configured the Travis job to download it and fire it up in QEMU.</li>
<li>“Here we go: ./configure &amp;&amp; make ! That works, but 50 minutes later (the maximum length of a Travis-CI job), our job is killed with perhaps only 10% of the GDAL code base being 
compiled. The reason is that we used the pure software emulation mode of QEMU that involves on-the-fly disassembling of the code to be run and re-assembling.”</li>
<li>Travis-CI runs in Google Compute Engine, which does not allow nested virtualization, so hardware virtualization is not an option to speed up QEMU</li>
<li>“Here comes the time for good old memories and a bit of software archeology. QEMU was started by Fabrice Bellard. If you didn&#39;t know his name yet, F. Bellard created FFMPEG and 
QEMU, holds a world record for the number of decimals of Pi computed on a COTS PC, has ported QEMU in JavaScript to run the Linux kernel in your browser, devised BPG, a new 
compression based on HEVC, etc....”</li>
<li>“At the time where his interest was focused on QEMU, he created KQemu, a kernel module (for Linux, Windows, FreeBSD hosts), that could significantly enhance QEMU performance 
when the guest and hosts are x86/x86_64 and does not require (nor use) hardware virtualization instructions.”</li>
<li>“Running it on Travis-CI was successful too, with the compilation being done in 20 minutes, so probably half of the speed of bare metal, which is good enough.”</li>
<li>“I could also have potentially tried VirtualBox because, as mentioned above, it supports software virtualization with acceleration. But that is only for 32 bit guests (and I 
didn&#39;t find a ready-made FreeBSD 32bit image that you can directly ssh into). For 64 bit guests, VirtualBox require hardware virtualization to be available in the host. To the best 
of my knowledge, KQemu is (was) the only solution to enable acceleration of 64 bit guests without hardware requirements.”</li>
<li>It will be interesting to see if enough people do this hack, maybe Travis-CI will consider properly supporting FreeBSD
***</li>
</ul>

<h3><a href="https://www.openbsd.org/events.html" rel="nofollow">OpenBSD EuroBSDcon 2016 Papers are online</a></h3>

<ul>
<li>Slides from the OpenBSD talks at EuroBSDCon are online now

<ul>
<li>Landry Breuil, <a href="https://rhaalovely.net/%7Elandry/eurobsdcon2016/" rel="nofollow">Building packages on exotic architectures</a></li>
<li>Peter Hessler, <a href="https://www.openbsd.org/papers/eurobsdcon2016-bfd.pdf" rel="nofollow">Bidirectional Forwarding Detection (BFD) implementation and support in OpenBSD</a></li>
<li>Ingo Schwarze, <a href="https://www.openbsd.org/papers/eurobsdcon2016-utf8.pdf" rel="nofollow">Why and how you ought to keep multibyte character support simple</a> (roff/mm/gpresent <a href="https://www.openbsd.org/papers/eurobsdcon2016-utf8.roff" rel="nofollow">source 
code</a>)</li>
<li>Stefan Sperling, <a href="https://www.openbsd.org/papers/eurobsdcon2016-openbsd-11n.pdf" rel="nofollow">OpenBSD meets 802.11n</a></li>
<li>Antoine Jacoutot, <a href="https://www.bsdfrog.org/pub/events/openbsd-rcd-EuroBSDcon2016.pdf" rel="nofollow">OpenBSD rc.d(8)</a></li>
<li>Marc Espie, <a href="https://www.openbsd.org/papers/eurobsdcon2016-privsep.pdf" rel="nofollow">Retrofitting privsep into dpb and pkg_add</a></li>
<li>Martin Pieuchot, <a href="https://www.openbsd.org/papers/eurobsdcon2016-embracingbsdrt.pdf" rel="nofollow">Embracing the BSD routing table</a></li>
</ul></li>
<li>I am working to build a similar website for the FreeBSD project, but there is still a lot of work to do</li>
<li>I also managed to find the slides from the keynotes:</li>
<li><a href="https://papers.freebsd.org/2016/EuroBSDCon/LookingBackwards.pdf" rel="nofollow">Opening Keynote: George Neville-Neil: Looking Backwards: The coming decades of BSD </a></li>
<li><a href="http://www.monobsd.com/files/16_ddos_and_consequences.pptx" rel="nofollow">Closing Keynote: Gert Döring: Internet Attacks, Self-Governance, and the Consequences </a>
***</li>
</ul>

<h3><a href="https://kernelnomicon.org/?p=650" rel="nofollow">VirtualBox Shared Folders on FreeBSD: progress report</a></h3>

<ul>
<li>In the past month or so, VirtualBox in the FreeBSD ports tree got bumped to version 5, which while bringing new features, did cause a regression in Shared Folders.</li>
<li>FreeBSD developer gonzo@ (Oleksandr Tymoshenko) has been tackling this issue in recent days and provides us with a look behind the curtain at the challenges involved.</li>
<li>Specifically he started by implementing the various needed VOPs: “lookup, access, readdir, read, getattr, readlink, remove, rmdir, symlink, close, create, open, write.”</li>
<li>He then continues with details about how complete this is:</li>
</ul>

<p>““Kind of implemented” means that I was able to mount directory, traverse it, read file, calculate md5 sums and compare with host’s md5sum, create/remove directories, <br>
unzip zip file, etc but I doubt it would survive stress-test. Locking is all wrong at the moment and read/write VOPs allocate buffers for every operation.”</p>

<ul>
<li>The bigger issue faced is with the rename VOP though:</li>
</ul>

<blockquote>
<p>I hit a roadblock with rename VOP: it involves some non-trivial locking logic and also there is a problem with cached paths. VBox hypervisor operates on full paths so we cache them <br>
in vboxfs nodes, but if one of parent directories is renamed, all cached names should be modified accordingly. I am going to tackle these two problems once I have long enough stretch <br>
of time time sit and concentrate on task.</p>

<ul>
<li>We wish him luck in getting those issues solved. I know quite a few of our users rely on shared folders as well.
***</li>
</ul>
</blockquote>

<h3><a href="http://support.rossw.net/FreeBSD-Issue1.pdf" rel="nofollow">FreeBSD News Issue #1</a></h3>

<ul>
<li>Issue #1 of FreeBSD News, from summer of 1997</li>
<li>Contains an article by Yahoo! co-founder David Filo about their early use of FreeBSD, on 100mhz Pentium machines with 64MB of ram</li>
<li>Java Development Kit 1.0.2 ported to FreeBSD</li>
<li>What is FreeBSD?</li>
<li>Running the world’s busiest FTP site (cdrom.com) on FreeBSD</li>
<li>Xi Graphics announces the release of CDE Business Desktop, the first and only integrated desktop for FreeBSD, on AcceleratedX, a fully supported commercial grade X display server</li>
<li>Get FreeBSD 2.2.2 Today!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://mail-index.netbsd.org/current-users/2016/09/21/msg030183.html" rel="nofollow">Call for testing: newly MPSAFE nvme(4)</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-September/313061.html" rel="nofollow">Thinking about starting a BUG in Indianapolis, IN USA</a></p></li>
<li><p><a href="https://medium.com/bradfield-cs/the-cost-of-forsaking-c-113986438784#.o2m5gv8y7" rel="nofollow">The cost of forsaking C: Why students still need to learn C </a> </p></li>
<li><p><a href="https://blog.jasper.la/openbsd-uefi-bootloader-howto/" rel="nofollow">OpenBSD (U)EFI bootloader howto</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2780" rel="nofollow">Michael Lucas sets his eyes on OpenBSD&#39;s web stack for his next book</a> </p></li>
<li><p><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.0-relnotes.txt" rel="nofollow">LibreSSL 2.5.0 released</a></p></li>
<li><p><a href="https://opnsense.org/opnsense-16-7-5-released/" rel="nofollow">OPNsense 16.7.5 released</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/XeJhK0AJ" rel="nofollow"> Jonas - ZFS on DO </a> </li>
<li><a href="http://pastebin.com/Z9JRjcvb" rel="nofollow"> Ricardo - OpenBSD Encrypted Disk</a> </li>
<li><a href="http://pastebin.com/XAD0UevP" rel="nofollow"> WiskerTickle - Storage Benchmark </a> </li>
<li><a href="http://pastebin.com/N52JhYru" rel="nofollow"> Phil - Thanks</a> </li>
<li><a href="http://pastebin.com/57qS0wrx" rel="nofollow"> Luis - Misc Questions</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we’ll be talking to Petra about the NetBSD foundation, about how they operate and assist NetBSD behind the scenes. That plus lots of news</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.daemonology.net/blog/2016-10-03-FreeBSD-EC2-11-0-RELEASE.html" rel="nofollow">What is new on EC2 for FreeBSD 11.0-RELEASE</a></h3>

<ul>
<li>“FreeBSD 11.0-RELEASE is just around the corner, and it will be bringing a long list of new features and improvements — far too many for me to list here. I think there are 
some improvements in FreeBSD 11.0 which are particularly noteworthy for EC2 users.”</li>
<li>“First, the EC2 Console Screenshot functionality now works with FreeBSD. This provides a &quot;VGA&quot; output as opposed to the traditional &quot;serial port&quot; which EC2 has exposed as 
&quot;console output&quot; for the past decade, and is useful largely because the &quot;VGA&quot; output becomes available immediately whereas the &quot;serial port&quot; output can lag by several minutes. This 
improvement is a simple configuration change — older releases didn&#39;t waste time writing to a non-serial console because it didn&#39;t go anywhere until Amazon added support on their 
side — and can be enabled on older FreeBSD releases by changing the line console=&quot;comconsole&quot; to boot_multicons=&quot;YES&quot; in /boot/loader.conf.”</li>
<li>“The second notable change is support for EC2 &quot;Enhanced Networking&quot; using Intel 82599 hardware; on the C3, C4, R3, I2, D2, and M4 (excluding m4.16xlarge) families, this 
provides increased network throughput and reduced latency and jitter, since it allows FreeBSD to talk directly to the networking hardware rather than via a Xen paravirtual interface. 
Getting this working took much longer than I had hoped, but the final problem turned out not to be in FreeBSD at all — we were tickling an interrupt-routing bug in a version of 
Xen used in EC2. Unfortunately FreeBSD does not yet have support for the new &quot;Elastic Network Adapter&quot; enhanced networking used in P2 and X1 instance families and the m4.16xlarge 
instance type; I&#39;m hoping that we&#39;ll have a driver for that before FreeBSD 11.1 arrives.”</li>
<li>“The third notable change is an improvement in EC2 disk throughput. This comes thanks to enabling indirect segment I/Os in FreeBSD&#39;s blkfront driver; while the support was 
present in 10.3, I had it turned off by default due to performance anomalies on some EC2 instances. (Those EC2 performance problems have been resolved, and disk I/O performance in 
EC2 on FreeBSD 10.3 can now be safely improved by removing the line hw.xbd.xbd_enable_indirect=&quot;0&quot; from /boot/loader.conf.)”</li>
<li>“Finally, FreeBSD now supports all 128 CPUs in the x1.32xlarge instance type. This improvement comes thanks to two changes: The FreeBSD default kernel was modified in 2014 to 
support up to 256 CPUs (up from 64), but that resulted in a (fixed-size) section of preallocated memory being exhausted early in the boot process on systems with 92 or more CPUs; a 
few months ago I changed that value to tune automatically so that FreeBSD can now boot and not immediately panic with an out-of-the-box setup on such large systems.”</li>
<li>“I think FreeBSD/EC2 users will be very happy with FreeBSD 11.0-RELEASE; but I&#39;d like to end with an important reminder: No matter what you might see on FTP servers, in EC2, or 
available via freebsd-update, the new release has not been released until you see a GPG-signed email from the release engineer. This is not just a theoretical point: In my time as a 
FreeBSD developer I&#39;ve seen multiple instances of last-minute release re-rolls happening due to problems being discovered very late, so the fact that you can see bits doesn&#39;t 
necessarily mean that they are ready to be downloaded. I hope you&#39;re looking forward to 11.0-RELEASE, but please be patient.”
***</li>
</ul>

<h3><a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=213196" rel="nofollow">Upgrading Amazon EC2 instance from 10.3 to 11.0-PRERELEASE results in hang at boot </a></h3>

<ul>
<li>As if to underscore that last point, a last minute bug was found on sunday night</li>
<li>A user reported that they used freebsd-update to upgrade an EC2 instance from 10.3 to 11.0 and it started hanging during boot</li>
<li>After some quick investigation by Colin, the problem was reproduced</li>
<li>Since I had done a lot of work in the loader recently, I helped Colin build a version of the loader with a lot of the debugging enabled, and some more added to try to isolate where 
in the loader the freeze was happening</li>
<li>Colin and I worked late into the night, but eventually found the read from disk that was causing the hang</li>
<li>Unlike most of the other reads, that were going into the heap, this read was into a very low memory address, right near the 640kb border. This initially distracted us from the real 
cause of the problem</li>
<li>With more debugging added, it was determined that the problem was in the GELIBoot code, when reading the last sector of each partition to determine if it is encrypted. In cases 
where the partition is not 4k aligned, and butts up against the end of the disk, the formula used could result in a read past the end of the disk</li>
<li>The formula rounds the last sector byte address down to the nearest factor of 4096, then reads 4096 bytes. Then that buffer is examined to determine if the partition is encrypted. 
If it is a 512b sector drive, the metadata will be in the last 512 bytes of that 4096 byte buffer.</li>
<li>However, if the partition is not 4k aligned, the rounding will produce a value that is less than 4096 bytes from the end of the disk, and attempting to read 4096 bytes, will read 
past the end of the disk</li>
<li>Normally this isn’t that big of a problem, the BIOS will just return an error. The loader will retry up to three times, then give up and move on, continuing to boot normally.</li>
<li>Some BIOSes are buggy, and will initiate their own retries, and the combination might result in a stall of up to 30 seconds for each attempt to read past the end of the disk</li>
<li>But it seems that Amazon EC2 instances, (and possibly other virtual instances), will just hang in this case.</li>
<li>This bug has existed for 6 months, but was not caught because almost all installations are 4k aligned thanks to changes made to the installer over the last few years, and most 
hardware continues to boot with no sign of a problem</li>
<li>Even the EC2 snapshot images of 11.0 do not have the problem, as they use a newer disk layout that is 4k aligned by default now. The problem only seems to happen when older disk 
images are upgraded</li>
<li>The fix has been committed and will be merged the the branches over the next few days</li>
<li>An Errata notice will be issues, and the fix will be available via freebsd-update</li>
<li>It is recommended that EC2 users, and anyone who wants to be especially cautious, wait until this errata notice goes out before attempting to upgrade from FreeBSD 10.3 to 11.0</li>
<li>You can determine if your partitions are 4k aligned by running ‘gpart show’. If there is free space after your last partition, you won’t have any issues.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160929230557&mode=expanded" rel="nofollow">OpenBSD 6.0 Limited Edition CD set (signed by developers)</a></h3>

<p><a href="http://www.ebay.com/itm/-/331985953783" rel="nofollow">The first one went for .$4,200.00</a> </p>

<ul>
<li>Looking for your piece of OpenBSD history? At the recent g2k16 hackathon in Cambridge UK, 40 OpenBSD developers put pen to paper and signed 5 copies of the new 6.0 release.</li>
<li>Each of these will be auctioned off on ebay, with the proceeds to benefit the OpenBSD foundation.</li>
<li>The first auction has already ended, and CD set went for a whopping $4200!</li>
<li>The next set only has 2 days left, and currently stands at $3000! (<a href="http://www.ebay.com/itm/-/331990536246" rel="nofollow">http://www.ebay.com/itm/-/331990536246</a>) </li>
<li>Get your bids in soon, these are VERY unique, the odds of getting the same 40 developers in a room together and signing a new .0 release may make this a once-in-a-lifetime 
opportunity.</li>
<li>Additionally, if you are just starting your OpenBSD collection, here’s a nice image to make you envious: <a href="http://i.imgur.com/OrE0Gsa.png" rel="nofollow">A nice collection of OpenBSD CD Sets</a> 
***</li>
</ul>

<h3>[What typing <sup>D</sup> really does on Unix</h3>

<p>](<a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/TypingEOFEffects" rel="nofollow">https://utcc.utoronto.ca/~cks/space/blog/unix/TypingEOFEffects</a>)</p>

<ul>
<li>How often have you used a <sup>D</sup> to generate an EOF? Do you really know what that does?</li>
<li>Chris Siebenmann has posted a look at this on his blog, which might not be what you think</li>
</ul>

<blockquote>
<p>“Typing <sup>D</sup> causes the tty driver to immediately finish a read().”</p>
</blockquote>

<ul>
<li>He continues on:</li>
</ul>

<blockquote>
<p>Normally doing a read() from a terminal is line-buffered inside the tty driver; your program only wakes up when the tty driver sees the newline, at which point you get back the full <br>
line. (Note that this buffering is distinct from anything that your language&#39;s IO system may be doing.)</p>

<p>Typing <sup>D</sup> causes the tty driver to stop waiting for a newline and immediately return from the read() with however much of the line has been accumulated to date. If you haven&#39;t <br>
typed anything on the line yet, there is nothing accumulated and the read() will return 0 bytes, which is conveniently the signal for end of file. If you have typed something the <br>
program will get it; because it doesn&#39;t have a trailing newline, the program&#39;s own line-buffering may take over and keep read()ing to get the rest of the line.</p>

<p>(Other programs will immediately process the partial line with no buffering; cat is one example of this.)</p>

<p>Once you&#39;ve typed <sup>D</sup> on a partial line, that portion of the line is immutable because it&#39;s already been given to the program. Most Unixes won&#39;t let you backspace over such partial <br>
lines; effectively they become output, not input.</p>

<p>(Note that modern shells are not good examples of this, because they don&#39;t do line-buffered input; to support command line editing, they switch terminal input into an uninterpreted <br>
mode. So they get the raw <sup>D</sup> and can do whatever they want with it, and they can let you edit as much of the pending line as they want.)</p>
</blockquote>

<ul>
<li>Fascinating stuff, and interesting to see behind the curtain at exactly what’s going on with your programs buffering and tty driver interaction.</li>
</ul>

<hr>

<h2>Interview - Petra Zeidler - <a href="mailto:spz@netbsd.org" rel="nofollow">spz@netbsd.org</a></h2>

<ul>
<li>NetBSD Foundation
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://erouault.blogspot.com/2016/09/running-freebsd-in-travis-ci.html" rel="nofollow">Running FreeBSD in Travis-CI Thanks to KQEmu</a></h3>

<ul>
<li>Travis-CI is the most popular testing framework on Github, but it doesn’t support any of the BSDs</li>
<li>This didn’t discourage Even Rouault, who managed to run FreeBSD in KQEMU on the Linux instances provided by Travis-CI</li>
<li>“Travis-CI has a free offer for software having public repository at GitHub. Travis-CI provides cloud instances running Linux or Mac OS X. To increase portability tests of 
GDAL, I wondered if it was somehow possible to run another operating system with Travis-CI, for example FreeBSD. A search lead me to this 
<a href="https://github.com/travis-ci/travis-ci/issues/1818" rel="nofollow">question</a> in their bug tracker but the outcome seems to be that it is not possible, nor in their medium or long term plans.”</li>
<li>“One idea that came quickly to mind was to use the QEMU machine emulator that can simulate full machines, of several hardware architectures.”</li>
<li>They found an existing image of FreeBSD 9.2 and configured the Travis job to download it and fire it up in QEMU.</li>
<li>“Here we go: ./configure &amp;&amp; make ! That works, but 50 minutes later (the maximum length of a Travis-CI job), our job is killed with perhaps only 10% of the GDAL code base being 
compiled. The reason is that we used the pure software emulation mode of QEMU that involves on-the-fly disassembling of the code to be run and re-assembling.”</li>
<li>Travis-CI runs in Google Compute Engine, which does not allow nested virtualization, so hardware virtualization is not an option to speed up QEMU</li>
<li>“Here comes the time for good old memories and a bit of software archeology. QEMU was started by Fabrice Bellard. If you didn&#39;t know his name yet, F. Bellard created FFMPEG and 
QEMU, holds a world record for the number of decimals of Pi computed on a COTS PC, has ported QEMU in JavaScript to run the Linux kernel in your browser, devised BPG, a new 
compression based on HEVC, etc....”</li>
<li>“At the time where his interest was focused on QEMU, he created KQemu, a kernel module (for Linux, Windows, FreeBSD hosts), that could significantly enhance QEMU performance 
when the guest and hosts are x86/x86_64 and does not require (nor use) hardware virtualization instructions.”</li>
<li>“Running it on Travis-CI was successful too, with the compilation being done in 20 minutes, so probably half of the speed of bare metal, which is good enough.”</li>
<li>“I could also have potentially tried VirtualBox because, as mentioned above, it supports software virtualization with acceleration. But that is only for 32 bit guests (and I 
didn&#39;t find a ready-made FreeBSD 32bit image that you can directly ssh into). For 64 bit guests, VirtualBox require hardware virtualization to be available in the host. To the best 
of my knowledge, KQemu is (was) the only solution to enable acceleration of 64 bit guests without hardware requirements.”</li>
<li>It will be interesting to see if enough people do this hack, maybe Travis-CI will consider properly supporting FreeBSD
***</li>
</ul>

<h3><a href="https://www.openbsd.org/events.html" rel="nofollow">OpenBSD EuroBSDcon 2016 Papers are online</a></h3>

<ul>
<li>Slides from the OpenBSD talks at EuroBSDCon are online now

<ul>
<li>Landry Breuil, <a href="https://rhaalovely.net/%7Elandry/eurobsdcon2016/" rel="nofollow">Building packages on exotic architectures</a></li>
<li>Peter Hessler, <a href="https://www.openbsd.org/papers/eurobsdcon2016-bfd.pdf" rel="nofollow">Bidirectional Forwarding Detection (BFD) implementation and support in OpenBSD</a></li>
<li>Ingo Schwarze, <a href="https://www.openbsd.org/papers/eurobsdcon2016-utf8.pdf" rel="nofollow">Why and how you ought to keep multibyte character support simple</a> (roff/mm/gpresent <a href="https://www.openbsd.org/papers/eurobsdcon2016-utf8.roff" rel="nofollow">source 
code</a>)</li>
<li>Stefan Sperling, <a href="https://www.openbsd.org/papers/eurobsdcon2016-openbsd-11n.pdf" rel="nofollow">OpenBSD meets 802.11n</a></li>
<li>Antoine Jacoutot, <a href="https://www.bsdfrog.org/pub/events/openbsd-rcd-EuroBSDcon2016.pdf" rel="nofollow">OpenBSD rc.d(8)</a></li>
<li>Marc Espie, <a href="https://www.openbsd.org/papers/eurobsdcon2016-privsep.pdf" rel="nofollow">Retrofitting privsep into dpb and pkg_add</a></li>
<li>Martin Pieuchot, <a href="https://www.openbsd.org/papers/eurobsdcon2016-embracingbsdrt.pdf" rel="nofollow">Embracing the BSD routing table</a></li>
</ul></li>
<li>I am working to build a similar website for the FreeBSD project, but there is still a lot of work to do</li>
<li>I also managed to find the slides from the keynotes:</li>
<li><a href="https://papers.freebsd.org/2016/EuroBSDCon/LookingBackwards.pdf" rel="nofollow">Opening Keynote: George Neville-Neil: Looking Backwards: The coming decades of BSD </a></li>
<li><a href="http://www.monobsd.com/files/16_ddos_and_consequences.pptx" rel="nofollow">Closing Keynote: Gert Döring: Internet Attacks, Self-Governance, and the Consequences </a>
***</li>
</ul>

<h3><a href="https://kernelnomicon.org/?p=650" rel="nofollow">VirtualBox Shared Folders on FreeBSD: progress report</a></h3>

<ul>
<li>In the past month or so, VirtualBox in the FreeBSD ports tree got bumped to version 5, which while bringing new features, did cause a regression in Shared Folders.</li>
<li>FreeBSD developer gonzo@ (Oleksandr Tymoshenko) has been tackling this issue in recent days and provides us with a look behind the curtain at the challenges involved.</li>
<li>Specifically he started by implementing the various needed VOPs: “lookup, access, readdir, read, getattr, readlink, remove, rmdir, symlink, close, create, open, write.”</li>
<li>He then continues with details about how complete this is:</li>
</ul>

<p>““Kind of implemented” means that I was able to mount directory, traverse it, read file, calculate md5 sums and compare with host’s md5sum, create/remove directories, <br>
unzip zip file, etc but I doubt it would survive stress-test. Locking is all wrong at the moment and read/write VOPs allocate buffers for every operation.”</p>

<ul>
<li>The bigger issue faced is with the rename VOP though:</li>
</ul>

<blockquote>
<p>I hit a roadblock with rename VOP: it involves some non-trivial locking logic and also there is a problem with cached paths. VBox hypervisor operates on full paths so we cache them <br>
in vboxfs nodes, but if one of parent directories is renamed, all cached names should be modified accordingly. I am going to tackle these two problems once I have long enough stretch <br>
of time time sit and concentrate on task.</p>

<ul>
<li>We wish him luck in getting those issues solved. I know quite a few of our users rely on shared folders as well.
***</li>
</ul>
</blockquote>

<h3><a href="http://support.rossw.net/FreeBSD-Issue1.pdf" rel="nofollow">FreeBSD News Issue #1</a></h3>

<ul>
<li>Issue #1 of FreeBSD News, from summer of 1997</li>
<li>Contains an article by Yahoo! co-founder David Filo about their early use of FreeBSD, on 100mhz Pentium machines with 64MB of ram</li>
<li>Java Development Kit 1.0.2 ported to FreeBSD</li>
<li>What is FreeBSD?</li>
<li>Running the world’s busiest FTP site (cdrom.com) on FreeBSD</li>
<li>Xi Graphics announces the release of CDE Business Desktop, the first and only integrated desktop for FreeBSD, on AcceleratedX, a fully supported commercial grade X display server</li>
<li>Get FreeBSD 2.2.2 Today!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://mail-index.netbsd.org/current-users/2016/09/21/msg030183.html" rel="nofollow">Call for testing: newly MPSAFE nvme(4)</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-September/313061.html" rel="nofollow">Thinking about starting a BUG in Indianapolis, IN USA</a></p></li>
<li><p><a href="https://medium.com/bradfield-cs/the-cost-of-forsaking-c-113986438784#.o2m5gv8y7" rel="nofollow">The cost of forsaking C: Why students still need to learn C </a> </p></li>
<li><p><a href="https://blog.jasper.la/openbsd-uefi-bootloader-howto/" rel="nofollow">OpenBSD (U)EFI bootloader howto</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2780" rel="nofollow">Michael Lucas sets his eyes on OpenBSD&#39;s web stack for his next book</a> </p></li>
<li><p><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.5.0-relnotes.txt" rel="nofollow">LibreSSL 2.5.0 released</a></p></li>
<li><p><a href="https://opnsense.org/opnsense-16-7-5-released/" rel="nofollow">OPNsense 16.7.5 released</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/XeJhK0AJ" rel="nofollow"> Jonas - ZFS on DO </a> </li>
<li><a href="http://pastebin.com/Z9JRjcvb" rel="nofollow"> Ricardo - OpenBSD Encrypted Disk</a> </li>
<li><a href="http://pastebin.com/XAD0UevP" rel="nofollow"> WiskerTickle - Storage Benchmark </a> </li>
<li><a href="http://pastebin.com/N52JhYru" rel="nofollow"> Phil - Thanks</a> </li>
<li><a href="http://pastebin.com/57qS0wrx" rel="nofollow"> Luis - Misc Questions</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>161: The BSD Bromance</title>
  <link>https://www.bsdnow.tv/161</link>
  <guid isPermaLink="false">36da27b4-412f-4eac-9d44-5ffb73ed18a4</guid>
  <pubDate>Wed, 28 Sep 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/36da27b4-412f-4eac-9d44-5ffb73ed18a4.mp3" length="72823828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we’re going to be hearing about Allan’s trip to EuroBSDCon, plus an Interview about “Bro on BSD”! Stay tuned, for your place to</itunes:subtitle>
  <itunes:duration>1:41:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we’re going to be hearing about Allan’s trip to EuroBSDCon, plus an Interview about “Bro on BSD”! Stay tuned, for your place to&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;EuroBSDCon 2016 Wrapup&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://assets.keltia.net/photos/EuroBSDCon-2016/" target="_blank" rel="nofollow noopener"&gt;Ollivier Robert’s Photos from EuroBSDCon &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.jupiterbroadcasting.com/stickers/" target="_blank" rel="nofollow noopener"&gt;Get your BSDNow die-cut stickers&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://discusscomputerx.blogspot.com/2016/09/netbsd-for-noobies-your-power-laptop.html" target="_blank" rel="nofollow noopener"&gt;NetBSD for newbies - Develop your own Power PC&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We don’t get to feature too many stories on NetBSD being deployed as a Power PC (Not PowerPC, you know, a Powerful “PC”), so we jumped at this one.&lt;/li&gt;
&lt;li&gt;Specifically it starts off with some of the pre-req’s that you’ll need to get started, such as NetBSD 7.0.1 / amd64, along with some information about which wireless nics you may be using. (NetBSD like other BSD’s will give a driver based device name for network interfaces)&lt;/li&gt;
&lt;li&gt;From there, instructions on how to write your WPA_supplicant config are provided, in order for us to fetch the NetBSD sources and convert to their -STABLE branch.&lt;/li&gt;
&lt;li&gt;After doing a CVS checkout of the sources, he then provides a walkthrough of doing a kernel compile / install, however it mentions changing the config, but doesn’t provide an example of what options were changed. Perhaps to remove drivers we don’t need?&lt;/li&gt;
&lt;li&gt;At this point the rest of the “desktop” setup is pretty straight forward. Some packages are added such as openbox, lxappearance, firefox, etc.&lt;/li&gt;
&lt;li&gt;To get working sound, firefox requires pulseaudio, which in turn needs dbus, so instructions on getting that service up and running are provided as well.&lt;/li&gt;
&lt;li&gt;When it’s all said and done, you’ll end up with your shiny new NetBSD -STABLE desktop (or laptop), bragging rights achieved!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.poolp.org/tech/posts/2016/09/12/opensmtpd-6-0-0-released/" target="_blank" rel="nofollow noopener"&gt;More about OpenSMTPD 6.0.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenSMTPd 6.0.0 has just been released “and it's quite different from former releases.”&lt;/li&gt;
&lt;li&gt;“Unlike most of our releases, it comes out with almost no new feature.”, “Turns out most of the changes are not visible.”&lt;/li&gt;
&lt;li&gt;Changelog:

&lt;ul&gt;
&lt;li&gt;new fork+reexec model so each process has its own randomized memory space&lt;/li&gt;
&lt;li&gt;logging format has been reworked&lt;/li&gt;
&lt;li&gt;a "multi-line response" bug in the LMTP delivery backend has been fixed&lt;/li&gt;
&lt;li&gt;connections concurrency limits have been bumped&lt;/li&gt;
&lt;li&gt;artificial delaying in remote sessions have been reduced&lt;/li&gt;
&lt;li&gt;dhparams option has been removed&lt;/li&gt;
&lt;li&gt;dhe option has been added, supporting auto and legacy modes&lt;/li&gt;
&lt;li&gt; smtp engine has been simplified&lt;/li&gt;
&lt;li&gt;various cosmetic changes, code cleanup and documentation improvement&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;“The OpenSMTPD bootstrap process was quite simple: Upon executation, the parent process would read configuration, build a memory representation of it and would then create a bunch of socketpair() before fork()-ing all of its child processes.”&lt;/li&gt;
&lt;li&gt;The problem is that this does not take advantage of the new address randomization feature. Each child will have the same memory layout, copied from the parent process&lt;/li&gt;
&lt;li&gt;“So deraadt@ suggested that if OpenSMTPD would not just fork() children but instead fork() them and reexecute the smtpd binary, then each of the children would have its own randomized memory space.”&lt;/li&gt;
&lt;li&gt;“The idea itself is neat, however not so trivial to implement because when we reexec the whole "inherit configuration and descriptors" part goes away. It's not just fork and exec, it's fork and exec and figure a way for the parent to pass back all the information and descriptors back to the new post-fork instance so it is the new instance that allocates memory and decides where the information goes.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ftfl.ca/blog/2016-09-17-zfs-fde-one-pool-conversion.html" target="_blank" rel="nofollow noopener"&gt;Upgrade a FreeBSD 10.3 Installation with ZFS on Root and Full Disk Encryption to 11.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While FreeBSD 11.0 is not out yet, Joseph Mingrone has helped me work out and test the instructions for upgrading a FreeBSD 10.3 ZFS on full disk encryption setup (bootpool + zpool) to the new GELIBoot feature, which does not require any unencrypted partitions, just the 128kb bootcode&lt;/li&gt;
&lt;li&gt;Note: Do not upgrade to FreeBSD 11.0 yet. While some images have landed on the FTP server, they do not contain the final openssl fix and are going to be recreated.&lt;/li&gt;
&lt;li&gt;Currently, GELIBoot does not support key files, so the first step is to reencrypt the master key with only a passphrase.&lt;/li&gt;
&lt;li&gt;Next, to avoid GELIBoot picking up encrypted partitions that it does not support, or partitions you do not want decrypted at boot, only partitions with the GELIBoot flag are decrypted, so set the flag on your root partition&lt;/li&gt;
&lt;li&gt;Then, move the loader, kernel, and other files into /boot on the root filesystem, instead of them living on the bootpool. This allows the kernel to be versioned with boot environments, and is the main purpose of this work&lt;/li&gt;
&lt;li&gt;Then, install the newer gptzfsboot, as this is required to support GELIBoot&lt;/li&gt;
&lt;li&gt;The old 2gb bootpool partition is then purposely mislabeled as freebsd-vinum, so it is not picked up by the boot blocks. Later, if the upgrade is successful, this partition can be deleted, and used as addition swap or something&lt;/li&gt;
&lt;li&gt;In order to boot correctly, you want all boot environments to have the ‘canmount’ ZFS property set to ‘noauto’&lt;/li&gt;
&lt;li&gt;Thank you to Joseph for taking the time to prod me for the information required to write this up, and for testing it and finding all of the issues 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Michael Shirk - &lt;a href="mailto:mshirk@daemon-security.com" target="_blank" rel="nofollow noopener"&gt;mshirk@daemon-security.com&lt;/a&gt; / &lt;a href="https://twitter.com/shirkdog" target="_blank" rel="nofollow noopener"&gt;@shirkdog&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Running Bro on BSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://clonos.tekroutine.com/" target="_blank" rel="nofollow noopener"&gt;FreeBSD based distro for virtual hosting platform and appliance&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An interesting new FreeBSD-based project as shown up online, called “ClonOS”, which bills itself as a “free open-source FreeBSD-based platform for virtual environments creation and management”&lt;/li&gt;
&lt;li&gt;It looks to be leveraging an impressive list of technologies, including Bhyve, Xen, Jails and CBSD / Puppet for management tasks.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Among its list of features:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ZFS features support;&lt;/li&gt;
&lt;li&gt;VM cloning, export, import&lt;/li&gt;
&lt;li&gt;Ethernet SoftSwitch for separated networking&lt;/li&gt;
&lt;li&gt;jails for lightweight container&lt;/li&gt;
&lt;li&gt;VNC terminal for VM/containers&lt;/li&gt;
&lt;li&gt;Templates for VM/containers&lt;/li&gt;
&lt;li&gt;Configuration management/helpers&lt;/li&gt;
&lt;li&gt;Multi-node operation&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Multi-Node? Color me intrigued! &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Right now it appears to be under heavy development, but we’ll reach out to the developer to see if we can get an interview lined up at some point!&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://bsdmag.org/oleksandr_rybalko/" target="_blank" rel="nofollow noopener"&gt;The Raspberry PI Platform and The Challenges of Developing FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDMag recently did an interview with FreeBSD developer Olesandr Rybalko!&lt;/li&gt;
&lt;li&gt;Oleksandr lives in the Ukraine, and while you may not have heard of him, he has worked on some cool projects for FreeBSD including the new “vt” console driver (Which a lot of people are using now), and ARM/MIPS support.&lt;/li&gt;
&lt;li&gt;The interview covers some of the work he’s done to get the PI support working with FreeBSD:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I think, my main help here was a USB OTG driver, which I wrote before for another device (Ralink RT3052), then port it to R-Pi. But it was rewritten by Hans Peter Selasky. I do not know so much about USB as Hans knows.&lt;/p&gt;

&lt;p&gt;&amp;gt; Another useful part of my help is Xorg support. I did a simple Xorg video driver which uses framebuffer exported by virtual terminal subsystem. That is help to many guys to start use RPi as a simple desktop system.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He was also asked the question “Why would FreeBSD be good fit for ARM?”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;FreeBSD is very powerful as a network server. All modern network features in one box, with very fast processing.&lt;/p&gt;

&lt;p&gt;&amp;gt; Another good side of FreeBSD is modularity. It is not required to write code to use some driver that was already written for another system, you can just define it in configuration files (kernel config, kernel hints, FDT). So if you want build a nice, R-Pi based, home server – use FreeBSD. If you want to play with devices attached to R-Pi’s GPIO – use FreeBSD.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He also discusses his work on the ZRouter project, which is a very light-weight platform for tiny routers / embedded devices. But lastly the RPI comes up again, specifically asking him how interested individuals can get involved. Specifically the wiki.freebsd.org is a great reference point for those intested in getting started with FreeBSD on embedded. The warm community is also a plus!&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.phoronix.com/scan.php?page=news_item&amp;amp;px=TrueOS-First-Spin" target="_blank" rel="nofollow noopener"&gt;Trying out the FreeBSD powered TrueOS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The folks over at Phoronix have done an early look at the new TrueOS desktop images and given some of their thoughts. &lt;/li&gt;
&lt;li&gt;First up he gives props to the installer, noting that:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The TrueOS desktop installer is basically the same as from the PC-BSD days, just re-branded. Still one of the easiest BSD graphical installers I've dealt with and makes it a breeze for setting up a FreeBSD-on-ZFS system by default. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After that they took it for a minimal spin, and thing mostly seem to be working. He mentions some of the default apps (Such as qupzilla and trojita) aren’t their favorite, but Lumina has come quite a ways for 1.0, despite a few rough edges still. (We are in the process of changing those default e-mail / browser apps)&lt;/li&gt;
&lt;li&gt;Lastly the article mentions that it’s time to do a more full BSD round-up to see the state of installation of them, which we happen to have next!&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.phoronix.com/scan.php?page=article&amp;amp;item=trying-8-bsds&amp;amp;num=1" target="_blank" rel="nofollow noopener"&gt;Trying out 8 BSDs on a modern PC&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;First up was TrueOS again, which no major changes there, easy install and done.&lt;/li&gt;
&lt;li&gt;From there he tries out DragonFlyBSD, which he mentions that while the installer isn’t as easy, it is still one of his favorite BSD’s, working with all the hardware they’ve thrown at it.&lt;/li&gt;
&lt;li&gt;Next up was GhostBSD, which also has an Easy-To-Use graphical installer similar to TrueOS that made it quick to get loaded and up to the Mate desktop.&lt;/li&gt;
&lt;li&gt;Also tested was FreeBSD 11.0-RC2, which he mentions was easy to installed, and once done then ‘pkg’ could be used to easily get the setup he wanted setup.&lt;/li&gt;
&lt;li&gt;Turning over to page two we get to the naughty list of BSD’s he had troubles with.&lt;/li&gt;
&lt;li&gt;First up was OpenBSD which he tried 6.0. After installation and first boot, the display kept ‘disappearing’ which meant he couldn’t get IP information to try SSH’ing into the box. Perhaps a display driver error?&lt;/li&gt;
&lt;li&gt;NetBSD 7 was up next, where the installer couldn’t get past a root device prompt. Most likely trouble finding the install media, which was the same story with MightnightBSD as well.&lt;/li&gt;
&lt;li&gt;Also tested was “PacBSD” (Formerly ArchBSD) which he did manage to get installed, but not after major fighting with the process. After the process he ran into some issues getting packages up and running, but mentions it may have been bad timing due to them moving to a new server at the time.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.listbox.com/member/archive/182181/2016/09/sort/time_rev/page/1/entry/0:1/20160923124232:B7978ED4-81AC-11E6-A6DA-02E3F010038B/" target="_blank" rel="nofollow noopener"&gt;IllumOS imports a modified FreeBSD boot loader to replace grub 0.97&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Toomas Soome’s work to port the FreeBSD boot loader to IllumOS has been merged into illumos-gate, the upstream repository for all IllumOS distributions&lt;/li&gt;
&lt;li&gt;Toomas’ work has also resulted in a number of commits to FreeBSD, and code sharing in both directions&lt;/li&gt;
&lt;li&gt;Toomas helped me a lot with the building of the ZFS boot environment listing menu, even though on IllumOS they use a configuration file to list the BEs, rather than interrogating the live zpool like we do in FreeBSD&lt;/li&gt;
&lt;li&gt;Toomas’ work to improve msdosfs and the block cache to speed up booting IllumOS also greatly helped FreeBSD&lt;/li&gt;
&lt;li&gt;This work means IllumOS can now boot from a RAID-Z (the old grub they used could not), and if the work Toomas has done on FreeBSD is any indication, support for almost all other zpool features is also on the way&lt;/li&gt;
&lt;li&gt;This work also sets IllumOS on a path to eventually having UEFI boot as well&lt;/li&gt;
&lt;li&gt;It is good to see this work happening, FreeBSD technology being reused elsewhere, but also the improvements being made for IllumOS are coming back to FreeBSD, often landing upstream first, to make merging them into IllumOS easier.&lt;/li&gt;
&lt;li&gt;The mailing list post describes how to convert existing systems away from grub, as well as how to opt to remain on grub for a while longer.&lt;/li&gt;
&lt;li&gt;Grub 0.97 is expected to be removed from IllumOS within a year.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=8YQQfXqtyaA" target="_blank" rel="nofollow noopener"&gt;A demo of booting CentOS and Windows 10 in FreeBSD Bhyve through VNC headless&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2762" target="_blank" rel="nofollow noopener"&gt;This year’s anemic output&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2771" target="_blank" rel="nofollow noopener"&gt;“PAM Mastery” ebook now out&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=oC5D9fenQBs" target="_blank" rel="nofollow noopener"&gt;How-to Install OpenBSD 6.0 plus XFCE desktop and basic applications&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/yniniNpV" target="_blank" rel="nofollow noopener"&gt; Piotr - LibreBoot &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/dCNX0yF7" target="_blank" rel="nofollow noopener"&gt; Alan - FreeBSD and PC-BSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/LndNeAYb" target="_blank" rel="nofollow noopener"&gt; Eduardo - Newcomers&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/F0y6L6NK" target="_blank" rel="nofollow noopener"&gt; Greg - ZFS ACL’s&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/sqMPJGMM" target="_blank" rel="nofollow noopener"&gt; Brian - Laptop Recs&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we’re going to be hearing about Allan’s trip to EuroBSDCon, plus an Interview about “Bro on BSD”! Stay tuned, for your place to</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>EuroBSDCon 2016 Wrapup</h3>

<ul>
<li><a href="https://assets.keltia.net/photos/EuroBSDCon-2016/" rel="nofollow">Ollivier Robert’s Photos from EuroBSDCon </a> </li>
<li><a href="http://www.jupiterbroadcasting.com/stickers/" rel="nofollow">Get your BSDNow die-cut stickers</a> </li>
</ul>

<h3><a href="http://discusscomputerx.blogspot.com/2016/09/netbsd-for-noobies-your-power-laptop.html" rel="nofollow">NetBSD for newbies - Develop your own Power PC</a></h3>

<ul>
<li>We don’t get to feature too many stories on NetBSD being deployed as a Power PC (Not PowerPC, you know, a Powerful “PC”), so we jumped at this one.</li>
<li>Specifically it starts off with some of the pre-req’s that you’ll need to get started, such as NetBSD 7.0.1 / amd64, along with some information about which wireless nics you may be using. (NetBSD like other BSD’s will give a driver based device name for network interfaces)</li>
<li>From there, instructions on how to write your WPA_supplicant config are provided, in order for us to fetch the NetBSD sources and convert to their -STABLE branch.</li>
<li>After doing a CVS checkout of the sources, he then provides a walkthrough of doing a kernel compile / install, however it mentions changing the config, but doesn’t provide an example of what options were changed. Perhaps to remove drivers we don’t need?</li>
<li>At this point the rest of the “desktop” setup is pretty straight forward. Some packages are added such as openbox, lxappearance, firefox, etc.</li>
<li>To get working sound, firefox requires pulseaudio, which in turn needs dbus, so instructions on getting that service up and running are provided as well.</li>
<li>When it’s all said and done, you’ll end up with your shiny new NetBSD -STABLE desktop (or laptop), bragging rights achieved!
***</li>
</ul>

<h3><a href="https://www.poolp.org/tech/posts/2016/09/12/opensmtpd-6-0-0-released/" rel="nofollow">More about OpenSMTPD 6.0.0</a></h3>

<ul>
<li>OpenSMTPd 6.0.0 has just been released “and it&#39;s quite different from former releases.”</li>
<li>“Unlike most of our releases, it comes out with almost no new feature.”, “Turns out most of the changes are not visible.”</li>
<li>Changelog:

<ul>
<li>new fork+reexec model so each process has its own randomized memory space</li>
<li>logging format has been reworked</li>
<li>a &quot;multi-line response&quot; bug in the LMTP delivery backend has been fixed</li>
<li>connections concurrency limits have been bumped</li>
<li>artificial delaying in remote sessions have been reduced</li>
<li>dhparams option has been removed</li>
<li>dhe option has been added, supporting auto and legacy modes</li>
<li> smtp engine has been simplified</li>
<li>various cosmetic changes, code cleanup and documentation improvement</li>
</ul></li>
<li>“The OpenSMTPD bootstrap process was quite simple: Upon executation, the parent process would read configuration, build a memory representation of it and would then create a bunch of socketpair() before fork()-ing all of its child processes.”</li>
<li>The problem is that this does not take advantage of the new address randomization feature. Each child will have the same memory layout, copied from the parent process</li>
<li>“So deraadt@ suggested that if OpenSMTPD would not just fork() children but instead fork() them and reexecute the smtpd binary, then each of the children would have its own randomized memory space.”</li>
<li>“The idea itself is neat, however not so trivial to implement because when we reexec the whole &quot;inherit configuration and descriptors&quot; part goes away. It&#39;s not just fork and exec, it&#39;s fork and exec and figure a way for the parent to pass back all the information and descriptors back to the new post-fork instance so it is the new instance that allocates memory and decides where the information goes.”
***</li>
</ul>

<h3><a href="http://ftfl.ca/blog/2016-09-17-zfs-fde-one-pool-conversion.html" rel="nofollow">Upgrade a FreeBSD 10.3 Installation with ZFS on Root and Full Disk Encryption to 11.0</a></h3>

<ul>
<li>While FreeBSD 11.0 is not out yet, Joseph Mingrone has helped me work out and test the instructions for upgrading a FreeBSD 10.3 ZFS on full disk encryption setup (bootpool + zpool) to the new GELIBoot feature, which does not require any unencrypted partitions, just the 128kb bootcode</li>
<li>Note: Do not upgrade to FreeBSD 11.0 yet. While some images have landed on the FTP server, they do not contain the final openssl fix and are going to be recreated.</li>
<li>Currently, GELIBoot does not support key files, so the first step is to reencrypt the master key with only a passphrase.</li>
<li>Next, to avoid GELIBoot picking up encrypted partitions that it does not support, or partitions you do not want decrypted at boot, only partitions with the GELIBoot flag are decrypted, so set the flag on your root partition</li>
<li>Then, move the loader, kernel, and other files into /boot on the root filesystem, instead of them living on the bootpool. This allows the kernel to be versioned with boot environments, and is the main purpose of this work</li>
<li>Then, install the newer gptzfsboot, as this is required to support GELIBoot</li>
<li>The old 2gb bootpool partition is then purposely mislabeled as freebsd-vinum, so it is not picked up by the boot blocks. Later, if the upgrade is successful, this partition can be deleted, and used as addition swap or something</li>
<li>In order to boot correctly, you want all boot environments to have the ‘canmount’ ZFS property set to ‘noauto’</li>
<li>Thank you to Joseph for taking the time to prod me for the information required to write this up, and for testing it and finding all of the issues 
***</li>
</ul>

<h2>Interview - Michael Shirk - <a href="mailto:mshirk@daemon-security.com" rel="nofollow">mshirk@daemon-security.com</a> / <a href="https://twitter.com/shirkdog" rel="nofollow">@shirkdog</a></h2>

<ul>
<li>Running Bro on BSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://clonos.tekroutine.com/" rel="nofollow">FreeBSD based distro for virtual hosting platform and appliance</a></h3>

<ul>
<li>An interesting new FreeBSD-based project as shown up online, called “ClonOS”, which bills itself as a “free open-source FreeBSD-based platform for virtual environments creation and management”</li>
<li>It looks to be leveraging an impressive list of technologies, including Bhyve, Xen, Jails and CBSD / Puppet for management tasks.</li>
<li><p>Among its list of features:</p>

<ul>
<li>ZFS features support;</li>
<li>VM cloning, export, import</li>
<li>Ethernet SoftSwitch for separated networking</li>
<li>jails for lightweight container</li>
<li>VNC terminal for VM/containers</li>
<li>Templates for VM/containers</li>
<li>Configuration management/helpers</li>
<li>Multi-node operation</li>
</ul></li>
<li><p>Multi-Node? Color me intrigued! </p></li>
<li><p>Right now it appears to be under heavy development, but we’ll reach out to the developer to see if we can get an interview lined up at some point!</p>

<hr></li>
</ul>

<h3><a href="https://bsdmag.org/oleksandr_rybalko/" rel="nofollow">The Raspberry PI Platform and The Challenges of Developing FreeBSD</a></h3>

<ul>
<li>BSDMag recently did an interview with FreeBSD developer Olesandr Rybalko!</li>
<li>Oleksandr lives in the Ukraine, and while you may not have heard of him, he has worked on some cool projects for FreeBSD including the new “vt” console driver (Which a lot of people are using now), and ARM/MIPS support.</li>
<li>The interview covers some of the work he’s done to get the PI support working with FreeBSD:</li>
</ul>

<blockquote>
<p>I think, my main help here was a USB OTG driver, which I wrote before for another device (Ralink RT3052), then port it to R-Pi. But it was rewritten by Hans Peter Selasky. I do not know so much about USB as Hans knows.</p>

<p>Another useful part of my help is Xorg support. I did a simple Xorg video driver which uses framebuffer exported by virtual terminal subsystem. That is help to many guys to start use RPi as a simple desktop system.</p>
</blockquote>

<ul>
<li>He was also asked the question “Why would FreeBSD be good fit for ARM?”</li>
</ul>

<blockquote>
<p>FreeBSD is very powerful as a network server. All modern network features in one box, with very fast processing.</p>

<p>Another good side of FreeBSD is modularity. It is not required to write code to use some driver that was already written for another system, you can just define it in configuration files (kernel config, kernel hints, FDT). So if you want build a nice, R-Pi based, home server – use FreeBSD. If you want to play with devices attached to R-Pi’s GPIO – use FreeBSD.</p>
</blockquote>

<ul>
<li>He also discusses his work on the ZRouter project, which is a very light-weight platform for tiny routers / embedded devices. But lastly the RPI comes up again, specifically asking him how interested individuals can get involved. Specifically the wiki.freebsd.org is a great reference point for those intested in getting started with FreeBSD on embedded. The warm community is also a plus!</li>
</ul>

<hr>

<h3><a href="http://www.phoronix.com/scan.php?page=news_item&px=TrueOS-First-Spin" rel="nofollow">Trying out the FreeBSD powered TrueOS</a></h3>

<ul>
<li>The folks over at Phoronix have done an early look at the new TrueOS desktop images and given some of their thoughts. </li>
<li>First up he gives props to the installer, noting that:</li>
</ul>

<blockquote>
<p>The TrueOS desktop installer is basically the same as from the PC-BSD days, just re-branded. Still one of the easiest BSD graphical installers I&#39;ve dealt with and makes it a breeze for setting up a FreeBSD-on-ZFS system by default. </p>
</blockquote>

<ul>
<li>After that they took it for a minimal spin, and thing mostly seem to be working. He mentions some of the default apps (Such as qupzilla and trojita) aren’t their favorite, but Lumina has come quite a ways for 1.0, despite a few rough edges still. (We are in the process of changing those default e-mail / browser apps)</li>
<li>Lastly the article mentions that it’s time to do a more full BSD round-up to see the state of installation of them, which we happen to have next!</li>
</ul>

<h3><a href="http://www.phoronix.com/scan.php?page=article&item=trying-8-bsds&num=1" rel="nofollow">Trying out 8 BSDs on a modern PC</a></h3>

<ul>
<li>First up was TrueOS again, which no major changes there, easy install and done.</li>
<li>From there he tries out DragonFlyBSD, which he mentions that while the installer isn’t as easy, it is still one of his favorite BSD’s, working with all the hardware they’ve thrown at it.</li>
<li>Next up was GhostBSD, which also has an Easy-To-Use graphical installer similar to TrueOS that made it quick to get loaded and up to the Mate desktop.</li>
<li>Also tested was FreeBSD 11.0-RC2, which he mentions was easy to installed, and once done then ‘pkg’ could be used to easily get the setup he wanted setup.</li>
<li>Turning over to page two we get to the naughty list of BSD’s he had troubles with.</li>
<li>First up was OpenBSD which he tried 6.0. After installation and first boot, the display kept ‘disappearing’ which meant he couldn’t get IP information to try SSH’ing into the box. Perhaps a display driver error?</li>
<li>NetBSD 7 was up next, where the installer couldn’t get past a root device prompt. Most likely trouble finding the install media, which was the same story with MightnightBSD as well.</li>
<li>Also tested was “PacBSD” (Formerly ArchBSD) which he did manage to get installed, but not after major fighting with the process. After the process he ran into some issues getting packages up and running, but mentions it may have been bad timing due to them moving to a new server at the time.
***</li>
</ul>

<h3><a href="https://www.listbox.com/member/archive/182181/2016/09/sort/time_rev/page/1/entry/0:1/20160923124232:B7978ED4-81AC-11E6-A6DA-02E3F010038B/" rel="nofollow">IllumOS imports a modified FreeBSD boot loader to replace grub 0.97</a></h3>

<ul>
<li>Toomas Soome’s work to port the FreeBSD boot loader to IllumOS has been merged into illumos-gate, the upstream repository for all IllumOS distributions</li>
<li>Toomas’ work has also resulted in a number of commits to FreeBSD, and code sharing in both directions</li>
<li>Toomas helped me a lot with the building of the ZFS boot environment listing menu, even though on IllumOS they use a configuration file to list the BEs, rather than interrogating the live zpool like we do in FreeBSD</li>
<li>Toomas’ work to improve msdosfs and the block cache to speed up booting IllumOS also greatly helped FreeBSD</li>
<li>This work means IllumOS can now boot from a RAID-Z (the old grub they used could not), and if the work Toomas has done on FreeBSD is any indication, support for almost all other zpool features is also on the way</li>
<li>This work also sets IllumOS on a path to eventually having UEFI boot as well</li>
<li>It is good to see this work happening, FreeBSD technology being reused elsewhere, but also the improvements being made for IllumOS are coming back to FreeBSD, often landing upstream first, to make merging them into IllumOS easier.</li>
<li>The mailing list post describes how to convert existing systems away from grub, as well as how to opt to remain on grub for a while longer.</li>
<li>Grub 0.97 is expected to be removed from IllumOS within a year.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=8YQQfXqtyaA" rel="nofollow">A demo of booting CentOS and Windows 10 in FreeBSD Bhyve through VNC headless</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2762" rel="nofollow">This year’s anemic output</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2771" rel="nofollow">“PAM Mastery” ebook now out</a></li>
<li><a href="https://www.youtube.com/watch?v=oC5D9fenQBs" rel="nofollow">How-to Install OpenBSD 6.0 plus XFCE desktop and basic applications</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/yniniNpV" rel="nofollow"> Piotr - LibreBoot </a> </li>
<li><a href="http://pastebin.com/dCNX0yF7" rel="nofollow"> Alan - FreeBSD and PC-BSD</a> </li>
<li><a href="http://pastebin.com/LndNeAYb" rel="nofollow"> Eduardo - Newcomers</a> </li>
<li><a href="http://pastebin.com/F0y6L6NK" rel="nofollow"> Greg - ZFS ACL’s</a> </li>
<li><a href="http://pastebin.com/sqMPJGMM" rel="nofollow"> Brian - Laptop Recs</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we’re going to be hearing about Allan’s trip to EuroBSDCon, plus an Interview about “Bro on BSD”! Stay tuned, for your place to</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>EuroBSDCon 2016 Wrapup</h3>

<ul>
<li><a href="https://assets.keltia.net/photos/EuroBSDCon-2016/" rel="nofollow">Ollivier Robert’s Photos from EuroBSDCon </a> </li>
<li><a href="http://www.jupiterbroadcasting.com/stickers/" rel="nofollow">Get your BSDNow die-cut stickers</a> </li>
</ul>

<h3><a href="http://discusscomputerx.blogspot.com/2016/09/netbsd-for-noobies-your-power-laptop.html" rel="nofollow">NetBSD for newbies - Develop your own Power PC</a></h3>

<ul>
<li>We don’t get to feature too many stories on NetBSD being deployed as a Power PC (Not PowerPC, you know, a Powerful “PC”), so we jumped at this one.</li>
<li>Specifically it starts off with some of the pre-req’s that you’ll need to get started, such as NetBSD 7.0.1 / amd64, along with some information about which wireless nics you may be using. (NetBSD like other BSD’s will give a driver based device name for network interfaces)</li>
<li>From there, instructions on how to write your WPA_supplicant config are provided, in order for us to fetch the NetBSD sources and convert to their -STABLE branch.</li>
<li>After doing a CVS checkout of the sources, he then provides a walkthrough of doing a kernel compile / install, however it mentions changing the config, but doesn’t provide an example of what options were changed. Perhaps to remove drivers we don’t need?</li>
<li>At this point the rest of the “desktop” setup is pretty straight forward. Some packages are added such as openbox, lxappearance, firefox, etc.</li>
<li>To get working sound, firefox requires pulseaudio, which in turn needs dbus, so instructions on getting that service up and running are provided as well.</li>
<li>When it’s all said and done, you’ll end up with your shiny new NetBSD -STABLE desktop (or laptop), bragging rights achieved!
***</li>
</ul>

<h3><a href="https://www.poolp.org/tech/posts/2016/09/12/opensmtpd-6-0-0-released/" rel="nofollow">More about OpenSMTPD 6.0.0</a></h3>

<ul>
<li>OpenSMTPd 6.0.0 has just been released “and it&#39;s quite different from former releases.”</li>
<li>“Unlike most of our releases, it comes out with almost no new feature.”, “Turns out most of the changes are not visible.”</li>
<li>Changelog:

<ul>
<li>new fork+reexec model so each process has its own randomized memory space</li>
<li>logging format has been reworked</li>
<li>a &quot;multi-line response&quot; bug in the LMTP delivery backend has been fixed</li>
<li>connections concurrency limits have been bumped</li>
<li>artificial delaying in remote sessions have been reduced</li>
<li>dhparams option has been removed</li>
<li>dhe option has been added, supporting auto and legacy modes</li>
<li> smtp engine has been simplified</li>
<li>various cosmetic changes, code cleanup and documentation improvement</li>
</ul></li>
<li>“The OpenSMTPD bootstrap process was quite simple: Upon executation, the parent process would read configuration, build a memory representation of it and would then create a bunch of socketpair() before fork()-ing all of its child processes.”</li>
<li>The problem is that this does not take advantage of the new address randomization feature. Each child will have the same memory layout, copied from the parent process</li>
<li>“So deraadt@ suggested that if OpenSMTPD would not just fork() children but instead fork() them and reexecute the smtpd binary, then each of the children would have its own randomized memory space.”</li>
<li>“The idea itself is neat, however not so trivial to implement because when we reexec the whole &quot;inherit configuration and descriptors&quot; part goes away. It&#39;s not just fork and exec, it&#39;s fork and exec and figure a way for the parent to pass back all the information and descriptors back to the new post-fork instance so it is the new instance that allocates memory and decides where the information goes.”
***</li>
</ul>

<h3><a href="http://ftfl.ca/blog/2016-09-17-zfs-fde-one-pool-conversion.html" rel="nofollow">Upgrade a FreeBSD 10.3 Installation with ZFS on Root and Full Disk Encryption to 11.0</a></h3>

<ul>
<li>While FreeBSD 11.0 is not out yet, Joseph Mingrone has helped me work out and test the instructions for upgrading a FreeBSD 10.3 ZFS on full disk encryption setup (bootpool + zpool) to the new GELIBoot feature, which does not require any unencrypted partitions, just the 128kb bootcode</li>
<li>Note: Do not upgrade to FreeBSD 11.0 yet. While some images have landed on the FTP server, they do not contain the final openssl fix and are going to be recreated.</li>
<li>Currently, GELIBoot does not support key files, so the first step is to reencrypt the master key with only a passphrase.</li>
<li>Next, to avoid GELIBoot picking up encrypted partitions that it does not support, or partitions you do not want decrypted at boot, only partitions with the GELIBoot flag are decrypted, so set the flag on your root partition</li>
<li>Then, move the loader, kernel, and other files into /boot on the root filesystem, instead of them living on the bootpool. This allows the kernel to be versioned with boot environments, and is the main purpose of this work</li>
<li>Then, install the newer gptzfsboot, as this is required to support GELIBoot</li>
<li>The old 2gb bootpool partition is then purposely mislabeled as freebsd-vinum, so it is not picked up by the boot blocks. Later, if the upgrade is successful, this partition can be deleted, and used as addition swap or something</li>
<li>In order to boot correctly, you want all boot environments to have the ‘canmount’ ZFS property set to ‘noauto’</li>
<li>Thank you to Joseph for taking the time to prod me for the information required to write this up, and for testing it and finding all of the issues 
***</li>
</ul>

<h2>Interview - Michael Shirk - <a href="mailto:mshirk@daemon-security.com" rel="nofollow">mshirk@daemon-security.com</a> / <a href="https://twitter.com/shirkdog" rel="nofollow">@shirkdog</a></h2>

<ul>
<li>Running Bro on BSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://clonos.tekroutine.com/" rel="nofollow">FreeBSD based distro for virtual hosting platform and appliance</a></h3>

<ul>
<li>An interesting new FreeBSD-based project as shown up online, called “ClonOS”, which bills itself as a “free open-source FreeBSD-based platform for virtual environments creation and management”</li>
<li>It looks to be leveraging an impressive list of technologies, including Bhyve, Xen, Jails and CBSD / Puppet for management tasks.</li>
<li><p>Among its list of features:</p>

<ul>
<li>ZFS features support;</li>
<li>VM cloning, export, import</li>
<li>Ethernet SoftSwitch for separated networking</li>
<li>jails for lightweight container</li>
<li>VNC terminal for VM/containers</li>
<li>Templates for VM/containers</li>
<li>Configuration management/helpers</li>
<li>Multi-node operation</li>
</ul></li>
<li><p>Multi-Node? Color me intrigued! </p></li>
<li><p>Right now it appears to be under heavy development, but we’ll reach out to the developer to see if we can get an interview lined up at some point!</p>

<hr></li>
</ul>

<h3><a href="https://bsdmag.org/oleksandr_rybalko/" rel="nofollow">The Raspberry PI Platform and The Challenges of Developing FreeBSD</a></h3>

<ul>
<li>BSDMag recently did an interview with FreeBSD developer Olesandr Rybalko!</li>
<li>Oleksandr lives in the Ukraine, and while you may not have heard of him, he has worked on some cool projects for FreeBSD including the new “vt” console driver (Which a lot of people are using now), and ARM/MIPS support.</li>
<li>The interview covers some of the work he’s done to get the PI support working with FreeBSD:</li>
</ul>

<blockquote>
<p>I think, my main help here was a USB OTG driver, which I wrote before for another device (Ralink RT3052), then port it to R-Pi. But it was rewritten by Hans Peter Selasky. I do not know so much about USB as Hans knows.</p>

<p>Another useful part of my help is Xorg support. I did a simple Xorg video driver which uses framebuffer exported by virtual terminal subsystem. That is help to many guys to start use RPi as a simple desktop system.</p>
</blockquote>

<ul>
<li>He was also asked the question “Why would FreeBSD be good fit for ARM?”</li>
</ul>

<blockquote>
<p>FreeBSD is very powerful as a network server. All modern network features in one box, with very fast processing.</p>

<p>Another good side of FreeBSD is modularity. It is not required to write code to use some driver that was already written for another system, you can just define it in configuration files (kernel config, kernel hints, FDT). So if you want build a nice, R-Pi based, home server – use FreeBSD. If you want to play with devices attached to R-Pi’s GPIO – use FreeBSD.</p>
</blockquote>

<ul>
<li>He also discusses his work on the ZRouter project, which is a very light-weight platform for tiny routers / embedded devices. But lastly the RPI comes up again, specifically asking him how interested individuals can get involved. Specifically the wiki.freebsd.org is a great reference point for those intested in getting started with FreeBSD on embedded. The warm community is also a plus!</li>
</ul>

<hr>

<h3><a href="http://www.phoronix.com/scan.php?page=news_item&px=TrueOS-First-Spin" rel="nofollow">Trying out the FreeBSD powered TrueOS</a></h3>

<ul>
<li>The folks over at Phoronix have done an early look at the new TrueOS desktop images and given some of their thoughts. </li>
<li>First up he gives props to the installer, noting that:</li>
</ul>

<blockquote>
<p>The TrueOS desktop installer is basically the same as from the PC-BSD days, just re-branded. Still one of the easiest BSD graphical installers I&#39;ve dealt with and makes it a breeze for setting up a FreeBSD-on-ZFS system by default. </p>
</blockquote>

<ul>
<li>After that they took it for a minimal spin, and thing mostly seem to be working. He mentions some of the default apps (Such as qupzilla and trojita) aren’t their favorite, but Lumina has come quite a ways for 1.0, despite a few rough edges still. (We are in the process of changing those default e-mail / browser apps)</li>
<li>Lastly the article mentions that it’s time to do a more full BSD round-up to see the state of installation of them, which we happen to have next!</li>
</ul>

<h3><a href="http://www.phoronix.com/scan.php?page=article&item=trying-8-bsds&num=1" rel="nofollow">Trying out 8 BSDs on a modern PC</a></h3>

<ul>
<li>First up was TrueOS again, which no major changes there, easy install and done.</li>
<li>From there he tries out DragonFlyBSD, which he mentions that while the installer isn’t as easy, it is still one of his favorite BSD’s, working with all the hardware they’ve thrown at it.</li>
<li>Next up was GhostBSD, which also has an Easy-To-Use graphical installer similar to TrueOS that made it quick to get loaded and up to the Mate desktop.</li>
<li>Also tested was FreeBSD 11.0-RC2, which he mentions was easy to installed, and once done then ‘pkg’ could be used to easily get the setup he wanted setup.</li>
<li>Turning over to page two we get to the naughty list of BSD’s he had troubles with.</li>
<li>First up was OpenBSD which he tried 6.0. After installation and first boot, the display kept ‘disappearing’ which meant he couldn’t get IP information to try SSH’ing into the box. Perhaps a display driver error?</li>
<li>NetBSD 7 was up next, where the installer couldn’t get past a root device prompt. Most likely trouble finding the install media, which was the same story with MightnightBSD as well.</li>
<li>Also tested was “PacBSD” (Formerly ArchBSD) which he did manage to get installed, but not after major fighting with the process. After the process he ran into some issues getting packages up and running, but mentions it may have been bad timing due to them moving to a new server at the time.
***</li>
</ul>

<h3><a href="https://www.listbox.com/member/archive/182181/2016/09/sort/time_rev/page/1/entry/0:1/20160923124232:B7978ED4-81AC-11E6-A6DA-02E3F010038B/" rel="nofollow">IllumOS imports a modified FreeBSD boot loader to replace grub 0.97</a></h3>

<ul>
<li>Toomas Soome’s work to port the FreeBSD boot loader to IllumOS has been merged into illumos-gate, the upstream repository for all IllumOS distributions</li>
<li>Toomas’ work has also resulted in a number of commits to FreeBSD, and code sharing in both directions</li>
<li>Toomas helped me a lot with the building of the ZFS boot environment listing menu, even though on IllumOS they use a configuration file to list the BEs, rather than interrogating the live zpool like we do in FreeBSD</li>
<li>Toomas’ work to improve msdosfs and the block cache to speed up booting IllumOS also greatly helped FreeBSD</li>
<li>This work means IllumOS can now boot from a RAID-Z (the old grub they used could not), and if the work Toomas has done on FreeBSD is any indication, support for almost all other zpool features is also on the way</li>
<li>This work also sets IllumOS on a path to eventually having UEFI boot as well</li>
<li>It is good to see this work happening, FreeBSD technology being reused elsewhere, but also the improvements being made for IllumOS are coming back to FreeBSD, often landing upstream first, to make merging them into IllumOS easier.</li>
<li>The mailing list post describes how to convert existing systems away from grub, as well as how to opt to remain on grub for a while longer.</li>
<li>Grub 0.97 is expected to be removed from IllumOS within a year.
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.youtube.com/watch?v=8YQQfXqtyaA" rel="nofollow">A demo of booting CentOS and Windows 10 in FreeBSD Bhyve through VNC headless</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2762" rel="nofollow">This year’s anemic output</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2771" rel="nofollow">“PAM Mastery” ebook now out</a></li>
<li><a href="https://www.youtube.com/watch?v=oC5D9fenQBs" rel="nofollow">How-to Install OpenBSD 6.0 plus XFCE desktop and basic applications</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/yniniNpV" rel="nofollow"> Piotr - LibreBoot </a> </li>
<li><a href="http://pastebin.com/dCNX0yF7" rel="nofollow"> Alan - FreeBSD and PC-BSD</a> </li>
<li><a href="http://pastebin.com/LndNeAYb" rel="nofollow"> Eduardo - Newcomers</a> </li>
<li><a href="http://pastebin.com/F0y6L6NK" rel="nofollow"> Greg - ZFS ACL’s</a> </li>
<li><a href="http://pastebin.com/sqMPJGMM" rel="nofollow"> Brian - Laptop Recs</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>160: EuroBSD-Dreamin</title>
  <link>https://www.bsdnow.tv/160</link>
  <guid isPermaLink="false">37c0aa7b-2dd0-4ec8-b6d5-7f21831c73a6</guid>
  <pubDate>Wed, 21 Sep 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/37c0aa7b-2dd0-4ec8-b6d5-7f21831c73a6.mp3" length="35557780" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, Allan is currently at EuroBSDCon! However due to the magic of video (or time travel), you still get a new episode. (You’re Welcome!). Stay tuned</itunes:subtitle>
  <itunes:duration>49:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, Allan is currently at EuroBSDCon! However due to the magic of video (or time travel), you still get a new episode. (You’re Welcome!). Stay tuned&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://backtrace.io/blog/blog/2016/08/25/improving-freebsd-kernel-debugging/" target="_blank" rel="nofollow noopener"&gt;Performance Improvements for FreeBSD Kernel Debugging&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“We previously &lt;a href="http://backtrace.io/blog/blog/2015/10/03/whats-a-coredump" target="_blank" rel="nofollow noopener"&gt;explored FreeBSD userspace coredumps&lt;/a&gt;. Backtrace’s debugging platform supports FreeBSD kernel coredumps too, and their traces share many features. They are constructed somewhat differently, and in the process of adding support for them, we found a way to improve performance for automated programs accessing them.”&lt;/li&gt;
&lt;li&gt;“A kernel core is typically only generated in exceptional circumstances. Unlike userspace processes, kernel routines cannot fault without sacrificing the machine’s availability. This means things like page faults and illegal instructions inside the kernel stop the machine, instead of just one process. At that point, in most cases, it is only usable enough to inspect its state in a debugger, or to generate a core file.”&lt;/li&gt;
&lt;li&gt;No one likes it when this happens. This is why backtrace.io is focused on being able to figure out why it is happening&lt;/li&gt;
&lt;li&gt;“A FreeBSD kernel core file can be formatted in several different ways. This depends on which type of dump was performed. Full core dumps are ELF files, similar in structure to userspace core files. However, as RAM size grew, this became more difficult to manage. In 2006, FreeBSD introduced minidumps, which are much smaller without making the core file useless. This has been the default dump type since FreeBSD 6.0.”&lt;/li&gt;
&lt;li&gt;The article goes into detail on the minidump format, and some basic debugging techniques&lt;/li&gt;
&lt;li&gt;“Libkvm will first determine whether the virtual address lies within the kernel or direct maps. If it lies in the kernel map, libkvm will consult the page table pages to discover the corresponding physical address. If it lies in the direct map, it can simply mask off the direct map base address. If neither of these applies, the address is illegal. This process is encapsulated by va_to_pa, or “virtual address to physical address”. Once the physical address is determined, libkvm consults the core file’s bitmap to figure out where in the core file it is located.”&lt;/li&gt;
&lt;li&gt;“minidumps include a sparse bitmap indicating the pages that are included. These pages are dumped sequentially in the last section. Because they are sparse in a not entirely predictable way, figuring the offset into the dump for a particular physical address cannot be reduced to a trivial formula.”&lt;/li&gt;
&lt;li&gt;The article goes into detail about how lookups against this map are slow, and how they were improved&lt;/li&gt;
&lt;li&gt;“For typical manual debugger use, the impact of this change isn’t noticeable, which is probably why the hash table implementation has been in use for 10 years. However, for any automated debugging process, the extra latency adds up quickly.”&lt;/li&gt;
&lt;li&gt;“On a sample 8GB kernel core file (generated on a 128GB server), crashinfo improves from 44 seconds to 9 seconds, and uses 30% less memory”&lt;/li&gt;
&lt;li&gt;“Backtrace began shipping a version of this performance improvement in ptrace in February 2016. This enables us to also offer significantly faster tracing of FreeBSD kernel cores to customers running current and older releases of FreeBSD. On July 17, 2016, our work improving libkvm scaling was committed to FreeBSD/head. It will ship with FreeBSD 12.0.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/tech@openbsd.org/msg34035.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD gunzip pipeline tightening&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has rethought the way they handle package signing&lt;/li&gt;
&lt;li&gt;Changing from: 1/ fetch data -&amp;gt; 2/ uncompress it -&amp;gt; 3/ check signature -&amp;gt; 4/ process data&lt;/li&gt;
&lt;li&gt;To: 1/ fetch data -&amp;gt; 2/ check signature -&amp;gt; 3/ uncompress -&amp;gt; 4/ process data&lt;/li&gt;
&lt;li&gt;“The solution is to move the signature outside of the gzip header”&lt;/li&gt;
&lt;li&gt;“Now, Since step 1/ is privsep, as long as step 2 is airtight, 3/ and 4/are no longer vulnerable”&lt;/li&gt;
&lt;li&gt;Guidelines:

&lt;ul&gt;
&lt;li&gt;small, self-contained code to parse simple gzip headers&lt;/li&gt;
&lt;li&gt;signify-style  signature in the gzip comment. Contains checksums of 64K blocks of the compressed archive&lt;/li&gt;
&lt;li&gt;don't even think about passing the original gzip header through&lt;/li&gt;
&lt;li&gt;use as a pipeline step: does not need to download full archive to use it, and never ever pass any data to the gunzip part before it's been verified.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;“Note that afaik we haven't had any hole in our gunzipping process. Well… waiting for an accident to happen is not how we do things.  Hopefully, this should prevent future mishaps.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ramsdenj.com/2016/07/25/openvpn-on-freebsd-10_3.html" target="_blank" rel="nofollow noopener"&gt;OpenVPN On FreeBSD 10.3&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“While trying to setup OpenVPN, I noticed there was no up-to-date information with correct instructions. OpenVPN uses EasyRSA to setup keys, it has recently been changed in version 3. As a result of this, the old steps to configure OpenVPN are no longer correct. I went through the process of setting up a VPN using OpenVPN on FreeBSD 10.3.”&lt;/li&gt;
&lt;li&gt;I know FreeBSD developer Adrian Chadd complained about this exact problem when he was trying to setup a VPN before attending DEFCON&lt;/li&gt;
&lt;li&gt;The tutorial walks through the basic steps:

&lt;ul&gt;
&lt;li&gt;Install the needed software&lt;/li&gt;
&lt;li&gt;Configure EasyRSA&lt;/li&gt;
&lt;li&gt;Create a CA&lt;/li&gt;
&lt;li&gt;Generate keys and DH params&lt;/li&gt;
&lt;li&gt;OpenVPN Server Config&lt;/li&gt;
&lt;li&gt;OpenVPN Client Config&lt;/li&gt;
&lt;li&gt;Starting the daemon&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;It even finishes off with bonus instructions on Port Forwarding, Firewalls, and Dynamic DNS
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/606u/lsop" target="_blank" rel="nofollow noopener"&gt;lsop&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;LSOP is the tool a bunch of users have been asking for&lt;/li&gt;
&lt;li&gt;“a FreeBSD utility to list all processes running with outdated binaries or shared libraries”&lt;/li&gt;
&lt;li&gt;How does it work? “lsop iterates over all running processes and looks through memory-mapped files with read + execute access; then it checks if those files are still available or have been modified/deleted.”&lt;/li&gt;
&lt;li&gt;How would you use it? After installing an system update (that doesn’t require a reboot to update the kernel), or upgrade your packages, you still need to know which daemons need to be restarted to use the patched libraries and binaries&lt;/li&gt;
&lt;li&gt;This tool gives you that list&lt;/li&gt;
&lt;li&gt;Thanks to Bogdan Boyadzhiev for writing this much needed tool
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.openbsdfoundation.org/campaign2016.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 2016 Fundraising Campaign&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD fund-raising campaign has given us a status update on the state of 2016.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;They start by giving us a re-cap of previous years:&lt;br&gt;
“2015 was a good year for the foundation financially, with one platinum, one gold, four silver and 3 bronze donors providing half of our total donations. 680 individuals making smaller contributions provided the other half. While the total was down significantly after 2014’s blockbuster year, we again exceeded our goal.”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;As of Sept 5th, they were at approx $115k out of a total goal of 250k. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If you are an OpenBSD user, remember to contribute before the end of the year. Small amounts help, and the money of course goes to great causes such as hackathons and running the OpenBSD infrastructure.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/KaiLoi/update-fw-BC" target="_blank" rel="nofollow noopener"&gt;Update firewall Bad Countries&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Network and Systems admins know, sometimes when all else fails you need to break out the HUGE ban-hammer. In this case sometimes entire countries get put on the excrement list until the attacks stop.&lt;/li&gt;
&lt;li&gt;We have a handy GitHub project today, which will assist you in doing exactly that, enter update-fw-BC. (Update firewall by country)&lt;/li&gt;
&lt;li&gt;This perl script may be your savior when dealing with instances that require major brute force. It specifically works with IPFW, PF and IPTABLES, which will allow it to run across a variety of BSD’s or even Linux.&lt;/li&gt;
&lt;li&gt;It will ingest a list of IP’s that you feed it (perhaps from another tool such as sshguard) and determine what block the IP belongs to, and match according to country. &lt;/li&gt;
&lt;li&gt;Detailed setup instructions for the various firewalls are included, and some instructions for FreeBSD, although using it on OpenBSD or other $BSD should also be easy to adapt.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://distrowatch.com/weekly.php?issue=20160822#tips" target="_blank" rel="nofollow noopener"&gt;More utilities via moreutils&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In most BSDs, the “core” set of utilities and commands are just part of the base system, but on Linux, they are usually provided by the “coreutils” package.&lt;/li&gt;
&lt;li&gt;However, on Linux and now FreeBSD, there is a “moreutils” package, that provides a number of interesting additional basic utilities, including:

&lt;ul&gt;
&lt;li&gt;chronic: Run a task via crontab, and only generate output if the task fails&lt;/li&gt;
&lt;li&gt;combine: binary AND two text files together, only displaying lines that are in both files&lt;/li&gt;
&lt;li&gt;errno: look up the text description of a specific error number&lt;/li&gt;
&lt;li&gt;ifdata: parse out specific information from ifconfig&lt;/li&gt;
&lt;li&gt;ifne: if-not-empty, only run a command if the output of the pipe is not blank&lt;/li&gt;
&lt;li&gt;isutf8: determine if a file or stdin contains utf8&lt;/li&gt;
&lt;li&gt;lckdo: execute a command with a lock held, to prevent a second copy from spawning&lt;/li&gt;
&lt;li&gt;mispipe: return the exit code of the first command in a pipe chain, rather than the last&lt;/li&gt;
&lt;li&gt;parallel: run multiple jobs at once&lt;/li&gt;
&lt;li&gt;pee: tee standard input to multiple pipes&lt;/li&gt;
&lt;li&gt;sponge: write standard input to a file, allows you to overwrite a file in place: sort file | sponge file&lt;/li&gt;
&lt;li&gt;ts: add a timestamp to each line of standard input&lt;/li&gt;
&lt;li&gt;vidir: edit a directory in vi, great for bulk renames&lt;/li&gt;
&lt;li&gt;vipe: insert vi into a pipe, edit the content before it is passed to the next command&lt;/li&gt;
&lt;li&gt;zrun: uncompress the arguments before passing them. Like gzless and friends, but for any command&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Just goes to show the power of the original UNIX philosophy, chaining together a bunch of small useful tools to do really powerful things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160823100144" target="_blank" rel="nofollow noopener"&gt;OpenBSD: SNI support added to libtls, httpd in –current&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;libtls, LibreSSL’s improved API to replace the OpenSSL standard, now has a set of functions to implement SNI (Server Name Indication) &lt;/li&gt;
&lt;li&gt;Until a few years ago, each different SSL/TLS enabled website required a unique IP address, because typical HTTP Virtual Hosting (differentiating which content to serve based on the Host header in the HTTP request), didn’t work because the request was encrypted.&lt;/li&gt;
&lt;li&gt;Finally the TLS standard was updated to include the hostname of the site the user is requesting in the TLS handshake, so the server can return the corresponding certificate, and multiple TLS enabled websites can be hosted on a single IP address&lt;/li&gt;
&lt;li&gt;The new API includes the ability to provide additional keypairs (via tls_config_add_keypair_{file,mem}())&lt;/li&gt;
&lt;li&gt;And allow the server to determine what servername the client requested viatls_conn_servername()&lt;/li&gt;
&lt;li&gt;This is much easier to use, and therefore safer and less error prone, than the OpenSSL API&lt;/li&gt;
&lt;li&gt;The libtls API is used in a number of OpenBSD tools, including the httpd
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://opnsense.org/new-core-team-member/" target="_blank" rel="nofollow noopener"&gt;Shawn Webb of HardenedBSD joins the OPNSense Core Team&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://vak.ru/doku.php/proj/pdp11/211bsd" target="_blank" rel="nofollow noopener"&gt;How to install 2.11 BSD on a (simulated) PDP11&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://nemessica.tintagel.pl/blog/OpenBSD-Puffy/" target="_blank" rel="nofollow noopener"&gt;OpenBSD Puffy needlepoint pixelart&lt;/a&gt;&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-August/313010.html" target="_blank" rel="nofollow noopener"&gt;PulseAudio has been removed from dports (DragonFly BSD)&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pfsense.org/?p=2118" target="_blank" rel="nofollow noopener"&gt;pfSense 2.4 pre-alpha available for testing, based on FreeBSD 11.0 &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2016-September/004700.html" target="_blank" rel="nofollow noopener"&gt;Call for Testing - Bhyve HDA Sound Emulation &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/CrZiDAF0" target="_blank" rel="nofollow noopener"&gt; Matthew - ZFS Hole Birth&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/GztjY4wz" target="_blank" rel="nofollow noopener"&gt; Hunter - systemd-mount &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/gG4j4RCi" target="_blank" rel="nofollow noopener"&gt; Anonymous - Cool’n’quiet&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/9XgPzMM9" target="_blank" rel="nofollow noopener"&gt; Nathan - Datacenter &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/FM2xYcxh" target="_blank" rel="nofollow noopener"&gt; Chuck - OpenBSD w/DO&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, Allan is currently at EuroBSDCon! However due to the magic of video (or time travel), you still get a new episode. (You’re Welcome!). Stay tuned</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://backtrace.io/blog/blog/2016/08/25/improving-freebsd-kernel-debugging/" rel="nofollow">Performance Improvements for FreeBSD Kernel Debugging</a></h3>

<ul>
<li>“We previously <a href="http://backtrace.io/blog/blog/2015/10/03/whats-a-coredump" rel="nofollow">explored FreeBSD userspace coredumps</a>. Backtrace’s debugging platform supports FreeBSD kernel coredumps too, and their traces share many features. They are constructed somewhat differently, and in the process of adding support for them, we found a way to improve performance for automated programs accessing them.”</li>
<li>“A kernel core is typically only generated in exceptional circumstances. Unlike userspace processes, kernel routines cannot fault without sacrificing the machine’s availability. This means things like page faults and illegal instructions inside the kernel stop the machine, instead of just one process. At that point, in most cases, it is only usable enough to inspect its state in a debugger, or to generate a core file.”</li>
<li>No one likes it when this happens. This is why backtrace.io is focused on being able to figure out why it is happening</li>
<li>“A FreeBSD kernel core file can be formatted in several different ways. This depends on which type of dump was performed. Full core dumps are ELF files, similar in structure to userspace core files. However, as RAM size grew, this became more difficult to manage. In 2006, FreeBSD introduced minidumps, which are much smaller without making the core file useless. This has been the default dump type since FreeBSD 6.0.”</li>
<li>The article goes into detail on the minidump format, and some basic debugging techniques</li>
<li>“Libkvm will first determine whether the virtual address lies within the kernel or direct maps. If it lies in the kernel map, libkvm will consult the page table pages to discover the corresponding physical address. If it lies in the direct map, it can simply mask off the direct map base address. If neither of these applies, the address is illegal. This process is encapsulated by va_to_pa, or “virtual address to physical address”. Once the physical address is determined, libkvm consults the core file’s bitmap to figure out where in the core file it is located.”</li>
<li>“minidumps include a sparse bitmap indicating the pages that are included. These pages are dumped sequentially in the last section. Because they are sparse in a not entirely predictable way, figuring the offset into the dump for a particular physical address cannot be reduced to a trivial formula.”</li>
<li>The article goes into detail about how lookups against this map are slow, and how they were improved</li>
<li>“For typical manual debugger use, the impact of this change isn’t noticeable, which is probably why the hash table implementation has been in use for 10 years. However, for any automated debugging process, the extra latency adds up quickly.”</li>
<li>“On a sample 8GB kernel core file (generated on a 128GB server), crashinfo improves from 44 seconds to 9 seconds, and uses 30% less memory”</li>
<li>“Backtrace began shipping a version of this performance improvement in ptrace in February 2016. This enables us to also offer significantly faster tracing of FreeBSD kernel cores to customers running current and older releases of FreeBSD. On July 17, 2016, our work improving libkvm scaling was committed to FreeBSD/head. It will ship with FreeBSD 12.0.”
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg34035.html" rel="nofollow">OpenBSD gunzip pipeline tightening</a></h3>

<ul>
<li>OpenBSD has rethought the way they handle package signing</li>
<li>Changing from: 1/ fetch data -&gt; 2/ uncompress it -&gt; 3/ check signature -&gt; 4/ process data</li>
<li>To: 1/ fetch data -&gt; 2/ check signature -&gt; 3/ uncompress -&gt; 4/ process data</li>
<li>“The solution is to move the signature outside of the gzip header”</li>
<li>“Now, Since step 1/ is privsep, as long as step 2 is airtight, 3/ and 4/are no longer vulnerable”</li>
<li>Guidelines:

<ul>
<li>small, self-contained code to parse simple gzip headers</li>
<li>signify-style  signature in the gzip comment. Contains checksums of 64K blocks of the compressed archive</li>
<li>don&#39;t even think about passing the original gzip header through</li>
<li>use as a pipeline step: does not need to download full archive to use it, and never ever pass any data to the gunzip part before it&#39;s been verified.</li>
</ul></li>
<li>“Note that afaik we haven&#39;t had any hole in our gunzipping process. Well… waiting for an accident to happen is not how we do things.  Hopefully, this should prevent future mishaps.”
***</li>
</ul>

<h3><a href="http://ramsdenj.com/2016/07/25/openvpn-on-freebsd-10_3.html" rel="nofollow">OpenVPN On FreeBSD 10.3</a></h3>

<ul>
<li>“While trying to setup OpenVPN, I noticed there was no up-to-date information with correct instructions. OpenVPN uses EasyRSA to setup keys, it has recently been changed in version 3. As a result of this, the old steps to configure OpenVPN are no longer correct. I went through the process of setting up a VPN using OpenVPN on FreeBSD 10.3.”</li>
<li>I know FreeBSD developer Adrian Chadd complained about this exact problem when he was trying to setup a VPN before attending DEFCON</li>
<li>The tutorial walks through the basic steps:

<ul>
<li>Install the needed software</li>
<li>Configure EasyRSA</li>
<li>Create a CA</li>
<li>Generate keys and DH params</li>
<li>OpenVPN Server Config</li>
<li>OpenVPN Client Config</li>
<li>Starting the daemon</li>
</ul></li>
<li>It even finishes off with bonus instructions on Port Forwarding, Firewalls, and Dynamic DNS
***</li>
</ul>

<h3><a href="https://github.com/606u/lsop" rel="nofollow">lsop</a></h3>

<ul>
<li>LSOP is the tool a bunch of users have been asking for</li>
<li>“a FreeBSD utility to list all processes running with outdated binaries or shared libraries”</li>
<li>How does it work? “lsop iterates over all running processes and looks through memory-mapped files with read + execute access; then it checks if those files are still available or have been modified/deleted.”</li>
<li>How would you use it? After installing an system update (that doesn’t require a reboot to update the kernel), or upgrade your packages, you still need to know which daemons need to be restarted to use the patched libraries and binaries</li>
<li>This tool gives you that list</li>
<li>Thanks to Bogdan Boyadzhiev for writing this much needed tool
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.openbsdfoundation.org/campaign2016.html" rel="nofollow">OpenBSD 2016 Fundraising Campaign</a></h3>

<ul>
<li>The OpenBSD fund-raising campaign has given us a status update on the state of 2016.</li>
<li><p>They start by giving us a re-cap of previous years:<br>
“2015 was a good year for the foundation financially, with one platinum, one gold, four silver and 3 bronze donors providing half of our total donations. 680 individuals making smaller contributions provided the other half. While the total was down significantly after 2014’s blockbuster year, we again exceeded our goal.”</p></li>
<li><p>As of Sept 5th, they were at approx $115k out of a total goal of 250k. </p></li>
<li><p>If you are an OpenBSD user, remember to contribute before the end of the year. Small amounts help, and the money of course goes to great causes such as hackathons and running the OpenBSD infrastructure.</p>

<hr></li>
</ul>

<h3><a href="https://github.com/KaiLoi/update-fw-BC" rel="nofollow">Update firewall Bad Countries</a></h3>

<ul>
<li>Network and Systems admins know, sometimes when all else fails you need to break out the HUGE ban-hammer. In this case sometimes entire countries get put on the excrement list until the attacks stop.</li>
<li>We have a handy GitHub project today, which will assist you in doing exactly that, enter update-fw-BC. (Update firewall by country)</li>
<li>This perl script may be your savior when dealing with instances that require major brute force. It specifically works with IPFW, PF and IPTABLES, which will allow it to run across a variety of BSD’s or even Linux.</li>
<li>It will ingest a list of IP’s that you feed it (perhaps from another tool such as sshguard) and determine what block the IP belongs to, and match according to country. </li>
<li>Detailed setup instructions for the various firewalls are included, and some instructions for FreeBSD, although using it on OpenBSD or other $BSD should also be easy to adapt.
***</li>
</ul>

<h3><a href="https://distrowatch.com/weekly.php?issue=20160822#tips" rel="nofollow">More utilities via moreutils</a></h3>

<ul>
<li>In most BSDs, the “core” set of utilities and commands are just part of the base system, but on Linux, they are usually provided by the “coreutils” package.</li>
<li>However, on Linux and now FreeBSD, there is a “moreutils” package, that provides a number of interesting additional basic utilities, including:

<ul>
<li>chronic: Run a task via crontab, and only generate output if the task fails</li>
<li>combine: binary AND two text files together, only displaying lines that are in both files</li>
<li>errno: look up the text description of a specific error number</li>
<li>ifdata: parse out specific information from ifconfig</li>
<li>ifne: if-not-empty, only run a command if the output of the pipe is not blank</li>
<li>isutf8: determine if a file or stdin contains utf8</li>
<li>lckdo: execute a command with a lock held, to prevent a second copy from spawning</li>
<li>mispipe: return the exit code of the first command in a pipe chain, rather than the last</li>
<li>parallel: run multiple jobs at once</li>
<li>pee: tee standard input to multiple pipes</li>
<li>sponge: write standard input to a file, allows you to overwrite a file in place: sort file | sponge file</li>
<li>ts: add a timestamp to each line of standard input</li>
<li>vidir: edit a directory in vi, great for bulk renames</li>
<li>vipe: insert vi into a pipe, edit the content before it is passed to the next command</li>
<li>zrun: uncompress the arguments before passing them. Like gzless and friends, but for any command</li>
</ul></li>
<li>Just goes to show the power of the original UNIX philosophy, chaining together a bunch of small useful tools to do really powerful things
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160823100144" rel="nofollow">OpenBSD: SNI support added to libtls, httpd in –current</a></h3>

<ul>
<li>libtls, LibreSSL’s improved API to replace the OpenSSL standard, now has a set of functions to implement SNI (Server Name Indication) </li>
<li>Until a few years ago, each different SSL/TLS enabled website required a unique IP address, because typical HTTP Virtual Hosting (differentiating which content to serve based on the Host header in the HTTP request), didn’t work because the request was encrypted.</li>
<li>Finally the TLS standard was updated to include the hostname of the site the user is requesting in the TLS handshake, so the server can return the corresponding certificate, and multiple TLS enabled websites can be hosted on a single IP address</li>
<li>The new API includes the ability to provide additional keypairs (via tls_config_add_keypair_{file,mem}())</li>
<li>And allow the server to determine what servername the client requested viatls_conn_servername()</li>
<li>This is much easier to use, and therefore safer and less error prone, than the OpenSSL API</li>
<li>The libtls API is used in a number of OpenBSD tools, including the httpd
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://opnsense.org/new-core-team-member/" rel="nofollow">Shawn Webb of HardenedBSD joins the OPNSense Core Team</a> </li>
<li><a href="http://vak.ru/doku.php/proj/pdp11/211bsd" rel="nofollow">How to install 2.11 BSD on a (simulated) PDP11</a></li>
<li><a href="https://nemessica.tintagel.pl/blog/OpenBSD-Puffy/" rel="nofollow">OpenBSD Puffy needlepoint pixelart</a><br></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2016-August/313010.html" rel="nofollow">PulseAudio has been removed from dports (DragonFly BSD)</a> </li>
<li><a href="https://blog.pfsense.org/?p=2118" rel="nofollow">pfSense 2.4 pre-alpha available for testing, based on FreeBSD 11.0 </a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2016-September/004700.html" rel="nofollow">Call for Testing - Bhyve HDA Sound Emulation </a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/CrZiDAF0" rel="nofollow"> Matthew - ZFS Hole Birth</a> </li>
<li><a href="http://pastebin.com/GztjY4wz" rel="nofollow"> Hunter - systemd-mount </a> </li>
<li><a href="http://pastebin.com/gG4j4RCi" rel="nofollow"> Anonymous - Cool’n’quiet</a> </li>
<li><a href="http://pastebin.com/9XgPzMM9" rel="nofollow"> Nathan - Datacenter </a> </li>
<li><a href="http://pastebin.com/FM2xYcxh" rel="nofollow"> Chuck - OpenBSD w/DO</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, Allan is currently at EuroBSDCon! However due to the magic of video (or time travel), you still get a new episode. (You’re Welcome!). Stay tuned</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://backtrace.io/blog/blog/2016/08/25/improving-freebsd-kernel-debugging/" rel="nofollow">Performance Improvements for FreeBSD Kernel Debugging</a></h3>

<ul>
<li>“We previously <a href="http://backtrace.io/blog/blog/2015/10/03/whats-a-coredump" rel="nofollow">explored FreeBSD userspace coredumps</a>. Backtrace’s debugging platform supports FreeBSD kernel coredumps too, and their traces share many features. They are constructed somewhat differently, and in the process of adding support for them, we found a way to improve performance for automated programs accessing them.”</li>
<li>“A kernel core is typically only generated in exceptional circumstances. Unlike userspace processes, kernel routines cannot fault without sacrificing the machine’s availability. This means things like page faults and illegal instructions inside the kernel stop the machine, instead of just one process. At that point, in most cases, it is only usable enough to inspect its state in a debugger, or to generate a core file.”</li>
<li>No one likes it when this happens. This is why backtrace.io is focused on being able to figure out why it is happening</li>
<li>“A FreeBSD kernel core file can be formatted in several different ways. This depends on which type of dump was performed. Full core dumps are ELF files, similar in structure to userspace core files. However, as RAM size grew, this became more difficult to manage. In 2006, FreeBSD introduced minidumps, which are much smaller without making the core file useless. This has been the default dump type since FreeBSD 6.0.”</li>
<li>The article goes into detail on the minidump format, and some basic debugging techniques</li>
<li>“Libkvm will first determine whether the virtual address lies within the kernel or direct maps. If it lies in the kernel map, libkvm will consult the page table pages to discover the corresponding physical address. If it lies in the direct map, it can simply mask off the direct map base address. If neither of these applies, the address is illegal. This process is encapsulated by va_to_pa, or “virtual address to physical address”. Once the physical address is determined, libkvm consults the core file’s bitmap to figure out where in the core file it is located.”</li>
<li>“minidumps include a sparse bitmap indicating the pages that are included. These pages are dumped sequentially in the last section. Because they are sparse in a not entirely predictable way, figuring the offset into the dump for a particular physical address cannot be reduced to a trivial formula.”</li>
<li>The article goes into detail about how lookups against this map are slow, and how they were improved</li>
<li>“For typical manual debugger use, the impact of this change isn’t noticeable, which is probably why the hash table implementation has been in use for 10 years. However, for any automated debugging process, the extra latency adds up quickly.”</li>
<li>“On a sample 8GB kernel core file (generated on a 128GB server), crashinfo improves from 44 seconds to 9 seconds, and uses 30% less memory”</li>
<li>“Backtrace began shipping a version of this performance improvement in ptrace in February 2016. This enables us to also offer significantly faster tracing of FreeBSD kernel cores to customers running current and older releases of FreeBSD. On July 17, 2016, our work improving libkvm scaling was committed to FreeBSD/head. It will ship with FreeBSD 12.0.”
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg34035.html" rel="nofollow">OpenBSD gunzip pipeline tightening</a></h3>

<ul>
<li>OpenBSD has rethought the way they handle package signing</li>
<li>Changing from: 1/ fetch data -&gt; 2/ uncompress it -&gt; 3/ check signature -&gt; 4/ process data</li>
<li>To: 1/ fetch data -&gt; 2/ check signature -&gt; 3/ uncompress -&gt; 4/ process data</li>
<li>“The solution is to move the signature outside of the gzip header”</li>
<li>“Now, Since step 1/ is privsep, as long as step 2 is airtight, 3/ and 4/are no longer vulnerable”</li>
<li>Guidelines:

<ul>
<li>small, self-contained code to parse simple gzip headers</li>
<li>signify-style  signature in the gzip comment. Contains checksums of 64K blocks of the compressed archive</li>
<li>don&#39;t even think about passing the original gzip header through</li>
<li>use as a pipeline step: does not need to download full archive to use it, and never ever pass any data to the gunzip part before it&#39;s been verified.</li>
</ul></li>
<li>“Note that afaik we haven&#39;t had any hole in our gunzipping process. Well… waiting for an accident to happen is not how we do things.  Hopefully, this should prevent future mishaps.”
***</li>
</ul>

<h3><a href="http://ramsdenj.com/2016/07/25/openvpn-on-freebsd-10_3.html" rel="nofollow">OpenVPN On FreeBSD 10.3</a></h3>

<ul>
<li>“While trying to setup OpenVPN, I noticed there was no up-to-date information with correct instructions. OpenVPN uses EasyRSA to setup keys, it has recently been changed in version 3. As a result of this, the old steps to configure OpenVPN are no longer correct. I went through the process of setting up a VPN using OpenVPN on FreeBSD 10.3.”</li>
<li>I know FreeBSD developer Adrian Chadd complained about this exact problem when he was trying to setup a VPN before attending DEFCON</li>
<li>The tutorial walks through the basic steps:

<ul>
<li>Install the needed software</li>
<li>Configure EasyRSA</li>
<li>Create a CA</li>
<li>Generate keys and DH params</li>
<li>OpenVPN Server Config</li>
<li>OpenVPN Client Config</li>
<li>Starting the daemon</li>
</ul></li>
<li>It even finishes off with bonus instructions on Port Forwarding, Firewalls, and Dynamic DNS
***</li>
</ul>

<h3><a href="https://github.com/606u/lsop" rel="nofollow">lsop</a></h3>

<ul>
<li>LSOP is the tool a bunch of users have been asking for</li>
<li>“a FreeBSD utility to list all processes running with outdated binaries or shared libraries”</li>
<li>How does it work? “lsop iterates over all running processes and looks through memory-mapped files with read + execute access; then it checks if those files are still available or have been modified/deleted.”</li>
<li>How would you use it? After installing an system update (that doesn’t require a reboot to update the kernel), or upgrade your packages, you still need to know which daemons need to be restarted to use the patched libraries and binaries</li>
<li>This tool gives you that list</li>
<li>Thanks to Bogdan Boyadzhiev for writing this much needed tool
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.openbsdfoundation.org/campaign2016.html" rel="nofollow">OpenBSD 2016 Fundraising Campaign</a></h3>

<ul>
<li>The OpenBSD fund-raising campaign has given us a status update on the state of 2016.</li>
<li><p>They start by giving us a re-cap of previous years:<br>
“2015 was a good year for the foundation financially, with one platinum, one gold, four silver and 3 bronze donors providing half of our total donations. 680 individuals making smaller contributions provided the other half. While the total was down significantly after 2014’s blockbuster year, we again exceeded our goal.”</p></li>
<li><p>As of Sept 5th, they were at approx $115k out of a total goal of 250k. </p></li>
<li><p>If you are an OpenBSD user, remember to contribute before the end of the year. Small amounts help, and the money of course goes to great causes such as hackathons and running the OpenBSD infrastructure.</p>

<hr></li>
</ul>

<h3><a href="https://github.com/KaiLoi/update-fw-BC" rel="nofollow">Update firewall Bad Countries</a></h3>

<ul>
<li>Network and Systems admins know, sometimes when all else fails you need to break out the HUGE ban-hammer. In this case sometimes entire countries get put on the excrement list until the attacks stop.</li>
<li>We have a handy GitHub project today, which will assist you in doing exactly that, enter update-fw-BC. (Update firewall by country)</li>
<li>This perl script may be your savior when dealing with instances that require major brute force. It specifically works with IPFW, PF and IPTABLES, which will allow it to run across a variety of BSD’s or even Linux.</li>
<li>It will ingest a list of IP’s that you feed it (perhaps from another tool such as sshguard) and determine what block the IP belongs to, and match according to country. </li>
<li>Detailed setup instructions for the various firewalls are included, and some instructions for FreeBSD, although using it on OpenBSD or other $BSD should also be easy to adapt.
***</li>
</ul>

<h3><a href="https://distrowatch.com/weekly.php?issue=20160822#tips" rel="nofollow">More utilities via moreutils</a></h3>

<ul>
<li>In most BSDs, the “core” set of utilities and commands are just part of the base system, but on Linux, they are usually provided by the “coreutils” package.</li>
<li>However, on Linux and now FreeBSD, there is a “moreutils” package, that provides a number of interesting additional basic utilities, including:

<ul>
<li>chronic: Run a task via crontab, and only generate output if the task fails</li>
<li>combine: binary AND two text files together, only displaying lines that are in both files</li>
<li>errno: look up the text description of a specific error number</li>
<li>ifdata: parse out specific information from ifconfig</li>
<li>ifne: if-not-empty, only run a command if the output of the pipe is not blank</li>
<li>isutf8: determine if a file or stdin contains utf8</li>
<li>lckdo: execute a command with a lock held, to prevent a second copy from spawning</li>
<li>mispipe: return the exit code of the first command in a pipe chain, rather than the last</li>
<li>parallel: run multiple jobs at once</li>
<li>pee: tee standard input to multiple pipes</li>
<li>sponge: write standard input to a file, allows you to overwrite a file in place: sort file | sponge file</li>
<li>ts: add a timestamp to each line of standard input</li>
<li>vidir: edit a directory in vi, great for bulk renames</li>
<li>vipe: insert vi into a pipe, edit the content before it is passed to the next command</li>
<li>zrun: uncompress the arguments before passing them. Like gzless and friends, but for any command</li>
</ul></li>
<li>Just goes to show the power of the original UNIX philosophy, chaining together a bunch of small useful tools to do really powerful things
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160823100144" rel="nofollow">OpenBSD: SNI support added to libtls, httpd in –current</a></h3>

<ul>
<li>libtls, LibreSSL’s improved API to replace the OpenSSL standard, now has a set of functions to implement SNI (Server Name Indication) </li>
<li>Until a few years ago, each different SSL/TLS enabled website required a unique IP address, because typical HTTP Virtual Hosting (differentiating which content to serve based on the Host header in the HTTP request), didn’t work because the request was encrypted.</li>
<li>Finally the TLS standard was updated to include the hostname of the site the user is requesting in the TLS handshake, so the server can return the corresponding certificate, and multiple TLS enabled websites can be hosted on a single IP address</li>
<li>The new API includes the ability to provide additional keypairs (via tls_config_add_keypair_{file,mem}())</li>
<li>And allow the server to determine what servername the client requested viatls_conn_servername()</li>
<li>This is much easier to use, and therefore safer and less error prone, than the OpenSSL API</li>
<li>The libtls API is used in a number of OpenBSD tools, including the httpd
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://opnsense.org/new-core-team-member/" rel="nofollow">Shawn Webb of HardenedBSD joins the OPNSense Core Team</a> </li>
<li><a href="http://vak.ru/doku.php/proj/pdp11/211bsd" rel="nofollow">How to install 2.11 BSD on a (simulated) PDP11</a></li>
<li><a href="https://nemessica.tintagel.pl/blog/OpenBSD-Puffy/" rel="nofollow">OpenBSD Puffy needlepoint pixelart</a><br></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2016-August/313010.html" rel="nofollow">PulseAudio has been removed from dports (DragonFly BSD)</a> </li>
<li><a href="https://blog.pfsense.org/?p=2118" rel="nofollow">pfSense 2.4 pre-alpha available for testing, based on FreeBSD 11.0 </a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2016-September/004700.html" rel="nofollow">Call for Testing - Bhyve HDA Sound Emulation </a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/CrZiDAF0" rel="nofollow"> Matthew - ZFS Hole Birth</a> </li>
<li><a href="http://pastebin.com/GztjY4wz" rel="nofollow"> Hunter - systemd-mount </a> </li>
<li><a href="http://pastebin.com/gG4j4RCi" rel="nofollow"> Anonymous - Cool’n’quiet</a> </li>
<li><a href="http://pastebin.com/9XgPzMM9" rel="nofollow"> Nathan - Datacenter </a> </li>
<li><a href="http://pastebin.com/FM2xYcxh" rel="nofollow"> Chuck - OpenBSD w/DO</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>159: Net Scaling Privacy (Flix Style)</title>
  <link>https://www.bsdnow.tv/159</link>
  <guid isPermaLink="false">f3978698-0f12-4129-b880-c3190272bd36</guid>
  <pubDate>Wed, 14 Sep 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f3978698-0f12-4129-b880-c3190272bd36.mp3" length="51808468" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow! We’ve got Netflix + FreeBSD news to discuss, always a crowd pleaser, that plus EuroBSDCon is just around the corner. Stick around for your place</itunes:subtitle>
  <itunes:duration>1:11:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow! We’ve got Netflix + FreeBSD news to discuss, always a crowd pleaser, that plus EuroBSDCon is just around the corner. Stick around for your place&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://techblog.netflix.com/search/label/FreeBSD" target="_blank" rel="nofollow noopener"&gt;Protecting Netflix Viewing Privacy at Scale, with FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This blog post from Netflix tells the story of how Netflix developed in-kernel TLS to speed up delivery of video via HTTPS&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Since the beginning of the Open Connect program we have significantly increased the efficiency of our OCAs - from delivering 8 Gbps of throughput from a single server in 2012 to over 90 Gbps from a single server in 2016. We contribute to this effort on the software side by optimizing every aspect of the software for our unique use case - in particular, focusing on the open source FreeBSD operating system and the NGINX web server that run on the OCAs.&lt;/p&gt;

&lt;p&gt;&amp;gt; In the modern internet world, we have to focus not only on efficiency, but also security. There are many state-of-the-art security mechanisms in place at Netflix, including Transport Level Security (TLS) encryption of customer information, search queries, and other confidential data. We have always relied on pre-encoded Digital Rights Management (DRM) to secure our video streams. Over the past year, we’ve begun to use Secure HTTP (HTTP over TLS or HTTPS) to encrypt the transport of the video content as well. This helps protect member privacy, particularly when the network is insecure - ensuring that our members are safe from eavesdropping by anyone who might want to record their viewing habits.&lt;/p&gt;

&lt;p&gt;&amp;gt; The goal is to ensure that your government, ISP, and wifi sniffing neighbour cannot tell which Netflix videos you are watching&lt;/p&gt;

&lt;p&gt;&amp;gt; Netflix Open Connect serves over 125 million hours of content per day, all around the world. Given our scale, adding the overhead of TLS encryption calculations to our video stream transport had the potential to greatly reduce the efficiency of our global infrastructure.&lt;/p&gt;

&lt;p&gt;&amp;gt; We evaluated available and applicable ciphers and decided to primarily use the Advanced Encryption Standard (AES) cipher in Galois/Counter Mode (GCM), available starting in TLS 1.2. We chose AES-GCM over the Cipher Block Chaining (CBC) method, which comes at a higher computational cost. The AES-GCM cipher algorithm encrypts and authenticates the message simultaneously - as opposed to AES-CBC, which requires an additional pass over the data to generate keyed-hash message authentication code (HMAC). CBC can still be used as a fallback for clients that cannot support the preferred method.&lt;/p&gt;

&lt;p&gt;&amp;gt; All revisions of Open Connect Appliances also have Intel CPUs that support AES-NI, the extension to the x86 instruction set designed to improve encryption and decryption performance. We needed to determine the best implementation of AES-GCM with the AES-NI instruction set, so we investigated alternatives to OpenSSL, including BoringSSL and the Intel Intelligent Storage Acceleration Library (ISA-L).&lt;/p&gt;

&lt;p&gt;&amp;gt; Netflix and NGINX had previously worked together to improve our HTTP client request and response time via the use of sendfile calls to perform a zero-copy data flow from storage (HDD or SSD) to network socket, keeping the data in the kernel memory address space and relieving some of the CPU burden. The Netflix team specifically added the ability to make the sendfile calls asynchronous - further reducing the data path and enabling more simultaneous connections. However, TLS functionality, which requires the data to be passed to the application layer, was incompatible with the sendfile approach.&lt;/p&gt;

&lt;p&gt;&amp;gt; To retain the benefits of the sendfile model while adding TLS functionality, we designed a hybrid TLS scheme whereby session management stays in the application space, but the bulk encryption is inserted into the sendfile data pipeline in the kernel. This extends sendfile to support encrypting data for TLS/SSL connections.&lt;/p&gt;

&lt;p&gt;&amp;gt;  We tested the BoringSSL and ISA-L AES-GCM implementations with our sendfile improvements against a baseline of OpenSSL (with no sendfile changes), under typical Netflix traffic conditions on three different OCA hardware types. Our changes in both the BoringSSL and ISA-L test situations significantly increased both CPU utilization and bandwidth over baseline - increasing performance by up to 30%, depending on the OCA hardware version. We chose the ISA-L cipher implementation, which had slightly better results. With these improvements in place, we can continue the process of adding TLS to our video streams for clients that support it, without suffering prohibitive performance hits.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If you would like more detail, check out the papers from &lt;a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon 2015&lt;/a&gt; and the &lt;a href="https://people.freebsd.org/%7Errs/asiabsd_tls_improved.pdf" target="_blank" rel="nofollow noopener"&gt;updated one from 2016&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/OpenBSD-on-HP-Stream-7" target="_blank" rel="nofollow noopener"&gt;OpenBSD on HP Stream 7&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; Recent events have rocked the mobile computing world to its core. OpenBSD retired the zaurus port, leaving users in desperate need of a new device. And not long before that, Microsoft released the Anniversary Update to Windows 10, but with free space requirements such that it’s nigh impossible to install on cheap 32GB eMMC equipped devices such as the HP Stream series, leaving users searching for a new lightweight operating system. With necessity as both mother and father, the scene is set for a truly epic pairing. OpenBSD on the HP Stream 7.&lt;/p&gt;

&lt;p&gt;&amp;gt; The HP Stream line is a series of budget computers in a couple form factors. The Stream 11 is a fairly typical netbook. However, the Stream 7 and 8 are tablets. They look like cheap Android devices, but inside the case, they’re real boys, er PCs, with Intel Atom CPUs.&lt;/p&gt;

&lt;p&gt;&amp;gt; To install OpenBSD on such a device, we need a few parts. Obviously, the tablet itself. There’s a dearth of ports on these things, but there is a micro USB port. Attaching anything useful requires an OTG “on the go” cable that creates a type A port. Attaching more than one useful thing requires a mini hub. And completing the install requires one each USB stick, keyboard, and network adapter.&lt;/p&gt;

&lt;p&gt;&amp;gt; First, we need to prep the machine to boot from USB. Actually, before doing anything, make sure you have a full charge. It’s going to be battery only from here on out. Plug everything in. Flash drive, keyboard, and network into the hub, hub into the OTG cable, cable into the port on top of the Stream.&lt;/p&gt;

&lt;p&gt;&amp;gt; Turn on the machine while holding the volume down button. This launches a mini menu from which we can enter the BIOS. There’s a little on screen keyboard in the corner, so this can be done even without a keyboard attached, but the USB keyboard should work. We need to change two settings in the boot section. First, turn off secure boot. Second, switch boot order to prefer USB. Save and exit. The first reboot reveals a confirmation screen checking that we really want to disable secure boot. We must enter a PIN and press enter. Enter the PIN shown on the screen and press enter. And we are go.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Then boot up OpenBSD from the USB drive&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ted then works there a number of kernel panics and device driver issues, but after disabling ACPI and IntelDRM, the device boots OpenBSD.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Of course, there’s no X at this point. And definitely no touch screen. And no internal networking. However, by keeping our USB hub attached, we can drive the console and access the network. At least until the battery is depleted, even if we have no way of knowing how long that will be since we disabled all the ACPI devices, which also means no suspend or resume.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;With some xorg.conf hacking, he did get Xorg working
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-September/624493.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD steps towards base LibreSSL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://freshbsd.org/commit/dfbsd/304ca408000cd34559ef5319b4b5a6766d6eb35b" target="_blank" rel="nofollow noopener"&gt;Project: DragonFlyBSD / Switch base to use private LibreSSL libraries&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160911231651" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD adopts uses of LibreSSL&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The number of projects beginning to switch over to LibreSSL is growing and it appears we can now throw DragonFly into that camp.&lt;/li&gt;
&lt;li&gt;Following something that sounds vaguely familiar (Allan!) DFLY is now creating “private” LibreSSL libraries which are only linked against by base system binaries.&lt;/li&gt;
&lt;li&gt;For the moment OpenSSL is &lt;em&gt;still&lt;/em&gt; built, primarily so that various ports and 3rd party apps can continue to function as before.&lt;/li&gt;
&lt;li&gt;A NO_OPENSSL option has also been added, but doesn’t really do much (yet), since it’ll still build and install headers / libraries even if set.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;OpenBSD g2k16 Hackathon&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160911012316" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Antoine Jacoutot on Binary Patches&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160911231712" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Matthieu Herrb on xenodm&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160911000337" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Vincent Gross on iked(8), armv7 and sys/netinet[6]&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160911000052" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Florian Obser on httpd, networking, acme-client, and more&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160909012520" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Jasper Lievisse Adriaanse on ddb(4) and more&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160908002430" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Christian Weisgerber on gettext progress, RTC work, removing kernel cruft&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160907131655" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Brent Cook on Chromebooks, crypto, and more&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160906230610" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Ted Unangst on doas, signify, code removal&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160905235911" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Marc Espie on package signing evolution&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160906004915" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Adam Wolk on ports, wireless drivers and more&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160905134009&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;g2k16 Hackathon Report: Mike Larkin on vmm + vmd progress&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://jcs.org/notaweblog/2016/08/26/openbsd_chromebook/" target="_blank" rel="nofollow noopener"&gt;OpenBSD (with encrypted softraid) on the Chromebook Pixel&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for a Laptop to make your OpenBSD road-warrior? If so, we have a great blog tutorial on getting OpenBSD setup on the Chromebook Pixel with encrypted softraid!&lt;/li&gt;
&lt;li&gt;Author Joshua Stein gives us a very verbose look at how to install and dial-in the laptop perfectly. But first for those wondering about the hardware in the pixel:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The Chromebook Pixel LS (2015) has an Intel Core i7 processor (Broadwell) at 2.4Ghz, 16Gb of RAM, a 2560x1700 400-nit IPS screen (239ppi), and Intel 802.11ac wireless. It has a Kingston 64Gib flash chip, of which about 54Gib can be used by OpenBSD when dual-booting with a 1Gb Chrome OS partition.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Due to this being a chromebook with seaBIOS, some manual key-press trickery will be required to initially get the OpenBSD Installer up and running.&lt;/li&gt;
&lt;li&gt;From here you’ll want to pay special close attention to the disk partitioning. In particular Joshua will show us how to shrink the existing encrypted /home that ChromeOS uses, keeping the dual-boot intact. This will become important if you ever plan on updating the device.&lt;/li&gt;
&lt;li&gt;From here, we move back to a more traditional setup, but with the added bonus of doing a soft-raid setup.&lt;/li&gt;
&lt;li&gt;But the fun isn’t over yet! If you want to make OpenBSD the default boot, that’ll require cracking the lid on the device and removing a special pink write-protect screw. And of course if you want to remove the default splash-screen image, Joshua has you covered as well, although some flashrom magic will be required.&lt;/li&gt;
&lt;li&gt;At this point you are nearly done. Final details on enabling specific bits of hardware are discussed. Most things work, apart from Audio and Bluetooth as of right now.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/doas-mastery" target="_blank" rel="nofollow noopener"&gt;doas mastery&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“doas” mastery - Paging MWL!&lt;/li&gt;
&lt;li&gt;Our buddy Ted Unangst has written up a great ‘mastery’ guide of the doas command, which can come in handy if you are among the un-initiated in doas land.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; UNIX systems have two classes of user, the super user and regular users. The super user is super, and everybody else is not. This concentration of power keeps things simple, but also means that often too much power is granted. Usually we only need super user powers to perform one task. We would rather not have such power all the time. Think of the responsibility that would entail! Like the sudo command, doas allows for subdivision of super user privileges, granting them only for specific tasks.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He starts with the basic doas.conf setup, which starts with an empty config file&lt;/li&gt;
&lt;li&gt;The doas config is much like a pf ruleset, the default is to block everything
&amp;gt; We add the root rule second because doas evaluates rules in a last match manner. root is in the wheel group, so the first rule will match, and then we need to override that with a second rule. Remember to always start with general rules, then make them more specific.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;iXsystems&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/blog/ixsystems-host-meetbsd-california-2016-uc-berkeley/" target="_blank" rel="nofollow noopener"&gt;iXsystems to host MeetBSD&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;FreeBSD Foundation Welcomes New Board Members&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.freebsdfoundation.org/blog/freebsd-foundation-welcomes-new-board-members/" target="_blank" rel="nofollow noopener"&gt;New Board Members&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The FreeBSD Foundation has added two new board members&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdfoundation.org/blog/new-board-member-interview-kylie-liang/" target="_blank" rel="nofollow noopener"&gt;Interview with Kylie Liang&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Kylie will focus on representing FreeBSD at conferences and businesses in China&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I live in China. There, I can act as a bridge between Chinese companies and the FreeBSD community to help drive FreeBSD adoption. Through my leadership role in the FreeBSD Foundation, I will help promote FreeBSD in China and also represent the Foundation at conferences and events in my region.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Kylie leads the team the ensures FreeBSD runs well on Hyper-V and Azure, including providing commercial support for customers who run FreeBSD or FreeBSD based appliances on the Azure Cloud&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I joined Microsoft and started to lead the project called FreeBSD Integration Service to get FreeBSD running well on Hyper-V and Azure. To promote our work and to understand the FreeBSD ecosystem, I started to participate in FreeBSD events where I was inspired by this technical community.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.freebsdfoundation.org/blog/new-board-member-interview-philip-paeps/" target="_blank" rel="nofollow noopener"&gt;Interview with Philip Paeps&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Philip started with FreeBSD in the early 2000s and got his commit bit in 2004&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The patches I submitted to make ACPI and input devices work on that laptop led to a src commit bit in 2004. While I haven’t worked on ACPI or input devices since, I have been contributing to different areas of the kernel. Taking up maintainership of some ports I cared about also got me a ports commit bit after some time.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Philip will continue to help run EuroBSDCon, but is also spreading the word about FreeBSD in India and Africa&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Primarily, I think I can be useful! I attend (and organize) a number of conferences around the world every year, particularly in regions that have a mostly “stealthy” FreeBSD community. While I clearly don’t need to be on the FreeBSD Foundation board to advocate for FreeBSD, joining as a director will provide an additional asset when working in areas of the world where organizational affiliations are meaningful.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Philip has also developed network drivers and various other bits and pieces, and has extensive experience working with and for hardware vendors and appliance vendors&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Despite intending to eventually contribute their code to the FreeBSD Project as open source, many hardware vendors still find it very difficult to engage directly with the FreeBSD development community. The Foundation helps bridge that gap and helps facilitate collaboration between commercial vendors and the FreeBSD community.&lt;/p&gt;

&lt;p&gt;&amp;gt; I hope to make FreeBSD more visible in regions of the world where it is historically under-represented. I expect I will be attending even more conferences and getting myself invited to even more organizations.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/MoreAndUnixFossilization" target="_blank" rel="nofollow noopener"&gt;more, less, and a story of typical Unix fossilization&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Chris Siebenmann from the University of Toronto digs into the history of the difference between ‘less’ and ‘more’&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; In the beginning, by which we mean V7, Unix didn't have a pager at all. That was okay; Unix wasn't very visual in those days, partly because it was still sort of the era of the hard copy terminal. Then along came Berkeley and BSD. People at Berkeley were into CRT terminals, and so BSD Unix gave us things like vi and the first pager program, more (which showed up quite early, in 3BSD, although this isn't as early as vi, which appears in 2BSD). Calling a pager more is a little bit odd but it's a Unix type of name and from the beginning more prompted you with '--More--' at the bottom of the screen.&lt;/p&gt;

&lt;p&gt;&amp;gt; All of the Unix vendors that based their work on BSD Unix (like Sun and DEC) naturally shipped versions of more along with the rest of the BSD programs, and so more spread around the BSD side of things. However, more was by no means the best pager ever; as you might expect, it was actually a bit primitive and lacking in features. So fairly early on Mark Nudelman wrote a pager with somewhat more features and it wound up being called less as somewhat of a joke.&lt;/p&gt;

&lt;p&gt;&amp;gt; In a sane world, Unix vendors would have either replaced their version of more with the clearly superior less or at least updated their version of more to the 4.3 BSD version. Maybe less wouldn't have replaced more immediately, but certainly over say the next five years, when it kept on being better and most people kept preferring it when they had a choice.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;“This entire history has led to a series of vaguely absurd outcomes on various modern Unixes. On Solaris derivatives more is of course the traditional version with source code that can probably trace itself all the way back to 3BSD, carefully updated to SUS compliance. Solaris would never dream of changing what more is, not even if the replacement is better. Why, it might disturb someone.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Oddly, FreeBSD has done the most sensible thing; they've outright replaced more with less. There is a /usr/bin/more but it's the same binary as less and as you can see the more manpage is just the less manpage. OpenBSD has done the same thing but has a specific manpage for more instead of just giving you the less manpage.&lt;/p&gt;

&lt;p&gt;&amp;gt; So, now you can see why I say that less is more, or more, or both, at several levels. less is certainly more than more, and sometimes less literally is more (or rather more is less, to put it the right way around).&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.computerworlduk.com/galleries/operating-systems/-free-alternatives-windows-10-3639433/" target="_blank" rel="nofollow noopener"&gt;PC-BSD listed in the top 8 'best' alternatives to Windows 10&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://bsdimp.blogspot.co.uk/2016/08/creating-quick-dns-server-with.html" target="_blank" rel="nofollow noopener"&gt;Creating a quick DNS server with a Rapsberry Pi2 and FreeBSD 11.0-RC1&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://bsdlaptops.wordpress.com/2016/03/07/vaio-pro-11-part-2/" target="_blank" rel="nofollow noopener"&gt;Dual Boot OpenBSD and Linux + UEFI&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://desktopbsd.boards.net/board/10/announcements" target="_blank" rel="nofollow noopener"&gt;DesktopBSD 2.0 various versions available (Gnome, Lumina, KDE, LXDE)&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;FreeBSD gets new ZFS features including: &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=305323" target="_blank" rel="nofollow noopener"&gt;Compressed ARC &lt;/a&gt; and &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=305331" target="_blank" rel="nofollow noopener"&gt;ZFS Allocation Throttle &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/user340/fdgw2" target="_blank" rel="nofollow noopener"&gt;One Floppy NetBSD Distribution&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://github.com/q5sys/BUGtracker" target="_blank" rel="nofollow noopener"&gt;A Compendium of BUGs&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/b7W6NHqs" target="_blank" rel="nofollow noopener"&gt; Galahad - OpenBSD X setup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/P4MUs3Pa" target="_blank" rel="nofollow noopener"&gt; Tang - Subtitles&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/LQ8yTp0G" target="_blank" rel="nofollow noopener"&gt; Ivan - Zpool Options&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/XTK5gXMU" target="_blank" rel="nofollow noopener"&gt; Brad - Replication Issue&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/TdYTMSj9" target="_blank" rel="nofollow noopener"&gt; MJ - HBA&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow! We’ve got Netflix + FreeBSD news to discuss, always a crowd pleaser, that plus EuroBSDCon is just around the corner. Stick around for your place</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://techblog.netflix.com/search/label/FreeBSD" rel="nofollow">Protecting Netflix Viewing Privacy at Scale, with FreeBSD</a></h3>

<ul>
<li>This blog post from Netflix tells the story of how Netflix developed in-kernel TLS to speed up delivery of video via HTTPS</li>
</ul>

<blockquote>
<p>Since the beginning of the Open Connect program we have significantly increased the efficiency of our OCAs - from delivering 8 Gbps of throughput from a single server in 2012 to over 90 Gbps from a single server in 2016. We contribute to this effort on the software side by optimizing every aspect of the software for our unique use case - in particular, focusing on the open source FreeBSD operating system and the NGINX web server that run on the OCAs.</p>

<p>In the modern internet world, we have to focus not only on efficiency, but also security. There are many state-of-the-art security mechanisms in place at Netflix, including Transport Level Security (TLS) encryption of customer information, search queries, and other confidential data. We have always relied on pre-encoded Digital Rights Management (DRM) to secure our video streams. Over the past year, we’ve begun to use Secure HTTP (HTTP over TLS or HTTPS) to encrypt the transport of the video content as well. This helps protect member privacy, particularly when the network is insecure - ensuring that our members are safe from eavesdropping by anyone who might want to record their viewing habits.</p>

<p>The goal is to ensure that your government, ISP, and wifi sniffing neighbour cannot tell which Netflix videos you are watching</p>

<p>Netflix Open Connect serves over 125 million hours of content per day, all around the world. Given our scale, adding the overhead of TLS encryption calculations to our video stream transport had the potential to greatly reduce the efficiency of our global infrastructure.</p>

<p>We evaluated available and applicable ciphers and decided to primarily use the Advanced Encryption Standard (AES) cipher in Galois/Counter Mode (GCM), available starting in TLS 1.2. We chose AES-GCM over the Cipher Block Chaining (CBC) method, which comes at a higher computational cost. The AES-GCM cipher algorithm encrypts and authenticates the message simultaneously - as opposed to AES-CBC, which requires an additional pass over the data to generate keyed-hash message authentication code (HMAC). CBC can still be used as a fallback for clients that cannot support the preferred method.</p>

<p>All revisions of Open Connect Appliances also have Intel CPUs that support AES-NI, the extension to the x86 instruction set designed to improve encryption and decryption performance. We needed to determine the best implementation of AES-GCM with the AES-NI instruction set, so we investigated alternatives to OpenSSL, including BoringSSL and the Intel Intelligent Storage Acceleration Library (ISA-L).</p>

<p>Netflix and NGINX had previously worked together to improve our HTTP client request and response time via the use of sendfile calls to perform a zero-copy data flow from storage (HDD or SSD) to network socket, keeping the data in the kernel memory address space and relieving some of the CPU burden. The Netflix team specifically added the ability to make the sendfile calls asynchronous - further reducing the data path and enabling more simultaneous connections. However, TLS functionality, which requires the data to be passed to the application layer, was incompatible with the sendfile approach.</p>

<p>To retain the benefits of the sendfile model while adding TLS functionality, we designed a hybrid TLS scheme whereby session management stays in the application space, but the bulk encryption is inserted into the sendfile data pipeline in the kernel. This extends sendfile to support encrypting data for TLS/SSL connections.</p>

<p>We tested the BoringSSL and ISA-L AES-GCM implementations with our sendfile improvements against a baseline of OpenSSL (with no sendfile changes), under typical Netflix traffic conditions on three different OCA hardware types. Our changes in both the BoringSSL and ISA-L test situations significantly increased both CPU utilization and bandwidth over baseline - increasing performance by up to 30%, depending on the OCA hardware version. We chose the ISA-L cipher implementation, which had slightly better results. With these improvements in place, we can continue the process of adding TLS to our video streams for clients that support it, without suffering prohibitive performance hits.</p>
</blockquote>

<ul>
<li>If you would like more detail, check out the papers from <a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">AsiaBSDCon 2015</a> and the <a href="https://people.freebsd.org/%7Errs/asiabsd_tls_improved.pdf" rel="nofollow">updated one from 2016</a> 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-HP-Stream-7" rel="nofollow">OpenBSD on HP Stream 7</a></h3>

<blockquote>
<p>Recent events have rocked the mobile computing world to its core. OpenBSD retired the zaurus port, leaving users in desperate need of a new device. And not long before that, Microsoft released the Anniversary Update to Windows 10, but with free space requirements such that it’s nigh impossible to install on cheap 32GB eMMC equipped devices such as the HP Stream series, leaving users searching for a new lightweight operating system. With necessity as both mother and father, the scene is set for a truly epic pairing. OpenBSD on the HP Stream 7.</p>

<p>The HP Stream line is a series of budget computers in a couple form factors. The Stream 11 is a fairly typical netbook. However, the Stream 7 and 8 are tablets. They look like cheap Android devices, but inside the case, they’re real boys, er PCs, with Intel Atom CPUs.</p>

<p>To install OpenBSD on such a device, we need a few parts. Obviously, the tablet itself. There’s a dearth of ports on these things, but there is a micro USB port. Attaching anything useful requires an OTG “on the go” cable that creates a type A port. Attaching more than one useful thing requires a mini hub. And completing the install requires one each USB stick, keyboard, and network adapter.</p>

<p>First, we need to prep the machine to boot from USB. Actually, before doing anything, make sure you have a full charge. It’s going to be battery only from here on out. Plug everything in. Flash drive, keyboard, and network into the hub, hub into the OTG cable, cable into the port on top of the Stream.</p>

<p>Turn on the machine while holding the volume down button. This launches a mini menu from which we can enter the BIOS. There’s a little on screen keyboard in the corner, so this can be done even without a keyboard attached, but the USB keyboard should work. We need to change two settings in the boot section. First, turn off secure boot. Second, switch boot order to prefer USB. Save and exit. The first reboot reveals a confirmation screen checking that we really want to disable secure boot. We must enter a PIN and press enter. Enter the PIN shown on the screen and press enter. And we are go.</p>
</blockquote>

<ul>
<li><p>Then boot up OpenBSD from the USB drive</p></li>
<li><p>Ted then works there a number of kernel panics and device driver issues, but after disabling ACPI and IntelDRM, the device boots OpenBSD.</p></li>
</ul>

<blockquote>
<p>Of course, there’s no X at this point. And definitely no touch screen. And no internal networking. However, by keeping our USB hub attached, we can drive the console and access the network. At least until the battery is depleted, even if we have no way of knowing how long that will be since we disabled all the ACPI devices, which also means no suspend or resume.</p>
</blockquote>

<ul>
<li>With some xorg.conf hacking, he did get Xorg working
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-September/624493.html" rel="nofollow">DragonflyBSD steps towards base LibreSSL</a></h3>

<ul>
<li><a href="http://freshbsd.org/commit/dfbsd/304ca408000cd34559ef5319b4b5a6766d6eb35b" rel="nofollow">Project: DragonFlyBSD / Switch base to use private LibreSSL libraries</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911231651" rel="nofollow">DragonFly BSD adopts uses of LibreSSL</a></li>
<li>The number of projects beginning to switch over to LibreSSL is growing and it appears we can now throw DragonFly into that camp.</li>
<li>Following something that sounds vaguely familiar (Allan!) DFLY is now creating “private” LibreSSL libraries which are only linked against by base system binaries.</li>
<li>For the moment OpenSSL is <em>still</em> built, primarily so that various ports and 3rd party apps can continue to function as before.</li>
<li>A NO_OPENSSL option has also been added, but doesn’t really do much (yet), since it’ll still build and install headers / libraries even if set.
***</li>
</ul>

<h3>OpenBSD g2k16 Hackathon</h3>

<ul>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911012316" rel="nofollow">g2k16 Hackathon Report: Antoine Jacoutot on Binary Patches</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911231712" rel="nofollow">g2k16 Hackathon Report: Matthieu Herrb on xenodm</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911000337" rel="nofollow">g2k16 Hackathon Report: Vincent Gross on iked(8), armv7 and sys/netinet[6]</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911000052" rel="nofollow">g2k16 Hackathon Report: Florian Obser on httpd, networking, acme-client, and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160909012520" rel="nofollow">g2k16 Hackathon Report: Jasper Lievisse Adriaanse on ddb(4) and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160908002430" rel="nofollow">g2k16 Hackathon Report: Christian Weisgerber on gettext progress, RTC work, removing kernel cruft</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160907131655" rel="nofollow">g2k16 Hackathon Report: Brent Cook on Chromebooks, crypto, and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160906230610" rel="nofollow">g2k16 Hackathon Report: Ted Unangst on doas, signify, code removal</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160905235911" rel="nofollow">g2k16 Hackathon Report: Marc Espie on package signing evolution</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160906004915" rel="nofollow">g2k16 Hackathon Report: Adam Wolk on ports, wireless drivers and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160905134009&mode=expanded" rel="nofollow">g2k16 Hackathon Report: Mike Larkin on vmm + vmd progress</a> 
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://jcs.org/notaweblog/2016/08/26/openbsd_chromebook/" rel="nofollow">OpenBSD (with encrypted softraid) on the Chromebook Pixel</a></h3>

<ul>
<li>Looking for a Laptop to make your OpenBSD road-warrior? If so, we have a great blog tutorial on getting OpenBSD setup on the Chromebook Pixel with encrypted softraid!</li>
<li>Author Joshua Stein gives us a very verbose look at how to install and dial-in the laptop perfectly. But first for those wondering about the hardware in the pixel:</li>
</ul>

<blockquote>
<p>The Chromebook Pixel LS (2015) has an Intel Core i7 processor (Broadwell) at 2.4Ghz, 16Gb of RAM, a 2560x1700 400-nit IPS screen (239ppi), and Intel 802.11ac wireless. It has a Kingston 64Gib flash chip, of which about 54Gib can be used by OpenBSD when dual-booting with a 1Gb Chrome OS partition.</p>
</blockquote>

<ul>
<li>Due to this being a chromebook with seaBIOS, some manual key-press trickery will be required to initially get the OpenBSD Installer up and running.</li>
<li>From here you’ll want to pay special close attention to the disk partitioning. In particular Joshua will show us how to shrink the existing encrypted /home that ChromeOS uses, keeping the dual-boot intact. This will become important if you ever plan on updating the device.</li>
<li>From here, we move back to a more traditional setup, but with the added bonus of doing a soft-raid setup.</li>
<li>But the fun isn’t over yet! If you want to make OpenBSD the default boot, that’ll require cracking the lid on the device and removing a special pink write-protect screw. And of course if you want to remove the default splash-screen image, Joshua has you covered as well, although some flashrom magic will be required.</li>
<li>At this point you are nearly done. Final details on enabling specific bits of hardware are discussed. Most things work, apart from Audio and Bluetooth as of right now.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas-mastery" rel="nofollow">doas mastery</a></h3>

<ul>
<li>“doas” mastery - Paging MWL!</li>
<li>Our buddy Ted Unangst has written up a great ‘mastery’ guide of the doas command, which can come in handy if you are among the un-initiated in doas land.</li>
</ul>

<blockquote>
<p>UNIX systems have two classes of user, the super user and regular users. The super user is super, and everybody else is not. This concentration of power keeps things simple, but also means that often too much power is granted. Usually we only need super user powers to perform one task. We would rather not have such power all the time. Think of the responsibility that would entail! Like the sudo command, doas allows for subdivision of super user privileges, granting them only for specific tasks.</p>
</blockquote>

<ul>
<li>He starts with the basic doas.conf setup, which starts with an empty config file</li>
<li>The doas config is much like a pf ruleset, the default is to block everything
&gt; We add the root rule second because doas evaluates rules in a last match manner. root is in the wheel group, so the first rule will match, and then we need to override that with a second rule. Remember to always start with general rules, then make them more specific.
***</li>
</ul>

<h3>iXsystems</h3>

<ul>
<li><a href="https://www.ixsystems.com/blog/ixsystems-host-meetbsd-california-2016-uc-berkeley/" rel="nofollow">iXsystems to host MeetBSD</a> </li>
</ul>

<hr>

<h3>FreeBSD Foundation Welcomes New Board Members</h3>

<ul>
<li><a href="https://www.freebsdfoundation.org/blog/freebsd-foundation-welcomes-new-board-members/" rel="nofollow">New Board Members</a> </li>
<li>The FreeBSD Foundation has added two new board members</li>
<li><a href="https://www.freebsdfoundation.org/blog/new-board-member-interview-kylie-liang/" rel="nofollow">Interview with Kylie Liang</a></li>
<li>Kylie will focus on representing FreeBSD at conferences and businesses in China</li>
</ul>

<blockquote>
<p>I live in China. There, I can act as a bridge between Chinese companies and the FreeBSD community to help drive FreeBSD adoption. Through my leadership role in the FreeBSD Foundation, I will help promote FreeBSD in China and also represent the Foundation at conferences and events in my region.</p>
</blockquote>

<ul>
<li>Kylie leads the team the ensures FreeBSD runs well on Hyper-V and Azure, including providing commercial support for customers who run FreeBSD or FreeBSD based appliances on the Azure Cloud</li>
</ul>

<blockquote>
<p>I joined Microsoft and started to lead the project called FreeBSD Integration Service to get FreeBSD running well on Hyper-V and Azure. To promote our work and to understand the FreeBSD ecosystem, I started to participate in FreeBSD events where I was inspired by this technical community.</p>
</blockquote>

<ul>
<li><a href="https://www.freebsdfoundation.org/blog/new-board-member-interview-philip-paeps/" rel="nofollow">Interview with Philip Paeps</a> </li>
<li>Philip started with FreeBSD in the early 2000s and got his commit bit in 2004</li>
</ul>

<blockquote>
<p>The patches I submitted to make ACPI and input devices work on that laptop led to a src commit bit in 2004. While I haven’t worked on ACPI or input devices since, I have been contributing to different areas of the kernel. Taking up maintainership of some ports I cared about also got me a ports commit bit after some time.</p>
</blockquote>

<ul>
<li>Philip will continue to help run EuroBSDCon, but is also spreading the word about FreeBSD in India and Africa</li>
</ul>

<blockquote>
<p>Primarily, I think I can be useful! I attend (and organize) a number of conferences around the world every year, particularly in regions that have a mostly “stealthy” FreeBSD community. While I clearly don’t need to be on the FreeBSD Foundation board to advocate for FreeBSD, joining as a director will provide an additional asset when working in areas of the world where organizational affiliations are meaningful.</p>
</blockquote>

<ul>
<li>Philip has also developed network drivers and various other bits and pieces, and has extensive experience working with and for hardware vendors and appliance vendors</li>
</ul>

<blockquote>
<p>Despite intending to eventually contribute their code to the FreeBSD Project as open source, many hardware vendors still find it very difficult to engage directly with the FreeBSD development community. The Foundation helps bridge that gap and helps facilitate collaboration between commercial vendors and the FreeBSD community.</p>

<p>I hope to make FreeBSD more visible in regions of the world where it is historically under-represented. I expect I will be attending even more conferences and getting myself invited to even more organizations.</p>

<hr>
</blockquote>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/MoreAndUnixFossilization" rel="nofollow">more, less, and a story of typical Unix fossilization</a></h3>

<ul>
<li>Chris Siebenmann from the University of Toronto digs into the history of the difference between ‘less’ and ‘more’</li>
</ul>

<blockquote>
<p>In the beginning, by which we mean V7, Unix didn&#39;t have a pager at all. That was okay; Unix wasn&#39;t very visual in those days, partly because it was still sort of the era of the hard copy terminal. Then along came Berkeley and BSD. People at Berkeley were into CRT terminals, and so BSD Unix gave us things like vi and the first pager program, more (which showed up quite early, in 3BSD, although this isn&#39;t as early as vi, which appears in 2BSD). Calling a pager more is a little bit odd but it&#39;s a Unix type of name and from the beginning more prompted you with &#39;--More--&#39; at the bottom of the screen.</p>

<p>All of the Unix vendors that based their work on BSD Unix (like Sun and DEC) naturally shipped versions of more along with the rest of the BSD programs, and so more spread around the BSD side of things. However, more was by no means the best pager ever; as you might expect, it was actually a bit primitive and lacking in features. So fairly early on Mark Nudelman wrote a pager with somewhat more features and it wound up being called less as somewhat of a joke.</p>

<p>In a sane world, Unix vendors would have either replaced their version of more with the clearly superior less or at least updated their version of more to the 4.3 BSD version. Maybe less wouldn&#39;t have replaced more immediately, but certainly over say the next five years, when it kept on being better and most people kept preferring it when they had a choice.”</p>

<ul>
<li>“This entire history has led to a series of vaguely absurd outcomes on various modern Unixes. On Solaris derivatives more is of course the traditional version with source code that can probably trace itself all the way back to 3BSD, carefully updated to SUS compliance. Solaris would never dream of changing what more is, not even if the replacement is better. Why, it might disturb someone.</li>
</ul>

<p>Oddly, FreeBSD has done the most sensible thing; they&#39;ve outright replaced more with less. There is a /usr/bin/more but it&#39;s the same binary as less and as you can see the more manpage is just the less manpage. OpenBSD has done the same thing but has a specific manpage for more instead of just giving you the less manpage.</p>

<p>So, now you can see why I say that less is more, or more, or both, at several levels. less is certainly more than more, and sometimes less literally is more (or rather more is less, to put it the right way around).</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://www.computerworlduk.com/galleries/operating-systems/-free-alternatives-windows-10-3639433/" rel="nofollow">PC-BSD listed in the top 8 &#39;best&#39; alternatives to Windows 10</a> </p></li>
<li><p><a href="http://bsdimp.blogspot.co.uk/2016/08/creating-quick-dns-server-with.html" rel="nofollow">Creating a quick DNS server with a Rapsberry Pi2 and FreeBSD 11.0-RC1</a> </p></li>
<li><p><a href="https://bsdlaptops.wordpress.com/2016/03/07/vaio-pro-11-part-2/" rel="nofollow">Dual Boot OpenBSD and Linux + UEFI</a> </p></li>
<li><p><a href="http://desktopbsd.boards.net/board/10/announcements" rel="nofollow">DesktopBSD 2.0 various versions available (Gnome, Lumina, KDE, LXDE)</a> </p></li>
<li><p>FreeBSD gets new ZFS features including: <a href="https://svnweb.freebsd.org/base?view=revision&revision=305323" rel="nofollow">Compressed ARC </a> and <a href="https://svnweb.freebsd.org/base?view=revision&revision=305331" rel="nofollow">ZFS Allocation Throttle </a> </p></li>
<li><p><a href="https://github.com/user340/fdgw2" rel="nofollow">One Floppy NetBSD Distribution</a></p></li>
<li><p><a href="https://github.com/q5sys/BUGtracker" rel="nofollow">A Compendium of BUGs</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/b7W6NHqs" rel="nofollow"> Galahad - OpenBSD X setup</a> </li>
<li><a href="http://pastebin.com/P4MUs3Pa" rel="nofollow"> Tang - Subtitles</a> </li>
<li><a href="http://pastebin.com/LQ8yTp0G" rel="nofollow"> Ivan - Zpool Options</a> </li>
<li><a href="http://pastebin.com/XTK5gXMU" rel="nofollow"> Brad - Replication Issue</a> </li>
<li><a href="http://pastebin.com/TdYTMSj9" rel="nofollow"> MJ - HBA</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow! We’ve got Netflix + FreeBSD news to discuss, always a crowd pleaser, that plus EuroBSDCon is just around the corner. Stick around for your place</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://techblog.netflix.com/search/label/FreeBSD" rel="nofollow">Protecting Netflix Viewing Privacy at Scale, with FreeBSD</a></h3>

<ul>
<li>This blog post from Netflix tells the story of how Netflix developed in-kernel TLS to speed up delivery of video via HTTPS</li>
</ul>

<blockquote>
<p>Since the beginning of the Open Connect program we have significantly increased the efficiency of our OCAs - from delivering 8 Gbps of throughput from a single server in 2012 to over 90 Gbps from a single server in 2016. We contribute to this effort on the software side by optimizing every aspect of the software for our unique use case - in particular, focusing on the open source FreeBSD operating system and the NGINX web server that run on the OCAs.</p>

<p>In the modern internet world, we have to focus not only on efficiency, but also security. There are many state-of-the-art security mechanisms in place at Netflix, including Transport Level Security (TLS) encryption of customer information, search queries, and other confidential data. We have always relied on pre-encoded Digital Rights Management (DRM) to secure our video streams. Over the past year, we’ve begun to use Secure HTTP (HTTP over TLS or HTTPS) to encrypt the transport of the video content as well. This helps protect member privacy, particularly when the network is insecure - ensuring that our members are safe from eavesdropping by anyone who might want to record their viewing habits.</p>

<p>The goal is to ensure that your government, ISP, and wifi sniffing neighbour cannot tell which Netflix videos you are watching</p>

<p>Netflix Open Connect serves over 125 million hours of content per day, all around the world. Given our scale, adding the overhead of TLS encryption calculations to our video stream transport had the potential to greatly reduce the efficiency of our global infrastructure.</p>

<p>We evaluated available and applicable ciphers and decided to primarily use the Advanced Encryption Standard (AES) cipher in Galois/Counter Mode (GCM), available starting in TLS 1.2. We chose AES-GCM over the Cipher Block Chaining (CBC) method, which comes at a higher computational cost. The AES-GCM cipher algorithm encrypts and authenticates the message simultaneously - as opposed to AES-CBC, which requires an additional pass over the data to generate keyed-hash message authentication code (HMAC). CBC can still be used as a fallback for clients that cannot support the preferred method.</p>

<p>All revisions of Open Connect Appliances also have Intel CPUs that support AES-NI, the extension to the x86 instruction set designed to improve encryption and decryption performance. We needed to determine the best implementation of AES-GCM with the AES-NI instruction set, so we investigated alternatives to OpenSSL, including BoringSSL and the Intel Intelligent Storage Acceleration Library (ISA-L).</p>

<p>Netflix and NGINX had previously worked together to improve our HTTP client request and response time via the use of sendfile calls to perform a zero-copy data flow from storage (HDD or SSD) to network socket, keeping the data in the kernel memory address space and relieving some of the CPU burden. The Netflix team specifically added the ability to make the sendfile calls asynchronous - further reducing the data path and enabling more simultaneous connections. However, TLS functionality, which requires the data to be passed to the application layer, was incompatible with the sendfile approach.</p>

<p>To retain the benefits of the sendfile model while adding TLS functionality, we designed a hybrid TLS scheme whereby session management stays in the application space, but the bulk encryption is inserted into the sendfile data pipeline in the kernel. This extends sendfile to support encrypting data for TLS/SSL connections.</p>

<p>We tested the BoringSSL and ISA-L AES-GCM implementations with our sendfile improvements against a baseline of OpenSSL (with no sendfile changes), under typical Netflix traffic conditions on three different OCA hardware types. Our changes in both the BoringSSL and ISA-L test situations significantly increased both CPU utilization and bandwidth over baseline - increasing performance by up to 30%, depending on the OCA hardware version. We chose the ISA-L cipher implementation, which had slightly better results. With these improvements in place, we can continue the process of adding TLS to our video streams for clients that support it, without suffering prohibitive performance hits.</p>
</blockquote>

<ul>
<li>If you would like more detail, check out the papers from <a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">AsiaBSDCon 2015</a> and the <a href="https://people.freebsd.org/%7Errs/asiabsd_tls_improved.pdf" rel="nofollow">updated one from 2016</a> 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-HP-Stream-7" rel="nofollow">OpenBSD on HP Stream 7</a></h3>

<blockquote>
<p>Recent events have rocked the mobile computing world to its core. OpenBSD retired the zaurus port, leaving users in desperate need of a new device. And not long before that, Microsoft released the Anniversary Update to Windows 10, but with free space requirements such that it’s nigh impossible to install on cheap 32GB eMMC equipped devices such as the HP Stream series, leaving users searching for a new lightweight operating system. With necessity as both mother and father, the scene is set for a truly epic pairing. OpenBSD on the HP Stream 7.</p>

<p>The HP Stream line is a series of budget computers in a couple form factors. The Stream 11 is a fairly typical netbook. However, the Stream 7 and 8 are tablets. They look like cheap Android devices, but inside the case, they’re real boys, er PCs, with Intel Atom CPUs.</p>

<p>To install OpenBSD on such a device, we need a few parts. Obviously, the tablet itself. There’s a dearth of ports on these things, but there is a micro USB port. Attaching anything useful requires an OTG “on the go” cable that creates a type A port. Attaching more than one useful thing requires a mini hub. And completing the install requires one each USB stick, keyboard, and network adapter.</p>

<p>First, we need to prep the machine to boot from USB. Actually, before doing anything, make sure you have a full charge. It’s going to be battery only from here on out. Plug everything in. Flash drive, keyboard, and network into the hub, hub into the OTG cable, cable into the port on top of the Stream.</p>

<p>Turn on the machine while holding the volume down button. This launches a mini menu from which we can enter the BIOS. There’s a little on screen keyboard in the corner, so this can be done even without a keyboard attached, but the USB keyboard should work. We need to change two settings in the boot section. First, turn off secure boot. Second, switch boot order to prefer USB. Save and exit. The first reboot reveals a confirmation screen checking that we really want to disable secure boot. We must enter a PIN and press enter. Enter the PIN shown on the screen and press enter. And we are go.</p>
</blockquote>

<ul>
<li><p>Then boot up OpenBSD from the USB drive</p></li>
<li><p>Ted then works there a number of kernel panics and device driver issues, but after disabling ACPI and IntelDRM, the device boots OpenBSD.</p></li>
</ul>

<blockquote>
<p>Of course, there’s no X at this point. And definitely no touch screen. And no internal networking. However, by keeping our USB hub attached, we can drive the console and access the network. At least until the battery is depleted, even if we have no way of knowing how long that will be since we disabled all the ACPI devices, which also means no suspend or resume.</p>
</blockquote>

<ul>
<li>With some xorg.conf hacking, he did get Xorg working
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-September/624493.html" rel="nofollow">DragonflyBSD steps towards base LibreSSL</a></h3>

<ul>
<li><a href="http://freshbsd.org/commit/dfbsd/304ca408000cd34559ef5319b4b5a6766d6eb35b" rel="nofollow">Project: DragonFlyBSD / Switch base to use private LibreSSL libraries</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911231651" rel="nofollow">DragonFly BSD adopts uses of LibreSSL</a></li>
<li>The number of projects beginning to switch over to LibreSSL is growing and it appears we can now throw DragonFly into that camp.</li>
<li>Following something that sounds vaguely familiar (Allan!) DFLY is now creating “private” LibreSSL libraries which are only linked against by base system binaries.</li>
<li>For the moment OpenSSL is <em>still</em> built, primarily so that various ports and 3rd party apps can continue to function as before.</li>
<li>A NO_OPENSSL option has also been added, but doesn’t really do much (yet), since it’ll still build and install headers / libraries even if set.
***</li>
</ul>

<h3>OpenBSD g2k16 Hackathon</h3>

<ul>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911012316" rel="nofollow">g2k16 Hackathon Report: Antoine Jacoutot on Binary Patches</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911231712" rel="nofollow">g2k16 Hackathon Report: Matthieu Herrb on xenodm</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911000337" rel="nofollow">g2k16 Hackathon Report: Vincent Gross on iked(8), armv7 and sys/netinet[6]</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160911000052" rel="nofollow">g2k16 Hackathon Report: Florian Obser on httpd, networking, acme-client, and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160909012520" rel="nofollow">g2k16 Hackathon Report: Jasper Lievisse Adriaanse on ddb(4) and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160908002430" rel="nofollow">g2k16 Hackathon Report: Christian Weisgerber on gettext progress, RTC work, removing kernel cruft</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160907131655" rel="nofollow">g2k16 Hackathon Report: Brent Cook on Chromebooks, crypto, and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160906230610" rel="nofollow">g2k16 Hackathon Report: Ted Unangst on doas, signify, code removal</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160905235911" rel="nofollow">g2k16 Hackathon Report: Marc Espie on package signing evolution</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160906004915" rel="nofollow">g2k16 Hackathon Report: Adam Wolk on ports, wireless drivers and more</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160905134009&mode=expanded" rel="nofollow">g2k16 Hackathon Report: Mike Larkin on vmm + vmd progress</a> 
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://jcs.org/notaweblog/2016/08/26/openbsd_chromebook/" rel="nofollow">OpenBSD (with encrypted softraid) on the Chromebook Pixel</a></h3>

<ul>
<li>Looking for a Laptop to make your OpenBSD road-warrior? If so, we have a great blog tutorial on getting OpenBSD setup on the Chromebook Pixel with encrypted softraid!</li>
<li>Author Joshua Stein gives us a very verbose look at how to install and dial-in the laptop perfectly. But first for those wondering about the hardware in the pixel:</li>
</ul>

<blockquote>
<p>The Chromebook Pixel LS (2015) has an Intel Core i7 processor (Broadwell) at 2.4Ghz, 16Gb of RAM, a 2560x1700 400-nit IPS screen (239ppi), and Intel 802.11ac wireless. It has a Kingston 64Gib flash chip, of which about 54Gib can be used by OpenBSD when dual-booting with a 1Gb Chrome OS partition.</p>
</blockquote>

<ul>
<li>Due to this being a chromebook with seaBIOS, some manual key-press trickery will be required to initially get the OpenBSD Installer up and running.</li>
<li>From here you’ll want to pay special close attention to the disk partitioning. In particular Joshua will show us how to shrink the existing encrypted /home that ChromeOS uses, keeping the dual-boot intact. This will become important if you ever plan on updating the device.</li>
<li>From here, we move back to a more traditional setup, but with the added bonus of doing a soft-raid setup.</li>
<li>But the fun isn’t over yet! If you want to make OpenBSD the default boot, that’ll require cracking the lid on the device and removing a special pink write-protect screw. And of course if you want to remove the default splash-screen image, Joshua has you covered as well, although some flashrom magic will be required.</li>
<li>At this point you are nearly done. Final details on enabling specific bits of hardware are discussed. Most things work, apart from Audio and Bluetooth as of right now.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas-mastery" rel="nofollow">doas mastery</a></h3>

<ul>
<li>“doas” mastery - Paging MWL!</li>
<li>Our buddy Ted Unangst has written up a great ‘mastery’ guide of the doas command, which can come in handy if you are among the un-initiated in doas land.</li>
</ul>

<blockquote>
<p>UNIX systems have two classes of user, the super user and regular users. The super user is super, and everybody else is not. This concentration of power keeps things simple, but also means that often too much power is granted. Usually we only need super user powers to perform one task. We would rather not have such power all the time. Think of the responsibility that would entail! Like the sudo command, doas allows for subdivision of super user privileges, granting them only for specific tasks.</p>
</blockquote>

<ul>
<li>He starts with the basic doas.conf setup, which starts with an empty config file</li>
<li>The doas config is much like a pf ruleset, the default is to block everything
&gt; We add the root rule second because doas evaluates rules in a last match manner. root is in the wheel group, so the first rule will match, and then we need to override that with a second rule. Remember to always start with general rules, then make them more specific.
***</li>
</ul>

<h3>iXsystems</h3>

<ul>
<li><a href="https://www.ixsystems.com/blog/ixsystems-host-meetbsd-california-2016-uc-berkeley/" rel="nofollow">iXsystems to host MeetBSD</a> </li>
</ul>

<hr>

<h3>FreeBSD Foundation Welcomes New Board Members</h3>

<ul>
<li><a href="https://www.freebsdfoundation.org/blog/freebsd-foundation-welcomes-new-board-members/" rel="nofollow">New Board Members</a> </li>
<li>The FreeBSD Foundation has added two new board members</li>
<li><a href="https://www.freebsdfoundation.org/blog/new-board-member-interview-kylie-liang/" rel="nofollow">Interview with Kylie Liang</a></li>
<li>Kylie will focus on representing FreeBSD at conferences and businesses in China</li>
</ul>

<blockquote>
<p>I live in China. There, I can act as a bridge between Chinese companies and the FreeBSD community to help drive FreeBSD adoption. Through my leadership role in the FreeBSD Foundation, I will help promote FreeBSD in China and also represent the Foundation at conferences and events in my region.</p>
</blockquote>

<ul>
<li>Kylie leads the team the ensures FreeBSD runs well on Hyper-V and Azure, including providing commercial support for customers who run FreeBSD or FreeBSD based appliances on the Azure Cloud</li>
</ul>

<blockquote>
<p>I joined Microsoft and started to lead the project called FreeBSD Integration Service to get FreeBSD running well on Hyper-V and Azure. To promote our work and to understand the FreeBSD ecosystem, I started to participate in FreeBSD events where I was inspired by this technical community.</p>
</blockquote>

<ul>
<li><a href="https://www.freebsdfoundation.org/blog/new-board-member-interview-philip-paeps/" rel="nofollow">Interview with Philip Paeps</a> </li>
<li>Philip started with FreeBSD in the early 2000s and got his commit bit in 2004</li>
</ul>

<blockquote>
<p>The patches I submitted to make ACPI and input devices work on that laptop led to a src commit bit in 2004. While I haven’t worked on ACPI or input devices since, I have been contributing to different areas of the kernel. Taking up maintainership of some ports I cared about also got me a ports commit bit after some time.</p>
</blockquote>

<ul>
<li>Philip will continue to help run EuroBSDCon, but is also spreading the word about FreeBSD in India and Africa</li>
</ul>

<blockquote>
<p>Primarily, I think I can be useful! I attend (and organize) a number of conferences around the world every year, particularly in regions that have a mostly “stealthy” FreeBSD community. While I clearly don’t need to be on the FreeBSD Foundation board to advocate for FreeBSD, joining as a director will provide an additional asset when working in areas of the world where organizational affiliations are meaningful.</p>
</blockquote>

<ul>
<li>Philip has also developed network drivers and various other bits and pieces, and has extensive experience working with and for hardware vendors and appliance vendors</li>
</ul>

<blockquote>
<p>Despite intending to eventually contribute their code to the FreeBSD Project as open source, many hardware vendors still find it very difficult to engage directly with the FreeBSD development community. The Foundation helps bridge that gap and helps facilitate collaboration between commercial vendors and the FreeBSD community.</p>

<p>I hope to make FreeBSD more visible in regions of the world where it is historically under-represented. I expect I will be attending even more conferences and getting myself invited to even more organizations.</p>

<hr>
</blockquote>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/MoreAndUnixFossilization" rel="nofollow">more, less, and a story of typical Unix fossilization</a></h3>

<ul>
<li>Chris Siebenmann from the University of Toronto digs into the history of the difference between ‘less’ and ‘more’</li>
</ul>

<blockquote>
<p>In the beginning, by which we mean V7, Unix didn&#39;t have a pager at all. That was okay; Unix wasn&#39;t very visual in those days, partly because it was still sort of the era of the hard copy terminal. Then along came Berkeley and BSD. People at Berkeley were into CRT terminals, and so BSD Unix gave us things like vi and the first pager program, more (which showed up quite early, in 3BSD, although this isn&#39;t as early as vi, which appears in 2BSD). Calling a pager more is a little bit odd but it&#39;s a Unix type of name and from the beginning more prompted you with &#39;--More--&#39; at the bottom of the screen.</p>

<p>All of the Unix vendors that based their work on BSD Unix (like Sun and DEC) naturally shipped versions of more along with the rest of the BSD programs, and so more spread around the BSD side of things. However, more was by no means the best pager ever; as you might expect, it was actually a bit primitive and lacking in features. So fairly early on Mark Nudelman wrote a pager with somewhat more features and it wound up being called less as somewhat of a joke.</p>

<p>In a sane world, Unix vendors would have either replaced their version of more with the clearly superior less or at least updated their version of more to the 4.3 BSD version. Maybe less wouldn&#39;t have replaced more immediately, but certainly over say the next five years, when it kept on being better and most people kept preferring it when they had a choice.”</p>

<ul>
<li>“This entire history has led to a series of vaguely absurd outcomes on various modern Unixes. On Solaris derivatives more is of course the traditional version with source code that can probably trace itself all the way back to 3BSD, carefully updated to SUS compliance. Solaris would never dream of changing what more is, not even if the replacement is better. Why, it might disturb someone.</li>
</ul>

<p>Oddly, FreeBSD has done the most sensible thing; they&#39;ve outright replaced more with less. There is a /usr/bin/more but it&#39;s the same binary as less and as you can see the more manpage is just the less manpage. OpenBSD has done the same thing but has a specific manpage for more instead of just giving you the less manpage.</p>

<p>So, now you can see why I say that less is more, or more, or both, at several levels. less is certainly more than more, and sometimes less literally is more (or rather more is less, to put it the right way around).</p>

<hr>
</blockquote>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://www.computerworlduk.com/galleries/operating-systems/-free-alternatives-windows-10-3639433/" rel="nofollow">PC-BSD listed in the top 8 &#39;best&#39; alternatives to Windows 10</a> </p></li>
<li><p><a href="http://bsdimp.blogspot.co.uk/2016/08/creating-quick-dns-server-with.html" rel="nofollow">Creating a quick DNS server with a Rapsberry Pi2 and FreeBSD 11.0-RC1</a> </p></li>
<li><p><a href="https://bsdlaptops.wordpress.com/2016/03/07/vaio-pro-11-part-2/" rel="nofollow">Dual Boot OpenBSD and Linux + UEFI</a> </p></li>
<li><p><a href="http://desktopbsd.boards.net/board/10/announcements" rel="nofollow">DesktopBSD 2.0 various versions available (Gnome, Lumina, KDE, LXDE)</a> </p></li>
<li><p>FreeBSD gets new ZFS features including: <a href="https://svnweb.freebsd.org/base?view=revision&revision=305323" rel="nofollow">Compressed ARC </a> and <a href="https://svnweb.freebsd.org/base?view=revision&revision=305331" rel="nofollow">ZFS Allocation Throttle </a> </p></li>
<li><p><a href="https://github.com/user340/fdgw2" rel="nofollow">One Floppy NetBSD Distribution</a></p></li>
<li><p><a href="https://github.com/q5sys/BUGtracker" rel="nofollow">A Compendium of BUGs</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/b7W6NHqs" rel="nofollow"> Galahad - OpenBSD X setup</a> </li>
<li><a href="http://pastebin.com/P4MUs3Pa" rel="nofollow"> Tang - Subtitles</a> </li>
<li><a href="http://pastebin.com/LQ8yTp0G" rel="nofollow"> Ivan - Zpool Options</a> </li>
<li><a href="http://pastebin.com/XTK5gXMU" rel="nofollow"> Brad - Replication Issue</a> </li>
<li><a href="http://pastebin.com/TdYTMSj9" rel="nofollow"> MJ - HBA</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>158: Ham, Radio and Pie (oh my)</title>
  <link>https://www.bsdnow.tv/158</link>
  <guid isPermaLink="false">c0efd5d0-7ebb-4b12-822e-c3b63ad78e1f</guid>
  <pubDate>Wed, 07 Sep 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c0efd5d0-7ebb-4b12-822e-c3b63ad78e1f.mp3" length="78828052" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we’ll be talking to Diane Bruce about using it for Ham Radio Enthusiasts, the RPi3 and much more! That plus all the latest news from the week,</itunes:subtitle>
  <itunes:duration>1:49:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we’ll be talking to Diane Bruce about using it for Ham Radio Enthusiasts, the RPi3 and much more! That plus all the latest news from the week,&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.trueos.org/2016/09/01/pc-bsd-evolves-into-trueos/" target="_blank" rel="nofollow noopener"&gt;PC-BSD is now TrueOS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you’ve been watching this show the past few months, I’ve been dropping little hints about the upcoming rename of PC-BSD -&amp;gt; TrueOS. We’ve made that more official finally, and are asking folks to test out the software before a wider announcement this fall.&lt;/li&gt;
&lt;li&gt;For those wondering about the name change, it’s been something discussed over the past few years at different times. With us beginning to move more aggressively with changes for 11.0 (and eventually 12-CURRENT), the time seemed right to have a fresh start, using it as a spring-board to introduce all the changes in both software, and development / release model.&lt;/li&gt;
&lt;li&gt;I’ll be discussing more about this shift in a talk at MeetBSD2016 (Another reason for you to go), but here’s some of the highlights.&lt;/li&gt;
&lt;li&gt;No longer tied to specific FreeBSD point-releases, TrueOS will instead follow a rolling-release model based upon FreeBSD -CURRENT.&lt;/li&gt;
&lt;li&gt;Special tooling and features (Such as boot-environments) make this a feasible option that we didn’t have as easily in the early days of PC-BSD.&lt;/li&gt;
&lt;li&gt;In addition, TrueOS builds some things different from vanilla FreeBSD. Specifically Matt Macy’s DRM and Linux Compat work, LibreSSL directly in base, built from External Toolchain (No clang in base system package) and much more. &lt;/li&gt;
&lt;li&gt;New tools have have replaced, and are in the process of replacing the legacy PC-BSD control panel as well, which allows remote operation, either via Qt GUI, or WebSockets / REST API’s. &lt;/li&gt;
&lt;li&gt;I’ll be talking about more as things unfold, but for now please feel free to test and let us have feedback while we push towards a more stable release.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2016/08/the-voicemail-scammers-never-got-past.html" target="_blank" rel="nofollow noopener"&gt;The Voicemail Scammers Never Got Past Our OpenBSD Greylisting&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Peter Hansteen (That grumpy BSD guy) gives us an interesting look at how their OpenBSD grey-listing prevented spam from ever making it to their inbox.&lt;/li&gt;
&lt;li&gt;Specifically it looks like it occurred during Aug 23rd and 24th, with a particularly nasty ransomware payload destined to play havoc with Windows systems.&lt;/li&gt;
&lt;li&gt;Peter then walks us through their three-server mail setup, and how spamd is run in greylisting mode on each.&lt;/li&gt;
&lt;li&gt;The results? Nothing short of perfection:
   &amp;gt; “From those sources we can see that there were a total of 386 hosts that attempted delivery, to a total of 396 host and target email pairs (annotated here in a .csv file 
with geographic origin according to whois). The interesting part came when I started looking at the mail server logs to see how many had reached the content filtering or had even been passed on in the direction of users' mailboxes. There were none. The number of messages purportedly from voicemail@ in any of the domains we handle that made it even to the content filtering stage was 0. Zero. Not a single one made it through even to content filtering.”&lt;/li&gt;
&lt;li&gt;Not bad at all! Looks like spam-trap addresses + grey-listing is the way to go for stopping this kind of foolishness. Checkout Peter’s blog post for more details, but perhaps this will encourage you to setup a similar-type system for your business.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2016/08/freebsd-on-tiny-system-whats-missing.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD on a tiny system; what’s missing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd talks about some of the bits that are missing to make FreeBSD truly useful on small embedded devices&lt;/li&gt;
&lt;li&gt;Some of this stuff can be done now, but requires more work than it should&lt;/li&gt;
&lt;li&gt;“The first is a lack of real service management. FreeBSD doesn't have a service management daemon - the framework assumes that daemons implement their own background and monitoring. It would be much nicer if init or something similar to init could manage services and start/restart them where appropriate.”&lt;/li&gt;
&lt;li&gt;Of course, on a system with 32mb of memory, such a service manager would need to be very light weight&lt;/li&gt;
&lt;li&gt;“maybe I want to only start telnetd or dropbear/sshd whenever a connection comes in. But I'd also like to be able to add services for monitoring, such as dnsmasq and hostapd.”&lt;/li&gt;
&lt;li&gt;telnetd and sshd can be run from inetd, but often depend on special support from the daemon&lt;/li&gt;
&lt;li&gt;“The next is a lack of suitable syslog daemon. Yes, I'd like to be able to log some messages locally - even if it's only a couple hundred kilobytes of messages. I'd also like to be able to push messages to a remote service. Unfortunately the FreeBSD syslog daemon doesn't do log rotation or maximum log file sizes itself - it's done by "newsyslog" which runs out of cron. This isn't any good for real embedded systems with limited storage.”&lt;/li&gt;
&lt;li&gt;Syslog leaves much to be desired, especially in its configuration syntax, and filtering capabilities. Having it be able to detect with log files have grown beyond a reasonable size and fire off newsyslog would be very interesting&lt;/li&gt;
&lt;li&gt;“Then yes, there's a lack of a cron service. It'd be nice to have that integrated into the service management framework so things could be easily added/removed. I may just use cron, but that means cron is also always running which adds memory footprint (~1.3 megabytes) for something that is almost never actually active. When you have 32MB of RAM, that's quite a bit of wasted memory.”&lt;/li&gt;
&lt;li&gt;Systems have come back full circle, to where 32MB and 64MB are amounts of memory people expect to work with, while other people still want the system to perform well with 32 or 64 GB of memory&lt;/li&gt;
&lt;li&gt;It will be interesting to see how this balancing act plays out, trying to make the same codebase useful for extremely small and extremely large systems at the same time, while also running it on your middle of the road laptop.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.filippo.io/so-i-lost-my-openbsd-fde-password/" target="_blank" rel="nofollow noopener"&gt;So I lost my OpenBSD FDE password &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“The other day I set up a new OpenBSD instance with a nice RAID array, encrypted with Full Disk Encryption. And promptly proceeded to forget part of the passphrase.”&lt;/li&gt;
&lt;li&gt;So they started a little project&lt;/li&gt;
&lt;li&gt;Goal: “We need to extract enough info from the encrypted disk and rebuild enough of the decryption algorithm to be able to rapidly try many passphrases.”&lt;/li&gt;
&lt;li&gt;The post walks through how they reverse engineered the encryption system from the source code and a hexdump of a small encrypted memory disk&lt;/li&gt;
&lt;li&gt;“Now that we know how to extract the data and how to try passphrases against it, it will be trivial to write a bruteforce tool to recover the part of passphrase I forgot.”&lt;/li&gt;
&lt;li&gt;So, rather than having to try every possible passphrase, they only had to try fuzzing around the known keyword that was their passphrase.&lt;/li&gt;
&lt;li&gt;“UPDATE: I found it! After fixing a bug or two in the brute force tool and almost losing hope, it found the right combination of forgotten word and (Italian) misspelling.”&lt;/li&gt;
&lt;li&gt;This work lead to the author recommending that OpenBSD consider &lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=147316661717410&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;strengthening the key derivation algorithm&lt;/a&gt; used in its FDE.&lt;/li&gt;
&lt;li&gt;Rather than using a fixed number of rounds (8000 currently), do a small benchmark and determine how much work can be done in a reasonable amount of time&lt;/li&gt;
&lt;li&gt;This is what FreeBSD’s GELI FDE does, targeting ‘over 2 million microseconds’ of work. On my desktop i5-3570 this results in 974842 rounds. The number will likely not be the same twice because of minor variations in how long it will take in microseconds.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Diane Bruce - &lt;a href="mailto:db@freebsd.org" target="_blank" rel="nofollow noopener"&gt;db@freebsd.org&lt;/a&gt;  / &lt;a href="https://twitter.com/Dianora_1" target="_blank" rel="nofollow noopener"&gt;@Dianora_1&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Ham Radio, RPi3 and more!&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2739" target="_blank" rel="nofollow noopener"&gt;See Me &lt;sub&gt;&lt;sup&gt;(Michael W. Lucas)&lt;/sup&gt;&lt;/sub&gt; in 2016&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for a chance to interact with author Michael W Lucas in meat-space? (That sounds wrong)&lt;/li&gt;
&lt;li&gt;If so, he has posted a list of the up-coming conferences he’ll be speaking at, starting with Ohio LinuxFest Oct 7-8, where he’ll be giving an introduction to ZFS talk.&lt;/li&gt;
&lt;li&gt;Nov 8th, he’ll also be at MUG (Michigan User Group) giving a PAM talk.&lt;/li&gt;
&lt;li&gt;Sadly, no MeetBSD for Michael this year [moment of silence], but if you are able to make it to one of the aforementioned gatherings, be sure to bring your books for autographs. We promise he doesn’t bite. Much.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/its-hard-work-printing-nothing" target="_blank" rel="nofollow noopener"&gt;It’s hard work printing nothing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“It all starts with a bug report to LibreSSL that the openssl tool crashes when it tries to print NULL. This bug doesn’t manifest on OpenBSD because libc will convert NULL strings to ”(null)” when printing. However, this behavior is not required, and as observed, it’s not universal. When snprintf silently accepts NULL, that simply leads to propagating the error.”&lt;/li&gt;
&lt;li&gt;“There’s an argument to be made that silly error messages are better than crashing browsers, but stacking layers of sand seems like a poor means of building robust software in the long term.”&lt;/li&gt;
&lt;li&gt;“As soon as development for the next release of OpenBSD restarted, some developers began testing a patch that would remove this crutch from printf.”&lt;/li&gt;
&lt;li&gt;If you’d like to help with this work, see our call for volunteers from 2 weeks ago: &lt;a href="https://marc.info/?l=openbsd-misc&amp;amp;m=147059272201219&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;opportunity to help: %s audit in mandoc &lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Of course, immediately things started to complain. The configure script for talloc does a number of checks (check out the additional interesting observations by TedU here)&lt;/li&gt;
&lt;li&gt;“The test checking that our snprintf function conforms to the C99 standard actually contains, at a minimum, 3 deviations from the standard. It should say “Checking for non-conformant vsnprintf”.”&lt;/li&gt;
&lt;li&gt;“Of course, we’re dealing with NULL pointers, so all bets are off, but I wonder what people who expect printf NULL to work expect out of strlen? Does it return 0? Does it crash?”&lt;/li&gt;
&lt;li&gt;So, talloc decides that the system printf is no good, and it should use its own bundled implementation&lt;/li&gt;
&lt;li&gt;“After all the configure testing, eventually the build will fail, because somebody forgot to actually add the replacement object file to the Makefile.”&lt;/li&gt;
&lt;li&gt;“If the replacement function has never been used, that’s hardly reassuring that it is actually better tested than the version we have in libc.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.acumensecurity.net/revisiting-wx-with-openbsd-6-0/" target="_blank" rel="nofollow noopener"&gt;Revisiting W&lt;sup&gt;X&lt;/sup&gt; with OpenBSD 6.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD 6.0 includes enforcement of W&lt;sup&gt;X&lt;/sup&gt; in user-land&lt;/li&gt;
&lt;li&gt;This prevents an application from being able to map a page of memory with both Write and Execute permissions (protecting mmap(2))&lt;/li&gt;
&lt;li&gt;Once mapped a page of memory should not be able to have permissions escalated (protecting mprotect(2))&lt;/li&gt;
&lt;li&gt;OpenBSD 6.0 enforces the strict W&lt;sup&gt;X&lt;/sup&gt; definition, and not the PaX/grsec “once write never execute” type of policy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160901060733" target="_blank" rel="nofollow noopener"&gt;OpenBSD imports a letsencrypt client into the base system&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve mentioned letskencrypt before (A native C version of the letsencrypt client, developed by Kristaps).&lt;/li&gt;
&lt;li&gt;Looks like it’s undergoing a name-change to “acme-client” and has made it’s way into OpenBSD’s base system!&lt;/li&gt;
&lt;li&gt;This should ensure first-class support for management of Let’s Encrypt certificates, here’s hoping the portable version continues to thrive as well.&lt;/li&gt;
&lt;li&gt;Congrats to Kristaps!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.openbsd.org/lyrics.html#60f" target="_blank" rel="nofollow noopener"&gt;OpenBSD: Release Songs 6.0: "Goodbye" -- no more CD releases&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://nanxiao.gitbooks.io/freebsd-101-hacks/content/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 101 Hacks&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2016-08-20/libressl-enabled-default" target="_blank" rel="nofollow noopener"&gt;LibreSSL enabled by default in HardenedBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-August/624241.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD removes last bits of 32-bit Linux emulation and has no plans to implement 64-bit linux emulation&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/phessler/status/771277693090467840" target="_blank" rel="nofollow noopener"&gt;OpenBSD has sent 32bit sparc to the great bitbucket in the sky&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://slexy.org/view/s2hm4HBkb2" target="_blank" rel="nofollow noopener"&gt;Front Range BSD User Group September Meeting&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://knoxbug.org/content/going-with-the-flow" target="_blank" rel="nofollow noopener"&gt;KnoxBug TrueOS Wrap-up&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/mVK8G1Vr" target="_blank" rel="nofollow noopener"&gt; Cody - TrueOS Questions &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/xsUNUfCS" target="_blank" rel="nofollow noopener"&gt; John - FreeNAS Backups&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/nHkWuNkm" target="_blank" rel="nofollow noopener"&gt; Herminio - PowerPC + OpenBSD &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/NAh7r6Ed" target="_blank" rel="nofollow noopener"&gt; Dennis - pmake vs bmake&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/8HaK7yJ6" target="_blank" rel="nofollow noopener"&gt; Al - Upgrade conflicts&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we’ll be talking to Diane Bruce about using it for Ham Radio Enthusiasts, the RPi3 and much more! That plus all the latest news from the week,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.trueos.org/2016/09/01/pc-bsd-evolves-into-trueos/" rel="nofollow">PC-BSD is now TrueOS</a></h3>

<ul>
<li>If you’ve been watching this show the past few months, I’ve been dropping little hints about the upcoming rename of PC-BSD -&gt; TrueOS. We’ve made that more official finally, and are asking folks to test out the software before a wider announcement this fall.</li>
<li>For those wondering about the name change, it’s been something discussed over the past few years at different times. With us beginning to move more aggressively with changes for 11.0 (and eventually 12-CURRENT), the time seemed right to have a fresh start, using it as a spring-board to introduce all the changes in both software, and development / release model.</li>
<li>I’ll be discussing more about this shift in a talk at MeetBSD2016 (Another reason for you to go), but here’s some of the highlights.</li>
<li>No longer tied to specific FreeBSD point-releases, TrueOS will instead follow a rolling-release model based upon FreeBSD -CURRENT.</li>
<li>Special tooling and features (Such as boot-environments) make this a feasible option that we didn’t have as easily in the early days of PC-BSD.</li>
<li>In addition, TrueOS builds some things different from vanilla FreeBSD. Specifically Matt Macy’s DRM and Linux Compat work, LibreSSL directly in base, built from External Toolchain (No clang in base system package) and much more. </li>
<li>New tools have have replaced, and are in the process of replacing the legacy PC-BSD control panel as well, which allows remote operation, either via Qt GUI, or WebSockets / REST API’s. </li>
<li>I’ll be talking about more as things unfold, but for now please feel free to test and let us have feedback while we push towards a more stable release.
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2016/08/the-voicemail-scammers-never-got-past.html" rel="nofollow">The Voicemail Scammers Never Got Past Our OpenBSD Greylisting</a></h3>

<ul>
<li>Peter Hansteen (That grumpy BSD guy) gives us an interesting look at how their OpenBSD grey-listing prevented spam from ever making it to their inbox.</li>
<li>Specifically it looks like it occurred during Aug 23rd and 24th, with a particularly nasty ransomware payload destined to play havoc with Windows systems.</li>
<li>Peter then walks us through their three-server mail setup, and how spamd is run in greylisting mode on each.</li>
<li>The results? Nothing short of perfection:
   &gt; “From those sources we can see that there were a total of 386 hosts that attempted delivery, to a total of 396 host and target email pairs (annotated here in a .csv file 
with geographic origin according to whois). The interesting part came when I started looking at the mail server logs to see how many had reached the content filtering or had even been passed on in the direction of users&#39; mailboxes. There were none. The number of messages purportedly from voicemail@ in any of the domains we handle that made it even to the content filtering stage was 0. Zero. Not a single one made it through even to content filtering.”</li>
<li>Not bad at all! Looks like spam-trap addresses + grey-listing is the way to go for stopping this kind of foolishness. Checkout Peter’s blog post for more details, but perhaps this will encourage you to setup a similar-type system for your business.
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2016/08/freebsd-on-tiny-system-whats-missing.html" rel="nofollow">FreeBSD on a tiny system; what’s missing</a></h3>

<ul>
<li>Adrian Chadd talks about some of the bits that are missing to make FreeBSD truly useful on small embedded devices</li>
<li>Some of this stuff can be done now, but requires more work than it should</li>
<li>“The first is a lack of real service management. FreeBSD doesn&#39;t have a service management daemon - the framework assumes that daemons implement their own background and monitoring. It would be much nicer if init or something similar to init could manage services and start/restart them where appropriate.”</li>
<li>Of course, on a system with 32mb of memory, such a service manager would need to be very light weight</li>
<li>“maybe I want to only start telnetd or dropbear/sshd whenever a connection comes in. But I&#39;d also like to be able to add services for monitoring, such as dnsmasq and hostapd.”</li>
<li>telnetd and sshd can be run from inetd, but often depend on special support from the daemon</li>
<li>“The next is a lack of suitable syslog daemon. Yes, I&#39;d like to be able to log some messages locally - even if it&#39;s only a couple hundred kilobytes of messages. I&#39;d also like to be able to push messages to a remote service. Unfortunately the FreeBSD syslog daemon doesn&#39;t do log rotation or maximum log file sizes itself - it&#39;s done by &quot;newsyslog&quot; which runs out of cron. This isn&#39;t any good for real embedded systems with limited storage.”</li>
<li>Syslog leaves much to be desired, especially in its configuration syntax, and filtering capabilities. Having it be able to detect with log files have grown beyond a reasonable size and fire off newsyslog would be very interesting</li>
<li>“Then yes, there&#39;s a lack of a cron service. It&#39;d be nice to have that integrated into the service management framework so things could be easily added/removed. I may just use cron, but that means cron is also always running which adds memory footprint (~1.3 megabytes) for something that is almost never actually active. When you have 32MB of RAM, that&#39;s quite a bit of wasted memory.”</li>
<li>Systems have come back full circle, to where 32MB and 64MB are amounts of memory people expect to work with, while other people still want the system to perform well with 32 or 64 GB of memory</li>
<li>It will be interesting to see how this balancing act plays out, trying to make the same codebase useful for extremely small and extremely large systems at the same time, while also running it on your middle of the road laptop.
***</li>
</ul>

<h3><a href="https://blog.filippo.io/so-i-lost-my-openbsd-fde-password/" rel="nofollow">So I lost my OpenBSD FDE password </a></h3>

<ul>
<li>“The other day I set up a new OpenBSD instance with a nice RAID array, encrypted with Full Disk Encryption. And promptly proceeded to forget part of the passphrase.”</li>
<li>So they started a little project</li>
<li>Goal: “We need to extract enough info from the encrypted disk and rebuild enough of the decryption algorithm to be able to rapidly try many passphrases.”</li>
<li>The post walks through how they reverse engineered the encryption system from the source code and a hexdump of a small encrypted memory disk</li>
<li>“Now that we know how to extract the data and how to try passphrases against it, it will be trivial to write a bruteforce tool to recover the part of passphrase I forgot.”</li>
<li>So, rather than having to try every possible passphrase, they only had to try fuzzing around the known keyword that was their passphrase.</li>
<li>“UPDATE: I found it! After fixing a bug or two in the brute force tool and almost losing hope, it found the right combination of forgotten word and (Italian) misspelling.”</li>
<li>This work lead to the author recommending that OpenBSD consider <a href="http://marc.info/?l=openbsd-tech&m=147316661717410&w=2" rel="nofollow">strengthening the key derivation algorithm</a> used in its FDE.</li>
<li>Rather than using a fixed number of rounds (8000 currently), do a small benchmark and determine how much work can be done in a reasonable amount of time</li>
<li>This is what FreeBSD’s GELI FDE does, targeting ‘over 2 million microseconds’ of work. On my desktop i5-3570 this results in 974842 rounds. The number will likely not be the same twice because of minor variations in how long it will take in microseconds.
***</li>
</ul>

<h2>Interview - Diane Bruce - <a href="mailto:db@freebsd.org" rel="nofollow">db@freebsd.org</a>  / <a href="https://twitter.com/Dianora_1" rel="nofollow">@Dianora_1</a></h2>

<p>Ham Radio, RPi3 and more!</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2739" rel="nofollow">See Me <sub><sup>(Michael W. Lucas)</sup></sub> in 2016</a></h3>

<ul>
<li>Looking for a chance to interact with author Michael W Lucas in meat-space? (That sounds wrong)</li>
<li>If so, he has posted a list of the up-coming conferences he’ll be speaking at, starting with Ohio LinuxFest Oct 7-8, where he’ll be giving an introduction to ZFS talk.</li>
<li>Nov 8th, he’ll also be at MUG (Michigan User Group) giving a PAM talk.</li>
<li>Sadly, no MeetBSD for Michael this year [moment of silence], but if you are able to make it to one of the aforementioned gatherings, be sure to bring your books for autographs. We promise he doesn’t bite. Much.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/its-hard-work-printing-nothing" rel="nofollow">It’s hard work printing nothing</a></h3>

<ul>
<li>“It all starts with a bug report to LibreSSL that the openssl tool crashes when it tries to print NULL. This bug doesn’t manifest on OpenBSD because libc will convert NULL strings to ”(null)” when printing. However, this behavior is not required, and as observed, it’s not universal. When snprintf silently accepts NULL, that simply leads to propagating the error.”</li>
<li>“There’s an argument to be made that silly error messages are better than crashing browsers, but stacking layers of sand seems like a poor means of building robust software in the long term.”</li>
<li>“As soon as development for the next release of OpenBSD restarted, some developers began testing a patch that would remove this crutch from printf.”</li>
<li>If you’d like to help with this work, see our call for volunteers from 2 weeks ago: <a href="https://marc.info/?l=openbsd-misc&m=147059272201219&w=2" rel="nofollow">opportunity to help: %s audit in mandoc </a></li>
<li>Of course, immediately things started to complain. The configure script for talloc does a number of checks (check out the additional interesting observations by TedU here)</li>
<li>“The test checking that our snprintf function conforms to the C99 standard actually contains, at a minimum, 3 deviations from the standard. It should say “Checking for non-conformant vsnprintf”.”</li>
<li>“Of course, we’re dealing with NULL pointers, so all bets are off, but I wonder what people who expect printf NULL to work expect out of strlen? Does it return 0? Does it crash?”</li>
<li>So, talloc decides that the system printf is no good, and it should use its own bundled implementation</li>
<li>“After all the configure testing, eventually the build will fail, because somebody forgot to actually add the replacement object file to the Makefile.”</li>
<li>“If the replacement function has never been used, that’s hardly reassuring that it is actually better tested than the version we have in libc.”
***</li>
</ul>

<h3><a href="http://blog.acumensecurity.net/revisiting-wx-with-openbsd-6-0/" rel="nofollow">Revisiting W<sup>X</sup> with OpenBSD 6.0</a></h3>

<ul>
<li>OpenBSD 6.0 includes enforcement of W<sup>X</sup> in user-land</li>
<li>This prevents an application from being able to map a page of memory with both Write and Execute permissions (protecting mmap(2))</li>
<li>Once mapped a page of memory should not be able to have permissions escalated (protecting mprotect(2))</li>
<li>OpenBSD 6.0 enforces the strict W<sup>X</sup> definition, and not the PaX/grsec “once write never execute” type of policy
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160901060733" rel="nofollow">OpenBSD imports a letsencrypt client into the base system</a></h3>

<ul>
<li>We’ve mentioned letskencrypt before (A native C version of the letsencrypt client, developed by Kristaps).</li>
<li>Looks like it’s undergoing a name-change to “acme-client” and has made it’s way into OpenBSD’s base system!</li>
<li>This should ensure first-class support for management of Let’s Encrypt certificates, here’s hoping the portable version continues to thrive as well.</li>
<li>Congrats to Kristaps!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.openbsd.org/lyrics.html#60f" rel="nofollow">OpenBSD: Release Songs 6.0: &quot;Goodbye&quot; -- no more CD releases</a> </p></li>
<li><p><a href="https://nanxiao.gitbooks.io/freebsd-101-hacks/content/" rel="nofollow">FreeBSD 101 Hacks</a></p></li>
<li><p><a href="https://hardenedbsd.org/article/shawn-webb/2016-08-20/libressl-enabled-default" rel="nofollow">LibreSSL enabled by default in HardenedBSD</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-August/624241.html" rel="nofollow">DragonflyBSD removes last bits of 32-bit Linux emulation and has no plans to implement 64-bit linux emulation</a></p></li>
<li><p><a href="https://twitter.com/phessler/status/771277693090467840" rel="nofollow">OpenBSD has sent 32bit sparc to the great bitbucket in the sky</a></p></li>
<li><p><a href="http://slexy.org/view/s2hm4HBkb2" rel="nofollow">Front Range BSD User Group September Meeting</a></p></li>
<li><p><a href="http://knoxbug.org/content/going-with-the-flow" rel="nofollow">KnoxBug TrueOS Wrap-up</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/mVK8G1Vr" rel="nofollow"> Cody - TrueOS Questions </a> </li>
<li><a href="http://pastebin.com/xsUNUfCS" rel="nofollow"> John - FreeNAS Backups</a> </li>
<li><a href="http://pastebin.com/nHkWuNkm" rel="nofollow"> Herminio - PowerPC + OpenBSD </a> </li>
<li><a href="http://pastebin.com/NAh7r6Ed" rel="nofollow"> Dennis - pmake vs bmake</a> </li>
<li><a href="http://pastebin.com/8HaK7yJ6" rel="nofollow"> Al - Upgrade conflicts</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we’ll be talking to Diane Bruce about using it for Ham Radio Enthusiasts, the RPi3 and much more! That plus all the latest news from the week,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.trueos.org/2016/09/01/pc-bsd-evolves-into-trueos/" rel="nofollow">PC-BSD is now TrueOS</a></h3>

<ul>
<li>If you’ve been watching this show the past few months, I’ve been dropping little hints about the upcoming rename of PC-BSD -&gt; TrueOS. We’ve made that more official finally, and are asking folks to test out the software before a wider announcement this fall.</li>
<li>For those wondering about the name change, it’s been something discussed over the past few years at different times. With us beginning to move more aggressively with changes for 11.0 (and eventually 12-CURRENT), the time seemed right to have a fresh start, using it as a spring-board to introduce all the changes in both software, and development / release model.</li>
<li>I’ll be discussing more about this shift in a talk at MeetBSD2016 (Another reason for you to go), but here’s some of the highlights.</li>
<li>No longer tied to specific FreeBSD point-releases, TrueOS will instead follow a rolling-release model based upon FreeBSD -CURRENT.</li>
<li>Special tooling and features (Such as boot-environments) make this a feasible option that we didn’t have as easily in the early days of PC-BSD.</li>
<li>In addition, TrueOS builds some things different from vanilla FreeBSD. Specifically Matt Macy’s DRM and Linux Compat work, LibreSSL directly in base, built from External Toolchain (No clang in base system package) and much more. </li>
<li>New tools have have replaced, and are in the process of replacing the legacy PC-BSD control panel as well, which allows remote operation, either via Qt GUI, or WebSockets / REST API’s. </li>
<li>I’ll be talking about more as things unfold, but for now please feel free to test and let us have feedback while we push towards a more stable release.
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2016/08/the-voicemail-scammers-never-got-past.html" rel="nofollow">The Voicemail Scammers Never Got Past Our OpenBSD Greylisting</a></h3>

<ul>
<li>Peter Hansteen (That grumpy BSD guy) gives us an interesting look at how their OpenBSD grey-listing prevented spam from ever making it to their inbox.</li>
<li>Specifically it looks like it occurred during Aug 23rd and 24th, with a particularly nasty ransomware payload destined to play havoc with Windows systems.</li>
<li>Peter then walks us through their three-server mail setup, and how spamd is run in greylisting mode on each.</li>
<li>The results? Nothing short of perfection:
   &gt; “From those sources we can see that there were a total of 386 hosts that attempted delivery, to a total of 396 host and target email pairs (annotated here in a .csv file 
with geographic origin according to whois). The interesting part came when I started looking at the mail server logs to see how many had reached the content filtering or had even been passed on in the direction of users&#39; mailboxes. There were none. The number of messages purportedly from voicemail@ in any of the domains we handle that made it even to the content filtering stage was 0. Zero. Not a single one made it through even to content filtering.”</li>
<li>Not bad at all! Looks like spam-trap addresses + grey-listing is the way to go for stopping this kind of foolishness. Checkout Peter’s blog post for more details, but perhaps this will encourage you to setup a similar-type system for your business.
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2016/08/freebsd-on-tiny-system-whats-missing.html" rel="nofollow">FreeBSD on a tiny system; what’s missing</a></h3>

<ul>
<li>Adrian Chadd talks about some of the bits that are missing to make FreeBSD truly useful on small embedded devices</li>
<li>Some of this stuff can be done now, but requires more work than it should</li>
<li>“The first is a lack of real service management. FreeBSD doesn&#39;t have a service management daemon - the framework assumes that daemons implement their own background and monitoring. It would be much nicer if init or something similar to init could manage services and start/restart them where appropriate.”</li>
<li>Of course, on a system with 32mb of memory, such a service manager would need to be very light weight</li>
<li>“maybe I want to only start telnetd or dropbear/sshd whenever a connection comes in. But I&#39;d also like to be able to add services for monitoring, such as dnsmasq and hostapd.”</li>
<li>telnetd and sshd can be run from inetd, but often depend on special support from the daemon</li>
<li>“The next is a lack of suitable syslog daemon. Yes, I&#39;d like to be able to log some messages locally - even if it&#39;s only a couple hundred kilobytes of messages. I&#39;d also like to be able to push messages to a remote service. Unfortunately the FreeBSD syslog daemon doesn&#39;t do log rotation or maximum log file sizes itself - it&#39;s done by &quot;newsyslog&quot; which runs out of cron. This isn&#39;t any good for real embedded systems with limited storage.”</li>
<li>Syslog leaves much to be desired, especially in its configuration syntax, and filtering capabilities. Having it be able to detect with log files have grown beyond a reasonable size and fire off newsyslog would be very interesting</li>
<li>“Then yes, there&#39;s a lack of a cron service. It&#39;d be nice to have that integrated into the service management framework so things could be easily added/removed. I may just use cron, but that means cron is also always running which adds memory footprint (~1.3 megabytes) for something that is almost never actually active. When you have 32MB of RAM, that&#39;s quite a bit of wasted memory.”</li>
<li>Systems have come back full circle, to where 32MB and 64MB are amounts of memory people expect to work with, while other people still want the system to perform well with 32 or 64 GB of memory</li>
<li>It will be interesting to see how this balancing act plays out, trying to make the same codebase useful for extremely small and extremely large systems at the same time, while also running it on your middle of the road laptop.
***</li>
</ul>

<h3><a href="https://blog.filippo.io/so-i-lost-my-openbsd-fde-password/" rel="nofollow">So I lost my OpenBSD FDE password </a></h3>

<ul>
<li>“The other day I set up a new OpenBSD instance with a nice RAID array, encrypted with Full Disk Encryption. And promptly proceeded to forget part of the passphrase.”</li>
<li>So they started a little project</li>
<li>Goal: “We need to extract enough info from the encrypted disk and rebuild enough of the decryption algorithm to be able to rapidly try many passphrases.”</li>
<li>The post walks through how they reverse engineered the encryption system from the source code and a hexdump of a small encrypted memory disk</li>
<li>“Now that we know how to extract the data and how to try passphrases against it, it will be trivial to write a bruteforce tool to recover the part of passphrase I forgot.”</li>
<li>So, rather than having to try every possible passphrase, they only had to try fuzzing around the known keyword that was their passphrase.</li>
<li>“UPDATE: I found it! After fixing a bug or two in the brute force tool and almost losing hope, it found the right combination of forgotten word and (Italian) misspelling.”</li>
<li>This work lead to the author recommending that OpenBSD consider <a href="http://marc.info/?l=openbsd-tech&m=147316661717410&w=2" rel="nofollow">strengthening the key derivation algorithm</a> used in its FDE.</li>
<li>Rather than using a fixed number of rounds (8000 currently), do a small benchmark and determine how much work can be done in a reasonable amount of time</li>
<li>This is what FreeBSD’s GELI FDE does, targeting ‘over 2 million microseconds’ of work. On my desktop i5-3570 this results in 974842 rounds. The number will likely not be the same twice because of minor variations in how long it will take in microseconds.
***</li>
</ul>

<h2>Interview - Diane Bruce - <a href="mailto:db@freebsd.org" rel="nofollow">db@freebsd.org</a>  / <a href="https://twitter.com/Dianora_1" rel="nofollow">@Dianora_1</a></h2>

<p>Ham Radio, RPi3 and more!</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2739" rel="nofollow">See Me <sub><sup>(Michael W. Lucas)</sup></sub> in 2016</a></h3>

<ul>
<li>Looking for a chance to interact with author Michael W Lucas in meat-space? (That sounds wrong)</li>
<li>If so, he has posted a list of the up-coming conferences he’ll be speaking at, starting with Ohio LinuxFest Oct 7-8, where he’ll be giving an introduction to ZFS talk.</li>
<li>Nov 8th, he’ll also be at MUG (Michigan User Group) giving a PAM talk.</li>
<li>Sadly, no MeetBSD for Michael this year [moment of silence], but if you are able to make it to one of the aforementioned gatherings, be sure to bring your books for autographs. We promise he doesn’t bite. Much.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/its-hard-work-printing-nothing" rel="nofollow">It’s hard work printing nothing</a></h3>

<ul>
<li>“It all starts with a bug report to LibreSSL that the openssl tool crashes when it tries to print NULL. This bug doesn’t manifest on OpenBSD because libc will convert NULL strings to ”(null)” when printing. However, this behavior is not required, and as observed, it’s not universal. When snprintf silently accepts NULL, that simply leads to propagating the error.”</li>
<li>“There’s an argument to be made that silly error messages are better than crashing browsers, but stacking layers of sand seems like a poor means of building robust software in the long term.”</li>
<li>“As soon as development for the next release of OpenBSD restarted, some developers began testing a patch that would remove this crutch from printf.”</li>
<li>If you’d like to help with this work, see our call for volunteers from 2 weeks ago: <a href="https://marc.info/?l=openbsd-misc&m=147059272201219&w=2" rel="nofollow">opportunity to help: %s audit in mandoc </a></li>
<li>Of course, immediately things started to complain. The configure script for talloc does a number of checks (check out the additional interesting observations by TedU here)</li>
<li>“The test checking that our snprintf function conforms to the C99 standard actually contains, at a minimum, 3 deviations from the standard. It should say “Checking for non-conformant vsnprintf”.”</li>
<li>“Of course, we’re dealing with NULL pointers, so all bets are off, but I wonder what people who expect printf NULL to work expect out of strlen? Does it return 0? Does it crash?”</li>
<li>So, talloc decides that the system printf is no good, and it should use its own bundled implementation</li>
<li>“After all the configure testing, eventually the build will fail, because somebody forgot to actually add the replacement object file to the Makefile.”</li>
<li>“If the replacement function has never been used, that’s hardly reassuring that it is actually better tested than the version we have in libc.”
***</li>
</ul>

<h3><a href="http://blog.acumensecurity.net/revisiting-wx-with-openbsd-6-0/" rel="nofollow">Revisiting W<sup>X</sup> with OpenBSD 6.0</a></h3>

<ul>
<li>OpenBSD 6.0 includes enforcement of W<sup>X</sup> in user-land</li>
<li>This prevents an application from being able to map a page of memory with both Write and Execute permissions (protecting mmap(2))</li>
<li>Once mapped a page of memory should not be able to have permissions escalated (protecting mprotect(2))</li>
<li>OpenBSD 6.0 enforces the strict W<sup>X</sup> definition, and not the PaX/grsec “once write never execute” type of policy
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160901060733" rel="nofollow">OpenBSD imports a letsencrypt client into the base system</a></h3>

<ul>
<li>We’ve mentioned letskencrypt before (A native C version of the letsencrypt client, developed by Kristaps).</li>
<li>Looks like it’s undergoing a name-change to “acme-client” and has made it’s way into OpenBSD’s base system!</li>
<li>This should ensure first-class support for management of Let’s Encrypt certificates, here’s hoping the portable version continues to thrive as well.</li>
<li>Congrats to Kristaps!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.openbsd.org/lyrics.html#60f" rel="nofollow">OpenBSD: Release Songs 6.0: &quot;Goodbye&quot; -- no more CD releases</a> </p></li>
<li><p><a href="https://nanxiao.gitbooks.io/freebsd-101-hacks/content/" rel="nofollow">FreeBSD 101 Hacks</a></p></li>
<li><p><a href="https://hardenedbsd.org/article/shawn-webb/2016-08-20/libressl-enabled-default" rel="nofollow">LibreSSL enabled by default in HardenedBSD</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-August/624241.html" rel="nofollow">DragonflyBSD removes last bits of 32-bit Linux emulation and has no plans to implement 64-bit linux emulation</a></p></li>
<li><p><a href="https://twitter.com/phessler/status/771277693090467840" rel="nofollow">OpenBSD has sent 32bit sparc to the great bitbucket in the sky</a></p></li>
<li><p><a href="http://slexy.org/view/s2hm4HBkb2" rel="nofollow">Front Range BSD User Group September Meeting</a></p></li>
<li><p><a href="http://knoxbug.org/content/going-with-the-flow" rel="nofollow">KnoxBug TrueOS Wrap-up</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/mVK8G1Vr" rel="nofollow"> Cody - TrueOS Questions </a> </li>
<li><a href="http://pastebin.com/xsUNUfCS" rel="nofollow"> John - FreeNAS Backups</a> </li>
<li><a href="http://pastebin.com/nHkWuNkm" rel="nofollow"> Herminio - PowerPC + OpenBSD </a> </li>
<li><a href="http://pastebin.com/NAh7r6Ed" rel="nofollow"> Dennis - pmake vs bmake</a> </li>
<li><a href="http://pastebin.com/8HaK7yJ6" rel="nofollow"> Al - Upgrade conflicts</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>157: ZFS, The “Universal” File-system</title>
  <link>https://www.bsdnow.tv/157</link>
  <guid isPermaLink="false">b05374fc-d22e-4b78-9784-6e23162191ef</guid>
  <pubDate>Wed, 31 Aug 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b05374fc-d22e-4b78-9784-6e23162191ef.mp3" length="59546452" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we have an interview with Richard Yao, who will be telling us about the experience and challenges of porting ZFS to Linux. That plus the latest news and feedback is coming your way, on your place</itunes:subtitle>
  <itunes:duration>1:22:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we have an interview with Richard Yao, who will be telling us about the experience and challenges of porting ZFS to Linux. That plus the latest news and feedback is coming your way, on your place&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;Registration for MeetBSD 2016 is now Open &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“Beastie’s coming home!” This year, MeetBSD will be held at UC Berkeley’s Clark Kerr Campus&lt;/li&gt;
&lt;li&gt;November 11th and 12th, preceded by a two day FreeBSD Vendor/Dev Summit (Nov 9th and 10th)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; MeetBSD can be traced back to its humble roots as a local workshop for BSD developers and users, hosted annually in Poland since 2004. Since then, MeetBSD’s popularity has spread, and it’s now widely recognized as its own conference with participants from all over the world.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The US version runs every two years in California since 2008, and now trades off with the east coast vBSDCon which runs on the odd years.&lt;/li&gt;
&lt;li&gt;“MeetBSD 2016 uses a mixed unConference format featuring both scheduled talks and community-driven events such as birds-of-a-feather meetings, lightning talks, hackable presentations, stump the chumps, and speed geeking sessions. Speakers are to be determined – stay tuned for more information!”&lt;/li&gt;
&lt;li&gt;Register before September 30th, and get $30 off&lt;/li&gt;
&lt;li&gt;Kris and I will be there, along with lots of other FreeBSD Developers, Vendors, and Users.&lt;/li&gt;
&lt;li&gt;MeetBSD’s unconference style does a very good job of mingling users with developers and is one of my favourite conferences.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://kev009.com/wp/2016/07/freebsd-uefi-root-on-zfs-and-windows-dual-boot/" target="_blank" rel="nofollow noopener"&gt;Dual Booting FreeBSD and Windows UEFI&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking to install FreeBSD alongside Windows 10? What happens if that that system is pre-installed and UEFI? Well you could run TrueOS, but if that isn’t your bag and you want vanilla FreeBSD we have you covered this week!&lt;/li&gt;
&lt;li&gt;Over on Kevin Bowling’s blog, we have a detailed article showing exactly how to do that.&lt;/li&gt;
&lt;li&gt;First up, as prep you’ll need to go into the Windows disk manager and shrink your existing NTFS partition.&lt;/li&gt;
&lt;li&gt;You’ll need to next boot FreeBSD 11 or later.&lt;/li&gt;
&lt;li&gt;From there the walkthrough takes us through disk partitioning using gpart, and setup of ZFS into a boot-environment friendly layout.&lt;/li&gt;
&lt;li&gt;Once you get through the typical FreeBSD setup / extraction, the tutorial gives us a nice bonus, showing how to setup “rEFInd” for a graphical boot-menu. &lt;/li&gt;
&lt;li&gt;A great walkthrough, and hopefully it encourages others to try out dual-booting “EFI-style”.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/ewwhite/zfs-ha/wiki" target="_blank" rel="nofollow noopener"&gt;ZFS High-Availability NAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Interested in a DiY HA ZFS NAS? Edmund White (ewwhite on github) has posted a very detailed look at how he has custom-rolled his own Linux + ZFS + HA setup.&lt;/li&gt;
&lt;li&gt;Most of the concepts are already ones used in various other HA products, but it is interesting and informative to see a public detailed look at how ZFS and HA works.&lt;/li&gt;
&lt;li&gt;In particular this setup require some very specific hardware, such as dual-port SAS drives, so you will have to pre-plan according.&lt;/li&gt;
&lt;li&gt;The only bummer is this is a ZFS on Linux setup. Maybe this can serve as the guide / inspiration for somebody in our community to do their own FreeBSD + HA + ZFS setup and blog about it in similar detail.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://chyves.org/" target="_blank" rel="nofollow noopener"&gt;First public release of chyves - version 0.1.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As bhyve continues to mature we are seeing tooling evolve around it. Enter ‘chyves’ which started life as a fork of iohyve.&lt;/li&gt;
&lt;li&gt;We are looking to do an interview with the author in the near future, but we still want to bring you some of the new features / changes in this evolution of bhyve management.&lt;/li&gt;
&lt;li&gt;First up, nearly every function from iohyve has either been re-written in part or full.&lt;/li&gt;
&lt;li&gt;Among the new features, a full logging system (master and per-vm logs), multiple pool configurations, properties stored outside of ZFS (for speed) and self-upgrading. (Will that work with pkg’d version?)&lt;/li&gt;
&lt;li&gt;In addition to the above features, the website has a large chart showing the original ‘iohyve’ commands, and how that usage has changed moving to chyves. &lt;/li&gt;
&lt;li&gt;Give it a spin, let the author know of issues!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Richard Yao - &lt;a href="mailto:ryao@gentoo.org" target="_blank" rel="nofollow noopener"&gt;ryao@gentoo.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Sr. Kernel Engineer at ClusterHQ - Major Contributor to ZFS on Linux&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.freebsd.org/pipermail/freebsd-hackers/2016-July/049740.html" target="_blank" rel="nofollow noopener"&gt;ZFS Deadlock: 'Directory of Death'&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A user reports that when they try to install npm (the Node.js package manager), their system deadlocks&lt;/li&gt;
&lt;li&gt;It turns out, this was also hitting the FreeBSD package building machines&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=209158" target="_blank" rel="nofollow noopener"&gt;PR 209158 &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The problem was a race condition in the way renames are handled in the FreeBSD VFS vs how ZFS does them internally&lt;/li&gt;
&lt;li&gt;This bug has existed since the original import of ZFS, but some other change caused it to happen much more frequently&lt;/li&gt;
&lt;li&gt;“ZFS POSIX Layer is originally written for Solaris VFS which is very different from FreeBSD VFS.  Most importantly many things that FreeBSD VFS manages on behalf of all filesystems are implemented in ZPL in a different Way. Thus, ZPL contains code that is redundant on FreeBSD or duplicates VFS functionality or, in the worst cases, badly interacts / interferes with VFS.”&lt;/li&gt;
&lt;li&gt;“The most prominent problem is a deadlock caused by the lock order reversal of vnode locks that may happen with concurrent zfs_rename() and lookup(). The deadlock is a result of zfs_rename() not observing the vnode locking contract expected by VFS.”&lt;/li&gt;
&lt;li&gt;The fixes have been merged to the 10.x and 11.x branches
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://bsdmag.org/download/implementing-memory-cache-beast-architecture/" target="_blank" rel="nofollow noopener"&gt;New BSD Magazine out (2016-07)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Articles include: Implementing in-memory cache in the BeaST architecture, Docker Cleanup, FreeNAS Getting Started Guide, and starting at the very beginning with open source&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsdmag.org/download/minix-3-free-open-source-operating-system-highly-reliable-flexible-secure/" target="_blank" rel="nofollow noopener"&gt;The August issue is also out &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;This issue features two articles about MINIX 3, continues the FreeNAS getting started guide, Optimizes the in-memory cache for the BeaST architecture, and talks about fixing failed ports for Hardened and LibreBSD&lt;/li&gt;
&lt;li&gt;We hope to have an interview with the creator of the BeaST architecture in the coming weeks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-July/270796.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD and UEFI&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve featured a few stories and walkthroughs about using UEFI to dual-boot BSD, and now its Dragonfly BSD’s turn.&lt;/li&gt;
&lt;li&gt;Dave McFarlane writes into the DF mailing lists, telling us about the specific steps taken to get UEFI installed and boot-strapped on his system.&lt;/li&gt;
&lt;li&gt;If you’ve done a FreeBSD manual UEFI install, the process looks very similar, but you will end up manually running ‘gpt’ to create partitions, installing dist files, and eventually installing boot1.efi into the FAT EFI partition.&lt;/li&gt;
&lt;li&gt;Dave also ran into an issue with resulted in no /etc/fstab being present, and helpfully includes what his system needed to fully boot hammer properly.&lt;/li&gt;
&lt;li&gt;Somebody should document this fully for DFLY, since I would expect to become more commonplace as commodity hardware is shipped with UEFI on by default.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://techblog.netflix.com/2016/08/netflix-and-fill.html" target="_blank" rel="nofollow noopener"&gt;Netflix and Fill &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Netflix team has produced a technical blog post describing how their OpenConnect appliances work&lt;/li&gt;
&lt;li&gt;First the content is received from the content provider, and the Netflix content team makes it ready for deployment, by transcoding the various bitrates, packaging the subtitles, etc.&lt;/li&gt;
&lt;li&gt;The finished files are then pushed to Amazon S3 storage&lt;/li&gt;
&lt;li&gt;“We deploy the majority of our updates proactively during configured fill windows. An important difference between our OpenConnect CDN and other commercial CDNs is the concept of proactive caching. Because we can predict with high accuracy what our members will watch and what time of day they will watch it, we can make use of non-peak bandwidth to download most of the content updates to the OCAs in our network during these configurable time windows. By reducing disk reads (content serving) while we are performing disk writes (adding new content to the OCAs), we are able to optimize our disk efficiency by avoiding read/write contention. The predictability of off-peak traffic patterns helps with this optimization, but we still only have a finite amount of time every day to get our content pre-positioned to where it needs to be before our traffic starts to ramp up and we want to make all of the OCA capacity available for content serving.”&lt;/li&gt;
&lt;li&gt;The OCA may actually contain more than one copy of the same video, because each disk in the OCA is independent, storing the same video on two different disks will provide twice the available read bandwidth&lt;/li&gt;
&lt;li&gt;Normally the filesystem cache would obviate the need for this, but the Netflix OCA has so much storage, and not a lot of memory, and the requests from users are offset enough that the cache is useless&lt;/li&gt;
&lt;li&gt;“OCAs communicate at regular intervals with the control plane services, requesting (among other things) a manifest file that contains the list of titles they should be storing and serving to members. If there is a delta between the list of titles in the manifest and what they are currently storing, each OCA will send a request, during its configured fill window, that includes a list of the new or updated titles that it needs. The response from the control plane in AWS is a ranked list of potential download locations, aka fill sources, for each title.”&lt;/li&gt;
&lt;li&gt;“It would be inefficient, in terms of both time and cost, to distribute a title directly from S3 to all of our OCAs, so we use a tiered approach. The goal is to ensure that the title is passed from one part of our network to another using the most efficient route possible.”&lt;/li&gt;
&lt;li&gt;The article then goes on to explain how they calculate the least cost filling source&lt;/li&gt;
&lt;li&gt;“Now that Netflix operates in 190 countries and we have thousands of appliances embedded within many ISP networks around the world, we are even more obsessed with making sure that our OCAs get the latest content as quickly as possible while continuing to minimize bandwidth cost to our ISP partners.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits:&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2734" target="_blank" rel="nofollow noopener"&gt;Cover reveal for “PAM Mastery”&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://libertybsd.net/download.html" target="_blank" rel="nofollow noopener"&gt;LibertyBSD 5.9 is out - looking for mirrors&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://web.stanford.edu/class/cs124/lec/124-UnixForPoets.pdf" target="_blank" rel="nofollow noopener"&gt;Unix for Poets&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ksq0rfph" target="_blank" rel="nofollow noopener"&gt; Chuck / Ingo - Get Involved&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/YqzcHEMg" target="_blank" rel="nofollow noopener"&gt; Oskar - Thanks&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/WvdVZbYc" target="_blank" rel="nofollow noopener"&gt; Alex - SMF&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/JPWgzSGv" target="_blank" rel="nofollow noopener"&gt; Raymond - RPI3&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we have an interview with Richard Yao, who will be telling us about the experience and challenges of porting ZFS to Linux. That plus the latest news and feedback is coming your way, on your place</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" <br>
/></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Registration for MeetBSD 2016 is now Open </a></h3>

<ul>
<li>“Beastie’s coming home!” This year, MeetBSD will be held at UC Berkeley’s Clark Kerr Campus</li>
<li>November 11th and 12th, preceded by a two day FreeBSD Vendor/Dev Summit (Nov 9th and 10th)</li>
</ul>

<blockquote>
<p>MeetBSD can be traced back to its humble roots as a local workshop for BSD developers and users, hosted annually in Poland since 2004. Since then, MeetBSD’s popularity has spread, and it’s now widely recognized as its own conference with participants from all over the world.</p>
</blockquote>

<ul>
<li>The US version runs every two years in California since 2008, and now trades off with the east coast vBSDCon which runs on the odd years.</li>
<li>“MeetBSD 2016 uses a mixed unConference format featuring both scheduled talks and community-driven events such as birds-of-a-feather meetings, lightning talks, hackable presentations, stump the chumps, and speed geeking sessions. Speakers are to be determined – stay tuned for more information!”</li>
<li>Register before September 30th, and get $30 off</li>
<li>Kris and I will be there, along with lots of other FreeBSD Developers, Vendors, and Users.</li>
<li>MeetBSD’s unconference style does a very good job of mingling users with developers and is one of my favourite conferences.
***</li>
</ul>

<h3><a href="http://kev009.com/wp/2016/07/freebsd-uefi-root-on-zfs-and-windows-dual-boot/" rel="nofollow">Dual Booting FreeBSD and Windows UEFI</a></h3>

<ul>
<li>Looking to install FreeBSD alongside Windows 10? What happens if that that system is pre-installed and UEFI? Well you could run TrueOS, but if that isn’t your bag and you want vanilla FreeBSD we have you covered this week!</li>
<li>Over on Kevin Bowling’s blog, we have a detailed article showing exactly how to do that.</li>
<li>First up, as prep you’ll need to go into the Windows disk manager and shrink your existing NTFS partition.</li>
<li>You’ll need to next boot FreeBSD 11 or later.</li>
<li>From there the walkthrough takes us through disk partitioning using gpart, and setup of ZFS into a boot-environment friendly layout.</li>
<li>Once you get through the typical FreeBSD setup / extraction, the tutorial gives us a nice bonus, showing how to setup “rEFInd” for a graphical boot-menu. </li>
<li>A great walkthrough, and hopefully it encourages others to try out dual-booting “EFI-style”.
***</li>
</ul>

<h3><a href="https://github.com/ewwhite/zfs-ha/wiki" rel="nofollow">ZFS High-Availability NAS</a></h3>

<ul>
<li>Interested in a DiY HA ZFS NAS? Edmund White (ewwhite on github) has posted a very detailed look at how he has custom-rolled his own Linux + ZFS + HA setup.</li>
<li>Most of the concepts are already ones used in various other HA products, but it is interesting and informative to see a public detailed look at how ZFS and HA works.</li>
<li>In particular this setup require some very specific hardware, such as dual-port SAS drives, so you will have to pre-plan according.</li>
<li>The only bummer is this is a ZFS on Linux setup. Maybe this can serve as the guide / inspiration for somebody in our community to do their own FreeBSD + HA + ZFS setup and blog about it in similar detail.
***</li>
</ul>

<h3><a href="http://chyves.org/" rel="nofollow">First public release of chyves - version 0.1.0</a></h3>

<ul>
<li>As bhyve continues to mature we are seeing tooling evolve around it. Enter ‘chyves’ which started life as a fork of iohyve.</li>
<li>We are looking to do an interview with the author in the near future, but we still want to bring you some of the new features / changes in this evolution of bhyve management.</li>
<li>First up, nearly every function from iohyve has either been re-written in part or full.</li>
<li>Among the new features, a full logging system (master and per-vm logs), multiple pool configurations, properties stored outside of ZFS (for speed) and self-upgrading. (Will that work with pkg’d version?)</li>
<li>In addition to the above features, the website has a large chart showing the original ‘iohyve’ commands, and how that usage has changed moving to chyves. </li>
<li>Give it a spin, let the author know of issues!
***</li>
</ul>

<h2>Interview - Richard Yao - <a href="mailto:ryao@gentoo.org" rel="nofollow">ryao@gentoo.org</a></h2>

<p>Sr. Kernel Engineer at ClusterHQ - Major Contributor to ZFS on Linux</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.freebsd.org/pipermail/freebsd-hackers/2016-July/049740.html" rel="nofollow">ZFS Deadlock: &#39;Directory of Death&#39;</a></h3>

<ul>
<li>A user reports that when they try to install npm (the Node.js package manager), their system deadlocks</li>
<li>It turns out, this was also hitting the FreeBSD package building machines</li>
<li><a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=209158" rel="nofollow">PR 209158 </a> </li>
<li>The problem was a race condition in the way renames are handled in the FreeBSD VFS vs how ZFS does them internally</li>
<li>This bug has existed since the original import of ZFS, but some other change caused it to happen much more frequently</li>
<li>“ZFS POSIX Layer is originally written for Solaris VFS which is very different from FreeBSD VFS.  Most importantly many things that FreeBSD VFS manages on behalf of all filesystems are implemented in ZPL in a different Way. Thus, ZPL contains code that is redundant on FreeBSD or duplicates VFS functionality or, in the worst cases, badly interacts / interferes with VFS.”</li>
<li>“The most prominent problem is a deadlock caused by the lock order reversal of vnode locks that may happen with concurrent zfs_rename() and lookup(). The deadlock is a result of zfs_rename() not observing the vnode locking contract expected by VFS.”</li>
<li>The fixes have been merged to the 10.x and 11.x branches
***</li>
</ul>

<h3><a href="https://bsdmag.org/download/implementing-memory-cache-beast-architecture/" rel="nofollow">New BSD Magazine out (2016-07)</a></h3>

<ul>
<li>Articles include: Implementing in-memory cache in the BeaST architecture, Docker Cleanup, FreeNAS Getting Started Guide, and starting at the very beginning with open source</li>
<li><a href="https://bsdmag.org/download/minix-3-free-open-source-operating-system-highly-reliable-flexible-secure/" rel="nofollow">The August issue is also out </a></li>
<li>This issue features two articles about MINIX 3, continues the FreeNAS getting started guide, Optimizes the in-memory cache for the BeaST architecture, and talks about fixing failed ports for Hardened and LibreBSD</li>
<li>We hope to have an interview with the creator of the BeaST architecture in the coming weeks
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-July/270796.html" rel="nofollow">DragonflyBSD and UEFI</a></h3>

<ul>
<li>We’ve featured a few stories and walkthroughs about using UEFI to dual-boot BSD, and now its Dragonfly BSD’s turn.</li>
<li>Dave McFarlane writes into the DF mailing lists, telling us about the specific steps taken to get UEFI installed and boot-strapped on his system.</li>
<li>If you’ve done a FreeBSD manual UEFI install, the process looks very similar, but you will end up manually running ‘gpt’ to create partitions, installing dist files, and eventually installing boot1.efi into the FAT EFI partition.</li>
<li>Dave also ran into an issue with resulted in no /etc/fstab being present, and helpfully includes what his system needed to fully boot hammer properly.</li>
<li>Somebody should document this fully for DFLY, since I would expect to become more commonplace as commodity hardware is shipped with UEFI on by default.
***</li>
</ul>

<h3><a href="http://techblog.netflix.com/2016/08/netflix-and-fill.html" rel="nofollow">Netflix and Fill </a></h3>

<ul>
<li>The Netflix team has produced a technical blog post describing how their OpenConnect appliances work</li>
<li>First the content is received from the content provider, and the Netflix content team makes it ready for deployment, by transcoding the various bitrates, packaging the subtitles, etc.</li>
<li>The finished files are then pushed to Amazon S3 storage</li>
<li>“We deploy the majority of our updates proactively during configured fill windows. An important difference between our OpenConnect CDN and other commercial CDNs is the concept of proactive caching. Because we can predict with high accuracy what our members will watch and what time of day they will watch it, we can make use of non-peak bandwidth to download most of the content updates to the OCAs in our network during these configurable time windows. By reducing disk reads (content serving) while we are performing disk writes (adding new content to the OCAs), we are able to optimize our disk efficiency by avoiding read/write contention. The predictability of off-peak traffic patterns helps with this optimization, but we still only have a finite amount of time every day to get our content pre-positioned to where it needs to be before our traffic starts to ramp up and we want to make all of the OCA capacity available for content serving.”</li>
<li>The OCA may actually contain more than one copy of the same video, because each disk in the OCA is independent, storing the same video on two different disks will provide twice the available read bandwidth</li>
<li>Normally the filesystem cache would obviate the need for this, but the Netflix OCA has so much storage, and not a lot of memory, and the requests from users are offset enough that the cache is useless</li>
<li>“OCAs communicate at regular intervals with the control plane services, requesting (among other things) a manifest file that contains the list of titles they should be storing and serving to members. If there is a delta between the list of titles in the manifest and what they are currently storing, each OCA will send a request, during its configured fill window, that includes a list of the new or updated titles that it needs. The response from the control plane in AWS is a ranked list of potential download locations, aka fill sources, for each title.”</li>
<li>“It would be inefficient, in terms of both time and cost, to distribute a title directly from S3 to all of our OCAs, so we use a tiered approach. The goal is to ensure that the title is passed from one part of our network to another using the most efficient route possible.”</li>
<li>The article then goes on to explain how they calculate the least cost filling source</li>
<li>“Now that Netflix operates in 190 countries and we have thousands of appliances embedded within many ISP networks around the world, we are even more obsessed with making sure that our OCAs get the latest content as quickly as possible while continuing to minimize bandwidth cost to our ISP partners.”
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><a href="http://blather.michaelwlucas.com/archives/2734" rel="nofollow">Cover reveal for “PAM Mastery”</a></li>
<li><a href="http://libertybsd.net/download.html" rel="nofollow">LibertyBSD 5.9 is out - looking for mirrors</a></li>
<li><a href="https://web.stanford.edu/class/cs124/lec/124-UnixForPoets.pdf" rel="nofollow">Unix for Poets</a></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ksq0rfph" rel="nofollow"> Chuck / Ingo - Get Involved</a> </li>
<li><a href="http://pastebin.com/YqzcHEMg" rel="nofollow"> Oskar - Thanks</a> </li>
<li><a href="http://pastebin.com/WvdVZbYc" rel="nofollow"> Alex - SMF</a> </li>
<li><a href="http://pastebin.com/JPWgzSGv" rel="nofollow"> Raymond - RPI3</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we have an interview with Richard Yao, who will be telling us about the experience and challenges of porting ZFS to Linux. That plus the latest news and feedback is coming your way, on your place</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" <br>
/></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Registration for MeetBSD 2016 is now Open </a></h3>

<ul>
<li>“Beastie’s coming home!” This year, MeetBSD will be held at UC Berkeley’s Clark Kerr Campus</li>
<li>November 11th and 12th, preceded by a two day FreeBSD Vendor/Dev Summit (Nov 9th and 10th)</li>
</ul>

<blockquote>
<p>MeetBSD can be traced back to its humble roots as a local workshop for BSD developers and users, hosted annually in Poland since 2004. Since then, MeetBSD’s popularity has spread, and it’s now widely recognized as its own conference with participants from all over the world.</p>
</blockquote>

<ul>
<li>The US version runs every two years in California since 2008, and now trades off with the east coast vBSDCon which runs on the odd years.</li>
<li>“MeetBSD 2016 uses a mixed unConference format featuring both scheduled talks and community-driven events such as birds-of-a-feather meetings, lightning talks, hackable presentations, stump the chumps, and speed geeking sessions. Speakers are to be determined – stay tuned for more information!”</li>
<li>Register before September 30th, and get $30 off</li>
<li>Kris and I will be there, along with lots of other FreeBSD Developers, Vendors, and Users.</li>
<li>MeetBSD’s unconference style does a very good job of mingling users with developers and is one of my favourite conferences.
***</li>
</ul>

<h3><a href="http://kev009.com/wp/2016/07/freebsd-uefi-root-on-zfs-and-windows-dual-boot/" rel="nofollow">Dual Booting FreeBSD and Windows UEFI</a></h3>

<ul>
<li>Looking to install FreeBSD alongside Windows 10? What happens if that that system is pre-installed and UEFI? Well you could run TrueOS, but if that isn’t your bag and you want vanilla FreeBSD we have you covered this week!</li>
<li>Over on Kevin Bowling’s blog, we have a detailed article showing exactly how to do that.</li>
<li>First up, as prep you’ll need to go into the Windows disk manager and shrink your existing NTFS partition.</li>
<li>You’ll need to next boot FreeBSD 11 or later.</li>
<li>From there the walkthrough takes us through disk partitioning using gpart, and setup of ZFS into a boot-environment friendly layout.</li>
<li>Once you get through the typical FreeBSD setup / extraction, the tutorial gives us a nice bonus, showing how to setup “rEFInd” for a graphical boot-menu. </li>
<li>A great walkthrough, and hopefully it encourages others to try out dual-booting “EFI-style”.
***</li>
</ul>

<h3><a href="https://github.com/ewwhite/zfs-ha/wiki" rel="nofollow">ZFS High-Availability NAS</a></h3>

<ul>
<li>Interested in a DiY HA ZFS NAS? Edmund White (ewwhite on github) has posted a very detailed look at how he has custom-rolled his own Linux + ZFS + HA setup.</li>
<li>Most of the concepts are already ones used in various other HA products, but it is interesting and informative to see a public detailed look at how ZFS and HA works.</li>
<li>In particular this setup require some very specific hardware, such as dual-port SAS drives, so you will have to pre-plan according.</li>
<li>The only bummer is this is a ZFS on Linux setup. Maybe this can serve as the guide / inspiration for somebody in our community to do their own FreeBSD + HA + ZFS setup and blog about it in similar detail.
***</li>
</ul>

<h3><a href="http://chyves.org/" rel="nofollow">First public release of chyves - version 0.1.0</a></h3>

<ul>
<li>As bhyve continues to mature we are seeing tooling evolve around it. Enter ‘chyves’ which started life as a fork of iohyve.</li>
<li>We are looking to do an interview with the author in the near future, but we still want to bring you some of the new features / changes in this evolution of bhyve management.</li>
<li>First up, nearly every function from iohyve has either been re-written in part or full.</li>
<li>Among the new features, a full logging system (master and per-vm logs), multiple pool configurations, properties stored outside of ZFS (for speed) and self-upgrading. (Will that work with pkg’d version?)</li>
<li>In addition to the above features, the website has a large chart showing the original ‘iohyve’ commands, and how that usage has changed moving to chyves. </li>
<li>Give it a spin, let the author know of issues!
***</li>
</ul>

<h2>Interview - Richard Yao - <a href="mailto:ryao@gentoo.org" rel="nofollow">ryao@gentoo.org</a></h2>

<p>Sr. Kernel Engineer at ClusterHQ - Major Contributor to ZFS on Linux</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.freebsd.org/pipermail/freebsd-hackers/2016-July/049740.html" rel="nofollow">ZFS Deadlock: &#39;Directory of Death&#39;</a></h3>

<ul>
<li>A user reports that when they try to install npm (the Node.js package manager), their system deadlocks</li>
<li>It turns out, this was also hitting the FreeBSD package building machines</li>
<li><a href="https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=209158" rel="nofollow">PR 209158 </a> </li>
<li>The problem was a race condition in the way renames are handled in the FreeBSD VFS vs how ZFS does them internally</li>
<li>This bug has existed since the original import of ZFS, but some other change caused it to happen much more frequently</li>
<li>“ZFS POSIX Layer is originally written for Solaris VFS which is very different from FreeBSD VFS.  Most importantly many things that FreeBSD VFS manages on behalf of all filesystems are implemented in ZPL in a different Way. Thus, ZPL contains code that is redundant on FreeBSD or duplicates VFS functionality or, in the worst cases, badly interacts / interferes with VFS.”</li>
<li>“The most prominent problem is a deadlock caused by the lock order reversal of vnode locks that may happen with concurrent zfs_rename() and lookup(). The deadlock is a result of zfs_rename() not observing the vnode locking contract expected by VFS.”</li>
<li>The fixes have been merged to the 10.x and 11.x branches
***</li>
</ul>

<h3><a href="https://bsdmag.org/download/implementing-memory-cache-beast-architecture/" rel="nofollow">New BSD Magazine out (2016-07)</a></h3>

<ul>
<li>Articles include: Implementing in-memory cache in the BeaST architecture, Docker Cleanup, FreeNAS Getting Started Guide, and starting at the very beginning with open source</li>
<li><a href="https://bsdmag.org/download/minix-3-free-open-source-operating-system-highly-reliable-flexible-secure/" rel="nofollow">The August issue is also out </a></li>
<li>This issue features two articles about MINIX 3, continues the FreeNAS getting started guide, Optimizes the in-memory cache for the BeaST architecture, and talks about fixing failed ports for Hardened and LibreBSD</li>
<li>We hope to have an interview with the creator of the BeaST architecture in the coming weeks
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-July/270796.html" rel="nofollow">DragonflyBSD and UEFI</a></h3>

<ul>
<li>We’ve featured a few stories and walkthroughs about using UEFI to dual-boot BSD, and now its Dragonfly BSD’s turn.</li>
<li>Dave McFarlane writes into the DF mailing lists, telling us about the specific steps taken to get UEFI installed and boot-strapped on his system.</li>
<li>If you’ve done a FreeBSD manual UEFI install, the process looks very similar, but you will end up manually running ‘gpt’ to create partitions, installing dist files, and eventually installing boot1.efi into the FAT EFI partition.</li>
<li>Dave also ran into an issue with resulted in no /etc/fstab being present, and helpfully includes what his system needed to fully boot hammer properly.</li>
<li>Somebody should document this fully for DFLY, since I would expect to become more commonplace as commodity hardware is shipped with UEFI on by default.
***</li>
</ul>

<h3><a href="http://techblog.netflix.com/2016/08/netflix-and-fill.html" rel="nofollow">Netflix and Fill </a></h3>

<ul>
<li>The Netflix team has produced a technical blog post describing how their OpenConnect appliances work</li>
<li>First the content is received from the content provider, and the Netflix content team makes it ready for deployment, by transcoding the various bitrates, packaging the subtitles, etc.</li>
<li>The finished files are then pushed to Amazon S3 storage</li>
<li>“We deploy the majority of our updates proactively during configured fill windows. An important difference between our OpenConnect CDN and other commercial CDNs is the concept of proactive caching. Because we can predict with high accuracy what our members will watch and what time of day they will watch it, we can make use of non-peak bandwidth to download most of the content updates to the OCAs in our network during these configurable time windows. By reducing disk reads (content serving) while we are performing disk writes (adding new content to the OCAs), we are able to optimize our disk efficiency by avoiding read/write contention. The predictability of off-peak traffic patterns helps with this optimization, but we still only have a finite amount of time every day to get our content pre-positioned to where it needs to be before our traffic starts to ramp up and we want to make all of the OCA capacity available for content serving.”</li>
<li>The OCA may actually contain more than one copy of the same video, because each disk in the OCA is independent, storing the same video on two different disks will provide twice the available read bandwidth</li>
<li>Normally the filesystem cache would obviate the need for this, but the Netflix OCA has so much storage, and not a lot of memory, and the requests from users are offset enough that the cache is useless</li>
<li>“OCAs communicate at regular intervals with the control plane services, requesting (among other things) a manifest file that contains the list of titles they should be storing and serving to members. If there is a delta between the list of titles in the manifest and what they are currently storing, each OCA will send a request, during its configured fill window, that includes a list of the new or updated titles that it needs. The response from the control plane in AWS is a ranked list of potential download locations, aka fill sources, for each title.”</li>
<li>“It would be inefficient, in terms of both time and cost, to distribute a title directly from S3 to all of our OCAs, so we use a tiered approach. The goal is to ensure that the title is passed from one part of our network to another using the most efficient route possible.”</li>
<li>The article then goes on to explain how they calculate the least cost filling source</li>
<li>“Now that Netflix operates in 190 countries and we have thousands of appliances embedded within many ISP networks around the world, we are even more obsessed with making sure that our OCAs get the latest content as quickly as possible while continuing to minimize bandwidth cost to our ISP partners.”
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><a href="http://blather.michaelwlucas.com/archives/2734" rel="nofollow">Cover reveal for “PAM Mastery”</a></li>
<li><a href="http://libertybsd.net/download.html" rel="nofollow">LibertyBSD 5.9 is out - looking for mirrors</a></li>
<li><a href="https://web.stanford.edu/class/cs124/lec/124-UnixForPoets.pdf" rel="nofollow">Unix for Poets</a></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ksq0rfph" rel="nofollow"> Chuck / Ingo - Get Involved</a> </li>
<li><a href="http://pastebin.com/YqzcHEMg" rel="nofollow"> Oskar - Thanks</a> </li>
<li><a href="http://pastebin.com/WvdVZbYc" rel="nofollow"> Alex - SMF</a> </li>
<li><a href="http://pastebin.com/JPWgzSGv" rel="nofollow"> Raymond - RPI3</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>155: Cabling up FreeBSD</title>
  <link>https://www.bsdnow.tv/155</link>
  <guid isPermaLink="false">fba64561-1dc0-4be9-8f98-99ed69324e02</guid>
  <pubDate>Wed, 17 Aug 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/fba64561-1dc0-4be9-8f98-99ed69324e02.mp3" length="84693460" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, Allen is away in the UK (For BSDCam), but we still have a full episode for you! Don’t miss our interview with</itunes:subtitle>
  <itunes:duration>1:57:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, Allen is away in the UK (For BSDCam), but we still have a full episode for you! Don’t miss our interview with&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://zinascii.com/2016/going-to-joyent.html" target="_blank" rel="nofollow noopener"&gt;My two year journey to becoming an OS Developer &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A blog post by Ryan Zezeski about how he ended doing OS Development instead of working on application&lt;/li&gt;
&lt;li&gt;We have featured his posts before, including &lt;a href="http://zinascii.com/2016/the-illumos-syscall-handler.html" target="_blank" rel="nofollow noopener"&gt;The illumos SYSCALL Handler&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; It started in the summer of 2014: I had just left Basho after 3.5 years of working on Riak, when I decided I wanted to become an OS developer. I purchased Solaris Internals, cloned illumos-gate, fired up cscope, and got to work. I hardly knew any C, x86 might as well have been Brainfuck, and, frankly, I knew shit about operating systems. But I was determined.&lt;br&gt;
&amp;gt; I’ve always learned best by beating my head against something until it makes sense. I’m not a fast learner; I’m persistent. What others have in ability I make up for in effort. And when it comes to OS internals it’s all about work ethic. The more you look, the more you realize it’s just another program. The main difference being: it’s the program all the other programs run on.&lt;br&gt;
&amp;gt; My strategy: to pick something, anything, that looked interesting, and write a post describing how it works. I wrote several of these posts in 2014 and 2015. More important, it put me in touch with Roger Faulkner: the creator of truss(1), the Solaris process model, and the real /proc filesystem. At the time I didn’t like my interaction with Roger. He explained, in what I would later find out to be his typical gruff manner, that I was wrong; so I concluded he is a prick. But over the years I realized that I was being a brat—he was trying to teach me something and I let my ego get in the way. I’ve come to view that interaction as a blessing. I interacted with one of the greats, a mentor of my mentor’s mentor (a Great Great Mentor).&lt;br&gt;
&amp;gt; A couple of weeks later something even more surreal happened, at illumos Day 2014. Bryan Cantrill was the last speaker of the day. One of my mentors and someone I admire greatly. He was there to regale us with the story of Joyent’s resurrection of lx-branded zones: Linux system call emulation on top of the illumos kernel. But before he would do that he decided to speak about me! I couldn’t believe it. I was so overwhelmed that I don’t remember most of what he said. I was too busy flipping shit—Bryan Cantrill is on stage, in front of other kernel developers I look up to, saying my name. I was in a dream. It turns out, unknown to me at the time, that he wrote the POSIX queue code for both Solaris and QNX, which I wrote about. He compared me to the great expository technical writers Elliott Organick and Richard Stevens. And it was at this moment that I knew I could do this: I could become an OS developer.&lt;br&gt;
&amp;gt; Never underestimate the effect kind words can have on someone that looks up to you.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There is a lot more to the story, and it is definitely worth the read&lt;/li&gt;
&lt;li&gt;The story then goes on to talk about his recent run in with Bryan Cantrill
&amp;gt; A week from now my two year journey to become an OS developer comes to an end; and a new chapter begins. I don’t know what specific things I’m going to work on, but I’m sure it will push me to the limit. I look forward to the challenge.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lumina-desktop.org/version-1-0-0-released/" target="_blank" rel="nofollow noopener"&gt;Version 1.0 of the Lumina Desktop released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After 4 years of development, Lumina Desktop has now hit version 1.0!&lt;/li&gt;
&lt;li&gt;This release brings with it a slew of new features and support:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; + Completely customizable interface! Rather than having to learn how to use a new layout, change the desktop to suit you instead!&lt;br&gt;
&amp;gt; + Simple shortcuts for any application! The “favorites” system makes it easy to find and launch applications at any time.&lt;br&gt;
&amp;gt; + Extremely lightweight! Allows applications to utilize more of your system hardware and revitalizes older systems!&lt;br&gt;
&amp;gt; + Multiple-monitor support! Each monitor is treated as an independent entity – making it great for presentation systems which use a temporary monitor or for workstations which utilize an array of monitors for various tasks.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;While originally developed on PC-BSD, it already has been ported to a variety of different platforms, including OpenBSD, DragonFly, NetBSD, Debian and Gentoo&lt;/li&gt;
&lt;li&gt;Lumina has become the defacto desktop environment for TrueOS (Formerly PC-BSD), and looks like will provide a solid framework to continue growing desktop features.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160804200232" target="_blank" rel="nofollow noopener"&gt;n2k16 hackathon report: Ken Westerback on dhclient, bridges, routing and more&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Next up, we have a report from Ken Westerback talking about the recent OpenBSD hackathon in Prague&lt;/li&gt;
&lt;li&gt;He starts by telling us about the work in bpf:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;First order of business, stsp@'s weird setup involving bridges and multiple dhclient clients. A bit of bpf(4) programming to restrict dhclient to handling ethernet packets unicast to its interface worked. Cool. Unfortunately it turned out some lazy dhcp servers always use ethernet broadcasts just because some lesser, non-OpenBSD clients ignore unicast packets until they have configured IP. Classic chicken and egg. So this was backed out just before 6.0. Sigh.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Next up, he talks about an idea he had on the flight over, specifically with regard to how DHCP leases are stored, and how keeping the SSID information with them could speed up re-connection times, by only trying leases for current SSID’s connected. After a day or so of hacking, it was working! However for $REASONS it was shelved for post 6.0, bummer! &lt;/li&gt;
&lt;li&gt; He then discusses an on-going project with Peter Hessler on passing along relevant PIDs in response to routing messages generated by kernel from ioctl events. This is something they’ve been hacking at, in order to allow dhclient to recognize its own routing messages. Sounds like they are both still works-in-progress.&lt;/li&gt;
&lt;li&gt;However, Ken did get something in for 6.0:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Diving back into dhclient code I discovered that in situations where multiple offers were received the unused offers were not being declined and discarded. Despite a clear comment saying that's what was being done! Thus dhclient might gradually use up more and more memory. And possibly be retrying offers that should have been discarded. The fix for this did make 6.0! Yay!&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.usenix.org/memoriam-roger-faulkner" target="_blank" rel="nofollow noopener"&gt;In Memoriam Roger Faulkner &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;USENIX has re-released Roger Faulkner’s original paper on /proc as a free download&lt;/li&gt;
&lt;li&gt;The UNIX community recently lost one of its original pioneers, Roger Faulkner, whom one commenter described as “The godfather of post-AT&amp;amp;T UNIX”&lt;/li&gt;
&lt;li&gt;In his memory, the USENIX group as re-released his original paper on the /proc file-system from 1991.&lt;/li&gt;
&lt;li&gt;Roger worked in many area’s of UNIX, however the process file system /proc was his special baby.&lt;/li&gt;
&lt;li&gt;“/proc began as a debugger interface superseding ptrace(2) but has evolved into a general interface to the process model.”&lt;/li&gt;
&lt;li&gt;The original /proc only had a file for each process, not a directory. "Data may be transferred from or to any valid locations in the process's address space by applying lseek(2) to position the file at the virtual address of interest followed by read(2) or write(2)."&lt;/li&gt;
&lt;li&gt;Processes could be controlled using IOCTLs on the file&lt;/li&gt;
&lt;li&gt;&lt;p&gt;As the USENIX article states:&lt;br&gt;
&amp;gt; Roger believed that terrible things were sometimes required to create beautiful abstractions, and his trailblazing work on /proc embodies this burden: the innards may be delicate and nasty ("vile," as Roger might say in his distinguished Carolinian accent)—but the resulting abstractions are breathtaking in their power, scope and robustness.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;RIP Roger, and thanks for the wonderful UNIX legacy you’ve left us all.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Myke Geiger - &lt;a href="mailto:myke@servernorth.net" target="_blank" rel="nofollow noopener"&gt;myke@servernorth.net&lt;/a&gt; / &lt;a href="https://twitter.com/mWare" target="_blank" rel="nofollow noopener"&gt;@mWare&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Using FreeBSD at a DSL/Cable ISP
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/freebsd/comments/4vxnw3/new_options_in_bsdinstall_some_sysctls_and/" target="_blank" rel="nofollow noopener"&gt;New options in bsdinstall - some sysctls and date/time settings&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;bsdinstall in FreeBSD 11.0 will feature a number of new menus.&lt;/li&gt;
&lt;li&gt;The first, well allow you to set the date and time. Often on computers that have been in storage, or some embedded type devices that have no RTC, the date will be wildly wrong, and ntpd will refuse to run until the date is correctly set. This feature makes it easy to enter the date and time using dialog(1)&lt;/li&gt;
&lt;li&gt;The second menu, inspired by the existing ‘services’ menu, offers a number of ‘hardening’ options&lt;/li&gt;
&lt;li&gt;This menu allows users to easily enable a number of security features, including:

&lt;ul&gt;
&lt;li&gt;Hide processes running as other users/groups&lt;/li&gt;
&lt;li&gt;Disable reading the kernel message buffer and debugging processes for unprivileged users&lt;/li&gt;
&lt;li&gt;Randomize the PID of newly created processes&lt;/li&gt;
&lt;li&gt;Enable the stack guard&lt;/li&gt;
&lt;li&gt;Erase /tmp at boot&lt;/li&gt;
&lt;li&gt;Disable remote syslog&lt;/li&gt;
&lt;li&gt;Disable sendmail&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;All of these options are off by default, so that an install done with the installer will be the same as an install from source, or an upgrade.&lt;/li&gt;
&lt;li&gt;A number of these options are candidates to become on-by-default in the future, so the hope is that this menu will get more users to test these features and find any negative interactions with applications or general use, so they can be fixed.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.netbsd.org/%7Emartin/rawrite32/" target="_blank" rel="nofollow noopener"&gt;Rawrite32: the NetBSD image writing tool&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Martin of the NetBSD project has released a new version of his USB imaging tool, rawrite32&lt;/li&gt;
&lt;li&gt;For those who’ve not used this tool before, it is a Windows Application that allows writing NetBSD images directly to USB media (other other disk media)&lt;/li&gt;
&lt;li&gt;This update brings with it support for writing .xz file, and binary signing&lt;/li&gt;
&lt;li&gt;This may come in handy for writing other OS images to memory sticks as well, especially for those locked into a windows environment who need to 
switch.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/j-keck/zfs-snap-diff" target="_blank" rel="nofollow noopener"&gt;ZFS-Snap-Diff -- A pretty interface for viewing what changed after a ZFS snapshot &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There are lots of nice little utilities to help create and maintain your ZFS snapshots. However today we have something unique to look at, ‘zfs-snap-diff’.&lt;/li&gt;
&lt;li&gt;What makes it unique, is that it ships with a built-in golang / angularjs GUI for snapshot management&lt;/li&gt;
&lt;li&gt;It looks very powerful, including a built-in diff utility, so you can even see the changes in text-files, in addition to downloading files, restoring old versions and more.&lt;/li&gt;
&lt;li&gt;Its nice to see so many ZFS utilities starting to take off, and evolve file-management further.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.joyent.com/about/events/2016/dtrace-conf" target="_blank" rel="nofollow noopener"&gt;Dtrace Conf 2016 Event Videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The videos from Dtrace.conf 2016 have been posted&lt;/li&gt;
&lt;li&gt;Some highlights:

&lt;ul&gt;
&lt;li&gt;Useful DTrace Intro&lt;/li&gt;
&lt;li&gt;CTF Everywhere&lt;/li&gt;
&lt;li&gt;Distributed DTrace&lt;/li&gt;
&lt;li&gt;DTrace for Apps&lt;/li&gt;
&lt;li&gt;DTrace json() subroutine&lt;/li&gt;
&lt;li&gt;Implementing (or not) fds[] in FreeBSD&lt;/li&gt;
&lt;li&gt;OpenDTrace&lt;/li&gt;
&lt;li&gt;DTrace performance improvements with always-on instrumentation&lt;/li&gt;
&lt;li&gt;D Syntactic Sugar&lt;/li&gt;
&lt;li&gt;DTrace and Go, DTrace and Postgres&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.joyent.com/blog/dtrace-conf-16-wrap-up" target="_blank" rel="nofollow noopener"&gt;dtrace.conf(16) wrap-up by Bryan Cantrill&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; Once again, it was an eclectic mix of technologists — and once again, the day got kicked off with me providing an introduction to dtrace.conf and its history. (Just to save you the time filling out your Cantrill Presentation Bingo Card: you can find me punching myself at 16:19, me offering unsolicited personal medical history at 20:11, and me getting trolled by unikernels at 38:25.)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The next DTrace.conf isn’t until 2020
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.reddit.com/r/BSD/comments/4vngmw/the_bsd_daemon_feature_in_mexican_candy_packaging/" target="_blank" rel="nofollow noopener"&gt;The BSD Daemon features in Mexican candy packaging&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-August/624202.html" target="_blank" rel="nofollow noopener"&gt;Remove PG_ZERO and zeroidle (page-zeroing) entirely&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.openbsd.org/lyrics.html#60b" target="_blank" rel="nofollow noopener"&gt;OpenBSD: Release Songs: 6.0: "Black Hat"&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://satterly.neocities.org/openbsd_games.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD Gaming Resource&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://bsdsec.net/articles/libressl-2-4-2-and-2-3-7-released" target="_blank" rel="nofollow noopener"&gt;LibreSSL 2.4.2 and 2.3.7 Released&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/LJcJmNsR" target="_blank" rel="nofollow noopener"&gt; Pedja - Bhyve GUI &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/259x94Rh" target="_blank" rel="nofollow noopener"&gt; Tim - Jail Management&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/A86yHnzz" target="_blank" rel="nofollow noopener"&gt; Don - X260 &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/wjtcuVSA" target="_blank" rel="nofollow noopener"&gt; David - Updates&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/DgH9G7p5" target="_blank" rel="nofollow noopener"&gt; Ghislain - Jail Management&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, Allen is away in the UK (For BSDCam), but we still have a full episode for you! Don’t miss our interview with</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://zinascii.com/2016/going-to-joyent.html" rel="nofollow">My two year journey to becoming an OS Developer </a></h3>

<ul>
<li>A blog post by Ryan Zezeski about how he ended doing OS Development instead of working on application</li>
<li>We have featured his posts before, including <a href="http://zinascii.com/2016/the-illumos-syscall-handler.html" rel="nofollow">The illumos SYSCALL Handler</a></li>
</ul>

<blockquote>
<p>It started in the summer of 2014: I had just left Basho after 3.5 years of working on Riak, when I decided I wanted to become an OS developer. I purchased Solaris Internals, cloned illumos-gate, fired up cscope, and got to work. I hardly knew any C, x86 might as well have been Brainfuck, and, frankly, I knew shit about operating systems. But I was determined.<br>
I’ve always learned best by beating my head against something until it makes sense. I’m not a fast learner; I’m persistent. What others have in ability I make up for in effort. And when it comes to OS internals it’s all about work ethic. The more you look, the more you realize it’s just another program. The main difference being: it’s the program all the other programs run on.<br>
My strategy: to pick something, anything, that looked interesting, and write a post describing how it works. I wrote several of these posts in 2014 and 2015. More important, it put me in touch with Roger Faulkner: the creator of truss(1), the Solaris process model, and the real /proc filesystem. At the time I didn’t like my interaction with Roger. He explained, in what I would later find out to be his typical gruff manner, that I was wrong; so I concluded he is a prick. But over the years I realized that I was being a brat—he was trying to teach me something and I let my ego get in the way. I’ve come to view that interaction as a blessing. I interacted with one of the greats, a mentor of my mentor’s mentor (a Great Great Mentor).<br>
A couple of weeks later something even more surreal happened, at illumos Day 2014. Bryan Cantrill was the last speaker of the day. One of my mentors and someone I admire greatly. He was there to regale us with the story of Joyent’s resurrection of lx-branded zones: Linux system call emulation on top of the illumos kernel. But before he would do that he decided to speak about me! I couldn’t believe it. I was so overwhelmed that I don’t remember most of what he said. I was too busy flipping shit—Bryan Cantrill is on stage, in front of other kernel developers I look up to, saying my name. I was in a dream. It turns out, unknown to me at the time, that he wrote the POSIX queue code for both Solaris and QNX, which I wrote about. He compared me to the great expository technical writers Elliott Organick and Richard Stevens. And it was at this moment that I knew I could do this: I could become an OS developer.<br>
Never underestimate the effect kind words can have on someone that looks up to you.</p>
</blockquote>

<ul>
<li>There is a lot more to the story, and it is definitely worth the read</li>
<li>The story then goes on to talk about his recent run in with Bryan Cantrill
&gt; A week from now my two year journey to become an OS developer comes to an end; and a new chapter begins. I don’t know what specific things I’m going to work on, but I’m sure it will push me to the limit. I look forward to the challenge.
***</li>
</ul>

<h3><a href="https://lumina-desktop.org/version-1-0-0-released/" rel="nofollow">Version 1.0 of the Lumina Desktop released</a></h3>

<ul>
<li>After 4 years of development, Lumina Desktop has now hit version 1.0!</li>
<li>This release brings with it a slew of new features and support:</li>
</ul>

<blockquote>
<ul>
<li>Completely customizable interface! Rather than having to learn how to use a new layout, change the desktop to suit you instead!</li>
<li>Simple shortcuts for any application! The “favorites” system makes it easy to find and launch applications at any time.</li>
<li>Extremely lightweight! Allows applications to utilize more of your system hardware and revitalizes older systems!</li>
<li>Multiple-monitor support! Each monitor is treated as an independent entity – making it great for presentation systems which use a temporary monitor or for workstations which utilize an array of monitors for various tasks.</li>
</ul>
</blockquote>

<ul>
<li>While originally developed on PC-BSD, it already has been ported to a variety of different platforms, including OpenBSD, DragonFly, NetBSD, Debian and Gentoo</li>
<li>Lumina has become the defacto desktop environment for TrueOS (Formerly PC-BSD), and looks like will provide a solid framework to continue growing desktop features.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160804200232" rel="nofollow">n2k16 hackathon report: Ken Westerback on dhclient, bridges, routing and more</a></h3>

<ul>
<li>Next up, we have a report from Ken Westerback talking about the recent OpenBSD hackathon in Prague</li>
<li>He starts by telling us about the work in bpf:</li>
</ul>

<blockquote>
<p>First order of business, stsp@&#39;s weird setup involving bridges and multiple dhclient clients. A bit of bpf(4) programming to restrict dhclient to handling ethernet packets unicast to its interface worked. Cool. Unfortunately it turned out some lazy dhcp servers always use ethernet broadcasts just because some lesser, non-OpenBSD clients ignore unicast packets until they have configured IP. Classic chicken and egg. So this was backed out just before 6.0. Sigh.</p>
</blockquote>

<ul>
<li>Next up, he talks about an idea he had on the flight over, specifically with regard to how DHCP leases are stored, and how keeping the SSID information with them could speed up re-connection times, by only trying leases for current SSID’s connected. After a day or so of hacking, it was working! However for $REASONS it was shelved for post 6.0, bummer! </li>
<li> He then discusses an on-going project with Peter Hessler on passing along relevant PIDs in response to routing messages generated by kernel from ioctl events. This is something they’ve been hacking at, in order to allow dhclient to recognize its own routing messages. Sounds like they are both still works-in-progress.</li>
<li>However, Ken did get something in for 6.0:</li>
</ul>

<blockquote>
<p>Diving back into dhclient code I discovered that in situations where multiple offers were received the unused offers were not being declined and discarded. Despite a clear comment saying that&#39;s what was being done! Thus dhclient might gradually use up more and more memory. And possibly be retrying offers that should have been discarded. The fix for this did make 6.0! Yay!</p>
</blockquote>

<hr>

<h3><a href="https://www.usenix.org/memoriam-roger-faulkner" rel="nofollow">In Memoriam Roger Faulkner </a></h3>

<ul>
<li>USENIX has re-released Roger Faulkner’s original paper on /proc as a free download</li>
<li>The UNIX community recently lost one of its original pioneers, Roger Faulkner, whom one commenter described as “The godfather of post-AT&amp;T UNIX”</li>
<li>In his memory, the USENIX group as re-released his original paper on the /proc file-system from 1991.</li>
<li>Roger worked in many area’s of UNIX, however the process file system /proc was his special baby.</li>
<li>“/proc began as a debugger interface superseding ptrace(2) but has evolved into a general interface to the process model.”</li>
<li>The original /proc only had a file for each process, not a directory. &quot;Data may be transferred from or to any valid locations in the process&#39;s address space by applying lseek(2) to position the file at the virtual address of interest followed by read(2) or write(2).&quot;</li>
<li>Processes could be controlled using IOCTLs on the file</li>
<li><p>As the USENIX article states:</p>

<blockquote>
<p>Roger believed that terrible things were sometimes required to create beautiful abstractions, and his trailblazing work on /proc embodies this burden: the innards may be delicate and nasty (&quot;vile,&quot; as Roger might say in his distinguished Carolinian accent)—but the resulting abstractions are breathtaking in their power, scope and robustness.</p>
</blockquote></li>
<li><p>RIP Roger, and thanks for the wonderful UNIX legacy you’ve left us all.</p>

<hr></li>
</ul>

<h2>Interview - Myke Geiger - <a href="mailto:myke@servernorth.net" rel="nofollow">myke@servernorth.net</a> / <a href="https://twitter.com/mWare" rel="nofollow">@mWare</a></h2>

<ul>
<li>Using FreeBSD at a DSL/Cable ISP
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/4vxnw3/new_options_in_bsdinstall_some_sysctls_and/" rel="nofollow">New options in bsdinstall - some sysctls and date/time settings</a></h3>

<ul>
<li>bsdinstall in FreeBSD 11.0 will feature a number of new menus.</li>
<li>The first, well allow you to set the date and time. Often on computers that have been in storage, or some embedded type devices that have no RTC, the date will be wildly wrong, and ntpd will refuse to run until the date is correctly set. This feature makes it easy to enter the date and time using dialog(1)</li>
<li>The second menu, inspired by the existing ‘services’ menu, offers a number of ‘hardening’ options</li>
<li>This menu allows users to easily enable a number of security features, including:

<ul>
<li>Hide processes running as other users/groups</li>
<li>Disable reading the kernel message buffer and debugging processes for unprivileged users</li>
<li>Randomize the PID of newly created processes</li>
<li>Enable the stack guard</li>
<li>Erase /tmp at boot</li>
<li>Disable remote syslog</li>
<li>Disable sendmail</li>
</ul></li>
<li>All of these options are off by default, so that an install done with the installer will be the same as an install from source, or an upgrade.</li>
<li>A number of these options are candidates to become on-by-default in the future, so the hope is that this menu will get more users to test these features and find any negative interactions with applications or general use, so they can be fixed.
***</li>
</ul>

<h3><a href="https://www.netbsd.org/%7Emartin/rawrite32/" rel="nofollow">Rawrite32: the NetBSD image writing tool</a></h3>

<ul>
<li>Martin of the NetBSD project has released a new version of his USB imaging tool, rawrite32</li>
<li>For those who’ve not used this tool before, it is a Windows Application that allows writing NetBSD images directly to USB media (other other disk media)</li>
<li>This update brings with it support for writing .xz file, and binary signing</li>
<li>This may come in handy for writing other OS images to memory sticks as well, especially for those locked into a windows environment who need to 
switch.
***</li>
</ul>

<h3><a href="https://github.com/j-keck/zfs-snap-diff" rel="nofollow">ZFS-Snap-Diff -- A pretty interface for viewing what changed after a ZFS snapshot </a></h3>

<ul>
<li>There are lots of nice little utilities to help create and maintain your ZFS snapshots. However today we have something unique to look at, ‘zfs-snap-diff’.</li>
<li>What makes it unique, is that it ships with a built-in golang / angularjs GUI for snapshot management</li>
<li>It looks very powerful, including a built-in diff utility, so you can even see the changes in text-files, in addition to downloading files, restoring old versions and more.</li>
<li>Its nice to see so many ZFS utilities starting to take off, and evolve file-management further.
***</li>
</ul>

<h3><a href="https://www.joyent.com/about/events/2016/dtrace-conf" rel="nofollow">Dtrace Conf 2016 Event Videos</a></h3>

<ul>
<li>The videos from Dtrace.conf 2016 have been posted</li>
<li>Some highlights:

<ul>
<li>Useful DTrace Intro</li>
<li>CTF Everywhere</li>
<li>Distributed DTrace</li>
<li>DTrace for Apps</li>
<li>DTrace json() subroutine</li>
<li>Implementing (or not) fds[] in FreeBSD</li>
<li>OpenDTrace</li>
<li>DTrace performance improvements with always-on instrumentation</li>
<li>D Syntactic Sugar</li>
<li>DTrace and Go, DTrace and Postgres</li>
</ul></li>
<li><a href="https://www.joyent.com/blog/dtrace-conf-16-wrap-up" rel="nofollow">dtrace.conf(16) wrap-up by Bryan Cantrill</a> </li>
</ul>

<blockquote>
<p>Once again, it was an eclectic mix of technologists — and once again, the day got kicked off with me providing an introduction to dtrace.conf and its history. (Just to save you the time filling out your Cantrill Presentation Bingo Card: you can find me punching myself at 16:19, me offering unsolicited personal medical history at 20:11, and me getting trolled by unikernels at 38:25.)</p>
</blockquote>

<ul>
<li>The next DTrace.conf isn’t until 2020
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.reddit.com/r/BSD/comments/4vngmw/the_bsd_daemon_feature_in_mexican_candy_packaging/" rel="nofollow">The BSD Daemon features in Mexican candy packaging</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-August/624202.html" rel="nofollow">Remove PG_ZERO and zeroidle (page-zeroing) entirely</a></p></li>
<li><p><a href="https://www.openbsd.org/lyrics.html#60b" rel="nofollow">OpenBSD: Release Songs: 6.0: &quot;Black Hat&quot;</a></p></li>
<li><p><a href="http://satterly.neocities.org/openbsd_games.html" rel="nofollow">OpenBSD Gaming Resource</a> </p></li>
<li><p><a href="http://bsdsec.net/articles/libressl-2-4-2-and-2-3-7-released" rel="nofollow">LibreSSL 2.4.2 and 2.3.7 Released</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/LJcJmNsR" rel="nofollow"> Pedja - Bhyve GUI </a> </li>
<li><a href="http://pastebin.com/259x94Rh" rel="nofollow"> Tim - Jail Management</a> </li>
<li><a href="http://pastebin.com/A86yHnzz" rel="nofollow"> Don - X260 </a> </li>
<li><a href="http://pastebin.com/wjtcuVSA" rel="nofollow"> David - Updates</a> </li>
<li><a href="http://pastebin.com/DgH9G7p5" rel="nofollow"> Ghislain - Jail Management</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, Allen is away in the UK (For BSDCam), but we still have a full episode for you! Don’t miss our interview with</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://zinascii.com/2016/going-to-joyent.html" rel="nofollow">My two year journey to becoming an OS Developer </a></h3>

<ul>
<li>A blog post by Ryan Zezeski about how he ended doing OS Development instead of working on application</li>
<li>We have featured his posts before, including <a href="http://zinascii.com/2016/the-illumos-syscall-handler.html" rel="nofollow">The illumos SYSCALL Handler</a></li>
</ul>

<blockquote>
<p>It started in the summer of 2014: I had just left Basho after 3.5 years of working on Riak, when I decided I wanted to become an OS developer. I purchased Solaris Internals, cloned illumos-gate, fired up cscope, and got to work. I hardly knew any C, x86 might as well have been Brainfuck, and, frankly, I knew shit about operating systems. But I was determined.<br>
I’ve always learned best by beating my head against something until it makes sense. I’m not a fast learner; I’m persistent. What others have in ability I make up for in effort. And when it comes to OS internals it’s all about work ethic. The more you look, the more you realize it’s just another program. The main difference being: it’s the program all the other programs run on.<br>
My strategy: to pick something, anything, that looked interesting, and write a post describing how it works. I wrote several of these posts in 2014 and 2015. More important, it put me in touch with Roger Faulkner: the creator of truss(1), the Solaris process model, and the real /proc filesystem. At the time I didn’t like my interaction with Roger. He explained, in what I would later find out to be his typical gruff manner, that I was wrong; so I concluded he is a prick. But over the years I realized that I was being a brat—he was trying to teach me something and I let my ego get in the way. I’ve come to view that interaction as a blessing. I interacted with one of the greats, a mentor of my mentor’s mentor (a Great Great Mentor).<br>
A couple of weeks later something even more surreal happened, at illumos Day 2014. Bryan Cantrill was the last speaker of the day. One of my mentors and someone I admire greatly. He was there to regale us with the story of Joyent’s resurrection of lx-branded zones: Linux system call emulation on top of the illumos kernel. But before he would do that he decided to speak about me! I couldn’t believe it. I was so overwhelmed that I don’t remember most of what he said. I was too busy flipping shit—Bryan Cantrill is on stage, in front of other kernel developers I look up to, saying my name. I was in a dream. It turns out, unknown to me at the time, that he wrote the POSIX queue code for both Solaris and QNX, which I wrote about. He compared me to the great expository technical writers Elliott Organick and Richard Stevens. And it was at this moment that I knew I could do this: I could become an OS developer.<br>
Never underestimate the effect kind words can have on someone that looks up to you.</p>
</blockquote>

<ul>
<li>There is a lot more to the story, and it is definitely worth the read</li>
<li>The story then goes on to talk about his recent run in with Bryan Cantrill
&gt; A week from now my two year journey to become an OS developer comes to an end; and a new chapter begins. I don’t know what specific things I’m going to work on, but I’m sure it will push me to the limit. I look forward to the challenge.
***</li>
</ul>

<h3><a href="https://lumina-desktop.org/version-1-0-0-released/" rel="nofollow">Version 1.0 of the Lumina Desktop released</a></h3>

<ul>
<li>After 4 years of development, Lumina Desktop has now hit version 1.0!</li>
<li>This release brings with it a slew of new features and support:</li>
</ul>

<blockquote>
<ul>
<li>Completely customizable interface! Rather than having to learn how to use a new layout, change the desktop to suit you instead!</li>
<li>Simple shortcuts for any application! The “favorites” system makes it easy to find and launch applications at any time.</li>
<li>Extremely lightweight! Allows applications to utilize more of your system hardware and revitalizes older systems!</li>
<li>Multiple-monitor support! Each monitor is treated as an independent entity – making it great for presentation systems which use a temporary monitor or for workstations which utilize an array of monitors for various tasks.</li>
</ul>
</blockquote>

<ul>
<li>While originally developed on PC-BSD, it already has been ported to a variety of different platforms, including OpenBSD, DragonFly, NetBSD, Debian and Gentoo</li>
<li>Lumina has become the defacto desktop environment for TrueOS (Formerly PC-BSD), and looks like will provide a solid framework to continue growing desktop features.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160804200232" rel="nofollow">n2k16 hackathon report: Ken Westerback on dhclient, bridges, routing and more</a></h3>

<ul>
<li>Next up, we have a report from Ken Westerback talking about the recent OpenBSD hackathon in Prague</li>
<li>He starts by telling us about the work in bpf:</li>
</ul>

<blockquote>
<p>First order of business, stsp@&#39;s weird setup involving bridges and multiple dhclient clients. A bit of bpf(4) programming to restrict dhclient to handling ethernet packets unicast to its interface worked. Cool. Unfortunately it turned out some lazy dhcp servers always use ethernet broadcasts just because some lesser, non-OpenBSD clients ignore unicast packets until they have configured IP. Classic chicken and egg. So this was backed out just before 6.0. Sigh.</p>
</blockquote>

<ul>
<li>Next up, he talks about an idea he had on the flight over, specifically with regard to how DHCP leases are stored, and how keeping the SSID information with them could speed up re-connection times, by only trying leases for current SSID’s connected. After a day or so of hacking, it was working! However for $REASONS it was shelved for post 6.0, bummer! </li>
<li> He then discusses an on-going project with Peter Hessler on passing along relevant PIDs in response to routing messages generated by kernel from ioctl events. This is something they’ve been hacking at, in order to allow dhclient to recognize its own routing messages. Sounds like they are both still works-in-progress.</li>
<li>However, Ken did get something in for 6.0:</li>
</ul>

<blockquote>
<p>Diving back into dhclient code I discovered that in situations where multiple offers were received the unused offers were not being declined and discarded. Despite a clear comment saying that&#39;s what was being done! Thus dhclient might gradually use up more and more memory. And possibly be retrying offers that should have been discarded. The fix for this did make 6.0! Yay!</p>
</blockquote>

<hr>

<h3><a href="https://www.usenix.org/memoriam-roger-faulkner" rel="nofollow">In Memoriam Roger Faulkner </a></h3>

<ul>
<li>USENIX has re-released Roger Faulkner’s original paper on /proc as a free download</li>
<li>The UNIX community recently lost one of its original pioneers, Roger Faulkner, whom one commenter described as “The godfather of post-AT&amp;T UNIX”</li>
<li>In his memory, the USENIX group as re-released his original paper on the /proc file-system from 1991.</li>
<li>Roger worked in many area’s of UNIX, however the process file system /proc was his special baby.</li>
<li>“/proc began as a debugger interface superseding ptrace(2) but has evolved into a general interface to the process model.”</li>
<li>The original /proc only had a file for each process, not a directory. &quot;Data may be transferred from or to any valid locations in the process&#39;s address space by applying lseek(2) to position the file at the virtual address of interest followed by read(2) or write(2).&quot;</li>
<li>Processes could be controlled using IOCTLs on the file</li>
<li><p>As the USENIX article states:</p>

<blockquote>
<p>Roger believed that terrible things were sometimes required to create beautiful abstractions, and his trailblazing work on /proc embodies this burden: the innards may be delicate and nasty (&quot;vile,&quot; as Roger might say in his distinguished Carolinian accent)—but the resulting abstractions are breathtaking in their power, scope and robustness.</p>
</blockquote></li>
<li><p>RIP Roger, and thanks for the wonderful UNIX legacy you’ve left us all.</p>

<hr></li>
</ul>

<h2>Interview - Myke Geiger - <a href="mailto:myke@servernorth.net" rel="nofollow">myke@servernorth.net</a> / <a href="https://twitter.com/mWare" rel="nofollow">@mWare</a></h2>

<ul>
<li>Using FreeBSD at a DSL/Cable ISP
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/4vxnw3/new_options_in_bsdinstall_some_sysctls_and/" rel="nofollow">New options in bsdinstall - some sysctls and date/time settings</a></h3>

<ul>
<li>bsdinstall in FreeBSD 11.0 will feature a number of new menus.</li>
<li>The first, well allow you to set the date and time. Often on computers that have been in storage, or some embedded type devices that have no RTC, the date will be wildly wrong, and ntpd will refuse to run until the date is correctly set. This feature makes it easy to enter the date and time using dialog(1)</li>
<li>The second menu, inspired by the existing ‘services’ menu, offers a number of ‘hardening’ options</li>
<li>This menu allows users to easily enable a number of security features, including:

<ul>
<li>Hide processes running as other users/groups</li>
<li>Disable reading the kernel message buffer and debugging processes for unprivileged users</li>
<li>Randomize the PID of newly created processes</li>
<li>Enable the stack guard</li>
<li>Erase /tmp at boot</li>
<li>Disable remote syslog</li>
<li>Disable sendmail</li>
</ul></li>
<li>All of these options are off by default, so that an install done with the installer will be the same as an install from source, or an upgrade.</li>
<li>A number of these options are candidates to become on-by-default in the future, so the hope is that this menu will get more users to test these features and find any negative interactions with applications or general use, so they can be fixed.
***</li>
</ul>

<h3><a href="https://www.netbsd.org/%7Emartin/rawrite32/" rel="nofollow">Rawrite32: the NetBSD image writing tool</a></h3>

<ul>
<li>Martin of the NetBSD project has released a new version of his USB imaging tool, rawrite32</li>
<li>For those who’ve not used this tool before, it is a Windows Application that allows writing NetBSD images directly to USB media (other other disk media)</li>
<li>This update brings with it support for writing .xz file, and binary signing</li>
<li>This may come in handy for writing other OS images to memory sticks as well, especially for those locked into a windows environment who need to 
switch.
***</li>
</ul>

<h3><a href="https://github.com/j-keck/zfs-snap-diff" rel="nofollow">ZFS-Snap-Diff -- A pretty interface for viewing what changed after a ZFS snapshot </a></h3>

<ul>
<li>There are lots of nice little utilities to help create and maintain your ZFS snapshots. However today we have something unique to look at, ‘zfs-snap-diff’.</li>
<li>What makes it unique, is that it ships with a built-in golang / angularjs GUI for snapshot management</li>
<li>It looks very powerful, including a built-in diff utility, so you can even see the changes in text-files, in addition to downloading files, restoring old versions and more.</li>
<li>Its nice to see so many ZFS utilities starting to take off, and evolve file-management further.
***</li>
</ul>

<h3><a href="https://www.joyent.com/about/events/2016/dtrace-conf" rel="nofollow">Dtrace Conf 2016 Event Videos</a></h3>

<ul>
<li>The videos from Dtrace.conf 2016 have been posted</li>
<li>Some highlights:

<ul>
<li>Useful DTrace Intro</li>
<li>CTF Everywhere</li>
<li>Distributed DTrace</li>
<li>DTrace for Apps</li>
<li>DTrace json() subroutine</li>
<li>Implementing (or not) fds[] in FreeBSD</li>
<li>OpenDTrace</li>
<li>DTrace performance improvements with always-on instrumentation</li>
<li>D Syntactic Sugar</li>
<li>DTrace and Go, DTrace and Postgres</li>
</ul></li>
<li><a href="https://www.joyent.com/blog/dtrace-conf-16-wrap-up" rel="nofollow">dtrace.conf(16) wrap-up by Bryan Cantrill</a> </li>
</ul>

<blockquote>
<p>Once again, it was an eclectic mix of technologists — and once again, the day got kicked off with me providing an introduction to dtrace.conf and its history. (Just to save you the time filling out your Cantrill Presentation Bingo Card: you can find me punching myself at 16:19, me offering unsolicited personal medical history at 20:11, and me getting trolled by unikernels at 38:25.)</p>
</blockquote>

<ul>
<li>The next DTrace.conf isn’t until 2020
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.reddit.com/r/BSD/comments/4vngmw/the_bsd_daemon_feature_in_mexican_candy_packaging/" rel="nofollow">The BSD Daemon features in Mexican candy packaging</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-August/624202.html" rel="nofollow">Remove PG_ZERO and zeroidle (page-zeroing) entirely</a></p></li>
<li><p><a href="https://www.openbsd.org/lyrics.html#60b" rel="nofollow">OpenBSD: Release Songs: 6.0: &quot;Black Hat&quot;</a></p></li>
<li><p><a href="http://satterly.neocities.org/openbsd_games.html" rel="nofollow">OpenBSD Gaming Resource</a> </p></li>
<li><p><a href="http://bsdsec.net/articles/libressl-2-4-2-and-2-3-7-released" rel="nofollow">LibreSSL 2.4.2 and 2.3.7 Released</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/LJcJmNsR" rel="nofollow"> Pedja - Bhyve GUI </a> </li>
<li><a href="http://pastebin.com/259x94Rh" rel="nofollow"> Tim - Jail Management</a> </li>
<li><a href="http://pastebin.com/A86yHnzz" rel="nofollow"> Don - X260 </a> </li>
<li><a href="http://pastebin.com/wjtcuVSA" rel="nofollow"> David - Updates</a> </li>
<li><a href="http://pastebin.com/DgH9G7p5" rel="nofollow"> Ghislain - Jail Management</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>154: Myths, Pi’s &amp; Features, oh my!</title>
  <link>https://www.bsdnow.tv/154</link>
  <guid isPermaLink="false">0bae832b-aaaf-4862-8850-b4797b8350f8</guid>
  <pubDate>Wed, 10 Aug 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0bae832b-aaaf-4862-8850-b4797b8350f8.mp3" length="35808916" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we are taking a look at a few different tutorials, including running your very own RPi web-server. (Come-on, you</itunes:subtitle>
  <itunes:duration>49:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we are taking a look at a few different tutorials, including running your very own RPi web-server. (Come-on, you&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for &amp;lt;br&amp;gt;
Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly &amp;lt;br&amp;gt;
Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/broken-features-arent-used" target="_blank" rel="nofollow noopener"&gt;broken features aren't used&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This post from TedU talks about the difficulty of removing features from an operating system&lt;/li&gt;
&lt;li&gt;“One of the difficulties in removing a feature is identifying all the potential users. A feature here could be a program bundled with an operating system, or a command line option, or maybe just a function in a library. If we remove a feature, users that depend on it will be sad. Unfortunately, absence of evidence is not evidence of absence. I’ve never heard of anybody running ls -p but it’s not impossible that somebody does.”&lt;/li&gt;
&lt;li&gt;“The reasons why we want to remove an existing feature can vary. Sometimes it’s old code that interferes with maintenance. Sometimes a nearly complete rewrite can improve performance. In other cases, the feature in question is really more of a misfeature. It may have security implications, where the existence of the feature can be used to facilitate the exploitation of other vulnerabilities, and removing the feature will help mitigate the exploit.”&lt;/li&gt;
&lt;li&gt;“There’s no general test that can be used, but there is one test that works in many cases. Test that the feature works. If the feature doesn’t work, that’s compelling evidence that nobody is using it, because nobody can be using it. You don’t need to fix it. You can just remove it.”&lt;/li&gt;
&lt;li&gt;He makes some interesting comments about exhaustive unit tests and the push to keep everything working all the time. If you never break anything to see if someone complains, how do you know if it is still being used?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://devio.us/%7Espacemonkey/raspberry_pi_freebsd_web_server_howto.html" target="_blank" rel="nofollow noopener"&gt;A Raspberry Pi FreeBSD Web Server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking at a super-low power solution to host some webpages? If so, we have the tutorial for you.&lt;/li&gt;
&lt;li&gt;Specifically a walkthrough of getting FreeBSD up on a Pi, and setting up nginx, OpenNTPD, LibreSSL and friends. &lt;/li&gt;
&lt;li&gt;The walkthrough starts with grabbing a FreeBSD 11 snapshot for arm64 and doing the initial setup process to get to a bootable FreeBSD system.&lt;/li&gt;
&lt;li&gt;If you are an extreme noob, not to fear. The tutorial walks you through setting up usernames, timezones, even a larger /tmp directory on your new MiniBSD setup.&lt;/li&gt;
&lt;li&gt;The tedious part comes to play during the setup of packages. The author walks us through setting up LibreSSL and various other packages via ports (Since LibreSSL isn’t the default in FreeBSD). This will take some time to compile on your humble RPi device. (Go make a sandwich, walk the dog, fix the gutters, etc)&lt;/li&gt;
&lt;li&gt;When it’s all said and done, you’ll end up with a secure little web-server that you’ve configured all by yourself! (Wondering what the word-press performance would be like on that box)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://eng.uber.com/mysql-migration/" target="_blank" rel="nofollow noopener"&gt;Uber switches from PostgreSQL back to MySQL &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We often hear success stories of people switching to PostgreSQL and getting huge performance gains, but this stories is the reverse&lt;/li&gt;
&lt;li&gt;Uber’s engineering team has switched back to MySQL, because for their specific workload and design, MySQL’s innodb has better performance&lt;/li&gt;
&lt;li&gt;Of course, it is not just vanilla MySQL, but “Schemaless”, a sharding system that sits on top of MySQL&lt;/li&gt;
&lt;li&gt;The article goes into detail about the on-disk format used by Postgres, and the specific shortcomings that Uber encountered&lt;/li&gt;
&lt;li&gt;Uber admits that all of its testing was against the older PostgreSQL 9.2, but one of their complaints is about having difficulty upgrading&lt;/li&gt;
&lt;li&gt;“We started out with Postgres 9.1 and successfully completed the upgrade process to move to Postgres 9.2. However, the process took so many hours that we couldn’t afford to do the process again. By the time Postgres 9.3 came out, Uber’s growth increased our dataset substantially, so the upgrade would have been even lengthier. For this reason, our legacy Postgres instances run Postgres 9.2 to this day, even though the current Postgres GA release is 9.5.”&lt;/li&gt;
&lt;li&gt;There is a followup, from the Postgres side&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.postgresql.org/message-id/5797D5A1.5030009%40agliodbs.com" target="_blank" rel="nofollow noopener"&gt;“Why we lost Uber as a user” &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;This thread goes into detail about the specific types of problematic queries that Uber was using&lt;/li&gt;
&lt;li&gt;“The Uber guy is right that InnoDB handles this better as long as you don't touch the primary key (primary key updates in InnoDB are really bad)”&lt;/li&gt;
&lt;li&gt;“This is a common problem case we don't have an answer for yet.”&lt;/li&gt;
&lt;li&gt;The thread then goes on to discuss possibly supporting a “pluggable heap storage layer”, to allow different workloads to use different on-disk formats for best performance
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Getting started with GhostBSD and FreeBSD&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://unsolicitedbutoffered.blogspot.com/2016/07/getting-started-with-ghostbsd-and.html" target="_blank" rel="nofollow noopener"&gt;Part 1&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://unsolicitedbutoffered.blogspot.com/2016/07/getting-started-with-ghostbsd-and_31.html" target="_blank" rel="nofollow noopener"&gt;Part 2&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://unsolicitedbutoffered.blogspot.com/2016/08/getting-started-with-ghostbsd-and.html" target="_blank" rel="nofollow noopener"&gt;Part 3&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://unsolicitedbutoffered.blogspot.com/2016/08/getting-started-with-ghostbsd-and_2.html" target="_blank" rel="nofollow noopener"&gt;Part 4&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;In what may be our first GhostBSD tutorial, we have a nice walkthrough on the initial getting started with it.&lt;/li&gt;
&lt;li&gt;For those who don’t know, GhostBSD provides a nice XFCE or Mate desktop out of box, and still supports 32bit installs for those who want to keep that older hardware running.&lt;/li&gt;
&lt;li&gt;The walkthough takes us through the process of grabbing GhostBSD images and getting the installer up and running via bootable USB stick.&lt;/li&gt;
&lt;li&gt;Once booted, the graphical installer is straight-forward and short, allowing you to get the bits on disk as quickly as possible. (The actual installation took around 45 Minutes on an old Toshiba NB520)&lt;/li&gt;
&lt;li&gt;The author then takes us on a tour of some of GhostBSD’s out-of-box bundled applications (Along with XFCE) and how it compares to similar Linux setups.&lt;/li&gt;
&lt;li&gt;Lastly covered is the setup of Wireless (The manual way with WPA supplicant, since the GUI tool appeared to not work in this particular case)&lt;/li&gt;
&lt;li&gt;All in all a good walkthrough, especially if you’ve not seen GhostBSD in action before, the screenshots are very informative!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/SteamOnFreeBSD/SteamOnFreeBSD" target="_blank" rel="nofollow noopener"&gt;Steam on FreeBSD 11-CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Steam on FreeBSD. Yes, we’ve heard of setups using WINE, but what about running the Linux binaries natively?&lt;/li&gt;
&lt;li&gt;Well you are in luck. We have a github project that details getting the Linux native client up and running on a FreeBSD 11-CURRENT system.&lt;/li&gt;
&lt;li&gt;This github project is rather mysterious, with only the instructions to download a pre-packaged steam.txz file, extract and run the provided install.sh script.&lt;/li&gt;
&lt;li&gt;Curious I inspected some of the scripts, the installer.sh is fairly straight-forward, but does some ‘non-standard’ freebsd things, like fetching packages and extracting specific files/libaries into a new /compat/ubuntu directory. &lt;/li&gt;
&lt;li&gt;After that, it goes through a huge list of debian/ubuntu packages, also throwing them into the aforementioned ubuntu directory.&lt;/li&gt;
&lt;li&gt;At runtime, the wrapper script ensures that various linux compat file-systems are mounted in the correct location, then proceeds to run steam with some LD_LIBRARY_FLAGS set from the users .local/share/steam directory.&lt;/li&gt;
&lt;li&gt;A tad scary if honest, however it is a neat PoC to see Steam working on FreeBSD. Hopefully somebody can turn this into a more traditional package which can be easily removed / cleaned up afterwards.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://enform.haxlab.org/" target="_blank" rel="nofollow noopener"&gt;How to run Enlightenment on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Are you an enlightenment fan? Be honest, we know there are quite a few of you out there!&lt;/li&gt;
&lt;li&gt;If so, we have a tutorial for you today, which talks about how to run E on OpenBSD.&lt;/li&gt;
&lt;li&gt;The process is pretty easy, but some steps might be overlooked if you are new to OpenBSD or don’t know how to tune / compile things on your own.&lt;/li&gt;
&lt;li&gt;It starts out with adjusting some sysctl’s for better tuning that works on an E based desktop.&lt;/li&gt;
&lt;li&gt;Next is installing from package some pre-reqs that will enable us to build E from source.&lt;/li&gt;
&lt;li&gt;After that, we need to download and install EFL from github, and the autogen / gmake commands are helpfully provided for you.&lt;/li&gt;
&lt;li&gt;Lastly the same is done for E itself, and TADA, E is installed and ready to go on your OpenBSD system. If you do this right, should only take 5-10 minutes to be up and running.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/Myths" target="_blank" rel="nofollow noopener"&gt;Myths about FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over on the FreeBSD wiki, we have a new “Myths” page which we’ve never highlighted on the show before. &lt;/li&gt;
&lt;li&gt;First up, and one I’ve very familiar with, is the usual “FreeBSD is only for Servers and not Desktops”, along with a good rebuttal about what it does offer and mention of projects such as PC-BSD which do it also.&lt;/li&gt;
&lt;li&gt;Another prevalent one is the “FreeBSD has a closed development model”, which is easily refuted:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; FreeBSD has over 400 developers around the world who have commit access to the repository. Many of these are willing to commit patches from third parties. If you want to get an idea of the number of patches that have been committed on behalf of other developers, then search for 'Submitted by' in the commit logs. At the time of writing, this is just under twenty thousand, or about ten percent of all commits. After having a few patches accepted, regular contributors are usually encouraged to apply for commit access.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Another one that we are still hearing (Although it is less and less now) was the common “FreeBSD makes me compile everything from source”. Listeners of this show will know that pkg has pretty much made this irrelevant in recent years. However the option to compile yourself from source still exists, but most users won’t find this ever necessary.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A good list, with many more items on it than we’ve mentioned here. Take a look, you might find something there you’ve heard in the wild, or maybe even thought yourself at one point!&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://gist.github.com/swills/8a9a9f8a529256f134830c2a1476db0c" target="_blank" rel="nofollow noopener"&gt;FreeBSD Area51 testing repo, KDE 5 &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This github GIST from Steve Wills provides the instructions to enable the FreeBSD xorg teams unofficial ‘Area51’ testing repo on your machine&lt;/li&gt;
&lt;li&gt;This gives you access to the new KDE 5&lt;/li&gt;
&lt;li&gt;Users should obviously be careful testing early-access software, but bug reports are very welcome, and important to getting KDE 5 working well under FreeBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/08/01/msg000712.html" target="_blank" rel="nofollow noopener"&gt;NetBSD Machines at Open Source Conference 2016 Kyoto&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.cyberciti.biz/faq/pfsense-install-htop-using-pkg-command/" target="_blank" rel="nofollow noopener"&gt;How to install htop on pfSense&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/krytarowski/status/759909139300491265" target="_blank" rel="nofollow noopener"&gt;The first ever patch for #Chromium on #NetBSD has been committed!&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.meetup.com/CharmBUG/events/232474857/" target="_blank" rel="nofollow noopener"&gt;CharmBug - Adventures in Hardened BSD - August 24th 2016&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/q24sNcNY" target="_blank" rel="nofollow noopener"&gt; Emanual - GoTTY &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/iTkmpVr9" target="_blank" rel="nofollow noopener"&gt; Joe - Disable Device &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/bPHEP4Ya" target="_blank" rel="nofollow noopener"&gt; Allen - ZFS Send/Recv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/L0ttuNx3" target="_blank" rel="nofollow noopener"&gt; Mica - Adobe Replacements&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Dr92CGCU" target="_blank" rel="nofollow noopener"&gt; Robroy - RAID&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we are taking a look at a few different tutorials, including running your very own RPi web-server. (Come-on, you</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/broken-features-arent-used" rel="nofollow">broken features aren&#39;t used</a></h3>

<ul>
<li>This post from TedU talks about the difficulty of removing features from an operating system</li>
<li>“One of the difficulties in removing a feature is identifying all the potential users. A feature here could be a program bundled with an operating system, or a command line option, or maybe just a function in a library. If we remove a feature, users that depend on it will be sad. Unfortunately, absence of evidence is not evidence of absence. I’ve never heard of anybody running ls -p but it’s not impossible that somebody does.”</li>
<li>“The reasons why we want to remove an existing feature can vary. Sometimes it’s old code that interferes with maintenance. Sometimes a nearly complete rewrite can improve performance. In other cases, the feature in question is really more of a misfeature. It may have security implications, where the existence of the feature can be used to facilitate the exploitation of other vulnerabilities, and removing the feature will help mitigate the exploit.”</li>
<li>“There’s no general test that can be used, but there is one test that works in many cases. Test that the feature works. If the feature doesn’t work, that’s compelling evidence that nobody is using it, because nobody can be using it. You don’t need to fix it. You can just remove it.”</li>
<li>He makes some interesting comments about exhaustive unit tests and the push to keep everything working all the time. If you never break anything to see if someone complains, how do you know if it is still being used?
***</li>
</ul>

<h3><a href="http://devio.us/%7Espacemonkey/raspberry_pi_freebsd_web_server_howto.html" rel="nofollow">A Raspberry Pi FreeBSD Web Server</a></h3>

<ul>
<li>Looking at a super-low power solution to host some webpages? If so, we have the tutorial for you.</li>
<li>Specifically a walkthrough of getting FreeBSD up on a Pi, and setting up nginx, OpenNTPD, LibreSSL and friends. </li>
<li>The walkthrough starts with grabbing a FreeBSD 11 snapshot for arm64 and doing the initial setup process to get to a bootable FreeBSD system.</li>
<li>If you are an extreme noob, not to fear. The tutorial walks you through setting up usernames, timezones, even a larger /tmp directory on your new MiniBSD setup.</li>
<li>The tedious part comes to play during the setup of packages. The author walks us through setting up LibreSSL and various other packages via ports (Since LibreSSL isn’t the default in FreeBSD). This will take some time to compile on your humble RPi device. (Go make a sandwich, walk the dog, fix the gutters, etc)</li>
<li>When it’s all said and done, you’ll end up with a secure little web-server that you’ve configured all by yourself! (Wondering what the word-press performance would be like on that box)
***</li>
</ul>

<h3><a href="https://eng.uber.com/mysql-migration/" rel="nofollow">Uber switches from PostgreSQL back to MySQL </a></h3>

<ul>
<li>We often hear success stories of people switching to PostgreSQL and getting huge performance gains, but this stories is the reverse</li>
<li>Uber’s engineering team has switched back to MySQL, because for their specific workload and design, MySQL’s innodb has better performance</li>
<li>Of course, it is not just vanilla MySQL, but “Schemaless”, a sharding system that sits on top of MySQL</li>
<li>The article goes into detail about the on-disk format used by Postgres, and the specific shortcomings that Uber encountered</li>
<li>Uber admits that all of its testing was against the older PostgreSQL 9.2, but one of their complaints is about having difficulty upgrading</li>
<li>“We started out with Postgres 9.1 and successfully completed the upgrade process to move to Postgres 9.2. However, the process took so many hours that we couldn’t afford to do the process again. By the time Postgres 9.3 came out, Uber’s growth increased our dataset substantially, so the upgrade would have been even lengthier. For this reason, our legacy Postgres instances run Postgres 9.2 to this day, even though the current Postgres GA release is 9.5.”</li>
<li>There is a followup, from the Postgres side</li>
<li><a href="https://www.postgresql.org/message-id/5797D5A1.5030009%40agliodbs.com" rel="nofollow">“Why we lost Uber as a user” </a> </li>
<li>This thread goes into detail about the specific types of problematic queries that Uber was using</li>
<li>“The Uber guy is right that InnoDB handles this better as long as you don&#39;t touch the primary key (primary key updates in InnoDB are really bad)”</li>
<li>“This is a common problem case we don&#39;t have an answer for yet.”</li>
<li>The thread then goes on to discuss possibly supporting a “pluggable heap storage layer”, to allow different workloads to use different on-disk formats for best performance
***</li>
</ul>

<h3>Getting started with GhostBSD and FreeBSD</h3>

<ul>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/07/getting-started-with-ghostbsd-and.html" rel="nofollow">Part 1</a> </li>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/07/getting-started-with-ghostbsd-and_31.html" rel="nofollow">Part 2</a> </li>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/08/getting-started-with-ghostbsd-and.html" rel="nofollow">Part 3</a> </li>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/08/getting-started-with-ghostbsd-and_2.html" rel="nofollow">Part 4</a> </li>
<li>In what may be our first GhostBSD tutorial, we have a nice walkthrough on the initial getting started with it.</li>
<li>For those who don’t know, GhostBSD provides a nice XFCE or Mate desktop out of box, and still supports 32bit installs for those who want to keep that older hardware running.</li>
<li>The walkthough takes us through the process of grabbing GhostBSD images and getting the installer up and running via bootable USB stick.</li>
<li>Once booted, the graphical installer is straight-forward and short, allowing you to get the bits on disk as quickly as possible. (The actual installation took around 45 Minutes on an old Toshiba NB520)</li>
<li>The author then takes us on a tour of some of GhostBSD’s out-of-box bundled applications (Along with XFCE) and how it compares to similar Linux setups.</li>
<li>Lastly covered is the setup of Wireless (The manual way with WPA supplicant, since the GUI tool appeared to not work in this particular case)</li>
<li>All in all a good walkthrough, especially if you’ve not seen GhostBSD in action before, the screenshots are very informative!
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/SteamOnFreeBSD/SteamOnFreeBSD" rel="nofollow">Steam on FreeBSD 11-CURRENT</a></h3>

<ul>
<li>Steam on FreeBSD. Yes, we’ve heard of setups using WINE, but what about running the Linux binaries natively?</li>
<li>Well you are in luck. We have a github project that details getting the Linux native client up and running on a FreeBSD 11-CURRENT system.</li>
<li>This github project is rather mysterious, with only the instructions to download a pre-packaged steam.txz file, extract and run the provided install.sh script.</li>
<li>Curious I inspected some of the scripts, the installer.sh is fairly straight-forward, but does some ‘non-standard’ freebsd things, like fetching packages and extracting specific files/libaries into a new /compat/ubuntu directory. </li>
<li>After that, it goes through a huge list of debian/ubuntu packages, also throwing them into the aforementioned ubuntu directory.</li>
<li>At runtime, the wrapper script ensures that various linux compat file-systems are mounted in the correct location, then proceeds to run steam with some LD_LIBRARY_FLAGS set from the users .local/share/steam directory.</li>
<li>A tad scary if honest, however it is a neat PoC to see Steam working on FreeBSD. Hopefully somebody can turn this into a more traditional package which can be easily removed / cleaned up afterwards.
***</li>
</ul>

<h3><a href="http://enform.haxlab.org/" rel="nofollow">How to run Enlightenment on OpenBSD</a></h3>

<ul>
<li>Are you an enlightenment fan? Be honest, we know there are quite a few of you out there!</li>
<li>If so, we have a tutorial for you today, which talks about how to run E on OpenBSD.</li>
<li>The process is pretty easy, but some steps might be overlooked if you are new to OpenBSD or don’t know how to tune / compile things on your own.</li>
<li>It starts out with adjusting some sysctl’s for better tuning that works on an E based desktop.</li>
<li>Next is installing from package some pre-reqs that will enable us to build E from source.</li>
<li>After that, we need to download and install EFL from github, and the autogen / gmake commands are helpfully provided for you.</li>
<li>Lastly the same is done for E itself, and TADA, E is installed and ready to go on your OpenBSD system. If you do this right, should only take 5-10 minutes to be up and running.
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Myths" rel="nofollow">Myths about FreeBSD</a></h3>

<ul>
<li>Over on the FreeBSD wiki, we have a new “Myths” page which we’ve never highlighted on the show before. </li>
<li>First up, and one I’ve very familiar with, is the usual “FreeBSD is only for Servers and not Desktops”, along with a good rebuttal about what it does offer and mention of projects such as PC-BSD which do it also.</li>
<li>Another prevalent one is the “FreeBSD has a closed development model”, which is easily refuted:</li>
</ul>

<blockquote>
<p>FreeBSD has over 400 developers around the world who have commit access to the repository. Many of these are willing to commit patches from third parties. If you want to get an idea of the number of patches that have been committed on behalf of other developers, then search for &#39;Submitted by&#39; in the commit logs. At the time of writing, this is just under twenty thousand, or about ten percent of all commits. After having a few patches accepted, regular contributors are usually encouraged to apply for commit access.</p>
</blockquote>

<ul>
<li><p>Another one that we are still hearing (Although it is less and less now) was the common “FreeBSD makes me compile everything from source”. Listeners of this show will know that pkg has pretty much made this irrelevant in recent years. However the option to compile yourself from source still exists, but most users won’t find this ever necessary.</p></li>
<li><p>A good list, with many more items on it than we’ve mentioned here. Take a look, you might find something there you’ve heard in the wild, or maybe even thought yourself at one point!</p>

<hr></li>
</ul>

<h3><a href="https://gist.github.com/swills/8a9a9f8a529256f134830c2a1476db0c" rel="nofollow">FreeBSD Area51 testing repo, KDE 5 </a></h3>

<ul>
<li>This github GIST from Steve Wills provides the instructions to enable the FreeBSD xorg teams unofficial ‘Area51’ testing repo on your machine</li>
<li>This gives you access to the new KDE 5</li>
<li>Users should obviously be careful testing early-access software, but bug reports are very welcome, and important to getting KDE 5 working well under FreeBSD
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/08/01/msg000712.html" rel="nofollow">NetBSD Machines at Open Source Conference 2016 Kyoto</a> </p></li>
<li><p><a href="http://www.cyberciti.biz/faq/pfsense-install-htop-using-pkg-command/" rel="nofollow">How to install htop on pfSense</a> </p></li>
<li><p><a href="https://twitter.com/krytarowski/status/759909139300491265" rel="nofollow">The first ever patch for #Chromium on #NetBSD has been committed!</a></p></li>
<li><p><a href="http://www.meetup.com/CharmBUG/events/232474857/" rel="nofollow">CharmBug - Adventures in Hardened BSD - August 24th 2016</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/q24sNcNY" rel="nofollow"> Emanual - GoTTY </a> </li>
<li><a href="http://pastebin.com/iTkmpVr9" rel="nofollow"> Joe - Disable Device </a> </li>
<li><a href="http://pastebin.com/bPHEP4Ya" rel="nofollow"> Allen - ZFS Send/Recv</a> </li>
<li><a href="http://pastebin.com/L0ttuNx3" rel="nofollow"> Mica - Adobe Replacements</a> </li>
<li><a href="http://pastebin.com/Dr92CGCU" rel="nofollow"> Robroy - RAID</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we are taking a look at a few different tutorials, including running your very own RPi web-server. (Come-on, you</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/broken-features-arent-used" rel="nofollow">broken features aren&#39;t used</a></h3>

<ul>
<li>This post from TedU talks about the difficulty of removing features from an operating system</li>
<li>“One of the difficulties in removing a feature is identifying all the potential users. A feature here could be a program bundled with an operating system, or a command line option, or maybe just a function in a library. If we remove a feature, users that depend on it will be sad. Unfortunately, absence of evidence is not evidence of absence. I’ve never heard of anybody running ls -p but it’s not impossible that somebody does.”</li>
<li>“The reasons why we want to remove an existing feature can vary. Sometimes it’s old code that interferes with maintenance. Sometimes a nearly complete rewrite can improve performance. In other cases, the feature in question is really more of a misfeature. It may have security implications, where the existence of the feature can be used to facilitate the exploitation of other vulnerabilities, and removing the feature will help mitigate the exploit.”</li>
<li>“There’s no general test that can be used, but there is one test that works in many cases. Test that the feature works. If the feature doesn’t work, that’s compelling evidence that nobody is using it, because nobody can be using it. You don’t need to fix it. You can just remove it.”</li>
<li>He makes some interesting comments about exhaustive unit tests and the push to keep everything working all the time. If you never break anything to see if someone complains, how do you know if it is still being used?
***</li>
</ul>

<h3><a href="http://devio.us/%7Espacemonkey/raspberry_pi_freebsd_web_server_howto.html" rel="nofollow">A Raspberry Pi FreeBSD Web Server</a></h3>

<ul>
<li>Looking at a super-low power solution to host some webpages? If so, we have the tutorial for you.</li>
<li>Specifically a walkthrough of getting FreeBSD up on a Pi, and setting up nginx, OpenNTPD, LibreSSL and friends. </li>
<li>The walkthrough starts with grabbing a FreeBSD 11 snapshot for arm64 and doing the initial setup process to get to a bootable FreeBSD system.</li>
<li>If you are an extreme noob, not to fear. The tutorial walks you through setting up usernames, timezones, even a larger /tmp directory on your new MiniBSD setup.</li>
<li>The tedious part comes to play during the setup of packages. The author walks us through setting up LibreSSL and various other packages via ports (Since LibreSSL isn’t the default in FreeBSD). This will take some time to compile on your humble RPi device. (Go make a sandwich, walk the dog, fix the gutters, etc)</li>
<li>When it’s all said and done, you’ll end up with a secure little web-server that you’ve configured all by yourself! (Wondering what the word-press performance would be like on that box)
***</li>
</ul>

<h3><a href="https://eng.uber.com/mysql-migration/" rel="nofollow">Uber switches from PostgreSQL back to MySQL </a></h3>

<ul>
<li>We often hear success stories of people switching to PostgreSQL and getting huge performance gains, but this stories is the reverse</li>
<li>Uber’s engineering team has switched back to MySQL, because for their specific workload and design, MySQL’s innodb has better performance</li>
<li>Of course, it is not just vanilla MySQL, but “Schemaless”, a sharding system that sits on top of MySQL</li>
<li>The article goes into detail about the on-disk format used by Postgres, and the specific shortcomings that Uber encountered</li>
<li>Uber admits that all of its testing was against the older PostgreSQL 9.2, but one of their complaints is about having difficulty upgrading</li>
<li>“We started out with Postgres 9.1 and successfully completed the upgrade process to move to Postgres 9.2. However, the process took so many hours that we couldn’t afford to do the process again. By the time Postgres 9.3 came out, Uber’s growth increased our dataset substantially, so the upgrade would have been even lengthier. For this reason, our legacy Postgres instances run Postgres 9.2 to this day, even though the current Postgres GA release is 9.5.”</li>
<li>There is a followup, from the Postgres side</li>
<li><a href="https://www.postgresql.org/message-id/5797D5A1.5030009%40agliodbs.com" rel="nofollow">“Why we lost Uber as a user” </a> </li>
<li>This thread goes into detail about the specific types of problematic queries that Uber was using</li>
<li>“The Uber guy is right that InnoDB handles this better as long as you don&#39;t touch the primary key (primary key updates in InnoDB are really bad)”</li>
<li>“This is a common problem case we don&#39;t have an answer for yet.”</li>
<li>The thread then goes on to discuss possibly supporting a “pluggable heap storage layer”, to allow different workloads to use different on-disk formats for best performance
***</li>
</ul>

<h3>Getting started with GhostBSD and FreeBSD</h3>

<ul>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/07/getting-started-with-ghostbsd-and.html" rel="nofollow">Part 1</a> </li>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/07/getting-started-with-ghostbsd-and_31.html" rel="nofollow">Part 2</a> </li>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/08/getting-started-with-ghostbsd-and.html" rel="nofollow">Part 3</a> </li>
<li><a href="http://unsolicitedbutoffered.blogspot.com/2016/08/getting-started-with-ghostbsd-and_2.html" rel="nofollow">Part 4</a> </li>
<li>In what may be our first GhostBSD tutorial, we have a nice walkthrough on the initial getting started with it.</li>
<li>For those who don’t know, GhostBSD provides a nice XFCE or Mate desktop out of box, and still supports 32bit installs for those who want to keep that older hardware running.</li>
<li>The walkthough takes us through the process of grabbing GhostBSD images and getting the installer up and running via bootable USB stick.</li>
<li>Once booted, the graphical installer is straight-forward and short, allowing you to get the bits on disk as quickly as possible. (The actual installation took around 45 Minutes on an old Toshiba NB520)</li>
<li>The author then takes us on a tour of some of GhostBSD’s out-of-box bundled applications (Along with XFCE) and how it compares to similar Linux setups.</li>
<li>Lastly covered is the setup of Wireless (The manual way with WPA supplicant, since the GUI tool appeared to not work in this particular case)</li>
<li>All in all a good walkthrough, especially if you’ve not seen GhostBSD in action before, the screenshots are very informative!
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/SteamOnFreeBSD/SteamOnFreeBSD" rel="nofollow">Steam on FreeBSD 11-CURRENT</a></h3>

<ul>
<li>Steam on FreeBSD. Yes, we’ve heard of setups using WINE, but what about running the Linux binaries natively?</li>
<li>Well you are in luck. We have a github project that details getting the Linux native client up and running on a FreeBSD 11-CURRENT system.</li>
<li>This github project is rather mysterious, with only the instructions to download a pre-packaged steam.txz file, extract and run the provided install.sh script.</li>
<li>Curious I inspected some of the scripts, the installer.sh is fairly straight-forward, but does some ‘non-standard’ freebsd things, like fetching packages and extracting specific files/libaries into a new /compat/ubuntu directory. </li>
<li>After that, it goes through a huge list of debian/ubuntu packages, also throwing them into the aforementioned ubuntu directory.</li>
<li>At runtime, the wrapper script ensures that various linux compat file-systems are mounted in the correct location, then proceeds to run steam with some LD_LIBRARY_FLAGS set from the users .local/share/steam directory.</li>
<li>A tad scary if honest, however it is a neat PoC to see Steam working on FreeBSD. Hopefully somebody can turn this into a more traditional package which can be easily removed / cleaned up afterwards.
***</li>
</ul>

<h3><a href="http://enform.haxlab.org/" rel="nofollow">How to run Enlightenment on OpenBSD</a></h3>

<ul>
<li>Are you an enlightenment fan? Be honest, we know there are quite a few of you out there!</li>
<li>If so, we have a tutorial for you today, which talks about how to run E on OpenBSD.</li>
<li>The process is pretty easy, but some steps might be overlooked if you are new to OpenBSD or don’t know how to tune / compile things on your own.</li>
<li>It starts out with adjusting some sysctl’s for better tuning that works on an E based desktop.</li>
<li>Next is installing from package some pre-reqs that will enable us to build E from source.</li>
<li>After that, we need to download and install EFL from github, and the autogen / gmake commands are helpfully provided for you.</li>
<li>Lastly the same is done for E itself, and TADA, E is installed and ready to go on your OpenBSD system. If you do this right, should only take 5-10 minutes to be up and running.
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Myths" rel="nofollow">Myths about FreeBSD</a></h3>

<ul>
<li>Over on the FreeBSD wiki, we have a new “Myths” page which we’ve never highlighted on the show before. </li>
<li>First up, and one I’ve very familiar with, is the usual “FreeBSD is only for Servers and not Desktops”, along with a good rebuttal about what it does offer and mention of projects such as PC-BSD which do it also.</li>
<li>Another prevalent one is the “FreeBSD has a closed development model”, which is easily refuted:</li>
</ul>

<blockquote>
<p>FreeBSD has over 400 developers around the world who have commit access to the repository. Many of these are willing to commit patches from third parties. If you want to get an idea of the number of patches that have been committed on behalf of other developers, then search for &#39;Submitted by&#39; in the commit logs. At the time of writing, this is just under twenty thousand, or about ten percent of all commits. After having a few patches accepted, regular contributors are usually encouraged to apply for commit access.</p>
</blockquote>

<ul>
<li><p>Another one that we are still hearing (Although it is less and less now) was the common “FreeBSD makes me compile everything from source”. Listeners of this show will know that pkg has pretty much made this irrelevant in recent years. However the option to compile yourself from source still exists, but most users won’t find this ever necessary.</p></li>
<li><p>A good list, with many more items on it than we’ve mentioned here. Take a look, you might find something there you’ve heard in the wild, or maybe even thought yourself at one point!</p>

<hr></li>
</ul>

<h3><a href="https://gist.github.com/swills/8a9a9f8a529256f134830c2a1476db0c" rel="nofollow">FreeBSD Area51 testing repo, KDE 5 </a></h3>

<ul>
<li>This github GIST from Steve Wills provides the instructions to enable the FreeBSD xorg teams unofficial ‘Area51’ testing repo on your machine</li>
<li>This gives you access to the new KDE 5</li>
<li>Users should obviously be careful testing early-access software, but bug reports are very welcome, and important to getting KDE 5 working well under FreeBSD
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/08/01/msg000712.html" rel="nofollow">NetBSD Machines at Open Source Conference 2016 Kyoto</a> </p></li>
<li><p><a href="http://www.cyberciti.biz/faq/pfsense-install-htop-using-pkg-command/" rel="nofollow">How to install htop on pfSense</a> </p></li>
<li><p><a href="https://twitter.com/krytarowski/status/759909139300491265" rel="nofollow">The first ever patch for #Chromium on #NetBSD has been committed!</a></p></li>
<li><p><a href="http://www.meetup.com/CharmBUG/events/232474857/" rel="nofollow">CharmBug - Adventures in Hardened BSD - August 24th 2016</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/q24sNcNY" rel="nofollow"> Emanual - GoTTY </a> </li>
<li><a href="http://pastebin.com/iTkmpVr9" rel="nofollow"> Joe - Disable Device </a> </li>
<li><a href="http://pastebin.com/bPHEP4Ya" rel="nofollow"> Allen - ZFS Send/Recv</a> </li>
<li><a href="http://pastebin.com/L0ttuNx3" rel="nofollow"> Mica - Adobe Replacements</a> </li>
<li><a href="http://pastebin.com/Dr92CGCU" rel="nofollow"> Robroy - RAID</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>153: Big int trouble</title>
  <link>https://www.bsdnow.tv/153</link>
  <guid isPermaLink="false">a08dade0-6b9f-4b0c-8dbf-390f1d1a05c0</guid>
  <pubDate>Wed, 03 Aug 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a08dade0-6b9f-4b0c-8dbf-390f1d1a05c0.mp3" length="55789780" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we have a variety of news to discuss, covering quite the spectrum of BSD. (Including a new DragonFly release!).</itunes:subtitle>
  <itunes:duration>1:17:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we have a variety of news to discuss, covering quite the spectrum of BSD. (Including a new DragonFly release!).&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for &amp;lt;br&amp;gt;
Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly &amp;lt;br&amp;gt;
Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/my-int-is-too-big" target="_blank" rel="nofollow noopener"&gt;my int is too big&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“The &lt;a href="http://marc.info/?l=oss-security&amp;amp;m=146853062403622&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;NCC Group report&lt;/a&gt; describes the bugs, but not the history of the code.”&lt;/li&gt;
&lt;li&gt;“Several of them, as reported by NCC, involved similar integer truncation issues. Actually, they involved very similar modern 64 bit code meeting classic 32 bit code”&lt;/li&gt;
&lt;li&gt;“The thrsleep system call is a part of the kernel code that supports threads. As the name implies, it gives userland a measure of control over scheduling and lets a thread sleep until something happens. As such, it takes a timeout in the form of a timespec. The kernel, however, internally implements time keeping using ticks (there are HZ, 100, ticks per second). The tsleep function (t is for timed) takes an int number of ticks and performs basic validation by checking that it’s not negative. A negative timeout would indicate that the caller has miscalculated. The kernel panics so you can fix the bug, instead of stalling forever.”&lt;/li&gt;
&lt;li&gt;“The trouble therefore is when userland is allowed to specify a timeout that could be negative. The existing code made an attempt to handle various tricks by converting the timespec to a ticks value stored as a 64 bit long long which was checked against INT_MAX before passing to sleep. Any value over INT_MAX would be truncated, so we can’t allow that. Instead, we saturate the value to INT_MAX. Unfortunately, this check didn’t account for the possibility that the tick conversion from the timespec could also overflow and result in a negative value.”&lt;/li&gt;
&lt;li&gt;Then there is the description of the kqueue flaw:&lt;/li&gt;
&lt;li&gt;“Every kqueue keeps a list of all the attached events it’s watching for. A simple array is used to store file events, indexed by fd.”&lt;/li&gt;
&lt;li&gt;“This array is scaled to accommodate the largest fd that needs to be stored. This would obviously cause trouble, consuming too much memory, if the identifier were not validated first. Which is exactly what kqueue tries to do. The fd_getfile function checks that the identifier is a file that the process has open. One wrinkle. fd_getfile takes an int argument but ident is a uintptr_t, possibly 64 bits. An ident of 2&lt;sup&gt;32&lt;/sup&gt; + 2 will look like a valid file descriptor, but then cause the array to be resized to gargantuan proportions.”&lt;/li&gt;
&lt;li&gt;“Again, the fix is pretty simple. We must check that the ident is bounded by INT_MAX before calling fd_getfile. This bug likely would have been exploitable beyond a panic, but the array allocation was changed to use mallocarray instead of multiplying arguments by hand, thus preventing another overflow.”&lt;/li&gt;
&lt;li&gt;Then there is a description of the anonymous mmap flaw, and the “secret magic” __MAP_NOFAULT flag
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2016-04-2016-06.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Quarterly Status Report Q2 2016&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It’s time for another round of FreeBSD Quarterly Status Reports!&lt;/li&gt;
&lt;li&gt;In this edition, we have status updates from the various teams, including IRC/Bugs/RE/Ports/Core and Foundation&lt;/li&gt;
&lt;li&gt;We also have updates on some specific projects, including  from Konstantin on the on-going work for his implementation of ASLR, including the new ‘proccontrol’ command which provides the following:
&amp;gt; “The proccontrol(1) utility was written to manage and query ASLR enforcement on a per-process basis. It is required for analyzing ASLR failures in specific programs. This utility leverages the procctl(2) interface which was added to the previous version of the patch, with some bug fixes.”&lt;/li&gt;
&lt;li&gt;Next are updates on porting CEPH to FreeBSD, the ongoing work to improve EFI+GELI (touched on last week) and more robust Mutexes. &lt;/li&gt;
&lt;li&gt;Additionally we have an update from Matt Macy and the Xorg team discussing the current work to update FreeBSD’s graphic stack:
&amp;gt; “All Intel GPUs up to and including the unreleased Kaby Lake     are supported. The xf86-video-intel driver will be updated soon. Updating this driver requires updating Xorg, which in turn is blocked on Nvidia updates.”&lt;/li&gt;
&lt;li&gt;The kernel also got some feature status updates, including on the new Allwinner SoC support, an update on FreeBSD in Hyper-V and VIMAGE &lt;/li&gt;
&lt;li&gt;In addition to a quick update on the arm64 architecture (It’s getting there, RPi3 is almost a thing), we also have a slew of port updates, including support for GitLab in ports, updates on GNOME / KDE and some additional Intel-specific networking tools.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-security/2016-July/009016.html" target="_blank" rel="nofollow noopener"&gt;Vulnerabilities discovered in freebsd-update and portsnap&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There are two vulnerabilities discovered in freebsd-update and portsnap, where an attacker could place files in the portsnap directory and they would be used without being subject to having their checksum verified (but this requires root access), and the second where a man-in-the-middle attacker could guess the name of a file you will fetch by exploiting the time-gap between when you download the initial snapshot, and when you fetch the updated files.&lt;/li&gt;
&lt;li&gt;There are a number of vulnerabilities that were discovered in libarchive/tar as well&lt;/li&gt;
&lt;li&gt;There is also an issue with bspatch. A security advisory for bspatch has already been released, as this vulnerabilities was also discovered by the Chromium team, which uses this same code. The patch discussed in this mailing list thread is larger, but secteam@ believes at least one of the additional checks introduced is incorrect and may prevent a valid patch from being applied. The smaller patch was pushed out first, to solve the main attack vector, while the larger patch is investigated. Automated fuzz testing is underway. Great care is being taken fixing bspatch, as if it is broken installing future updates becomes much more difficult&lt;/li&gt;
&lt;li&gt;secteam@ and core@ would like to emphasize that the FreeBSD project takes these issue very seriously and are working on it
&amp;gt;  “As a general rule, secteam@ does not announce vulnerabilities for which we don't have patches, but we concede that we should have considered making an exception in this case”&lt;/li&gt;
&lt;li&gt;Work is underway to re-architect freebsd-update and portsnap to do signature verification on all files before they are passed to libarchive/tar, to help protect users from any future vulnerabilities in libarchive.&lt;/li&gt;
&lt;li&gt;However, this requires changes to the metadata format to provide these additional signatures, and backwards compatibilities must be preserved, so people can update to the newer versions to get these additional security features &lt;/li&gt;
&lt;li&gt;There is also discussion of using HTTPS for delivery of the files, but certificate verification and trust are always an issue. FreeBSD does not distribute a certificate trust store by default.&lt;/li&gt;
&lt;li&gt;There will be more on this in the coming days.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openssh.com/txt/release-7.3" target="_blank" rel="nofollow noopener"&gt;OpenSSH 7.3 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenSSH 7.3 has landed! &lt;/li&gt;
&lt;li&gt;Primarily a bug-fix release, the release notes do mention the pending deprecation of some more legacy Crypto in the future, including denying all RSA keys &amp;lt; 1024bit, and removal of SSHv1 support. (Already disabled via compile option)&lt;/li&gt;
&lt;li&gt;&lt;p&gt;On the bug side, there was a security issue addressed in sshd:&lt;br&gt;
&amp;gt; “sshd(8): Mitigate a potential denial-of-service attack against the system's crypt(3) function via sshd(8). An attacker could send very long passwords that would cause excessive CPU use in crypt(3). sshd(8) now refuses to accept password authentication requests of length greater than 1024 characters”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Also a timing issue was resolved in regard to password auth, which could possibly allow an attacker to discern between valid/invalid account names.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;On the feature side, we have the new ProxyJump option (-J flag) which allows you to do simplified indirection through various SSH jump hosts.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Various bugs were fixed, and some compile failures resolved in the portable version to auto-disable some ciphers not supported by OpenSSL.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://jggimi.homeip.net/semibug.pdf" target="_blank" rel="nofollow noopener"&gt;OpenBSD Ports - Integrating Third Party Applications [pdf]&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A talk from Josh Grosse, presented at SEMIBUG (South-East Michigan BSD Users Group), about OpenBSD Ports&lt;/li&gt;
&lt;li&gt;It opens by explaining the separation of the ‘base system’ from ‘packages’, as is common in most all BSDs&lt;/li&gt;
&lt;li&gt;It explains the contents of OpenBSD package tar file, which contain some metadata files (+CONTENTS and +DESC) and then the actual package files&lt;/li&gt;
&lt;li&gt;The talk goes on to explain the different branches (-release, -stable, and -current), and warn users that there are no official -stable packages from the project&lt;/li&gt;
&lt;li&gt;Then it goes on into the development model, including what new contributors should expect&lt;/li&gt;
&lt;li&gt;Then it walks through the entire process of creating a port and getting it contributed
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/source-changes/2016/07/27/msg076413.html" target="_blank" rel="nofollow noopener"&gt;NetBSD removes last RWX page in amd64 kernel&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD has purged the last holdout RWX page on the amd64 platform
&amp;gt; “Use UVM_PROT_ALL only if UVM_KMF_EXEC is given as argument. Otherwise, if UVM_KMF_PAGEABLE is also given as argument, only the VA is allocated and UVM waits for the page to fault before kentering it. When kentering it, it will use the UVM_PROT_ flag that was passed to uvm_map; which means that it will kenter it as RWX. With this change, the number of RWX pages in the amd64 kernel reaches strictly zero.”&lt;/li&gt;
&lt;li&gt;Break out the party favors! Hopefully any last stragglers in any of the other BSD’s gets retired soon as well.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://linux.softpedia.com/blog/dragonfly-bsd-4-6-0-launches-with-home-grown-support-for-nvme-controllers-506908.shtml" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD 4.6 launches with home-grown support for NVMe Controllers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Softpedia picked up on the release of DragonFlyBSD 4.6, specifically about their new home-grown NVMe driver. 
&amp;gt; “We now have a NVMe driver (PCIe SSDs). It currently must be kldloaded with nvme_load="YES" in /boot/loader.conf. The driver uses all concurrency features offered by the chip and will distribute queues and interrupts across multiple CPUs to maximize performance. It has been tested up to around 1.05M IOPS @4K, and roughly 6.5 GBytes/sec @32K (random read from urandom-filled partition, physio, many threads), with the 2xE5-2620v4 (xeon) test server 78% idle in the IOPS test and 72% idle on the bandwidth test. In other words, we maxed out the three NVMe devices we had plugged in and the system still had plenty of suds left over. Please note that a machine's ability to boot from an NVMe device depends on the BIOS, and not DragonFly. Most BIOSes cannot boot from NVMe devices and those that can probably only do it through UEFI. Info on device state is available with the new utility nvmectl.“&lt;/li&gt;
&lt;li&gt;In addition to this improved support, 4.6 also brings in the improved graphics support, matching what is in Linux 4.4 and support for Broadwell/Skylake.&lt;/li&gt;
&lt;li&gt;SMP also got some love:
&amp;gt; “SMP performance was already very good. As part of the NVMe driver work we revamped the buffer cache subsystem and a number of other I/O related paths, further reducing lock contention and IPI signalling overheads. We also put topology-aware cpu cache localization into the kernel memory allocator (primarily helps multi-socket systems and systems with high core counts). The network subsystem also continues to receive significant improvement, with modest machine configurations now capable of handling upwards of 580K conns/sec.“
+&lt;a href="https://www.dragonflybsd.org/release46/" target="_blank" rel="nofollow noopener"&gt;Full Release Notes&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.freshports.org/sysutils/powerdxx/" target="_blank" rel="nofollow noopener"&gt;The powerd++ daemon monitors the system load and adjusts the CPU clock accordingly and is a drop-in replacement for FreeBSD's native powerd(8).&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As mentioned in our EuroBSDCon 2016 rundown, Dominic Fandrey will be giving a presentation about his powerd replacement, powerd++&lt;/li&gt;
&lt;li&gt;The source code is already available on github, and is in ports&lt;/li&gt;
&lt;li&gt;The major difference is the newer design handle many-core systems much better. The original powerd was written at a time when most laptops only had a single core, and maybe a hyperthread.&lt;/li&gt;
&lt;li&gt;The new design decides which CPU frequency to use by looking at the busiest core, rather than the average across the cores, resulting in a more meaningful result. It also supports averaging over a longer period of time, to avoid jumping to a higher frequency to quickly&lt;/li&gt;
&lt;li&gt;powerd++ also avoids ‘slewing’ the cpu frequency, ratching it up and down one step at a time, and instead jumps directly to the target frequency.&lt;/li&gt;
&lt;li&gt;Often times, you will use less battery by jumping to maximum frequency, finishing the work, and going back to a low power state, than trying to do that work over a longer period of time in low power mode
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=303474" target="_blank" rel="nofollow noopener"&gt;Hyper-V: Unmapped I/O improves userland direct disk performance by 35% ~ 135%&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://imgur.com/a/gjGoq" target="_blank" rel="nofollow noopener"&gt;One does not simply remove FreeBSD&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/channel/UCBua6yMtJ6W5ExYSREnS3UQ" target="_blank" rel="nofollow noopener"&gt;A new BSD Podcast "BSD Synergy" has started&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://knoxbug.org/content/2016-08-30" target="_blank" rel="nofollow noopener"&gt;KnoxBug - Next Meeting - Aug 30th &lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/8sMyKm6c" target="_blank" rel="nofollow noopener"&gt; Daniel - Root/Wheel&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/r5Y0gbxf" target="_blank" rel="nofollow noopener"&gt; Joe - IPV6 Frag&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/iVYPYcVs" target="_blank" rel="nofollow noopener"&gt; Paul - ChicagoBug&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/597m9gHa" target="_blank" rel="nofollow noopener"&gt; Chris - SSH BruteBlock&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/xjbKwSaz" target="_blank" rel="nofollow noopener"&gt; Todd - Jails &lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we have a variety of news to discuss, covering quite the spectrum of BSD. (Including a new DragonFly release!).</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/my-int-is-too-big" rel="nofollow">my int is too big</a></h3>

<ul>
<li>“The <a href="http://marc.info/?l=oss-security&m=146853062403622&w=2" rel="nofollow">NCC Group report</a> describes the bugs, but not the history of the code.”</li>
<li>“Several of them, as reported by NCC, involved similar integer truncation issues. Actually, they involved very similar modern 64 bit code meeting classic 32 bit code”</li>
<li>“The thrsleep system call is a part of the kernel code that supports threads. As the name implies, it gives userland a measure of control over scheduling and lets a thread sleep until something happens. As such, it takes a timeout in the form of a timespec. The kernel, however, internally implements time keeping using ticks (there are HZ, 100, ticks per second). The tsleep function (t is for timed) takes an int number of ticks and performs basic validation by checking that it’s not negative. A negative timeout would indicate that the caller has miscalculated. The kernel panics so you can fix the bug, instead of stalling forever.”</li>
<li>“The trouble therefore is when userland is allowed to specify a timeout that could be negative. The existing code made an attempt to handle various tricks by converting the timespec to a ticks value stored as a 64 bit long long which was checked against INT_MAX before passing to sleep. Any value over INT_MAX would be truncated, so we can’t allow that. Instead, we saturate the value to INT_MAX. Unfortunately, this check didn’t account for the possibility that the tick conversion from the timespec could also overflow and result in a negative value.”</li>
<li>Then there is the description of the kqueue flaw:</li>
<li>“Every kqueue keeps a list of all the attached events it’s watching for. A simple array is used to store file events, indexed by fd.”</li>
<li>“This array is scaled to accommodate the largest fd that needs to be stored. This would obviously cause trouble, consuming too much memory, if the identifier were not validated first. Which is exactly what kqueue tries to do. The fd_getfile function checks that the identifier is a file that the process has open. One wrinkle. fd_getfile takes an int argument but ident is a uintptr_t, possibly 64 bits. An ident of 2<sup>32</sup> + 2 will look like a valid file descriptor, but then cause the array to be resized to gargantuan proportions.”</li>
<li>“Again, the fix is pretty simple. We must check that the ident is bounded by INT_MAX before calling fd_getfile. This bug likely would have been exploitable beyond a panic, but the array allocation was changed to use mallocarray instead of multiplying arguments by hand, thus preventing another overflow.”</li>
<li>Then there is a description of the anonymous mmap flaw, and the “secret magic” __MAP_NOFAULT flag
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2016-04-2016-06.html" rel="nofollow">FreeBSD Quarterly Status Report Q2 2016</a></h3>

<ul>
<li>It’s time for another round of FreeBSD Quarterly Status Reports!</li>
<li>In this edition, we have status updates from the various teams, including IRC/Bugs/RE/Ports/Core and Foundation</li>
<li>We also have updates on some specific projects, including  from Konstantin on the on-going work for his implementation of ASLR, including the new ‘proccontrol’ command which provides the following:
&gt; “The proccontrol(1) utility was written to manage and query ASLR enforcement on a per-process basis. It is required for analyzing ASLR failures in specific programs. This utility leverages the procctl(2) interface which was added to the previous version of the patch, with some bug fixes.”</li>
<li>Next are updates on porting CEPH to FreeBSD, the ongoing work to improve EFI+GELI (touched on last week) and more robust Mutexes. </li>
<li>Additionally we have an update from Matt Macy and the Xorg team discussing the current work to update FreeBSD’s graphic stack:
&gt; “All Intel GPUs up to and including the unreleased Kaby Lake     are supported. The xf86-video-intel driver will be updated soon. Updating this driver requires updating Xorg, which in turn is blocked on Nvidia updates.”</li>
<li>The kernel also got some feature status updates, including on the new Allwinner SoC support, an update on FreeBSD in Hyper-V and VIMAGE </li>
<li>In addition to a quick update on the arm64 architecture (It’s getting there, RPi3 is almost a thing), we also have a slew of port updates, including support for GitLab in ports, updates on GNOME / KDE and some additional Intel-specific networking tools.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-security/2016-July/009016.html" rel="nofollow">Vulnerabilities discovered in freebsd-update and portsnap</a></h3>

<ul>
<li>There are two vulnerabilities discovered in freebsd-update and portsnap, where an attacker could place files in the portsnap directory and they would be used without being subject to having their checksum verified (but this requires root access), and the second where a man-in-the-middle attacker could guess the name of a file you will fetch by exploiting the time-gap between when you download the initial snapshot, and when you fetch the updated files.</li>
<li>There are a number of vulnerabilities that were discovered in libarchive/tar as well</li>
<li>There is also an issue with bspatch. A security advisory for bspatch has already been released, as this vulnerabilities was also discovered by the Chromium team, which uses this same code. The patch discussed in this mailing list thread is larger, but secteam@ believes at least one of the additional checks introduced is incorrect and may prevent a valid patch from being applied. The smaller patch was pushed out first, to solve the main attack vector, while the larger patch is investigated. Automated fuzz testing is underway. Great care is being taken fixing bspatch, as if it is broken installing future updates becomes much more difficult</li>
<li>secteam@ and core@ would like to emphasize that the FreeBSD project takes these issue very seriously and are working on it
&gt;  “As a general rule, secteam@ does not announce vulnerabilities for which we don&#39;t have patches, but we concede that we should have considered making an exception in this case”</li>
<li>Work is underway to re-architect freebsd-update and portsnap to do signature verification on all files before they are passed to libarchive/tar, to help protect users from any future vulnerabilities in libarchive.</li>
<li>However, this requires changes to the metadata format to provide these additional signatures, and backwards compatibilities must be preserved, so people can update to the newer versions to get these additional security features </li>
<li>There is also discussion of using HTTPS for delivery of the files, but certificate verification and trust are always an issue. FreeBSD does not distribute a certificate trust store by default.</li>
<li>There will be more on this in the coming days.
***</li>
</ul>

<h3><a href="http://www.openssh.com/txt/release-7.3" rel="nofollow">OpenSSH 7.3 Released</a></h3>

<ul>
<li>OpenSSH 7.3 has landed! </li>
<li>Primarily a bug-fix release, the release notes do mention the pending deprecation of some more legacy Crypto in the future, including denying all RSA keys &lt; 1024bit, and removal of SSHv1 support. (Already disabled via compile option)</li>
<li><p>On the bug side, there was a security issue addressed in sshd:</p>

<blockquote>
<p>“sshd(8): Mitigate a potential denial-of-service attack against the system&#39;s crypt(3) function via sshd(8). An attacker could send very long passwords that would cause excessive CPU use in crypt(3). sshd(8) now refuses to accept password authentication requests of length greater than 1024 characters”</p>
</blockquote></li>
<li><p>Also a timing issue was resolved in regard to password auth, which could possibly allow an attacker to discern between valid/invalid account names.</p></li>
<li><p>On the feature side, we have the new ProxyJump option (-J flag) which allows you to do simplified indirection through various SSH jump hosts.</p></li>
<li><p>Various bugs were fixed, and some compile failures resolved in the portable version to auto-disable some ciphers not supported by OpenSSL.</p>

<hr></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://jggimi.homeip.net/semibug.pdf" rel="nofollow">OpenBSD Ports - Integrating Third Party Applications [pdf]</a></h3>

<ul>
<li>A talk from Josh Grosse, presented at SEMIBUG (South-East Michigan BSD Users Group), about OpenBSD Ports</li>
<li>It opens by explaining the separation of the ‘base system’ from ‘packages’, as is common in most all BSDs</li>
<li>It explains the contents of OpenBSD package tar file, which contain some metadata files (+CONTENTS and +DESC) and then the actual package files</li>
<li>The talk goes on to explain the different branches (-release, -stable, and -current), and warn users that there are no official -stable packages from the project</li>
<li>Then it goes on into the development model, including what new contributors should expect</li>
<li>Then it walks through the entire process of creating a port and getting it contributed
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/source-changes/2016/07/27/msg076413.html" rel="nofollow">NetBSD removes last RWX page in amd64 kernel</a></h3>

<ul>
<li>NetBSD has purged the last holdout RWX page on the amd64 platform
&gt; “Use UVM_PROT_ALL only if UVM_KMF_EXEC is given as argument. Otherwise, if UVM_KMF_PAGEABLE is also given as argument, only the VA is allocated and UVM waits for the page to fault before kentering it. When kentering it, it will use the UVM_PROT_ flag that was passed to uvm_map; which means that it will kenter it as RWX. With this change, the number of RWX pages in the amd64 kernel reaches strictly zero.”</li>
<li>Break out the party favors! Hopefully any last stragglers in any of the other BSD’s gets retired soon as well.
***</li>
</ul>

<h3><a href="http://linux.softpedia.com/blog/dragonfly-bsd-4-6-0-launches-with-home-grown-support-for-nvme-controllers-506908.shtml" rel="nofollow">DragonFly BSD 4.6 launches with home-grown support for NVMe Controllers</a></h3>

<ul>
<li>Softpedia picked up on the release of DragonFlyBSD 4.6, specifically about their new home-grown NVMe driver. 
&gt; “We now have a NVMe driver (PCIe SSDs). It currently must be kldloaded with nvme_load=&quot;YES&quot; in /boot/loader.conf. The driver uses all concurrency features offered by the chip and will distribute queues and interrupts across multiple CPUs to maximize performance. It has been tested up to around 1.05M IOPS @4K, and roughly 6.5 GBytes/sec @32K (random read from urandom-filled partition, physio, many threads), with the 2xE5-2620v4 (xeon) test server 78% idle in the IOPS test and 72% idle on the bandwidth test. In other words, we maxed out the three NVMe devices we had plugged in and the system still had plenty of suds left over. Please note that a machine&#39;s ability to boot from an NVMe device depends on the BIOS, and not DragonFly. Most BIOSes cannot boot from NVMe devices and those that can probably only do it through UEFI. Info on device state is available with the new utility nvmectl.“</li>
<li>In addition to this improved support, 4.6 also brings in the improved graphics support, matching what is in Linux 4.4 and support for Broadwell/Skylake.</li>
<li>SMP also got some love:
&gt; “SMP performance was already very good. As part of the NVMe driver work we revamped the buffer cache subsystem and a number of other I/O related paths, further reducing lock contention and IPI signalling overheads. We also put topology-aware cpu cache localization into the kernel memory allocator (primarily helps multi-socket systems and systems with high core counts). The network subsystem also continues to receive significant improvement, with modest machine configurations now capable of handling upwards of 580K conns/sec.“
+<a href="https://www.dragonflybsd.org/release46/" rel="nofollow">Full Release Notes</a> 
***</li>
</ul>

<h3><a href="http://www.freshports.org/sysutils/powerdxx/" rel="nofollow">The powerd++ daemon monitors the system load and adjusts the CPU clock accordingly and is a drop-in replacement for FreeBSD&#39;s native powerd(8).</a></h3>

<ul>
<li>As mentioned in our EuroBSDCon 2016 rundown, Dominic Fandrey will be giving a presentation about his powerd replacement, powerd++</li>
<li>The source code is already available on github, and is in ports</li>
<li>The major difference is the newer design handle many-core systems much better. The original powerd was written at a time when most laptops only had a single core, and maybe a hyperthread.</li>
<li>The new design decides which CPU frequency to use by looking at the busiest core, rather than the average across the cores, resulting in a more meaningful result. It also supports averaging over a longer period of time, to avoid jumping to a higher frequency to quickly</li>
<li>powerd++ also avoids ‘slewing’ the cpu frequency, ratching it up and down one step at a time, and instead jumps directly to the target frequency.</li>
<li>Often times, you will use less battery by jumping to maximum frequency, finishing the work, and going back to a low power state, than trying to do that work over a longer period of time in low power mode
***</li>
</ul>

<h2>Beastie Bits</h2>

<p><a href="https://svnweb.freebsd.org/base?view=revision&revision=303474" rel="nofollow">Hyper-V: Unmapped I/O improves userland direct disk performance by 35% ~ 135%</a> </p>

<p><a href="https://imgur.com/a/gjGoq" rel="nofollow">One does not simply remove FreeBSD</a> </p>

<p><a href="https://www.youtube.com/channel/UCBua6yMtJ6W5ExYSREnS3UQ" rel="nofollow">A new BSD Podcast &quot;BSD Synergy&quot; has started</a></p>

<p><a href="http://knoxbug.org/content/2016-08-30" rel="nofollow">KnoxBug - Next Meeting - Aug 30th </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/8sMyKm6c" rel="nofollow"> Daniel - Root/Wheel</a> </li>
<li><a href="http://pastebin.com/r5Y0gbxf" rel="nofollow"> Joe - IPV6 Frag</a> </li>
<li><a href="http://pastebin.com/iVYPYcVs" rel="nofollow"> Paul - ChicagoBug</a> </li>
<li><a href="http://pastebin.com/597m9gHa" rel="nofollow"> Chris - SSH BruteBlock</a> </li>
<li><a href="http://pastebin.com/xjbKwSaz" rel="nofollow"> Todd - Jails </a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we have a variety of news to discuss, covering quite the spectrum of BSD. (Including a new DragonFly release!).</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/my-int-is-too-big" rel="nofollow">my int is too big</a></h3>

<ul>
<li>“The <a href="http://marc.info/?l=oss-security&m=146853062403622&w=2" rel="nofollow">NCC Group report</a> describes the bugs, but not the history of the code.”</li>
<li>“Several of them, as reported by NCC, involved similar integer truncation issues. Actually, they involved very similar modern 64 bit code meeting classic 32 bit code”</li>
<li>“The thrsleep system call is a part of the kernel code that supports threads. As the name implies, it gives userland a measure of control over scheduling and lets a thread sleep until something happens. As such, it takes a timeout in the form of a timespec. The kernel, however, internally implements time keeping using ticks (there are HZ, 100, ticks per second). The tsleep function (t is for timed) takes an int number of ticks and performs basic validation by checking that it’s not negative. A negative timeout would indicate that the caller has miscalculated. The kernel panics so you can fix the bug, instead of stalling forever.”</li>
<li>“The trouble therefore is when userland is allowed to specify a timeout that could be negative. The existing code made an attempt to handle various tricks by converting the timespec to a ticks value stored as a 64 bit long long which was checked against INT_MAX before passing to sleep. Any value over INT_MAX would be truncated, so we can’t allow that. Instead, we saturate the value to INT_MAX. Unfortunately, this check didn’t account for the possibility that the tick conversion from the timespec could also overflow and result in a negative value.”</li>
<li>Then there is the description of the kqueue flaw:</li>
<li>“Every kqueue keeps a list of all the attached events it’s watching for. A simple array is used to store file events, indexed by fd.”</li>
<li>“This array is scaled to accommodate the largest fd that needs to be stored. This would obviously cause trouble, consuming too much memory, if the identifier were not validated first. Which is exactly what kqueue tries to do. The fd_getfile function checks that the identifier is a file that the process has open. One wrinkle. fd_getfile takes an int argument but ident is a uintptr_t, possibly 64 bits. An ident of 2<sup>32</sup> + 2 will look like a valid file descriptor, but then cause the array to be resized to gargantuan proportions.”</li>
<li>“Again, the fix is pretty simple. We must check that the ident is bounded by INT_MAX before calling fd_getfile. This bug likely would have been exploitable beyond a panic, but the array allocation was changed to use mallocarray instead of multiplying arguments by hand, thus preventing another overflow.”</li>
<li>Then there is a description of the anonymous mmap flaw, and the “secret magic” __MAP_NOFAULT flag
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2016-04-2016-06.html" rel="nofollow">FreeBSD Quarterly Status Report Q2 2016</a></h3>

<ul>
<li>It’s time for another round of FreeBSD Quarterly Status Reports!</li>
<li>In this edition, we have status updates from the various teams, including IRC/Bugs/RE/Ports/Core and Foundation</li>
<li>We also have updates on some specific projects, including  from Konstantin on the on-going work for his implementation of ASLR, including the new ‘proccontrol’ command which provides the following:
&gt; “The proccontrol(1) utility was written to manage and query ASLR enforcement on a per-process basis. It is required for analyzing ASLR failures in specific programs. This utility leverages the procctl(2) interface which was added to the previous version of the patch, with some bug fixes.”</li>
<li>Next are updates on porting CEPH to FreeBSD, the ongoing work to improve EFI+GELI (touched on last week) and more robust Mutexes. </li>
<li>Additionally we have an update from Matt Macy and the Xorg team discussing the current work to update FreeBSD’s graphic stack:
&gt; “All Intel GPUs up to and including the unreleased Kaby Lake     are supported. The xf86-video-intel driver will be updated soon. Updating this driver requires updating Xorg, which in turn is blocked on Nvidia updates.”</li>
<li>The kernel also got some feature status updates, including on the new Allwinner SoC support, an update on FreeBSD in Hyper-V and VIMAGE </li>
<li>In addition to a quick update on the arm64 architecture (It’s getting there, RPi3 is almost a thing), we also have a slew of port updates, including support for GitLab in ports, updates on GNOME / KDE and some additional Intel-specific networking tools.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-security/2016-July/009016.html" rel="nofollow">Vulnerabilities discovered in freebsd-update and portsnap</a></h3>

<ul>
<li>There are two vulnerabilities discovered in freebsd-update and portsnap, where an attacker could place files in the portsnap directory and they would be used without being subject to having their checksum verified (but this requires root access), and the second where a man-in-the-middle attacker could guess the name of a file you will fetch by exploiting the time-gap between when you download the initial snapshot, and when you fetch the updated files.</li>
<li>There are a number of vulnerabilities that were discovered in libarchive/tar as well</li>
<li>There is also an issue with bspatch. A security advisory for bspatch has already been released, as this vulnerabilities was also discovered by the Chromium team, which uses this same code. The patch discussed in this mailing list thread is larger, but secteam@ believes at least one of the additional checks introduced is incorrect and may prevent a valid patch from being applied. The smaller patch was pushed out first, to solve the main attack vector, while the larger patch is investigated. Automated fuzz testing is underway. Great care is being taken fixing bspatch, as if it is broken installing future updates becomes much more difficult</li>
<li>secteam@ and core@ would like to emphasize that the FreeBSD project takes these issue very seriously and are working on it
&gt;  “As a general rule, secteam@ does not announce vulnerabilities for which we don&#39;t have patches, but we concede that we should have considered making an exception in this case”</li>
<li>Work is underway to re-architect freebsd-update and portsnap to do signature verification on all files before they are passed to libarchive/tar, to help protect users from any future vulnerabilities in libarchive.</li>
<li>However, this requires changes to the metadata format to provide these additional signatures, and backwards compatibilities must be preserved, so people can update to the newer versions to get these additional security features </li>
<li>There is also discussion of using HTTPS for delivery of the files, but certificate verification and trust are always an issue. FreeBSD does not distribute a certificate trust store by default.</li>
<li>There will be more on this in the coming days.
***</li>
</ul>

<h3><a href="http://www.openssh.com/txt/release-7.3" rel="nofollow">OpenSSH 7.3 Released</a></h3>

<ul>
<li>OpenSSH 7.3 has landed! </li>
<li>Primarily a bug-fix release, the release notes do mention the pending deprecation of some more legacy Crypto in the future, including denying all RSA keys &lt; 1024bit, and removal of SSHv1 support. (Already disabled via compile option)</li>
<li><p>On the bug side, there was a security issue addressed in sshd:</p>

<blockquote>
<p>“sshd(8): Mitigate a potential denial-of-service attack against the system&#39;s crypt(3) function via sshd(8). An attacker could send very long passwords that would cause excessive CPU use in crypt(3). sshd(8) now refuses to accept password authentication requests of length greater than 1024 characters”</p>
</blockquote></li>
<li><p>Also a timing issue was resolved in regard to password auth, which could possibly allow an attacker to discern between valid/invalid account names.</p></li>
<li><p>On the feature side, we have the new ProxyJump option (-J flag) which allows you to do simplified indirection through various SSH jump hosts.</p></li>
<li><p>Various bugs were fixed, and some compile failures resolved in the portable version to auto-disable some ciphers not supported by OpenSSL.</p>

<hr></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://jggimi.homeip.net/semibug.pdf" rel="nofollow">OpenBSD Ports - Integrating Third Party Applications [pdf]</a></h3>

<ul>
<li>A talk from Josh Grosse, presented at SEMIBUG (South-East Michigan BSD Users Group), about OpenBSD Ports</li>
<li>It opens by explaining the separation of the ‘base system’ from ‘packages’, as is common in most all BSDs</li>
<li>It explains the contents of OpenBSD package tar file, which contain some metadata files (+CONTENTS and +DESC) and then the actual package files</li>
<li>The talk goes on to explain the different branches (-release, -stable, and -current), and warn users that there are no official -stable packages from the project</li>
<li>Then it goes on into the development model, including what new contributors should expect</li>
<li>Then it walks through the entire process of creating a port and getting it contributed
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/source-changes/2016/07/27/msg076413.html" rel="nofollow">NetBSD removes last RWX page in amd64 kernel</a></h3>

<ul>
<li>NetBSD has purged the last holdout RWX page on the amd64 platform
&gt; “Use UVM_PROT_ALL only if UVM_KMF_EXEC is given as argument. Otherwise, if UVM_KMF_PAGEABLE is also given as argument, only the VA is allocated and UVM waits for the page to fault before kentering it. When kentering it, it will use the UVM_PROT_ flag that was passed to uvm_map; which means that it will kenter it as RWX. With this change, the number of RWX pages in the amd64 kernel reaches strictly zero.”</li>
<li>Break out the party favors! Hopefully any last stragglers in any of the other BSD’s gets retired soon as well.
***</li>
</ul>

<h3><a href="http://linux.softpedia.com/blog/dragonfly-bsd-4-6-0-launches-with-home-grown-support-for-nvme-controllers-506908.shtml" rel="nofollow">DragonFly BSD 4.6 launches with home-grown support for NVMe Controllers</a></h3>

<ul>
<li>Softpedia picked up on the release of DragonFlyBSD 4.6, specifically about their new home-grown NVMe driver. 
&gt; “We now have a NVMe driver (PCIe SSDs). It currently must be kldloaded with nvme_load=&quot;YES&quot; in /boot/loader.conf. The driver uses all concurrency features offered by the chip and will distribute queues and interrupts across multiple CPUs to maximize performance. It has been tested up to around 1.05M IOPS @4K, and roughly 6.5 GBytes/sec @32K (random read from urandom-filled partition, physio, many threads), with the 2xE5-2620v4 (xeon) test server 78% idle in the IOPS test and 72% idle on the bandwidth test. In other words, we maxed out the three NVMe devices we had plugged in and the system still had plenty of suds left over. Please note that a machine&#39;s ability to boot from an NVMe device depends on the BIOS, and not DragonFly. Most BIOSes cannot boot from NVMe devices and those that can probably only do it through UEFI. Info on device state is available with the new utility nvmectl.“</li>
<li>In addition to this improved support, 4.6 also brings in the improved graphics support, matching what is in Linux 4.4 and support for Broadwell/Skylake.</li>
<li>SMP also got some love:
&gt; “SMP performance was already very good. As part of the NVMe driver work we revamped the buffer cache subsystem and a number of other I/O related paths, further reducing lock contention and IPI signalling overheads. We also put topology-aware cpu cache localization into the kernel memory allocator (primarily helps multi-socket systems and systems with high core counts). The network subsystem also continues to receive significant improvement, with modest machine configurations now capable of handling upwards of 580K conns/sec.“
+<a href="https://www.dragonflybsd.org/release46/" rel="nofollow">Full Release Notes</a> 
***</li>
</ul>

<h3><a href="http://www.freshports.org/sysutils/powerdxx/" rel="nofollow">The powerd++ daemon monitors the system load and adjusts the CPU clock accordingly and is a drop-in replacement for FreeBSD&#39;s native powerd(8).</a></h3>

<ul>
<li>As mentioned in our EuroBSDCon 2016 rundown, Dominic Fandrey will be giving a presentation about his powerd replacement, powerd++</li>
<li>The source code is already available on github, and is in ports</li>
<li>The major difference is the newer design handle many-core systems much better. The original powerd was written at a time when most laptops only had a single core, and maybe a hyperthread.</li>
<li>The new design decides which CPU frequency to use by looking at the busiest core, rather than the average across the cores, resulting in a more meaningful result. It also supports averaging over a longer period of time, to avoid jumping to a higher frequency to quickly</li>
<li>powerd++ also avoids ‘slewing’ the cpu frequency, ratching it up and down one step at a time, and instead jumps directly to the target frequency.</li>
<li>Often times, you will use less battery by jumping to maximum frequency, finishing the work, and going back to a low power state, than trying to do that work over a longer period of time in low power mode
***</li>
</ul>

<h2>Beastie Bits</h2>

<p><a href="https://svnweb.freebsd.org/base?view=revision&revision=303474" rel="nofollow">Hyper-V: Unmapped I/O improves userland direct disk performance by 35% ~ 135%</a> </p>

<p><a href="https://imgur.com/a/gjGoq" rel="nofollow">One does not simply remove FreeBSD</a> </p>

<p><a href="https://www.youtube.com/channel/UCBua6yMtJ6W5ExYSREnS3UQ" rel="nofollow">A new BSD Podcast &quot;BSD Synergy&quot; has started</a></p>

<p><a href="http://knoxbug.org/content/2016-08-30" rel="nofollow">KnoxBug - Next Meeting - Aug 30th </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/8sMyKm6c" rel="nofollow"> Daniel - Root/Wheel</a> </li>
<li><a href="http://pastebin.com/r5Y0gbxf" rel="nofollow"> Joe - IPV6 Frag</a> </li>
<li><a href="http://pastebin.com/iVYPYcVs" rel="nofollow"> Paul - ChicagoBug</a> </li>
<li><a href="http://pastebin.com/597m9gHa" rel="nofollow"> Chris - SSH BruteBlock</a> </li>
<li><a href="http://pastebin.com/xjbKwSaz" rel="nofollow"> Todd - Jails </a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>152: The Laporte has landed!</title>
  <link>https://www.bsdnow.tv/152</link>
  <guid isPermaLink="false">b946bdcd-f9d8-4480-995a-0eb2cb5e1b77</guid>
  <pubDate>Wed, 27 Jul 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b946bdcd-f9d8-4480-995a-0eb2cb5e1b77.mp3" length="51561940" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we have some big breaking news about another major switcher to FreeBSD, plus early information about the pending</itunes:subtitle>
  <itunes:duration>1:11:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we have some big breaking news about another major switcher to FreeBSD, plus early information about the pending&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for &amp;lt;br&amp;gt;
Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly &amp;lt;br&amp;gt;
Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.leolaporte.com/blog/a-grand-experiment" target="_blank" rel="nofollow noopener"&gt;Leo Laporte tries FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Leo Laporte, formerly of TechTV, and now of TWiT.tv, is switching to FreeBSD&lt;/li&gt;
&lt;li&gt;“The latest debacle over the "forced" upgrade to Windows 10 and Apple's increasingly locked-in ecosystem has got me thinking. Do I really need to use a proprietary operating system to get work done? And while I'm at it, do I need to use commercial cloud services to store my data?”&lt;/li&gt;
&lt;li&gt;A sometimes Linux user since the mid 90s, Leo talks about his motivations:&lt;/li&gt;
&lt;li&gt;“But as time went by, even Ubuntu began to seem too commercial to me”&lt;/li&gt;
&lt;li&gt;“So now for the grand experiment. Is it possible, I wonder, to do everything I need to do on an even more venerable, more robust system: a true UNIX OS, FreeBSD? Here are my requirements”&lt;/li&gt;
&lt;li&gt;Browsing&lt;/li&gt;
&lt;li&gt;Email with PGP signing and encryption&lt;/li&gt;
&lt;li&gt;Coding - I'm a hobbyist programmer requiring support for lisp/scheme/racket, rust, and python (and maybe forth and clojure and meteor and whatever else is cool and new)&lt;/li&gt;
&lt;li&gt;Writing&lt;/li&gt;
&lt;li&gt;A password vault. I currently use Lastpass because it syncs with mobile but eventually I'll need to find a FOSS replacement for that, too&lt;/li&gt;
&lt;li&gt;Photo editing - this is the toughest to replace. I love Photoshop and Lightroom. Can I get by with, say, GIMP and Darktable?&lt;/li&gt;
&lt;li&gt;I do all of those things on my PCBSD machine all the time&lt;/li&gt;
&lt;li&gt;“I love Linux and will continue to use it on my laptops, but for my main workhorse desktop I think FreeBSD will be a better choice. I also look forward to learning and administering a true UNIX system.”&lt;/li&gt;
&lt;li&gt;He got a nice SuperMicro based workstation, with an Intel Xeon E3-1275v5 and an NVIDIA GeForce GTX 960 GPU&lt;/li&gt;
&lt;li&gt;I have a server with one of those Skylake E3s, it is very nice&lt;/li&gt;
&lt;li&gt;“450Mbps Wireless N Dual Band PCI-e Adapter w/ 3x 2dBi Antennas (Yes, sad to say, unless I rewire my house I'll have to use Wi-Fi with this beast. I'll probably rewire my house.)”&lt;/li&gt;
&lt;li&gt;He plans to have a 4x 1TB ZFS pool, plus a second pool backed by a 512 GB NVMe m.2 for the OS&lt;/li&gt;
&lt;li&gt;“And I'll continue to chronicle my journey into the land of FOSS here when The Beast arrives. But in the meantime, please excuse me, I've got some reading to do.”&lt;/li&gt;
&lt;li&gt;Leo went so far as to &lt;a href="https://youtu.be/vNVst_rxxm0?t=270" target="_blank" rel="nofollow noopener"&gt;slap a “Power By FreeBSD” sticker &lt;/a&gt; on the back of his new Tesla
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160725100831" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.0 to be released on Sept 1st, 2016&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.openbsd.org/60.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.0 Tenative Released Notes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;OpenBSD 6.0 is just around the corner, currently slated for Sept 1st and brings with it a whole slew of exciting new features&lt;/li&gt;
&lt;li&gt;First up, and let’s get this right out of the way.. VAX support has been dropped!! Oh no!&lt;/li&gt;
&lt;li&gt;However to make up for this devastating loss, armv7 has been added to this release.&lt;/li&gt;
&lt;li&gt;The tentative release notes are very complete and marks 6.0 as quite an exciting release&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160726230851" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.0 Pre-orders up&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.infoworld.com/article/3099038/open-source-tools/openbsd-60-tightens-security-by-losing-linux-compatibility.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 6.0 tightens security by losing Linux compatibility&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In related news, infoworld picked up on the pending removal of Linux compat from OpenBSD 6.0.&lt;/li&gt;
&lt;li&gt;Touted as a security feature, you will soon be unable to run legacy linux binaries on OpenBSD. This has both positives and negatives depending upon your use case. Ironically we’re excitedly awaiting improved Linux Compat support in FreeBSD, to allow running some various closed-source applications. (Netflix DRM, Steam, Skype to name a few)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://2016.eurobsdcon.org/talks-schedule/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2016 Schedule released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://2016.eurobsdcon.org/tutorials/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2016 Tutorial Schedule released&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;EuroBSDCon has announced the list of talks and tutorials for September 22nd-25th’s conference!&lt;/li&gt;
&lt;li&gt;George Neville Neil (Who we’ve interviewed in the past) is giving the keynote about “The Coming Decades of BSD”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;Blast from the past&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;No interview again this week, we’re working on getting some people lined up.&lt;/li&gt;
&lt;li&gt;The Leo Laporte story brought these old gem from TechTV into my youtube playlist:&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=d0UsXwRvaIg" target="_blank" rel="nofollow noopener"&gt;Matt Olander and Murrey Stokey explain FreeBSD on TechTV &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=bAsYz5pVwyc" target="_blank" rel="nofollow noopener"&gt;Matt Olander and Brooks Davis explain building a cluster with FreeBSD on TechTV &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=91igg2UX7o8" target="_blank" rel="nofollow noopener"&gt;FreeBSD vs Linux Part 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=oU88fQkwfws" target="_blank" rel="nofollow noopener"&gt;FreeBSD vs Linux Part 2&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://ericmccorkleblog.wordpress.com/2016/07/16/freebsd-librem-update/" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD on the LibreM &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eric McCorkle (Who has worked on the EFI loader for a while now) has written an update on his efforts to get FreeBSD working properly on the LibreM 13 laptop.&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Since April the work seems to be progressing nicely&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Matt Macy’s i915 graphics patch works well on the Librem 13, and I personally made sure that the suspend/resume support works.  The patch is very stable on the Librem, and I’ve only had one kernel panic the entire time testing it.&lt;/li&gt;
&lt;li&gt;The HDMI output Just Works™ with the i915 driver.  Even better, it works for both X11 and console modes.&lt;/li&gt;
&lt;li&gt;Full support for the Atheros 9462 card has been merged in.  I’ve had some occasional issues, but it works for the most part.&lt;/li&gt;
&lt;li&gt;The vesa weirdness is obviated by i915 support, but it was resolved by using the scfb driver.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Some of the outstanding issues still being worked on are support for Synaptics on this particular touchpad, as well as hotkey support for the keyboard, and brightness controls.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In addition Eric is still working on the EFI + Geli support, with the eventual goal of getting EFI secure-boot working out of box as well.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://seclists.org/oss-sec/2016/q3/157" target="_blank" rel="nofollow noopener"&gt;More OpenBSD syscall fuzzing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NCC Group’s Project Triforce continues its work of fuzzing OpenBSD&lt;/li&gt;
&lt;li&gt;This time they have found a flaw that allows any user to panic the kernel&lt;/li&gt;
&lt;li&gt;Attempting to read from the tmpfs_vfsops sysctl tree will panic the system: “attempt to execute user address 0x0 in supervisor mode”&lt;/li&gt;
&lt;li&gt;This is actually a “good” thing…&lt;/li&gt;
&lt;li&gt;“Impact: Any user can panic the kernel by using the sysctl call.  If a user can manage to map a page at address zero, they may be able to gain kernel code execution and escalate privileges”&lt;/li&gt;
&lt;li&gt;OpenBSD’s default configuration prevents mapping a page at address zero, so the code execution is prevented&lt;/li&gt;
&lt;li&gt;So while a panic is a bad outcome, it is a lot better than it could have been
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://akat1.pl/?id=2" target="_blank" rel="nofollow noopener"&gt;Root privilege escalation on NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This post described a root privilege escalation in NetBSD&lt;/li&gt;
&lt;li&gt;mail.local is a utility included in the base system for delivering mail to other users on the same system, rather than invoking a mail client and going through the mail server.&lt;/li&gt;
&lt;li&gt;The mail.local utility contains a ‘time of check / time of use’ vulnerability. This means that it checks if a file or permission is valid, and then later accesses that file. If an attacker can change that file between the time when it is checked, and the time when it is used, they may be able to exploit the system by evading the check&lt;/li&gt;
&lt;li&gt;This is exactly what happens in this case&lt;/li&gt;
&lt;li&gt;mail.local appends a message to the indicated user’s mailbox&lt;/li&gt;
&lt;li&gt;It first checks if the target user already has an existing mailbox file. If the file exists, but is a link, mail.local exits with an error (to prevent exploits)&lt;/li&gt;
&lt;li&gt;If the file does not exist, it is created&lt;/li&gt;
&lt;li&gt;The message is then appended to the file&lt;/li&gt;
&lt;li&gt;If the file needed to be created, it is chown’d to the owner of the mailbox&lt;/li&gt;
&lt;li&gt;This is where the problem lies, if mail.local checks and does not find the mailbox, but an attacker then creates a link from the target mailbox to some other file&lt;/li&gt;
&lt;li&gt;mail.local then appends to that file instead, thinking it is creating the new mailbox&lt;/li&gt;
&lt;li&gt;Then, mail.local chown’s the target file to the user the attacker was trying to send mail to&lt;/li&gt;
&lt;li&gt;The article explains how this could be used to replace /etc/master.passwd etc, but opts for an easier proof of concept, replacing /usr/bin/atrun, which is run as root every 5 minutes from crontab with a script that will copy the shell to /tmp and mark it setuid&lt;/li&gt;
&lt;li&gt;The attacker can then run that shell out of /tmp, and be root&lt;/li&gt;
&lt;li&gt;NetBSD fixed the vulnerability by changing the code flow, separating the cases for opening an existing file from creating a new file.&lt;/li&gt;
&lt;li&gt;In the case where an existing file is opened, the code then verifies that the file that was opened has the same inode number and is on the same device, as the file that was checked earlier, to ensure it was not a link
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:25.bspatch.asc" target="_blank" rel="nofollow noopener"&gt;FreeBSD Heap vulnerability in bspatch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An important vuln has been found and fixed in FreeBSD this past week, specifically relating to the ‘bspatch’ utility.&lt;/li&gt;
&lt;li&gt;“Upstream's bspatch.c implementation doesn't check for negative values on the number of bytes to read from the "diff" and "extra" streams, allowing an attacker controlling the patch file to write at arbitrary locations in the heap.”&lt;/li&gt;
&lt;li&gt;This could result in a crash, or running arbitrary code as the user running bspatch. (Often root)&lt;/li&gt;
&lt;li&gt;“bspatch's main loop reads three numbers from the "control" stream in the patch: X, Y and Z. The first two are the number of bytes to read from "diff" and "extra" (and thus only non-negative), while the third one could be positive or negative and moves the oldpos pointer on the source image. These 3 values are 64bits signed ints (encoded somehow on the file) that are later passed the function that reads from the streams, but those values are not verified to be non-negative.”&lt;/li&gt;
&lt;li&gt;“Chrome[OS] has four different implementations of this program, all derived from the same original code by Colin Percival.”&lt;/li&gt;
&lt;li&gt;&lt;a href="https://bugs.chromium.org/p/chromium/issues/detail?id=372525" target="_blank" rel="nofollow noopener"&gt;Chromium Issue Tracker &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Patch your systems now!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits:&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/q5sys/status/758087886927388673" target="_blank" rel="nofollow noopener"&gt;If you're a BUG member or Organizer, please contact BSD Now&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.tedunangst.com/flak/post/one-reason-to-hate-openbsd" target="_blank" rel="nofollow noopener"&gt;TedU writes about some interesting localizations to gcc in openbsd, and why they are there &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/List_of_products_based_on_FreeBSD" target="_blank" rel="nofollow noopener"&gt;List of Products based on FreeBSD -- Help complete the list &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.freshports.org/emulators/virtualbox-ose/" target="_blank" rel="nofollow noopener"&gt;Virtualbox v5 hits the FreeBSD Ports tree&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://gist.github.com/gonzopancho/b71be467f45594822131f4816d6cb718" target="_blank" rel="nofollow noopener"&gt;Skull Canyon NUC booting FreeBSD 11.0-BETA2&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/blog/2016-bsdcan-trip-report-trent-thompson/" target="_blank" rel="nofollow noopener"&gt;2016 BSDCan Trip Report : Trent Thompson&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/regional-london/2016/07/25/msg000542.html" target="_blank" rel="nofollow noopener"&gt;August London BSD Meetup&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/eiWbDXTd" target="_blank" rel="nofollow noopener"&gt; Michael Open-Source Alts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/w9aCDBut" target="_blank" rel="nofollow noopener"&gt; Herminio - AP Troubles&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/d15QpVFw" target="_blank" rel="nofollow noopener"&gt; Jake - Plasma&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Wj1P7jq8" target="_blank" rel="nofollow noopener"&gt; Morgan - Clean DO Droplets&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/U9PYEH6K" target="_blank" rel="nofollow noopener"&gt;Chris - Auditd&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we have some big breaking news about another major switcher to FreeBSD, plus early information about the pending</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.leolaporte.com/blog/a-grand-experiment" rel="nofollow">Leo Laporte tries FreeBSD</a></h3>

<ul>
<li>Leo Laporte, formerly of TechTV, and now of TWiT.tv, is switching to FreeBSD</li>
<li>“The latest debacle over the &quot;forced&quot; upgrade to Windows 10 and Apple&#39;s increasingly locked-in ecosystem has got me thinking. Do I really need to use a proprietary operating system to get work done? And while I&#39;m at it, do I need to use commercial cloud services to store my data?”</li>
<li>A sometimes Linux user since the mid 90s, Leo talks about his motivations:</li>
<li>“But as time went by, even Ubuntu began to seem too commercial to me”</li>
<li>“So now for the grand experiment. Is it possible, I wonder, to do everything I need to do on an even more venerable, more robust system: a true UNIX OS, FreeBSD? Here are my requirements”</li>
<li>Browsing</li>
<li>Email with PGP signing and encryption</li>
<li>Coding - I&#39;m a hobbyist programmer requiring support for lisp/scheme/racket, rust, and python (and maybe forth and clojure and meteor and whatever else is cool and new)</li>
<li>Writing</li>
<li>A password vault. I currently use Lastpass because it syncs with mobile but eventually I&#39;ll need to find a FOSS replacement for that, too</li>
<li>Photo editing - this is the toughest to replace. I love Photoshop and Lightroom. Can I get by with, say, GIMP and Darktable?</li>
<li>I do all of those things on my PCBSD machine all the time</li>
<li>“I love Linux and will continue to use it on my laptops, but for my main workhorse desktop I think FreeBSD will be a better choice. I also look forward to learning and administering a true UNIX system.”</li>
<li>He got a nice SuperMicro based workstation, with an Intel Xeon E3-1275v5 and an NVIDIA GeForce GTX 960 GPU</li>
<li>I have a server with one of those Skylake E3s, it is very nice</li>
<li>“450Mbps Wireless N Dual Band PCI-e Adapter w/ 3x 2dBi Antennas (Yes, sad to say, unless I rewire my house I&#39;ll have to use Wi-Fi with this beast. I&#39;ll probably rewire my house.)”</li>
<li>He plans to have a 4x 1TB ZFS pool, plus a second pool backed by a 512 GB NVMe m.2 for the OS</li>
<li>“And I&#39;ll continue to chronicle my journey into the land of FOSS here when The Beast arrives. But in the meantime, please excuse me, I&#39;ve got some reading to do.”</li>
<li>Leo went so far as to <a href="https://youtu.be/vNVst_rxxm0?t=270" rel="nofollow">slap a “Power By FreeBSD” sticker </a> on the back of his new Tesla
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160725100831" rel="nofollow">OpenBSD 6.0 to be released on Sept 1st, 2016</a></h3>

<ul>
<li><a href="https://www.openbsd.org/60.html" rel="nofollow">OpenBSD 6.0 Tenative Released Notes</a></li>
<li>OpenBSD 6.0 is just around the corner, currently slated for Sept 1st and brings with it a whole slew of exciting new features</li>
<li>First up, and let’s get this right out of the way.. VAX support has been dropped!! Oh no!</li>
<li>However to make up for this devastating loss, armv7 has been added to this release.</li>
<li>The tentative release notes are very complete and marks 6.0 as quite an exciting release</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160726230851" rel="nofollow">OpenBSD 6.0 Pre-orders up</a> </li>
</ul>

<h3><a href="http://www.infoworld.com/article/3099038/open-source-tools/openbsd-60-tightens-security-by-losing-linux-compatibility.html" rel="nofollow">OpenBSD 6.0 tightens security by losing Linux compatibility</a></h3>

<ul>
<li>In related news, infoworld picked up on the pending removal of Linux compat from OpenBSD 6.0.</li>
<li>Touted as a security feature, you will soon be unable to run legacy linux binaries on OpenBSD. This has both positives and negatives depending upon your use case. Ironically we’re excitedly awaiting improved Linux Compat support in FreeBSD, to allow running some various closed-source applications. (Netflix DRM, Steam, Skype to name a few)
***</li>
</ul>

<h3><a href="https://2016.eurobsdcon.org/talks-schedule/" rel="nofollow">EuroBSDCon 2016 Schedule released</a></h3>

<ul>
<li><a href="https://2016.eurobsdcon.org/tutorials/" rel="nofollow">EuroBSDCon 2016 Tutorial Schedule released</a> </li>
<li>EuroBSDCon has announced the list of talks and tutorials for September 22nd-25th’s conference!</li>
<li>George Neville Neil (Who we’ve interviewed in the past) is giving the keynote about “The Coming Decades of BSD”
***</li>
</ul>

<h2>News Roundup</h2>

<h3>Blast from the past</h3>

<ul>
<li>No interview again this week, we’re working on getting some people lined up.</li>
<li>The Leo Laporte story brought these old gem from TechTV into my youtube playlist:</li>
<li><a href="https://www.youtube.com/watch?v=d0UsXwRvaIg" rel="nofollow">Matt Olander and Murrey Stokey explain FreeBSD on TechTV </a></li>
<li><a href="https://www.youtube.com/watch?v=bAsYz5pVwyc" rel="nofollow">Matt Olander and Brooks Davis explain building a cluster with FreeBSD on TechTV </a></li>
<li><a href="https://www.youtube.com/watch?v=91igg2UX7o8" rel="nofollow">FreeBSD vs Linux Part 1</a></li>
<li><a href="https://www.youtube.com/watch?v=oU88fQkwfws" rel="nofollow">FreeBSD vs Linux Part 2</a>
***</li>
</ul>

<h3><a href="https://ericmccorkleblog.wordpress.com/2016/07/16/freebsd-librem-update/" rel="nofollow">Running FreeBSD on the LibreM </a></h3>

<ul>
<li>Eric McCorkle (Who has worked on the EFI loader for a while now) has written an update on his efforts to get FreeBSD working properly on the LibreM 13 laptop.</li>
<li><p>Since April the work seems to be progressing nicely</p>

<ul>
<li>Matt Macy’s i915 graphics patch works well on the Librem 13, and I personally made sure that the suspend/resume support works.  The patch is very stable on the Librem, and I’ve only had one kernel panic the entire time testing it.</li>
<li>The HDMI output Just Works™ with the i915 driver.  Even better, it works for both X11 and console modes.</li>
<li>Full support for the Atheros 9462 card has been merged in.  I’ve had some occasional issues, but it works for the most part.</li>
<li>The vesa weirdness is obviated by i915 support, but it was resolved by using the scfb driver.</li>
</ul></li>
<li><p>Some of the outstanding issues still being worked on are support for Synaptics on this particular touchpad, as well as hotkey support for the keyboard, and brightness controls.</p></li>
<li><p>In addition Eric is still working on the EFI + Geli support, with the eventual goal of getting EFI secure-boot working out of box as well.</p>

<hr></li>
</ul>

<h3><a href="http://seclists.org/oss-sec/2016/q3/157" rel="nofollow">More OpenBSD syscall fuzzing</a></h3>

<ul>
<li>NCC Group’s Project Triforce continues its work of fuzzing OpenBSD</li>
<li>This time they have found a flaw that allows any user to panic the kernel</li>
<li>Attempting to read from the tmpfs_vfsops sysctl tree will panic the system: “attempt to execute user address 0x0 in supervisor mode”</li>
<li>This is actually a “good” thing…</li>
<li>“Impact: Any user can panic the kernel by using the sysctl call.  If a user can manage to map a page at address zero, they may be able to gain kernel code execution and escalate privileges”</li>
<li>OpenBSD’s default configuration prevents mapping a page at address zero, so the code execution is prevented</li>
<li>So while a panic is a bad outcome, it is a lot better than it could have been
***</li>
</ul>

<h3><a href="http://akat1.pl/?id=2" rel="nofollow">Root privilege escalation on NetBSD</a></h3>

<ul>
<li>This post described a root privilege escalation in NetBSD</li>
<li>mail.local is a utility included in the base system for delivering mail to other users on the same system, rather than invoking a mail client and going through the mail server.</li>
<li>The mail.local utility contains a ‘time of check / time of use’ vulnerability. This means that it checks if a file or permission is valid, and then later accesses that file. If an attacker can change that file between the time when it is checked, and the time when it is used, they may be able to exploit the system by evading the check</li>
<li>This is exactly what happens in this case</li>
<li>mail.local appends a message to the indicated user’s mailbox</li>
<li>It first checks if the target user already has an existing mailbox file. If the file exists, but is a link, mail.local exits with an error (to prevent exploits)</li>
<li>If the file does not exist, it is created</li>
<li>The message is then appended to the file</li>
<li>If the file needed to be created, it is chown’d to the owner of the mailbox</li>
<li>This is where the problem lies, if mail.local checks and does not find the mailbox, but an attacker then creates a link from the target mailbox to some other file</li>
<li>mail.local then appends to that file instead, thinking it is creating the new mailbox</li>
<li>Then, mail.local chown’s the target file to the user the attacker was trying to send mail to</li>
<li>The article explains how this could be used to replace /etc/master.passwd etc, but opts for an easier proof of concept, replacing /usr/bin/atrun, which is run as root every 5 minutes from crontab with a script that will copy the shell to /tmp and mark it setuid</li>
<li>The attacker can then run that shell out of /tmp, and be root</li>
<li>NetBSD fixed the vulnerability by changing the code flow, separating the cases for opening an existing file from creating a new file.</li>
<li>In the case where an existing file is opened, the code then verifies that the file that was opened has the same inode number and is on the same device, as the file that was checked earlier, to ensure it was not a link
***</li>
</ul>

<h3><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:25.bspatch.asc" rel="nofollow">FreeBSD Heap vulnerability in bspatch</a></h3>

<ul>
<li>An important vuln has been found and fixed in FreeBSD this past week, specifically relating to the ‘bspatch’ utility.</li>
<li>“Upstream&#39;s bspatch.c implementation doesn&#39;t check for negative values on the number of bytes to read from the &quot;diff&quot; and &quot;extra&quot; streams, allowing an attacker controlling the patch file to write at arbitrary locations in the heap.”</li>
<li>This could result in a crash, or running arbitrary code as the user running bspatch. (Often root)</li>
<li>“bspatch&#39;s main loop reads three numbers from the &quot;control&quot; stream in the patch: X, Y and Z. The first two are the number of bytes to read from &quot;diff&quot; and &quot;extra&quot; (and thus only non-negative), while the third one could be positive or negative and moves the oldpos pointer on the source image. These 3 values are 64bits signed ints (encoded somehow on the file) that are later passed the function that reads from the streams, but those values are not verified to be non-negative.”</li>
<li>“Chrome[OS] has four different implementations of this program, all derived from the same original code by Colin Percival.”</li>
<li><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=372525" rel="nofollow">Chromium Issue Tracker </a></li>
<li>Patch your systems now!
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><p><a href="https://twitter.com/q5sys/status/758087886927388673" rel="nofollow">If you&#39;re a BUG member or Organizer, please contact BSD Now</a> </p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/one-reason-to-hate-openbsd" rel="nofollow">TedU writes about some interesting localizations to gcc in openbsd, and why they are there </a> </p></li>
<li><p><a href="https://en.wikipedia.org/wiki/List_of_products_based_on_FreeBSD" rel="nofollow">List of Products based on FreeBSD -- Help complete the list </a></p></li>
<li><p><a href="http://www.freshports.org/emulators/virtualbox-ose/" rel="nofollow">Virtualbox v5 hits the FreeBSD Ports tree</a> </p></li>
<li><p><a href="https://gist.github.com/gonzopancho/b71be467f45594822131f4816d6cb718" rel="nofollow">Skull Canyon NUC booting FreeBSD 11.0-BETA2</a> </p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/2016-bsdcan-trip-report-trent-thompson/" rel="nofollow">2016 BSDCan Trip Report : Trent Thompson</a> </p></li>
<li><p><a href="http://mail-index.netbsd.org/regional-london/2016/07/25/msg000542.html" rel="nofollow">August London BSD Meetup</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/eiWbDXTd" rel="nofollow"> Michael Open-Source Alts</a> </li>
<li><a href="http://pastebin.com/w9aCDBut" rel="nofollow"> Herminio - AP Troubles</a> </li>
<li><a href="http://pastebin.com/d15QpVFw" rel="nofollow"> Jake - Plasma</a> </li>
<li><a href="http://pastebin.com/Wj1P7jq8" rel="nofollow"> Morgan - Clean DO Droplets</a> </li>
<li><a href="http://pastebin.com/U9PYEH6K" rel="nofollow">Chris - Auditd</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we have some big breaking news about another major switcher to FreeBSD, plus early information about the pending</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.leolaporte.com/blog/a-grand-experiment" rel="nofollow">Leo Laporte tries FreeBSD</a></h3>

<ul>
<li>Leo Laporte, formerly of TechTV, and now of TWiT.tv, is switching to FreeBSD</li>
<li>“The latest debacle over the &quot;forced&quot; upgrade to Windows 10 and Apple&#39;s increasingly locked-in ecosystem has got me thinking. Do I really need to use a proprietary operating system to get work done? And while I&#39;m at it, do I need to use commercial cloud services to store my data?”</li>
<li>A sometimes Linux user since the mid 90s, Leo talks about his motivations:</li>
<li>“But as time went by, even Ubuntu began to seem too commercial to me”</li>
<li>“So now for the grand experiment. Is it possible, I wonder, to do everything I need to do on an even more venerable, more robust system: a true UNIX OS, FreeBSD? Here are my requirements”</li>
<li>Browsing</li>
<li>Email with PGP signing and encryption</li>
<li>Coding - I&#39;m a hobbyist programmer requiring support for lisp/scheme/racket, rust, and python (and maybe forth and clojure and meteor and whatever else is cool and new)</li>
<li>Writing</li>
<li>A password vault. I currently use Lastpass because it syncs with mobile but eventually I&#39;ll need to find a FOSS replacement for that, too</li>
<li>Photo editing - this is the toughest to replace. I love Photoshop and Lightroom. Can I get by with, say, GIMP and Darktable?</li>
<li>I do all of those things on my PCBSD machine all the time</li>
<li>“I love Linux and will continue to use it on my laptops, but for my main workhorse desktop I think FreeBSD will be a better choice. I also look forward to learning and administering a true UNIX system.”</li>
<li>He got a nice SuperMicro based workstation, with an Intel Xeon E3-1275v5 and an NVIDIA GeForce GTX 960 GPU</li>
<li>I have a server with one of those Skylake E3s, it is very nice</li>
<li>“450Mbps Wireless N Dual Band PCI-e Adapter w/ 3x 2dBi Antennas (Yes, sad to say, unless I rewire my house I&#39;ll have to use Wi-Fi with this beast. I&#39;ll probably rewire my house.)”</li>
<li>He plans to have a 4x 1TB ZFS pool, plus a second pool backed by a 512 GB NVMe m.2 for the OS</li>
<li>“And I&#39;ll continue to chronicle my journey into the land of FOSS here when The Beast arrives. But in the meantime, please excuse me, I&#39;ve got some reading to do.”</li>
<li>Leo went so far as to <a href="https://youtu.be/vNVst_rxxm0?t=270" rel="nofollow">slap a “Power By FreeBSD” sticker </a> on the back of his new Tesla
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160725100831" rel="nofollow">OpenBSD 6.0 to be released on Sept 1st, 2016</a></h3>

<ul>
<li><a href="https://www.openbsd.org/60.html" rel="nofollow">OpenBSD 6.0 Tenative Released Notes</a></li>
<li>OpenBSD 6.0 is just around the corner, currently slated for Sept 1st and brings with it a whole slew of exciting new features</li>
<li>First up, and let’s get this right out of the way.. VAX support has been dropped!! Oh no!</li>
<li>However to make up for this devastating loss, armv7 has been added to this release.</li>
<li>The tentative release notes are very complete and marks 6.0 as quite an exciting release</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160726230851" rel="nofollow">OpenBSD 6.0 Pre-orders up</a> </li>
</ul>

<h3><a href="http://www.infoworld.com/article/3099038/open-source-tools/openbsd-60-tightens-security-by-losing-linux-compatibility.html" rel="nofollow">OpenBSD 6.0 tightens security by losing Linux compatibility</a></h3>

<ul>
<li>In related news, infoworld picked up on the pending removal of Linux compat from OpenBSD 6.0.</li>
<li>Touted as a security feature, you will soon be unable to run legacy linux binaries on OpenBSD. This has both positives and negatives depending upon your use case. Ironically we’re excitedly awaiting improved Linux Compat support in FreeBSD, to allow running some various closed-source applications. (Netflix DRM, Steam, Skype to name a few)
***</li>
</ul>

<h3><a href="https://2016.eurobsdcon.org/talks-schedule/" rel="nofollow">EuroBSDCon 2016 Schedule released</a></h3>

<ul>
<li><a href="https://2016.eurobsdcon.org/tutorials/" rel="nofollow">EuroBSDCon 2016 Tutorial Schedule released</a> </li>
<li>EuroBSDCon has announced the list of talks and tutorials for September 22nd-25th’s conference!</li>
<li>George Neville Neil (Who we’ve interviewed in the past) is giving the keynote about “The Coming Decades of BSD”
***</li>
</ul>

<h2>News Roundup</h2>

<h3>Blast from the past</h3>

<ul>
<li>No interview again this week, we’re working on getting some people lined up.</li>
<li>The Leo Laporte story brought these old gem from TechTV into my youtube playlist:</li>
<li><a href="https://www.youtube.com/watch?v=d0UsXwRvaIg" rel="nofollow">Matt Olander and Murrey Stokey explain FreeBSD on TechTV </a></li>
<li><a href="https://www.youtube.com/watch?v=bAsYz5pVwyc" rel="nofollow">Matt Olander and Brooks Davis explain building a cluster with FreeBSD on TechTV </a></li>
<li><a href="https://www.youtube.com/watch?v=91igg2UX7o8" rel="nofollow">FreeBSD vs Linux Part 1</a></li>
<li><a href="https://www.youtube.com/watch?v=oU88fQkwfws" rel="nofollow">FreeBSD vs Linux Part 2</a>
***</li>
</ul>

<h3><a href="https://ericmccorkleblog.wordpress.com/2016/07/16/freebsd-librem-update/" rel="nofollow">Running FreeBSD on the LibreM </a></h3>

<ul>
<li>Eric McCorkle (Who has worked on the EFI loader for a while now) has written an update on his efforts to get FreeBSD working properly on the LibreM 13 laptop.</li>
<li><p>Since April the work seems to be progressing nicely</p>

<ul>
<li>Matt Macy’s i915 graphics patch works well on the Librem 13, and I personally made sure that the suspend/resume support works.  The patch is very stable on the Librem, and I’ve only had one kernel panic the entire time testing it.</li>
<li>The HDMI output Just Works™ with the i915 driver.  Even better, it works for both X11 and console modes.</li>
<li>Full support for the Atheros 9462 card has been merged in.  I’ve had some occasional issues, but it works for the most part.</li>
<li>The vesa weirdness is obviated by i915 support, but it was resolved by using the scfb driver.</li>
</ul></li>
<li><p>Some of the outstanding issues still being worked on are support for Synaptics on this particular touchpad, as well as hotkey support for the keyboard, and brightness controls.</p></li>
<li><p>In addition Eric is still working on the EFI + Geli support, with the eventual goal of getting EFI secure-boot working out of box as well.</p>

<hr></li>
</ul>

<h3><a href="http://seclists.org/oss-sec/2016/q3/157" rel="nofollow">More OpenBSD syscall fuzzing</a></h3>

<ul>
<li>NCC Group’s Project Triforce continues its work of fuzzing OpenBSD</li>
<li>This time they have found a flaw that allows any user to panic the kernel</li>
<li>Attempting to read from the tmpfs_vfsops sysctl tree will panic the system: “attempt to execute user address 0x0 in supervisor mode”</li>
<li>This is actually a “good” thing…</li>
<li>“Impact: Any user can panic the kernel by using the sysctl call.  If a user can manage to map a page at address zero, they may be able to gain kernel code execution and escalate privileges”</li>
<li>OpenBSD’s default configuration prevents mapping a page at address zero, so the code execution is prevented</li>
<li>So while a panic is a bad outcome, it is a lot better than it could have been
***</li>
</ul>

<h3><a href="http://akat1.pl/?id=2" rel="nofollow">Root privilege escalation on NetBSD</a></h3>

<ul>
<li>This post described a root privilege escalation in NetBSD</li>
<li>mail.local is a utility included in the base system for delivering mail to other users on the same system, rather than invoking a mail client and going through the mail server.</li>
<li>The mail.local utility contains a ‘time of check / time of use’ vulnerability. This means that it checks if a file or permission is valid, and then later accesses that file. If an attacker can change that file between the time when it is checked, and the time when it is used, they may be able to exploit the system by evading the check</li>
<li>This is exactly what happens in this case</li>
<li>mail.local appends a message to the indicated user’s mailbox</li>
<li>It first checks if the target user already has an existing mailbox file. If the file exists, but is a link, mail.local exits with an error (to prevent exploits)</li>
<li>If the file does not exist, it is created</li>
<li>The message is then appended to the file</li>
<li>If the file needed to be created, it is chown’d to the owner of the mailbox</li>
<li>This is where the problem lies, if mail.local checks and does not find the mailbox, but an attacker then creates a link from the target mailbox to some other file</li>
<li>mail.local then appends to that file instead, thinking it is creating the new mailbox</li>
<li>Then, mail.local chown’s the target file to the user the attacker was trying to send mail to</li>
<li>The article explains how this could be used to replace /etc/master.passwd etc, but opts for an easier proof of concept, replacing /usr/bin/atrun, which is run as root every 5 minutes from crontab with a script that will copy the shell to /tmp and mark it setuid</li>
<li>The attacker can then run that shell out of /tmp, and be root</li>
<li>NetBSD fixed the vulnerability by changing the code flow, separating the cases for opening an existing file from creating a new file.</li>
<li>In the case where an existing file is opened, the code then verifies that the file that was opened has the same inode number and is on the same device, as the file that was checked earlier, to ensure it was not a link
***</li>
</ul>

<h3><a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-16:25.bspatch.asc" rel="nofollow">FreeBSD Heap vulnerability in bspatch</a></h3>

<ul>
<li>An important vuln has been found and fixed in FreeBSD this past week, specifically relating to the ‘bspatch’ utility.</li>
<li>“Upstream&#39;s bspatch.c implementation doesn&#39;t check for negative values on the number of bytes to read from the &quot;diff&quot; and &quot;extra&quot; streams, allowing an attacker controlling the patch file to write at arbitrary locations in the heap.”</li>
<li>This could result in a crash, or running arbitrary code as the user running bspatch. (Often root)</li>
<li>“bspatch&#39;s main loop reads three numbers from the &quot;control&quot; stream in the patch: X, Y and Z. The first two are the number of bytes to read from &quot;diff&quot; and &quot;extra&quot; (and thus only non-negative), while the third one could be positive or negative and moves the oldpos pointer on the source image. These 3 values are 64bits signed ints (encoded somehow on the file) that are later passed the function that reads from the streams, but those values are not verified to be non-negative.”</li>
<li>“Chrome[OS] has four different implementations of this program, all derived from the same original code by Colin Percival.”</li>
<li><a href="https://bugs.chromium.org/p/chromium/issues/detail?id=372525" rel="nofollow">Chromium Issue Tracker </a></li>
<li>Patch your systems now!
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><p><a href="https://twitter.com/q5sys/status/758087886927388673" rel="nofollow">If you&#39;re a BUG member or Organizer, please contact BSD Now</a> </p></li>
<li><p><a href="http://www.tedunangst.com/flak/post/one-reason-to-hate-openbsd" rel="nofollow">TedU writes about some interesting localizations to gcc in openbsd, and why they are there </a> </p></li>
<li><p><a href="https://en.wikipedia.org/wiki/List_of_products_based_on_FreeBSD" rel="nofollow">List of Products based on FreeBSD -- Help complete the list </a></p></li>
<li><p><a href="http://www.freshports.org/emulators/virtualbox-ose/" rel="nofollow">Virtualbox v5 hits the FreeBSD Ports tree</a> </p></li>
<li><p><a href="https://gist.github.com/gonzopancho/b71be467f45594822131f4816d6cb718" rel="nofollow">Skull Canyon NUC booting FreeBSD 11.0-BETA2</a> </p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/2016-bsdcan-trip-report-trent-thompson/" rel="nofollow">2016 BSDCan Trip Report : Trent Thompson</a> </p></li>
<li><p><a href="http://mail-index.netbsd.org/regional-london/2016/07/25/msg000542.html" rel="nofollow">August London BSD Meetup</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/eiWbDXTd" rel="nofollow"> Michael Open-Source Alts</a> </li>
<li><a href="http://pastebin.com/w9aCDBut" rel="nofollow"> Herminio - AP Troubles</a> </li>
<li><a href="http://pastebin.com/d15QpVFw" rel="nofollow"> Jake - Plasma</a> </li>
<li><a href="http://pastebin.com/Wj1P7jq8" rel="nofollow"> Morgan - Clean DO Droplets</a> </li>
<li><a href="http://pastebin.com/U9PYEH6K" rel="nofollow">Chris - Auditd</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>151: Fuzzy Auditing</title>
  <link>https://www.bsdnow.tv/151</link>
  <guid isPermaLink="false">a6d4cae2-dede-4e13-bab3-af1ea6a03992</guid>
  <pubDate>Wed, 20 Jul 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a6d4cae2-dede-4e13-bab3-af1ea6a03992.mp3" length="50343700" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we have all sorts of interesting news, including a Kernel Fuzzing audit done for OpenBSD, a much improved</itunes:subtitle>
  <itunes:duration>1:09:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we have all sorts of interesting news, including a Kernel Fuzzing audit done for OpenBSD, a much improved&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for &amp;lt;br&amp;gt;
Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly &amp;lt;br&amp;gt;
Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=oss-security&amp;amp;m=146853062403622&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Multiple Bugs in OpenBSD Kernel&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Its patch Wednesday! (OR last Thursday if you were watching the mailing lists)&lt;/li&gt;
&lt;li&gt;Jesse Hertz and Tim Newsham (part of the NCC Group calling themselves project Triforce) have been working with the OpenBSD team to fix some newly discovered bugs in the kernel using fuzzing.&lt;/li&gt;
&lt;li&gt;Specifically they were able to track down several potential methods to corrupt memory or panic the kernel:

&lt;ul&gt;
&lt;li&gt;mmap_panic: Malicious calls to mmap() can trigger an allocation panic or trigger memory corruption.&lt;/li&gt;
&lt;li&gt;kevent_panic: Any user can panic the kernel with the kevent system call.&lt;/li&gt;
&lt;li&gt;thrsleep_panic: Any user can panic the kernel with the __thrsleep system Call.&lt;/li&gt;
&lt;li&gt;thrsigdivert_panic: Any user can panic the kernel with the __thrsigdivert system call.&lt;/li&gt;
&lt;li&gt;ufs_getdents_panic: Any user can panic the kernel with the getdents system call.&lt;/li&gt;
&lt;li&gt;mount_panic: Root users, or users on systems with kern.usermount set to true, can trigger a kernel panic when mounting a tmpfs filesystem.&lt;/li&gt;
&lt;li&gt;unmount_panic: Root users, or users on systems with kern.usermount set to true, can trigger a kernel panic when unmounting a filesystem.&lt;/li&gt;
&lt;li&gt;tmpfs_mknod_panic: Root can panic kernel with mknod on a tmpfs filesystem.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;This was a great find, and we have a link to more of the results, if you would like to explore them in more detail.&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openwall.com/lists/oss-security/2016/07/14/5" target="_blank" rel="nofollow noopener"&gt;NCC Group OpenBSD Kernel fuzzing results&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Would like to see more work like this done in all of the BSDs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.cockroachlabs.com/blog/critters-in-a-jar-running-cockroachdb-in-a-freebsd-jail/" target="_blank" rel="nofollow noopener"&gt;Running CockroachDB in a FreeBSD Jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The developers behind CockroachDB have written up a nice walkthrough of getting their software to run inside FreeBSD jails.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Manually encapsulating CockroachDB using Linux cgroups is no easy task, which is why tools like Docker exist in the first place. By comparison, running server processes natively in FreeBSD jails is straightforward and robust.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The walkthrough begins with compiling CockroachDB straight from source (A port is pending), which is pretty easy relying upon bash / git / gmake and GO.&lt;/li&gt;
&lt;li&gt;With the compile finished, the next step will be mounting linprocfs, although that may be going away in the future:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “(Note: Linux compatibility files / packages / libraries are not needed further. CockroachDB uses Linux’s procfs to inspect system properties via gosigar. If/when gosigar evolves to read FreeBSD properties natively, CockroachDB will not need linprocfs any more.)”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;With the initial setup complete, the walkthrough then takes us through the process of creating the rc.d script (Which should be included with the port) and ultimately setting up ezjail and deploying CockroachDB within. &lt;/li&gt;
&lt;li&gt;With the word getting out about jails and their functionality, we hope to see more projects also provide walkthroughs and FreeBSD support natively. Kudos to the CockroachDB team!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-announce&amp;amp;m=146854517406640&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Usermount bugs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;kern.usermount, (vfs.usermount on FreeBSD) is a sysctl that can be enabled to allow an unprivileged user to mount filesystems. It is very useful for allowing non-root users to mount a USB stick or other external media.&lt;/li&gt;
&lt;li&gt;It is not without its dangers though:
&amp;gt; “kern.usermount=1 is unsafe for everyone, since it allows any non-pledged program to call the mount/umount system calls.  There is no way any user can be expected to keep their system safe / reliable with this feature. Ignore setting to =1, and after release we'll delete the sysctl entirely.”&lt;/li&gt;
&lt;li&gt;In OpenBSD 6.0 and forward, the setting will no longer work, and root privileges will be required to mount a filesystem&lt;/li&gt;
&lt;li&gt;If there is a bug in the filesystem driver, the user could potentially exploit that and root the system
&amp;gt; “In addition to the patched bugs, several panics were discovered by NCC that can be triggered by root or users with the usermount option set. These bugs are not getting patched because we believe they are only the tip of the iceberg. The mount system call exposes too much code to userland to be considered secure”&lt;/li&gt;
&lt;li&gt;This is a very pragmatic way of dealing with these issues, as it is not really possible to be sure that EVERY bug has been fixed, and that this feature is no longer an exploit vector&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160715125022" target="_blank" rel="nofollow noopener"&gt;usermount being removed from OpenBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;I use this facility in FreeBSD extensively, combined with ZFS permission delegation, to allow non-root users to create and mount new ZFS datasets, and to do replication without requiring any root access&lt;/li&gt;
&lt;li&gt;There are some safety belts, for instance: the user must own the directory that the new filesystem will be mounted to, so they can’t mount to /etc and replace the password file with their own
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://kristaps.bsd.lv/letskencrypt/" target="_blank" rel="nofollow noopener"&gt;Let's Encrypt client from BSD in C&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;File this one under the category of “It’s about time!”, but Kristaps (Who we’ve interviewed in the past) has released some new software for interacting with letsencrypt.&lt;/li&gt;
&lt;li&gt;The header for the project site sums it up nicely:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Be up-front about security: OpenSSL is known to have issues, you can't trust what comes down the pipe, and your private key's integrity is a hard requirement. Not a situation where you can be careless. letskencrypt is a client for Let's Encrypt users, but one designed for security. No Python. No Ruby. No Bash.A straightforward, open source     implementation in C that isolates each step of the sequence.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;What specifically does it isolate you ask? Right now it is broken down into 6 steps:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;read and parse an account and domain private key&lt;br&gt;
authenticate with the Let's Encrypt server&lt;br&gt;
authorise each domain listed for the certificate&lt;br&gt;
submit the X509 request&lt;br&gt;
receive and serialise the signed X509 certificate&lt;br&gt;
request, receive, and serialise the certificate chain from the issuer&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I don’t know about all of you, but I’m going to be switching over one of my systems this weekend.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://video.fosdem.org/2016/k4601/" target="_blank" rel="nofollow noopener"&gt;Videos from the FOSDEM BSD Dev room are now online&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The videos from the BSD Dev room at FOSDEM have been stealthily posted online at some point since last I checked&lt;/li&gt;
&lt;li&gt;The videos are individually linked from the talks on the &lt;a href="https://archive.fosdem.org/2016/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;Schedule &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The talk pages also include the slides, which can help you to follow along
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://kernelnomicon.org/?p=628" target="_blank" rel="nofollow noopener"&gt;FreeBSD on Jetson TK1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The nVidia Jetson TK1 is a medium sized ARM device that is a big more than your standard Raspberry Pi&lt;/li&gt;
&lt;li&gt;The device has:

&lt;ul&gt;
&lt;li&gt;NVIDIA 4-Plus-1™ Quad-Core ARM® Cortex™-A15 CPU (2.3 GHz)&lt;/li&gt;
&lt;li&gt;NVIDIA Kepler GPU with 192 CUDA Cores&lt;/li&gt;
&lt;li&gt;2 GB DDR3L x16 Memory with 64-bit Width&lt;/li&gt;
&lt;li&gt;16 GB 4.51 eMMC Memory&lt;/li&gt;
&lt;li&gt;1 Half Mini-PCIE Slot&lt;/li&gt;
&lt;li&gt;1 Full-Size SD/MMC Connector&lt;/li&gt;
&lt;li&gt;1 Full-Size HDMI Port&lt;/li&gt;
&lt;li&gt;1 USB 2.0 Port, Micro AB&lt;/li&gt;
&lt;li&gt;1 USB 3.0 Port, A&lt;/li&gt;
&lt;li&gt;1 RS232 Serial Port&lt;/li&gt;
&lt;li&gt;1 ALC5639 Realtek Audio Codec with Mic In and Line Out&lt;/li&gt;
&lt;li&gt;1 RTL8111GS Realtek GigE LAN&lt;/li&gt;
&lt;li&gt;1 SATA Data Port&lt;/li&gt;
&lt;li&gt;SPI 4 MByte Boot Flash&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The following signals are available through an expansion port:

&lt;ul&gt;
&lt;li&gt;DP/LVDS&lt;/li&gt;
&lt;li&gt;Touch SPI 1x4 + 1x1 CSI-2&lt;/li&gt;
&lt;li&gt;GPIOs&lt;/li&gt;
&lt;li&gt;UART&lt;/li&gt;
&lt;li&gt;HSIC&lt;/li&gt;
&lt;li&gt;i2c&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The device costs $192 USD from nVidia or Amazon&lt;/li&gt;
&lt;li&gt;Oleksandr Tymoshenko (&lt;a href="mailto:gonzo@freebsd.org" target="_blank" rel="nofollow noopener"&gt;gonzo@freebsd.org&lt;/a&gt;) has a post describing what it takes to get FreeBSD running on the Jetson TK1
&amp;gt; “First of all – my TK1 didn’t have U-Boot. Type of bootloader depends on the version of Linux4Tegra TK1 comes with. Mine had L4T R19, with some kind of “not u-boot” bootloader.”&lt;/li&gt;
&lt;li&gt;They tried using the provided tool, compiled on FreeBSD since it uses libusb, but it gave an error. Falling back to trying from Ubuntu, they got the same error.&lt;/li&gt;
&lt;li&gt;They then flashed the TK1 with newer firmware, and suddenly, uboot is available.&lt;/li&gt;
&lt;li&gt;The post then walks through pxe booting FreeBSD on the TK1&lt;/li&gt;
&lt;li&gt;The guide then walks through replacing the UBoot with a version compatible with UBLDR, for more features&lt;/li&gt;
&lt;li&gt;We’ll have to wait for another post to get FreeBSD burned onto the device, but at this point, you can reliably boot it without any user interaction&lt;/li&gt;
&lt;li&gt;I have one of these devices, so I am very interested in this work
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.vidiguard.com/why-we-use-openbsd-at-vidiguard-4521f217b2b7#.9r86v742v" target="_blank" rel="nofollow noopener"&gt;Why we use OpenBSD at VidiGaurd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;VidiGuard (Which makes autonomous drone solutions for security monitoring) has posted an interesting write-up on why they use OpenBSD.&lt;/li&gt;
&lt;li&gt;Specifically they start by mentioning while they are in business to provide physical security, they just as equally value their data security, especially their customer data.&lt;/li&gt;
&lt;li&gt;They name 4 specific features that matter to them, starting with Uncompromising Quality and Security:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Over the past 20 years, OpenBSD’s focus on uncompromising quality and code correctness has yielded an operating system second-to-none. Code auditing and review is core to the project’s development process. The team’s focus on security includes integrated cryptography, new security mitigation techniques, and an optional-security-is-no-security stance, making it arguably the most secure operating system available today. This approach pays off in the form of only a few security updates for a given release, compared to other operating systems that might release a handful of updates every week.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;High praise indeed! They also mention the sane-defaults, documentation and last but not least, the license as also winning factors in making OpenBSD their operating system of choice.&lt;/li&gt;
&lt;li&gt;Thanks to VidiGuard for publically detailing the use of BSD, and we hope to see other business follow suit!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://bsdmag.org/dru_lavigne/" target="_blank" rel="nofollow noopener"&gt;"You can (and should) slow down and learn how things work" – Interview with Dru Lavigne&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you’ve been around the BSD community for any length of time, you no doubt have heard of Dru Lavigne (Or perhaps own one of her books!)&lt;/li&gt;
&lt;li&gt;She was recently interviewed by Luca Ferrari for BSD Magazine and you may find it a fascinating read.&lt;/li&gt;
&lt;li&gt;The 2nd question asked sounded a lot like our opener to an interview (How did you get into BSD)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “ In the mid 90s, I went back to school to learn network and system administration. As graduation grew near and I started looking for a work, I noticed that all the interesting jobs wanted Unix skills. Wanting to increase my skills, and not having any money, I did an Internet search for “Free Unix”. The first hit was freebsd.org. I went to the website and started reading the Handbook and thought “I can do this”. Since I only had access to one computer and wanted to ramp up my skills quickly, I printed out the installation and networking chapters of the Handbook. I replaced the current operating system with FreeBSD and forced myself to learn how to do everything I needed to do on that computer in FreeBSD. It was a painful (and scary) few weeks as I figured out how to transition the family’s workflow to FreeBSD, but it was also exhilarating to learn that “yes, I can do this!.  Since then, I’ve had the opportunity to try out or administer the other BSDs, several Linux distros, SCO, and Solaris. I found that the layout, logic, and release engineering process of the BSDs makes the most sense to me and I’m happiest when on a BSD system.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;When asked, Dru also had a good response to what challenges potential new UNIX or BSD users may face:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Students who haven’t been exposed to open source before are used to thinking of technology in terms of a purchasable brand consisting of “black boxes” that are supposed to “just work”, without having to think about how they work. You can (and should) slow down and learn how things work. It can be a mind shift to learn that the freedom to use and change how something works does exist, and isn’t considered stealing. And that learning how something works, while hard, can be fun. BSD culture, in particular, is well suited for those who have the time and temperament to dive into how things work. With over 40 years of freely available source and commit messages, you can dive as deep as you want into learning how things came to be, how they evolved over the years, how they work now, and how they can be improved. There is a diverse range of stuff to choose from: from user tools to networking to memory management to hardware drivers to security mechanisms and so on. There is also a culture of sharing and learning and encouragement for users who demonstrate that they have done their homework and have their own ideas to contribute.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The interview is quite long, and Dru provides fantastic insights into more aspects of BSD in general. Well worth your time to read!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits:&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/ed_maste/status/755474764479672321" target="_blank" rel="nofollow noopener"&gt;Ed Maste is seeking testing 'without_gpl_dtc'&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2717" target="_blank" rel="nofollow noopener"&gt;“PAM Mastery” tech reviewers wanted&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://opnsense.org/opnsense-16-7-rc2-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.7 RC2&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://nbviewer.jupyter.org/github/DadAtH-me/Projects/blob/master/arduino-on-nix.ipynb" target="_blank" rel="nofollow noopener"&gt;Jupyter Notebook for bootstrapping Arduino on FreeBSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.fixup.fi/misc/rumpkernel-book/" target="_blank" rel="nofollow noopener"&gt;The Design and Implementation of the Anykernel and Rump Kernels (second edition)&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://github.com/kbs1/freebsd-synced-xjails" target="_blank" rel="nofollow noopener"&gt;Complete desktop synchronisation with Unison and FreeBSD jails (xjails)&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/S7u0VeVi" target="_blank" rel="nofollow noopener"&gt; Eric - List most popular files&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/81Zmj0cX" target="_blank" rel="nofollow noopener"&gt; Robroy - ZFS Write Cache&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/SfeKR7v2" target="_blank" rel="nofollow noopener"&gt; Luis - FreeNAS HW Setup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/wy4ar0YH" target="_blank" rel="nofollow noopener"&gt; Emett - Python Followup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/zd2QAu25" target="_blank" rel="nofollow noopener"&gt; Peter - Multicast + Jails&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we have all sorts of interesting news, including a Kernel Fuzzing audit done for OpenBSD, a much improved</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://marc.info/?l=oss-security&m=146853062403622&w=2" rel="nofollow">Multiple Bugs in OpenBSD Kernel</a></h3>

<ul>
<li>Its patch Wednesday! (OR last Thursday if you were watching the mailing lists)</li>
<li>Jesse Hertz and Tim Newsham (part of the NCC Group calling themselves project Triforce) have been working with the OpenBSD team to fix some newly discovered bugs in the kernel using fuzzing.</li>
<li>Specifically they were able to track down several potential methods to corrupt memory or panic the kernel:

<ul>
<li>mmap_panic: Malicious calls to mmap() can trigger an allocation panic or trigger memory corruption.</li>
<li>kevent_panic: Any user can panic the kernel with the kevent system call.</li>
<li>thrsleep_panic: Any user can panic the kernel with the __thrsleep system Call.</li>
<li>thrsigdivert_panic: Any user can panic the kernel with the __thrsigdivert system call.</li>
<li>ufs_getdents_panic: Any user can panic the kernel with the getdents system call.</li>
<li>mount_panic: Root users, or users on systems with kern.usermount set to true, can trigger a kernel panic when mounting a tmpfs filesystem.</li>
<li>unmount_panic: Root users, or users on systems with kern.usermount set to true, can trigger a kernel panic when unmounting a filesystem.</li>
<li>tmpfs_mknod_panic: Root can panic kernel with mknod on a tmpfs filesystem.</li>
</ul></li>
<li>This was a great find, and we have a link to more of the results, if you would like to explore them in more detail.</li>
<li><a href="http://www.openwall.com/lists/oss-security/2016/07/14/5" rel="nofollow">NCC Group OpenBSD Kernel fuzzing results</a> </li>
<li>Would like to see more work like this done in all of the BSDs
***</li>
</ul>

<h3><a href="https://www.cockroachlabs.com/blog/critters-in-a-jar-running-cockroachdb-in-a-freebsd-jail/" rel="nofollow">Running CockroachDB in a FreeBSD Jail</a></h3>

<ul>
<li>The developers behind CockroachDB have written up a nice walkthrough of getting their software to run inside FreeBSD jails.</li>
</ul>

<blockquote>
<p>“Manually encapsulating CockroachDB using Linux cgroups is no easy task, which is why tools like Docker exist in the first place. By comparison, running server processes natively in FreeBSD jails is straightforward and robust.”</p>
</blockquote>

<ul>
<li>The walkthrough begins with compiling CockroachDB straight from source (A port is pending), which is pretty easy relying upon bash / git / gmake and GO.</li>
<li>With the compile finished, the next step will be mounting linprocfs, although that may be going away in the future:</li>
</ul>

<blockquote>
<p>“(Note: Linux compatibility files / packages / libraries are not needed further. CockroachDB uses Linux’s procfs to inspect system properties via gosigar. If/when gosigar evolves to read FreeBSD properties natively, CockroachDB will not need linprocfs any more.)”</p>
</blockquote>

<ul>
<li>With the initial setup complete, the walkthrough then takes us through the process of creating the rc.d script (Which should be included with the port) and ultimately setting up ezjail and deploying CockroachDB within. </li>
<li>With the word getting out about jails and their functionality, we hope to see more projects also provide walkthroughs and FreeBSD support natively. Kudos to the CockroachDB team!
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-announce&m=146854517406640&w=2" rel="nofollow">Usermount bugs</a></h3>

<ul>
<li>kern.usermount, (vfs.usermount on FreeBSD) is a sysctl that can be enabled to allow an unprivileged user to mount filesystems. It is very useful for allowing non-root users to mount a USB stick or other external media.</li>
<li>It is not without its dangers though:
&gt; “kern.usermount=1 is unsafe for everyone, since it allows any non-pledged program to call the mount/umount system calls.  There is no way any user can be expected to keep their system safe / reliable with this feature. Ignore setting to =1, and after release we&#39;ll delete the sysctl entirely.”</li>
<li>In OpenBSD 6.0 and forward, the setting will no longer work, and root privileges will be required to mount a filesystem</li>
<li>If there is a bug in the filesystem driver, the user could potentially exploit that and root the system
&gt; “In addition to the patched bugs, several panics were discovered by NCC that can be triggered by root or users with the usermount option set. These bugs are not getting patched because we believe they are only the tip of the iceberg. The mount system call exposes too much code to userland to be considered secure”</li>
<li>This is a very pragmatic way of dealing with these issues, as it is not really possible to be sure that EVERY bug has been fixed, and that this feature is no longer an exploit vector</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160715125022" rel="nofollow">usermount being removed from OpenBSD</a> </li>
<li>I use this facility in FreeBSD extensively, combined with ZFS permission delegation, to allow non-root users to create and mount new ZFS datasets, and to do replication without requiring any root access</li>
<li>There are some safety belts, for instance: the user must own the directory that the new filesystem will be mounted to, so they can’t mount to /etc and replace the password file with their own
***</li>
</ul>

<h3><a href="https://kristaps.bsd.lv/letskencrypt/" rel="nofollow">Let&#39;s Encrypt client from BSD in C</a></h3>

<ul>
<li>File this one under the category of “It’s about time!”, but Kristaps (Who we’ve interviewed in the past) has released some new software for interacting with letsencrypt.</li>
<li>The header for the project site sums it up nicely:</li>
</ul>

<blockquote>
<p>“Be up-front about security: OpenSSL is known to have issues, you can&#39;t trust what comes down the pipe, and your private key&#39;s integrity is a hard requirement. Not a situation where you can be careless. letskencrypt is a client for Let&#39;s Encrypt users, but one designed for security. No Python. No Ruby. No Bash.A straightforward, open source     implementation in C that isolates each step of the sequence.”</p>
</blockquote>

<ul>
<li>What specifically does it isolate you ask? Right now it is broken down into 6 steps:</li>
</ul>

<p>read and parse an account and domain private key<br>
authenticate with the Let&#39;s Encrypt server<br>
authorise each domain listed for the certificate<br>
submit the X509 request<br>
receive and serialise the signed X509 certificate<br>
request, receive, and serialise the certificate chain from the issuer</p>

<ul>
<li>I don’t know about all of you, but I’m going to be switching over one of my systems this weekend.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://video.fosdem.org/2016/k4601/" rel="nofollow">Videos from the FOSDEM BSD Dev room are now online</a></h3>

<ul>
<li>The videos from the BSD Dev room at FOSDEM have been stealthily posted online at some point since last I checked</li>
<li>The videos are individually linked from the talks on the <a href="https://archive.fosdem.org/2016/schedule/track/bsd/" rel="nofollow">Schedule </a> </li>
<li>The talk pages also include the slides, which can help you to follow along
***</li>
</ul>

<h3><a href="http://kernelnomicon.org/?p=628" rel="nofollow">FreeBSD on Jetson TK1</a></h3>

<ul>
<li>The nVidia Jetson TK1 is a medium sized ARM device that is a big more than your standard Raspberry Pi</li>
<li>The device has:

<ul>
<li>NVIDIA 4-Plus-1™ Quad-Core ARM® Cortex™-A15 CPU (2.3 GHz)</li>
<li>NVIDIA Kepler GPU with 192 CUDA Cores</li>
<li>2 GB DDR3L x16 Memory with 64-bit Width</li>
<li>16 GB 4.51 eMMC Memory</li>
<li>1 Half Mini-PCIE Slot</li>
<li>1 Full-Size SD/MMC Connector</li>
<li>1 Full-Size HDMI Port</li>
<li>1 USB 2.0 Port, Micro AB</li>
<li>1 USB 3.0 Port, A</li>
<li>1 RS232 Serial Port</li>
<li>1 ALC5639 Realtek Audio Codec with Mic In and Line Out</li>
<li>1 RTL8111GS Realtek GigE LAN</li>
<li>1 SATA Data Port</li>
<li>SPI 4 MByte Boot Flash</li>
</ul></li>
<li>The following signals are available through an expansion port:

<ul>
<li>DP/LVDS</li>
<li>Touch SPI 1x4 + 1x1 CSI-2</li>
<li>GPIOs</li>
<li>UART</li>
<li>HSIC</li>
<li>i2c</li>
</ul></li>
<li>The device costs $192 USD from nVidia or Amazon</li>
<li>Oleksandr Tymoshenko (<a href="mailto:gonzo@freebsd.org" rel="nofollow">gonzo@freebsd.org</a>) has a post describing what it takes to get FreeBSD running on the Jetson TK1
&gt; “First of all – my TK1 didn’t have U-Boot. Type of bootloader depends on the version of Linux4Tegra TK1 comes with. Mine had L4T R19, with some kind of “not u-boot” bootloader.”</li>
<li>They tried using the provided tool, compiled on FreeBSD since it uses libusb, but it gave an error. Falling back to trying from Ubuntu, they got the same error.</li>
<li>They then flashed the TK1 with newer firmware, and suddenly, uboot is available.</li>
<li>The post then walks through pxe booting FreeBSD on the TK1</li>
<li>The guide then walks through replacing the UBoot with a version compatible with UBLDR, for more features</li>
<li>We’ll have to wait for another post to get FreeBSD burned onto the device, but at this point, you can reliably boot it without any user interaction</li>
<li>I have one of these devices, so I am very interested in this work
***</li>
</ul>

<h3><a href="https://blog.vidiguard.com/why-we-use-openbsd-at-vidiguard-4521f217b2b7#.9r86v742v" rel="nofollow">Why we use OpenBSD at VidiGaurd</a></h3>

<ul>
<li>VidiGuard (Which makes autonomous drone solutions for security monitoring) has posted an interesting write-up on why they use OpenBSD.</li>
<li>Specifically they start by mentioning while they are in business to provide physical security, they just as equally value their data security, especially their customer data.</li>
<li>They name 4 specific features that matter to them, starting with Uncompromising Quality and Security:</li>
</ul>

<blockquote>
<p>“Over the past 20 years, OpenBSD’s focus on uncompromising quality and code correctness has yielded an operating system second-to-none. Code auditing and review is core to the project’s development process. The team’s focus on security includes integrated cryptography, new security mitigation techniques, and an optional-security-is-no-security stance, making it arguably the most secure operating system available today. This approach pays off in the form of only a few security updates for a given release, compared to other operating systems that might release a handful of updates every week.”</p>
</blockquote>

<ul>
<li>High praise indeed! They also mention the sane-defaults, documentation and last but not least, the license as also winning factors in making OpenBSD their operating system of choice.</li>
<li>Thanks to VidiGuard for publically detailing the use of BSD, and we hope to see other business follow suit!
***</li>
</ul>

<h3><a href="https://bsdmag.org/dru_lavigne/" rel="nofollow">&quot;You can (and should) slow down and learn how things work&quot; – Interview with Dru Lavigne</a></h3>

<ul>
<li>If you’ve been around the BSD community for any length of time, you no doubt have heard of Dru Lavigne (Or perhaps own one of her books!)</li>
<li>She was recently interviewed by Luca Ferrari for BSD Magazine and you may find it a fascinating read.</li>
<li>The 2nd question asked sounded a lot like our opener to an interview (How did you get into BSD)</li>
</ul>

<blockquote>
<p>“ In the mid 90s, I went back to school to learn network and system administration. As graduation grew near and I started looking for a work, I noticed that all the interesting jobs wanted Unix skills. Wanting to increase my skills, and not having any money, I did an Internet search for “Free Unix”. The first hit was freebsd.org. I went to the website and started reading the Handbook and thought “I can do this”. Since I only had access to one computer and wanted to ramp up my skills quickly, I printed out the installation and networking chapters of the Handbook. I replaced the current operating system with FreeBSD and forced myself to learn how to do everything I needed to do on that computer in FreeBSD. It was a painful (and scary) few weeks as I figured out how to transition the family’s workflow to FreeBSD, but it was also exhilarating to learn that “yes, I can do this!.  Since then, I’ve had the opportunity to try out or administer the other BSDs, several Linux distros, SCO, and Solaris. I found that the layout, logic, and release engineering process of the BSDs makes the most sense to me and I’m happiest when on a BSD system.”</p>
</blockquote>

<ul>
<li>When asked, Dru also had a good response to what challenges potential new UNIX or BSD users may face:</li>
</ul>

<blockquote>
<p>“Students who haven’t been exposed to open source before are used to thinking of technology in terms of a purchasable brand consisting of “black boxes” that are supposed to “just work”, without having to think about how they work. You can (and should) slow down and learn how things work. It can be a mind shift to learn that the freedom to use and change how something works does exist, and isn’t considered stealing. And that learning how something works, while hard, can be fun. BSD culture, in particular, is well suited for those who have the time and temperament to dive into how things work. With over 40 years of freely available source and commit messages, you can dive as deep as you want into learning how things came to be, how they evolved over the years, how they work now, and how they can be improved. There is a diverse range of stuff to choose from: from user tools to networking to memory management to hardware drivers to security mechanisms and so on. There is also a culture of sharing and learning and encouragement for users who demonstrate that they have done their homework and have their own ideas to contribute.”</p>
</blockquote>

<ul>
<li>The interview is quite long, and Dru provides fantastic insights into more aspects of BSD in general. Well worth your time to read!
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><p><a href="https://twitter.com/ed_maste/status/755474764479672321" rel="nofollow">Ed Maste is seeking testing &#39;without_gpl_dtc&#39;</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2717" rel="nofollow">“PAM Mastery” tech reviewers wanted</a></p></li>
<li><p><a href="https://opnsense.org/opnsense-16-7-rc2-released/" rel="nofollow">OPNsense 16.7 RC2</a></p></li>
<li><p><a href="https://nbviewer.jupyter.org/github/DadAtH-me/Projects/blob/master/arduino-on-nix.ipynb" rel="nofollow">Jupyter Notebook for bootstrapping Arduino on FreeBSD</a> </p></li>
<li><p><a href="http://www.fixup.fi/misc/rumpkernel-book/" rel="nofollow">The Design and Implementation of the Anykernel and Rump Kernels (second edition)</a> </p></li>
<li><p><a href="https://github.com/kbs1/freebsd-synced-xjails" rel="nofollow">Complete desktop synchronisation with Unison and FreeBSD jails (xjails)</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/S7u0VeVi" rel="nofollow"> Eric - List most popular files</a> </li>
<li><a href="http://pastebin.com/81Zmj0cX" rel="nofollow"> Robroy - ZFS Write Cache</a> </li>
<li><a href="http://pastebin.com/SfeKR7v2" rel="nofollow"> Luis - FreeNAS HW Setup</a> </li>
<li><a href="http://pastebin.com/wy4ar0YH" rel="nofollow"> Emett - Python Followup</a> </li>
<li><a href="http://pastebin.com/zd2QAu25" rel="nofollow"> Peter - Multicast + Jails</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we have all sorts of interesting news, including a Kernel Fuzzing audit done for OpenBSD, a much improved</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" <br>
/></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for <br>
Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly <br>
Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://marc.info/?l=oss-security&m=146853062403622&w=2" rel="nofollow">Multiple Bugs in OpenBSD Kernel</a></h3>

<ul>
<li>Its patch Wednesday! (OR last Thursday if you were watching the mailing lists)</li>
<li>Jesse Hertz and Tim Newsham (part of the NCC Group calling themselves project Triforce) have been working with the OpenBSD team to fix some newly discovered bugs in the kernel using fuzzing.</li>
<li>Specifically they were able to track down several potential methods to corrupt memory or panic the kernel:

<ul>
<li>mmap_panic: Malicious calls to mmap() can trigger an allocation panic or trigger memory corruption.</li>
<li>kevent_panic: Any user can panic the kernel with the kevent system call.</li>
<li>thrsleep_panic: Any user can panic the kernel with the __thrsleep system Call.</li>
<li>thrsigdivert_panic: Any user can panic the kernel with the __thrsigdivert system call.</li>
<li>ufs_getdents_panic: Any user can panic the kernel with the getdents system call.</li>
<li>mount_panic: Root users, or users on systems with kern.usermount set to true, can trigger a kernel panic when mounting a tmpfs filesystem.</li>
<li>unmount_panic: Root users, or users on systems with kern.usermount set to true, can trigger a kernel panic when unmounting a filesystem.</li>
<li>tmpfs_mknod_panic: Root can panic kernel with mknod on a tmpfs filesystem.</li>
</ul></li>
<li>This was a great find, and we have a link to more of the results, if you would like to explore them in more detail.</li>
<li><a href="http://www.openwall.com/lists/oss-security/2016/07/14/5" rel="nofollow">NCC Group OpenBSD Kernel fuzzing results</a> </li>
<li>Would like to see more work like this done in all of the BSDs
***</li>
</ul>

<h3><a href="https://www.cockroachlabs.com/blog/critters-in-a-jar-running-cockroachdb-in-a-freebsd-jail/" rel="nofollow">Running CockroachDB in a FreeBSD Jail</a></h3>

<ul>
<li>The developers behind CockroachDB have written up a nice walkthrough of getting their software to run inside FreeBSD jails.</li>
</ul>

<blockquote>
<p>“Manually encapsulating CockroachDB using Linux cgroups is no easy task, which is why tools like Docker exist in the first place. By comparison, running server processes natively in FreeBSD jails is straightforward and robust.”</p>
</blockquote>

<ul>
<li>The walkthrough begins with compiling CockroachDB straight from source (A port is pending), which is pretty easy relying upon bash / git / gmake and GO.</li>
<li>With the compile finished, the next step will be mounting linprocfs, although that may be going away in the future:</li>
</ul>

<blockquote>
<p>“(Note: Linux compatibility files / packages / libraries are not needed further. CockroachDB uses Linux’s procfs to inspect system properties via gosigar. If/when gosigar evolves to read FreeBSD properties natively, CockroachDB will not need linprocfs any more.)”</p>
</blockquote>

<ul>
<li>With the initial setup complete, the walkthrough then takes us through the process of creating the rc.d script (Which should be included with the port) and ultimately setting up ezjail and deploying CockroachDB within. </li>
<li>With the word getting out about jails and their functionality, we hope to see more projects also provide walkthroughs and FreeBSD support natively. Kudos to the CockroachDB team!
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-announce&m=146854517406640&w=2" rel="nofollow">Usermount bugs</a></h3>

<ul>
<li>kern.usermount, (vfs.usermount on FreeBSD) is a sysctl that can be enabled to allow an unprivileged user to mount filesystems. It is very useful for allowing non-root users to mount a USB stick or other external media.</li>
<li>It is not without its dangers though:
&gt; “kern.usermount=1 is unsafe for everyone, since it allows any non-pledged program to call the mount/umount system calls.  There is no way any user can be expected to keep their system safe / reliable with this feature. Ignore setting to =1, and after release we&#39;ll delete the sysctl entirely.”</li>
<li>In OpenBSD 6.0 and forward, the setting will no longer work, and root privileges will be required to mount a filesystem</li>
<li>If there is a bug in the filesystem driver, the user could potentially exploit that and root the system
&gt; “In addition to the patched bugs, several panics were discovered by NCC that can be triggered by root or users with the usermount option set. These bugs are not getting patched because we believe they are only the tip of the iceberg. The mount system call exposes too much code to userland to be considered secure”</li>
<li>This is a very pragmatic way of dealing with these issues, as it is not really possible to be sure that EVERY bug has been fixed, and that this feature is no longer an exploit vector</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160715125022" rel="nofollow">usermount being removed from OpenBSD</a> </li>
<li>I use this facility in FreeBSD extensively, combined with ZFS permission delegation, to allow non-root users to create and mount new ZFS datasets, and to do replication without requiring any root access</li>
<li>There are some safety belts, for instance: the user must own the directory that the new filesystem will be mounted to, so they can’t mount to /etc and replace the password file with their own
***</li>
</ul>

<h3><a href="https://kristaps.bsd.lv/letskencrypt/" rel="nofollow">Let&#39;s Encrypt client from BSD in C</a></h3>

<ul>
<li>File this one under the category of “It’s about time!”, but Kristaps (Who we’ve interviewed in the past) has released some new software for interacting with letsencrypt.</li>
<li>The header for the project site sums it up nicely:</li>
</ul>

<blockquote>
<p>“Be up-front about security: OpenSSL is known to have issues, you can&#39;t trust what comes down the pipe, and your private key&#39;s integrity is a hard requirement. Not a situation where you can be careless. letskencrypt is a client for Let&#39;s Encrypt users, but one designed for security. No Python. No Ruby. No Bash.A straightforward, open source     implementation in C that isolates each step of the sequence.”</p>
</blockquote>

<ul>
<li>What specifically does it isolate you ask? Right now it is broken down into 6 steps:</li>
</ul>

<p>read and parse an account and domain private key<br>
authenticate with the Let&#39;s Encrypt server<br>
authorise each domain listed for the certificate<br>
submit the X509 request<br>
receive and serialise the signed X509 certificate<br>
request, receive, and serialise the certificate chain from the issuer</p>

<ul>
<li>I don’t know about all of you, but I’m going to be switching over one of my systems this weekend.
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://video.fosdem.org/2016/k4601/" rel="nofollow">Videos from the FOSDEM BSD Dev room are now online</a></h3>

<ul>
<li>The videos from the BSD Dev room at FOSDEM have been stealthily posted online at some point since last I checked</li>
<li>The videos are individually linked from the talks on the <a href="https://archive.fosdem.org/2016/schedule/track/bsd/" rel="nofollow">Schedule </a> </li>
<li>The talk pages also include the slides, which can help you to follow along
***</li>
</ul>

<h3><a href="http://kernelnomicon.org/?p=628" rel="nofollow">FreeBSD on Jetson TK1</a></h3>

<ul>
<li>The nVidia Jetson TK1 is a medium sized ARM device that is a big more than your standard Raspberry Pi</li>
<li>The device has:

<ul>
<li>NVIDIA 4-Plus-1™ Quad-Core ARM® Cortex™-A15 CPU (2.3 GHz)</li>
<li>NVIDIA Kepler GPU with 192 CUDA Cores</li>
<li>2 GB DDR3L x16 Memory with 64-bit Width</li>
<li>16 GB 4.51 eMMC Memory</li>
<li>1 Half Mini-PCIE Slot</li>
<li>1 Full-Size SD/MMC Connector</li>
<li>1 Full-Size HDMI Port</li>
<li>1 USB 2.0 Port, Micro AB</li>
<li>1 USB 3.0 Port, A</li>
<li>1 RS232 Serial Port</li>
<li>1 ALC5639 Realtek Audio Codec with Mic In and Line Out</li>
<li>1 RTL8111GS Realtek GigE LAN</li>
<li>1 SATA Data Port</li>
<li>SPI 4 MByte Boot Flash</li>
</ul></li>
<li>The following signals are available through an expansion port:

<ul>
<li>DP/LVDS</li>
<li>Touch SPI 1x4 + 1x1 CSI-2</li>
<li>GPIOs</li>
<li>UART</li>
<li>HSIC</li>
<li>i2c</li>
</ul></li>
<li>The device costs $192 USD from nVidia or Amazon</li>
<li>Oleksandr Tymoshenko (<a href="mailto:gonzo@freebsd.org" rel="nofollow">gonzo@freebsd.org</a>) has a post describing what it takes to get FreeBSD running on the Jetson TK1
&gt; “First of all – my TK1 didn’t have U-Boot. Type of bootloader depends on the version of Linux4Tegra TK1 comes with. Mine had L4T R19, with some kind of “not u-boot” bootloader.”</li>
<li>They tried using the provided tool, compiled on FreeBSD since it uses libusb, but it gave an error. Falling back to trying from Ubuntu, they got the same error.</li>
<li>They then flashed the TK1 with newer firmware, and suddenly, uboot is available.</li>
<li>The post then walks through pxe booting FreeBSD on the TK1</li>
<li>The guide then walks through replacing the UBoot with a version compatible with UBLDR, for more features</li>
<li>We’ll have to wait for another post to get FreeBSD burned onto the device, but at this point, you can reliably boot it without any user interaction</li>
<li>I have one of these devices, so I am very interested in this work
***</li>
</ul>

<h3><a href="https://blog.vidiguard.com/why-we-use-openbsd-at-vidiguard-4521f217b2b7#.9r86v742v" rel="nofollow">Why we use OpenBSD at VidiGaurd</a></h3>

<ul>
<li>VidiGuard (Which makes autonomous drone solutions for security monitoring) has posted an interesting write-up on why they use OpenBSD.</li>
<li>Specifically they start by mentioning while they are in business to provide physical security, they just as equally value their data security, especially their customer data.</li>
<li>They name 4 specific features that matter to them, starting with Uncompromising Quality and Security:</li>
</ul>

<blockquote>
<p>“Over the past 20 years, OpenBSD’s focus on uncompromising quality and code correctness has yielded an operating system second-to-none. Code auditing and review is core to the project’s development process. The team’s focus on security includes integrated cryptography, new security mitigation techniques, and an optional-security-is-no-security stance, making it arguably the most secure operating system available today. This approach pays off in the form of only a few security updates for a given release, compared to other operating systems that might release a handful of updates every week.”</p>
</blockquote>

<ul>
<li>High praise indeed! They also mention the sane-defaults, documentation and last but not least, the license as also winning factors in making OpenBSD their operating system of choice.</li>
<li>Thanks to VidiGuard for publically detailing the use of BSD, and we hope to see other business follow suit!
***</li>
</ul>

<h3><a href="https://bsdmag.org/dru_lavigne/" rel="nofollow">&quot;You can (and should) slow down and learn how things work&quot; – Interview with Dru Lavigne</a></h3>

<ul>
<li>If you’ve been around the BSD community for any length of time, you no doubt have heard of Dru Lavigne (Or perhaps own one of her books!)</li>
<li>She was recently interviewed by Luca Ferrari for BSD Magazine and you may find it a fascinating read.</li>
<li>The 2nd question asked sounded a lot like our opener to an interview (How did you get into BSD)</li>
</ul>

<blockquote>
<p>“ In the mid 90s, I went back to school to learn network and system administration. As graduation grew near and I started looking for a work, I noticed that all the interesting jobs wanted Unix skills. Wanting to increase my skills, and not having any money, I did an Internet search for “Free Unix”. The first hit was freebsd.org. I went to the website and started reading the Handbook and thought “I can do this”. Since I only had access to one computer and wanted to ramp up my skills quickly, I printed out the installation and networking chapters of the Handbook. I replaced the current operating system with FreeBSD and forced myself to learn how to do everything I needed to do on that computer in FreeBSD. It was a painful (and scary) few weeks as I figured out how to transition the family’s workflow to FreeBSD, but it was also exhilarating to learn that “yes, I can do this!.  Since then, I’ve had the opportunity to try out or administer the other BSDs, several Linux distros, SCO, and Solaris. I found that the layout, logic, and release engineering process of the BSDs makes the most sense to me and I’m happiest when on a BSD system.”</p>
</blockquote>

<ul>
<li>When asked, Dru also had a good response to what challenges potential new UNIX or BSD users may face:</li>
</ul>

<blockquote>
<p>“Students who haven’t been exposed to open source before are used to thinking of technology in terms of a purchasable brand consisting of “black boxes” that are supposed to “just work”, without having to think about how they work. You can (and should) slow down and learn how things work. It can be a mind shift to learn that the freedom to use and change how something works does exist, and isn’t considered stealing. And that learning how something works, while hard, can be fun. BSD culture, in particular, is well suited for those who have the time and temperament to dive into how things work. With over 40 years of freely available source and commit messages, you can dive as deep as you want into learning how things came to be, how they evolved over the years, how they work now, and how they can be improved. There is a diverse range of stuff to choose from: from user tools to networking to memory management to hardware drivers to security mechanisms and so on. There is also a culture of sharing and learning and encouragement for users who demonstrate that they have done their homework and have their own ideas to contribute.”</p>
</blockquote>

<ul>
<li>The interview is quite long, and Dru provides fantastic insights into more aspects of BSD in general. Well worth your time to read!
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><p><a href="https://twitter.com/ed_maste/status/755474764479672321" rel="nofollow">Ed Maste is seeking testing &#39;without_gpl_dtc&#39;</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2717" rel="nofollow">“PAM Mastery” tech reviewers wanted</a></p></li>
<li><p><a href="https://opnsense.org/opnsense-16-7-rc2-released/" rel="nofollow">OPNsense 16.7 RC2</a></p></li>
<li><p><a href="https://nbviewer.jupyter.org/github/DadAtH-me/Projects/blob/master/arduino-on-nix.ipynb" rel="nofollow">Jupyter Notebook for bootstrapping Arduino on FreeBSD</a> </p></li>
<li><p><a href="http://www.fixup.fi/misc/rumpkernel-book/" rel="nofollow">The Design and Implementation of the Anykernel and Rump Kernels (second edition)</a> </p></li>
<li><p><a href="https://github.com/kbs1/freebsd-synced-xjails" rel="nofollow">Complete desktop synchronisation with Unison and FreeBSD jails (xjails)</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/S7u0VeVi" rel="nofollow"> Eric - List most popular files</a> </li>
<li><a href="http://pastebin.com/81Zmj0cX" rel="nofollow"> Robroy - ZFS Write Cache</a> </li>
<li><a href="http://pastebin.com/SfeKR7v2" rel="nofollow"> Luis - FreeNAS HW Setup</a> </li>
<li><a href="http://pastebin.com/wy4ar0YH" rel="nofollow"> Emett - Python Followup</a> </li>
<li><a href="http://pastebin.com/zd2QAu25" rel="nofollow"> Peter - Multicast + Jails</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>150: Sprinkle a little BSD into your life.</title>
  <link>https://www.bsdnow.tv/150</link>
  <guid isPermaLink="false">00b6ee02-f104-4624-9691-b5333683a5ed</guid>
  <pubDate>Wed, 13 Jul 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/00b6ee02-f104-4624-9691-b5333683a5ed.mp3" length="58734580" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Today on the show, we are going to be talking to Jim Brown (of BSD Cert Fame) about his home-brew sprinkler system… Wait for it…</itunes:subtitle>
  <itunes:duration>1:21:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Today on the show, we are going to be talking to Jim Brown (of BSD Cert Fame) about his home-brew sprinkler system… Wait for it…&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://distrowatch.com/weekly.php?issue=20160620#upgrade" target="_blank" rel="nofollow noopener"&gt;Distrowatch reviews OpenBSD and PCBSD's live upgrade method&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Upgrading… The bane of any sysadmin! Distrowatch has recently done a write-up on the in-place upgrading of various distros / BSDs including PC-BSD and OpenBSD.&lt;/li&gt;
&lt;li&gt;Lets look first at the PC-BSD attempt, which was done going from 9.2 -&amp;gt; 10. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “I soon found trying to upgrade either the base system or pkg would fail. The update manager did not provide details as to what had gone wrong and so I decided to attempt a manual upgrade by following the FreeBSD Handbook as I had when performing a live upgrade of FreeBSD back in May. At first the manual process seemed to work, downloading the necessary patches for FreeBSD 10 and getting me to resolve conflicts between my existing configuration files and the new versions. Part way through, we are asked to reboot and then continue the upgrade process using the freebsd-update command utility. PC-BSD failed to reboot and, in fact, the boot loader no longer found any operating systems to run.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Ouch! I’m not sure on the particular commands used, but to lose the boot-loader indicates something went horribly wrong. There is good news in this though. After the pain experienced in the 9.X upgrade process, 11.0 has been vastly improved to help fix this going forward. The updater is also self-updating, which means future changes to tools such as package can be accounted for in previously released versions.&lt;/li&gt;
&lt;li&gt;Moving on to OpenBSD, Jesse had much better luck:
&amp;gt; “The documentation provided explains how to upgrade OpenBSD 5.8 to version 5.9 step-by-step and the instructions worked exactly as laid out. Upgrading requires two reboots, one to initiate the upgrade process and one to boot into the new version of OpenBSD. Upgrading the base operating system took approximately ten minutes, including the two reboots. Upgrading the third-party packages took another minute or two. The only quirk I ran into was that I had to manually update my repository mirror information to gain access to the new packages available for OpenBSD 5.9. If this step is not done, then the pkg_add package manager will continue to pull in packages from the old repository we set up for OpenBSD 5.8. “&lt;/li&gt;
&lt;li&gt;A good read, and they covered some Linux distros such as Mint and OpenMandriva as well, if you want to find out how they fared.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://awesome-dtrace.com/" target="_blank" rel="nofollow noopener"&gt;A curated list of awesome DTrace books, articles, videos, tools and resources&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The website awesome-dtrace.com compiles a list of resources, including books, articles, videos, tools, and other resources, to help you get the most out of DTrace&lt;/li&gt;
&lt;li&gt;The list of books includes 2 open source books that are available on the web, and of course Brendan Gregg’s official DTrace book&lt;/li&gt;
&lt;li&gt;There are also cheat sheets, one-liner collections, and a set of DTrace war stories&lt;/li&gt;
&lt;li&gt;A breakdown of different PID providers and the userspace statically defined tracepoints&lt;/li&gt;
&lt;li&gt;The videos from DTrace.conf 2008, 2012, and soon 2016&lt;/li&gt;
&lt;li&gt;And links to the tools to start using DTrace with your favourite programming language, including Erlang, Node.JS, Perl, PHP, Python, or Ruby&lt;/li&gt;
&lt;li&gt;There are also DTrace setups for MySQL/MariaDB, and PostreSQL&lt;/li&gt;
&lt;li&gt;Joyent has even written a mod_usdt DTrace module for the Apache web server&lt;/li&gt;
&lt;li&gt;This seems like a really good resource, and with the efforts of the new OpenDTrace project, to modernize the dtracetoolkit and make it more useful across the different supported operating systems, there has never been a better time to start learning DTrace
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://unix.stackexchange.com/questions/292891/how-can-i-install-openbsd-using-the-serial-console-without-external-monitor-wi" target="_blank" rel="nofollow noopener"&gt;Installing OpenBSD using a serial console with no external monitor&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Have you found yourself needing to install OpenBSD from USB, but with a twist, as in no external monitor? Well somebody has and asked the question on stackexchange.&lt;/li&gt;
&lt;li&gt;The answer provided is quite well explained, but in a nut-shell the process involves downloading the USB image and making some tweaks before copying it to the physical media.&lt;/li&gt;
&lt;li&gt;Specifically with a couple of well-placed echo’s into boot.conf, the serial-port can be enabled and ready for use:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt;  echo "stty com0 115200" &amp;gt; /mnt/etc/boot.conf&lt;br&gt;
&amp;gt;  echo "set tty com0" &amp;gt;&amp;gt; /mnt/etc/boot.conf&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After that, simply boot the box and you are ready to access the serial console and drive the installation as normal! #bsdhacks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/gsoc_2016_reports_split_debug" target="_blank" rel="nofollow noopener"&gt;GSoC 2016 Reports: Split debug symbols for pkgsrc builds&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NetBSD blog provides a status report on one of the GSoC projects that is nearing its midterm evaluation&lt;/li&gt;
&lt;li&gt;The project to split debugging data into separate pkgsrc packages, so that users can install the debugging symbols if they need them to debug a failing application&lt;/li&gt;
&lt;li&gt;The report is very detailed, and includes “A quick introduction to ELF and how debug information are stored/stripped off”&lt;/li&gt;
&lt;li&gt;It walks through the process of writing a simple example application, compiling it, and dealing with the debug data&lt;/li&gt;
&lt;li&gt;It includes a number of very useful diagrams, and a summary of what changes needed to be make to the pkgsrc makefile infrastructure&lt;/li&gt;
&lt;li&gt;With this as a recipe, someone should be able to do something quite similar for FreeBSD’s ports tree
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/blog/ixsystems-truenas-firmware-update-delivers-compelling-performance-replication-graphing-improvements/" target="_blank" rel="nofollow noopener"&gt;iXsystems’ TrueNAS Firmware Update Delivers Compelling Performance, Replication, and Graphing Improvements&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jim Brown - &lt;a href="mailto:jpb@jimby.name" target="_blank" rel="nofollow noopener"&gt;jpb@jimby.name&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD+BBB Sprinkler System&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.cs.dartmouth.edu/%7Edoug/reader.pdf" target="_blank" rel="nofollow noopener"&gt;From the past : A Research Unix Reader&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A paper by by Douglas McIlroy&lt;/li&gt;
&lt;li&gt;“Selected pages from the nine research editions of the UNIX® Programmer’s Manual illustrate the development of the system”&lt;/li&gt;
&lt;li&gt;“Accompanying commentary recounts some of the needs, events, and individual contributions that shaped this evolution.”&lt;/li&gt;
&lt;li&gt;Interesting insight into the evolution of the origin UNIX operating system
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://kristerw.blogspot.com/2016/06/evolution-of-c-programming-practices.html" target="_blank" rel="nofollow noopener"&gt;Evolution of C programming practices – Unix 1973–2015&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;From the author of the recent post we covered, “20 years of NetBSD code bloat”, comes a new post&lt;/li&gt;
&lt;li&gt;“I found a recent paper that also looks at how the BSD code base has evolved, but from a very different perspective compared to my code-size investigation.”&lt;/li&gt;
&lt;li&gt;The paper "The Evolution of C Programming Practices: A Study of the Unix Operating System 1973–2015" investigates coding style, and tests seven hypotheses by looking at metrics (line length, number of volatile in the source code, etc.) in 66 releases of Unix from 1973 to 2014. The hypotheses are:
&amp;gt; + Programming practices reflect technology affordances (e.g. developers may be more liberal with screen space when using high resolution displays)
&amp;gt; + Modularity increases with code size
&amp;gt; + New language features are increasingly used to saturation point
&amp;gt; + Programmers trust the compiler for register allocation
&amp;gt; + Code formatting practices converge to a common standard
&amp;gt; + Software complexity evolution follows self correction feedback mechanisms
&amp;gt; + Code readability increases&lt;/li&gt;
&lt;li&gt;and the result is that they seem to be true, as interpreted through the metrics.
&amp;gt; “The data points for the releases have somewhat random dates. One issue is that the paper use each release's mean file date (the average of the files' last modification time) instead of the release date (that is why the graphs stop at November 2010, even though FreeBSD 10 was released in 2014). The idea is that this better reflects the age of the code base, but this has the effect of compressing some of the data points (especially the clustering around 1993-1994), and it makes the spline fitting even more suspect.”
&amp;gt; “One other problem is that the original data used by the researchers seems to have incorrect timestamps. For example, 4.3BSD Net/1 was released in 1989, but is listed as 1993-12-25 in the paper. The same is true for at least the Net/2 release too, which was released in 1991, but the paper list it as 1993-07-02.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;[old release pictures]&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/blakkheim/status/747540167112671232" target="_blank" rel="nofollow noopener"&gt;openbsd 2.1 - 5.9, straight from theo's bookshelf.&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/q5sys/status/748003859012984837" target="_blank" rel="nofollow noopener"&gt;Speaking of old releases, our Producer JT picked up this gem at Southeast Linuxfest this year&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://plus.google.com/+NoahAxon/posts/VsiQhUn3tHb" target="_blank" rel="nofollow noopener"&gt;Noah Axon shares a scan of his NetBSD 1.4 disc&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://plus.google.com/101232368324501316985/posts/4QsaJE2KxXh" target="_blank" rel="nofollow noopener"&gt;Jan van den broek shares a pic of his FreeBSD 2.2.5 set&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://bsdmag.org/just_in_time/" target="_blank" rel="nofollow noopener"&gt;FreeBSD: Just in Time&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another BSDMag goodie this week, we have a small article written by Jonathan Garrido  which details their experience switching to FreeBSD for a NTP server.&lt;/li&gt;
&lt;li&gt;The article is short, but a good read:
&amp;gt; “A Few years ago we had a time problem. Suddenly our linux NTP server, for a reason that I still do not know, started to fail giving us a lot of issues within all the equipment and services within our network. After a quick and brief meeting with management, I found out that there was not sufficient budget left for a fancy and well-suited appliance. So, with no time (literally) and no money to spend, I decided to give it a try and utilized a homemade open source solution, and the operating system of choice was FreeBSD 10.0.”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Now, let’s pause for a second. You may be thinking, why in the world is this guy doing this, when he has never installed a BSD machine in his life? The answer is very simple; here, in the Dominican Republic, in the heart of the Caribbean, FreeBSD has a very good reputation when it comes to reliability and security. In fact, there is some collective thought within the sysadmin community that says something like: “If you want to deal only once with a service, install it over FreeBSD.””&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Jonathan then goes through some of the steps taken to initial deploy NTP services, but with that out of the way, he has a great summary:
&amp;gt; “Fascinated with the whole experience, we migrate one of our internal dns servers to a second FreeBSD machine and at the moment of this writing we are testing haproxy, an open source load-balancing proxy into a another server with the same OS.
&amp;gt; After all this, no time issues have been reported in the past 2 years, so at least for my environment, FreeBSD came just in time.“
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://hackaday.io/project/643-minibsd-laptop-computer" target="_blank" rel="nofollow noopener"&gt;MiniBSD laptop computer&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://attilagyorffy.com/2016/07/02/the-state-of-libressl-in-freebsd/" target="_blank" rel="nofollow noopener"&gt;The state of LibreSSL in FreeBSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.dragonflydigest.com/2016/07/01/18372.html" target="_blank" rel="nofollow noopener"&gt;Justin Sherrill is looking for someone willing to run a Go builder with DragonflyBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://tinyapps.org/blog/windows/201606040700_tiny_unix_tools_windows.html" target="_blank" rel="nofollow noopener"&gt;Tiny Unix tools for Windows&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.freshports.org/security/doas/" target="_blank" rel="nofollow noopener"&gt;OpenBSD's doas added to the FreeBSD Ports Tree&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://linux.softpedia.com/blog/ubuntubsd-16-04-will-feature-a-combination-of-busybox-and-openrc-but-no-systemd-505463.shtml" target="_blank" rel="nofollow noopener"&gt;ubuntuBSD 16.04 to feature a combo of BusyBox and OpenRC, no systemd&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://podcast.sysca.st/podcast/4-curl-libcurl-future-web-daniel-stenberg/" target="_blank" rel="nofollow noopener"&gt;Syncast Podcast 4 : Curl, libcurl and the future of the web, with Daniel Stenberg&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/qKeCd63F" target="_blank" rel="nofollow noopener"&gt; Harri - Using beadm / zfssnap &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/EhXDwbWQ" target="_blank" rel="nofollow noopener"&gt; Jonathan - bhyve vs Proxmox &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ZCNk4Bga" target="_blank" rel="nofollow noopener"&gt; Mohammad - Bhyve gfx passthrough&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/xp7nzEYa" target="_blank" rel="nofollow noopener"&gt; Jeremy - Shapshots and more Snapshots&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/H2xr53CR" target="_blank" rel="nofollow noopener"&gt; Ron - Microphone&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today on the show, we are going to be talking to Jim Brown (of BSD Cert Fame) about his home-brew sprinkler system… Wait for it…</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://distrowatch.com/weekly.php?issue=20160620#upgrade" rel="nofollow">Distrowatch reviews OpenBSD and PCBSD&#39;s live upgrade method</a></h3>

<ul>
<li>Upgrading… The bane of any sysadmin! Distrowatch has recently done a write-up on the in-place upgrading of various distros / BSDs including PC-BSD and OpenBSD.</li>
<li>Lets look first at the PC-BSD attempt, which was done going from 9.2 -&gt; 10. </li>
</ul>

<blockquote>
<p>“I soon found trying to upgrade either the base system or pkg would fail. The update manager did not provide details as to what had gone wrong and so I decided to attempt a manual upgrade by following the FreeBSD Handbook as I had when performing a live upgrade of FreeBSD back in May. At first the manual process seemed to work, downloading the necessary patches for FreeBSD 10 and getting me to resolve conflicts between my existing configuration files and the new versions. Part way through, we are asked to reboot and then continue the upgrade process using the freebsd-update command utility. PC-BSD failed to reboot and, in fact, the boot loader no longer found any operating systems to run.”</p>
</blockquote>

<ul>
<li>Ouch! I’m not sure on the particular commands used, but to lose the boot-loader indicates something went horribly wrong. There is good news in this though. After the pain experienced in the 9.X upgrade process, 11.0 has been vastly improved to help fix this going forward. The updater is also self-updating, which means future changes to tools such as package can be accounted for in previously released versions.</li>
<li>Moving on to OpenBSD, Jesse had much better luck:
&gt; “The documentation provided explains how to upgrade OpenBSD 5.8 to version 5.9 step-by-step and the instructions worked exactly as laid out. Upgrading requires two reboots, one to initiate the upgrade process and one to boot into the new version of OpenBSD. Upgrading the base operating system took approximately ten minutes, including the two reboots. Upgrading the third-party packages took another minute or two. The only quirk I ran into was that I had to manually update my repository mirror information to gain access to the new packages available for OpenBSD 5.9. If this step is not done, then the pkg_add package manager will continue to pull in packages from the old repository we set up for OpenBSD 5.8. “</li>
<li>A good read, and they covered some Linux distros such as Mint and OpenMandriva as well, if you want to find out how they fared.
***</li>
</ul>

<h3><a href="http://awesome-dtrace.com/" rel="nofollow">A curated list of awesome DTrace books, articles, videos, tools and resources</a></h3>

<ul>
<li>The website awesome-dtrace.com compiles a list of resources, including books, articles, videos, tools, and other resources, to help you get the most out of DTrace</li>
<li>The list of books includes 2 open source books that are available on the web, and of course Brendan Gregg’s official DTrace book</li>
<li>There are also cheat sheets, one-liner collections, and a set of DTrace war stories</li>
<li>A breakdown of different PID providers and the userspace statically defined tracepoints</li>
<li>The videos from DTrace.conf 2008, 2012, and soon 2016</li>
<li>And links to the tools to start using DTrace with your favourite programming language, including Erlang, Node.JS, Perl, PHP, Python, or Ruby</li>
<li>There are also DTrace setups for MySQL/MariaDB, and PostreSQL</li>
<li>Joyent has even written a mod_usdt DTrace module for the Apache web server</li>
<li>This seems like a really good resource, and with the efforts of the new OpenDTrace project, to modernize the dtracetoolkit and make it more useful across the different supported operating systems, there has never been a better time to start learning DTrace
***</li>
</ul>

<h3><a href="http://unix.stackexchange.com/questions/292891/how-can-i-install-openbsd-using-the-serial-console-without-external-monitor-wi" rel="nofollow">Installing OpenBSD using a serial console with no external monitor</a></h3>

<ul>
<li>Have you found yourself needing to install OpenBSD from USB, but with a twist, as in no external monitor? Well somebody has and asked the question on stackexchange.</li>
<li>The answer provided is quite well explained, but in a nut-shell the process involves downloading the USB image and making some tweaks before copying it to the physical media.</li>
<li>Specifically with a couple of well-placed echo’s into boot.conf, the serial-port can be enabled and ready for use:</li>
</ul>

<blockquote>
<p>echo &quot;stty com0 115200&quot; &gt; /mnt/etc/boot.conf<br>
 echo &quot;set tty com0&quot; &gt;&gt; /mnt/etc/boot.conf</p>

<ul>
<li>After that, simply boot the box and you are ready to access the serial console and drive the installation as normal! #bsdhacks
***</li>
</ul>
</blockquote>

<h3><a href="https://blog.netbsd.org/tnf/entry/gsoc_2016_reports_split_debug" rel="nofollow">GSoC 2016 Reports: Split debug symbols for pkgsrc builds</a></h3>

<ul>
<li>The NetBSD blog provides a status report on one of the GSoC projects that is nearing its midterm evaluation</li>
<li>The project to split debugging data into separate pkgsrc packages, so that users can install the debugging symbols if they need them to debug a failing application</li>
<li>The report is very detailed, and includes “A quick introduction to ELF and how debug information are stored/stripped off”</li>
<li>It walks through the process of writing a simple example application, compiling it, and dealing with the debug data</li>
<li>It includes a number of very useful diagrams, and a summary of what changes needed to be make to the pkgsrc makefile infrastructure</li>
<li>With this as a recipe, someone should be able to do something quite similar for FreeBSD’s ports tree
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/blog/ixsystems-truenas-firmware-update-delivers-compelling-performance-replication-graphing-improvements/" rel="nofollow">iXsystems’ TrueNAS Firmware Update Delivers Compelling Performance, Replication, and Graphing Improvements</a> 
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:jpb@jimby.name" rel="nofollow">jpb@jimby.name</a></h2>

<p>FreeBSD+BBB Sprinkler System</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.cs.dartmouth.edu/%7Edoug/reader.pdf" rel="nofollow">From the past : A Research Unix Reader</a></h3>

<ul>
<li>A paper by by Douglas McIlroy</li>
<li>“Selected pages from the nine research editions of the UNIX® Programmer’s Manual illustrate the development of the system”</li>
<li>“Accompanying commentary recounts some of the needs, events, and individual contributions that shaped this evolution.”</li>
<li>Interesting insight into the evolution of the origin UNIX operating system
***</li>
</ul>

<h3><a href="http://kristerw.blogspot.com/2016/06/evolution-of-c-programming-practices.html" rel="nofollow">Evolution of C programming practices – Unix 1973–2015</a></h3>

<ul>
<li>From the author of the recent post we covered, “20 years of NetBSD code bloat”, comes a new post</li>
<li>“I found a recent paper that also looks at how the BSD code base has evolved, but from a very different perspective compared to my code-size investigation.”</li>
<li>The paper &quot;The Evolution of C Programming Practices: A Study of the Unix Operating System 1973–2015&quot; investigates coding style, and tests seven hypotheses by looking at metrics (line length, number of volatile in the source code, etc.) in 66 releases of Unix from 1973 to 2014. The hypotheses are:
&gt; + Programming practices reflect technology affordances (e.g. developers may be more liberal with screen space when using high resolution displays)
&gt; + Modularity increases with code size
&gt; + New language features are increasingly used to saturation point
&gt; + Programmers trust the compiler for register allocation
&gt; + Code formatting practices converge to a common standard
&gt; + Software complexity evolution follows self correction feedback mechanisms
&gt; + Code readability increases</li>
<li>and the result is that they seem to be true, as interpreted through the metrics.
&gt; “The data points for the releases have somewhat random dates. One issue is that the paper use each release&#39;s mean file date (the average of the files&#39; last modification time) instead of the release date (that is why the graphs stop at November 2010, even though FreeBSD 10 was released in 2014). The idea is that this better reflects the age of the code base, but this has the effect of compressing some of the data points (especially the clustering around 1993-1994), and it makes the spline fitting even more suspect.”
&gt; “One other problem is that the original data used by the researchers seems to have incorrect timestamps. For example, 4.3BSD Net/1 was released in 1989, but is listed as 1993-12-25 in the paper. The same is true for at least the Net/2 release too, which was released in 1991, but the paper list it as 1993-07-02.”
***</li>
</ul>

<h3>[old release pictures]</h3>

<ul>
<li><a href="https://twitter.com/blakkheim/status/747540167112671232" rel="nofollow">openbsd 2.1 - 5.9, straight from theo&#39;s bookshelf.</a> </li>
<li><a href="https://twitter.com/q5sys/status/748003859012984837" rel="nofollow">Speaking of old releases, our Producer JT picked up this gem at Southeast Linuxfest this year</a> </li>
<li><a href="https://plus.google.com/+NoahAxon/posts/VsiQhUn3tHb" rel="nofollow">Noah Axon shares a scan of his NetBSD 1.4 disc</a> </li>
<li><a href="https://plus.google.com/101232368324501316985/posts/4QsaJE2KxXh" rel="nofollow">Jan van den broek shares a pic of his FreeBSD 2.2.5 set</a> 
***</li>
</ul>

<h3><a href="https://bsdmag.org/just_in_time/" rel="nofollow">FreeBSD: Just in Time</a></h3>

<ul>
<li>Another BSDMag goodie this week, we have a small article written by Jonathan Garrido  which details their experience switching to FreeBSD for a NTP server.</li>
<li>The article is short, but a good read:
&gt; “A Few years ago we had a time problem. Suddenly our linux NTP server, for a reason that I still do not know, started to fail giving us a lot of issues within all the equipment and services within our network. After a quick and brief meeting with management, I found out that there was not sufficient budget left for a fancy and well-suited appliance. So, with no time (literally) and no money to spend, I decided to give it a try and utilized a homemade open source solution, and the operating system of choice was FreeBSD 10.0.”</li>
</ul>

<blockquote>
<p>“Now, let’s pause for a second. You may be thinking, why in the world is this guy doing this, when he has never installed a BSD machine in his life? The answer is very simple; here, in the Dominican Republic, in the heart of the Caribbean, FreeBSD has a very good reputation when it comes to reliability and security. In fact, there is some collective thought within the sysadmin community that says something like: “If you want to deal only once with a service, install it over FreeBSD.””</p>
</blockquote>

<ul>
<li>Jonathan then goes through some of the steps taken to initial deploy NTP services, but with that out of the way, he has a great summary:
&gt; “Fascinated with the whole experience, we migrate one of our internal dns servers to a second FreeBSD machine and at the moment of this writing we are testing haproxy, an open source load-balancing proxy into a another server with the same OS.
&gt; After all this, no time issues have been reported in the past 2 years, so at least for my environment, FreeBSD came just in time.“
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://hackaday.io/project/643-minibsd-laptop-computer" rel="nofollow">MiniBSD laptop computer</a> </p></li>
<li><p><a href="https://attilagyorffy.com/2016/07/02/the-state-of-libressl-in-freebsd/" rel="nofollow">The state of LibreSSL in FreeBSD</a> </p></li>
<li><p><a href="https://www.dragonflydigest.com/2016/07/01/18372.html" rel="nofollow">Justin Sherrill is looking for someone willing to run a Go builder with DragonflyBSD</a></p></li>
<li><p><a href="https://tinyapps.org/blog/windows/201606040700_tiny_unix_tools_windows.html" rel="nofollow">Tiny Unix tools for Windows</a> </p></li>
<li><p><a href="http://www.freshports.org/security/doas/" rel="nofollow">OpenBSD&#39;s doas added to the FreeBSD Ports Tree</a> </p></li>
<li><p><a href="http://linux.softpedia.com/blog/ubuntubsd-16-04-will-feature-a-combination-of-busybox-and-openrc-but-no-systemd-505463.shtml" rel="nofollow">ubuntuBSD 16.04 to feature a combo of BusyBox and OpenRC, no systemd</a> </p></li>
<li><p><a href="http://podcast.sysca.st/podcast/4-curl-libcurl-future-web-daniel-stenberg/" rel="nofollow">Syncast Podcast 4 : Curl, libcurl and the future of the web, with Daniel Stenberg</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/qKeCd63F" rel="nofollow"> Harri - Using beadm / zfssnap </a> </li>
<li><a href="http://pastebin.com/EhXDwbWQ" rel="nofollow"> Jonathan - bhyve vs Proxmox </a> </li>
<li><a href="http://pastebin.com/ZCNk4Bga" rel="nofollow"> Mohammad - Bhyve gfx passthrough</a> </li>
<li><a href="http://pastebin.com/xp7nzEYa" rel="nofollow"> Jeremy - Shapshots and more Snapshots</a> </li>
<li><a href="http://pastebin.com/H2xr53CR" rel="nofollow"> Ron - Microphone</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today on the show, we are going to be talking to Jim Brown (of BSD Cert Fame) about his home-brew sprinkler system… Wait for it…</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://distrowatch.com/weekly.php?issue=20160620#upgrade" rel="nofollow">Distrowatch reviews OpenBSD and PCBSD&#39;s live upgrade method</a></h3>

<ul>
<li>Upgrading… The bane of any sysadmin! Distrowatch has recently done a write-up on the in-place upgrading of various distros / BSDs including PC-BSD and OpenBSD.</li>
<li>Lets look first at the PC-BSD attempt, which was done going from 9.2 -&gt; 10. </li>
</ul>

<blockquote>
<p>“I soon found trying to upgrade either the base system or pkg would fail. The update manager did not provide details as to what had gone wrong and so I decided to attempt a manual upgrade by following the FreeBSD Handbook as I had when performing a live upgrade of FreeBSD back in May. At first the manual process seemed to work, downloading the necessary patches for FreeBSD 10 and getting me to resolve conflicts between my existing configuration files and the new versions. Part way through, we are asked to reboot and then continue the upgrade process using the freebsd-update command utility. PC-BSD failed to reboot and, in fact, the boot loader no longer found any operating systems to run.”</p>
</blockquote>

<ul>
<li>Ouch! I’m not sure on the particular commands used, but to lose the boot-loader indicates something went horribly wrong. There is good news in this though. After the pain experienced in the 9.X upgrade process, 11.0 has been vastly improved to help fix this going forward. The updater is also self-updating, which means future changes to tools such as package can be accounted for in previously released versions.</li>
<li>Moving on to OpenBSD, Jesse had much better luck:
&gt; “The documentation provided explains how to upgrade OpenBSD 5.8 to version 5.9 step-by-step and the instructions worked exactly as laid out. Upgrading requires two reboots, one to initiate the upgrade process and one to boot into the new version of OpenBSD. Upgrading the base operating system took approximately ten minutes, including the two reboots. Upgrading the third-party packages took another minute or two. The only quirk I ran into was that I had to manually update my repository mirror information to gain access to the new packages available for OpenBSD 5.9. If this step is not done, then the pkg_add package manager will continue to pull in packages from the old repository we set up for OpenBSD 5.8. “</li>
<li>A good read, and they covered some Linux distros such as Mint and OpenMandriva as well, if you want to find out how they fared.
***</li>
</ul>

<h3><a href="http://awesome-dtrace.com/" rel="nofollow">A curated list of awesome DTrace books, articles, videos, tools and resources</a></h3>

<ul>
<li>The website awesome-dtrace.com compiles a list of resources, including books, articles, videos, tools, and other resources, to help you get the most out of DTrace</li>
<li>The list of books includes 2 open source books that are available on the web, and of course Brendan Gregg’s official DTrace book</li>
<li>There are also cheat sheets, one-liner collections, and a set of DTrace war stories</li>
<li>A breakdown of different PID providers and the userspace statically defined tracepoints</li>
<li>The videos from DTrace.conf 2008, 2012, and soon 2016</li>
<li>And links to the tools to start using DTrace with your favourite programming language, including Erlang, Node.JS, Perl, PHP, Python, or Ruby</li>
<li>There are also DTrace setups for MySQL/MariaDB, and PostreSQL</li>
<li>Joyent has even written a mod_usdt DTrace module for the Apache web server</li>
<li>This seems like a really good resource, and with the efforts of the new OpenDTrace project, to modernize the dtracetoolkit and make it more useful across the different supported operating systems, there has never been a better time to start learning DTrace
***</li>
</ul>

<h3><a href="http://unix.stackexchange.com/questions/292891/how-can-i-install-openbsd-using-the-serial-console-without-external-monitor-wi" rel="nofollow">Installing OpenBSD using a serial console with no external monitor</a></h3>

<ul>
<li>Have you found yourself needing to install OpenBSD from USB, but with a twist, as in no external monitor? Well somebody has and asked the question on stackexchange.</li>
<li>The answer provided is quite well explained, but in a nut-shell the process involves downloading the USB image and making some tweaks before copying it to the physical media.</li>
<li>Specifically with a couple of well-placed echo’s into boot.conf, the serial-port can be enabled and ready for use:</li>
</ul>

<blockquote>
<p>echo &quot;stty com0 115200&quot; &gt; /mnt/etc/boot.conf<br>
 echo &quot;set tty com0&quot; &gt;&gt; /mnt/etc/boot.conf</p>

<ul>
<li>After that, simply boot the box and you are ready to access the serial console and drive the installation as normal! #bsdhacks
***</li>
</ul>
</blockquote>

<h3><a href="https://blog.netbsd.org/tnf/entry/gsoc_2016_reports_split_debug" rel="nofollow">GSoC 2016 Reports: Split debug symbols for pkgsrc builds</a></h3>

<ul>
<li>The NetBSD blog provides a status report on one of the GSoC projects that is nearing its midterm evaluation</li>
<li>The project to split debugging data into separate pkgsrc packages, so that users can install the debugging symbols if they need them to debug a failing application</li>
<li>The report is very detailed, and includes “A quick introduction to ELF and how debug information are stored/stripped off”</li>
<li>It walks through the process of writing a simple example application, compiling it, and dealing with the debug data</li>
<li>It includes a number of very useful diagrams, and a summary of what changes needed to be make to the pkgsrc makefile infrastructure</li>
<li>With this as a recipe, someone should be able to do something quite similar for FreeBSD’s ports tree
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/blog/ixsystems-truenas-firmware-update-delivers-compelling-performance-replication-graphing-improvements/" rel="nofollow">iXsystems’ TrueNAS Firmware Update Delivers Compelling Performance, Replication, and Graphing Improvements</a> 
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:jpb@jimby.name" rel="nofollow">jpb@jimby.name</a></h2>

<p>FreeBSD+BBB Sprinkler System</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.cs.dartmouth.edu/%7Edoug/reader.pdf" rel="nofollow">From the past : A Research Unix Reader</a></h3>

<ul>
<li>A paper by by Douglas McIlroy</li>
<li>“Selected pages from the nine research editions of the UNIX® Programmer’s Manual illustrate the development of the system”</li>
<li>“Accompanying commentary recounts some of the needs, events, and individual contributions that shaped this evolution.”</li>
<li>Interesting insight into the evolution of the origin UNIX operating system
***</li>
</ul>

<h3><a href="http://kristerw.blogspot.com/2016/06/evolution-of-c-programming-practices.html" rel="nofollow">Evolution of C programming practices – Unix 1973–2015</a></h3>

<ul>
<li>From the author of the recent post we covered, “20 years of NetBSD code bloat”, comes a new post</li>
<li>“I found a recent paper that also looks at how the BSD code base has evolved, but from a very different perspective compared to my code-size investigation.”</li>
<li>The paper &quot;The Evolution of C Programming Practices: A Study of the Unix Operating System 1973–2015&quot; investigates coding style, and tests seven hypotheses by looking at metrics (line length, number of volatile in the source code, etc.) in 66 releases of Unix from 1973 to 2014. The hypotheses are:
&gt; + Programming practices reflect technology affordances (e.g. developers may be more liberal with screen space when using high resolution displays)
&gt; + Modularity increases with code size
&gt; + New language features are increasingly used to saturation point
&gt; + Programmers trust the compiler for register allocation
&gt; + Code formatting practices converge to a common standard
&gt; + Software complexity evolution follows self correction feedback mechanisms
&gt; + Code readability increases</li>
<li>and the result is that they seem to be true, as interpreted through the metrics.
&gt; “The data points for the releases have somewhat random dates. One issue is that the paper use each release&#39;s mean file date (the average of the files&#39; last modification time) instead of the release date (that is why the graphs stop at November 2010, even though FreeBSD 10 was released in 2014). The idea is that this better reflects the age of the code base, but this has the effect of compressing some of the data points (especially the clustering around 1993-1994), and it makes the spline fitting even more suspect.”
&gt; “One other problem is that the original data used by the researchers seems to have incorrect timestamps. For example, 4.3BSD Net/1 was released in 1989, but is listed as 1993-12-25 in the paper. The same is true for at least the Net/2 release too, which was released in 1991, but the paper list it as 1993-07-02.”
***</li>
</ul>

<h3>[old release pictures]</h3>

<ul>
<li><a href="https://twitter.com/blakkheim/status/747540167112671232" rel="nofollow">openbsd 2.1 - 5.9, straight from theo&#39;s bookshelf.</a> </li>
<li><a href="https://twitter.com/q5sys/status/748003859012984837" rel="nofollow">Speaking of old releases, our Producer JT picked up this gem at Southeast Linuxfest this year</a> </li>
<li><a href="https://plus.google.com/+NoahAxon/posts/VsiQhUn3tHb" rel="nofollow">Noah Axon shares a scan of his NetBSD 1.4 disc</a> </li>
<li><a href="https://plus.google.com/101232368324501316985/posts/4QsaJE2KxXh" rel="nofollow">Jan van den broek shares a pic of his FreeBSD 2.2.5 set</a> 
***</li>
</ul>

<h3><a href="https://bsdmag.org/just_in_time/" rel="nofollow">FreeBSD: Just in Time</a></h3>

<ul>
<li>Another BSDMag goodie this week, we have a small article written by Jonathan Garrido  which details their experience switching to FreeBSD for a NTP server.</li>
<li>The article is short, but a good read:
&gt; “A Few years ago we had a time problem. Suddenly our linux NTP server, for a reason that I still do not know, started to fail giving us a lot of issues within all the equipment and services within our network. After a quick and brief meeting with management, I found out that there was not sufficient budget left for a fancy and well-suited appliance. So, with no time (literally) and no money to spend, I decided to give it a try and utilized a homemade open source solution, and the operating system of choice was FreeBSD 10.0.”</li>
</ul>

<blockquote>
<p>“Now, let’s pause for a second. You may be thinking, why in the world is this guy doing this, when he has never installed a BSD machine in his life? The answer is very simple; here, in the Dominican Republic, in the heart of the Caribbean, FreeBSD has a very good reputation when it comes to reliability and security. In fact, there is some collective thought within the sysadmin community that says something like: “If you want to deal only once with a service, install it over FreeBSD.””</p>
</blockquote>

<ul>
<li>Jonathan then goes through some of the steps taken to initial deploy NTP services, but with that out of the way, he has a great summary:
&gt; “Fascinated with the whole experience, we migrate one of our internal dns servers to a second FreeBSD machine and at the moment of this writing we are testing haproxy, an open source load-balancing proxy into a another server with the same OS.
&gt; After all this, no time issues have been reported in the past 2 years, so at least for my environment, FreeBSD came just in time.“
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://hackaday.io/project/643-minibsd-laptop-computer" rel="nofollow">MiniBSD laptop computer</a> </p></li>
<li><p><a href="https://attilagyorffy.com/2016/07/02/the-state-of-libressl-in-freebsd/" rel="nofollow">The state of LibreSSL in FreeBSD</a> </p></li>
<li><p><a href="https://www.dragonflydigest.com/2016/07/01/18372.html" rel="nofollow">Justin Sherrill is looking for someone willing to run a Go builder with DragonflyBSD</a></p></li>
<li><p><a href="https://tinyapps.org/blog/windows/201606040700_tiny_unix_tools_windows.html" rel="nofollow">Tiny Unix tools for Windows</a> </p></li>
<li><p><a href="http://www.freshports.org/security/doas/" rel="nofollow">OpenBSD&#39;s doas added to the FreeBSD Ports Tree</a> </p></li>
<li><p><a href="http://linux.softpedia.com/blog/ubuntubsd-16-04-will-feature-a-combination-of-busybox-and-openrc-but-no-systemd-505463.shtml" rel="nofollow">ubuntuBSD 16.04 to feature a combo of BusyBox and OpenRC, no systemd</a> </p></li>
<li><p><a href="http://podcast.sysca.st/podcast/4-curl-libcurl-future-web-daniel-stenberg/" rel="nofollow">Syncast Podcast 4 : Curl, libcurl and the future of the web, with Daniel Stenberg</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/qKeCd63F" rel="nofollow"> Harri - Using beadm / zfssnap </a> </li>
<li><a href="http://pastebin.com/EhXDwbWQ" rel="nofollow"> Jonathan - bhyve vs Proxmox </a> </li>
<li><a href="http://pastebin.com/ZCNk4Bga" rel="nofollow"> Mohammad - Bhyve gfx passthrough</a> </li>
<li><a href="http://pastebin.com/xp7nzEYa" rel="nofollow"> Jeremy - Shapshots and more Snapshots</a> </li>
<li><a href="http://pastebin.com/H2xr53CR" rel="nofollow"> Ron - Microphone</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>149: The bhyve has been disturbed, and a wild Dexter appears!</title>
  <link>https://www.bsdnow.tv/149</link>
  <guid isPermaLink="false">24138cd0-e03d-4871-a6b5-6c78f13bd631</guid>
  <pubDate>Wed, 06 Jul 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/24138cd0-e03d-4871-a6b5-6c78f13bd631.mp3" length="84439828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Today on the show, we are going to be chatting with Michael Dexter about a variety of topics, but of course including bhyve! That plus</itunes:subtitle>
  <itunes:duration>2:20:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Today on the show, we are going to be chatting with Michael Dexter about a variety of topics, but of course including bhyve! That plus&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://bsdmag.org/netbsd_intr/" target="_blank" rel="nofollow noopener"&gt;NetBSD Introduction&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We start off today’s episode with a great new NetBSD article!&lt;/li&gt;
&lt;li&gt;Siju Oommen George has written an article for BSDMag, which provides a great overview of NetBSD’s beginnings and what it is today.&lt;/li&gt;
&lt;li&gt;Of course you can’t start an article about NetBSD without mentioning where the name came from:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;“The four founders of the NetBSD project, Chris Demetriou, Theo de Raadt, Adam Glass, and Charles Hannum, felt that a more open development model would benefit the project: one centered on portable, clean and correct code. They aimed to produce a unified, multi-platform, production-quality, BSD-based operating system. The name “NetBSD” was suggested by de Raadt, based on the importance and growth of networks, such as the Internet at that time, the distributed and collaborative nature of its development.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;From there NetBSD has expanded, and keeping in line with its motto “Of course it runs NetBSD” it has grown to over 57 hardware platforms, including “IA-32, Alpha, PowerPC,SPARC, Raspberry pi 2, SPARC64 and Zaurus”&lt;/li&gt;
&lt;li&gt;From there topics such as pkgsrc, SMP, embedded and of course virtualization are all covered, which gives the reader a good overview of what to expect in the modern NetBSD today.&lt;/li&gt;
&lt;li&gt;Lastly, in addition to mentioning some of the vendors using NetBSD in a variety of ways, including Point-Of-Sale systems, routers and thin-clients, you may not have known about the research teams which deploy NetBSD:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; NASA Lewis Research Center – Satellite Networks and Architectures Branch use NetBSD almost exclusively in their investigation of TCP for use in satellite networks.&lt;br&gt;
&amp;gt; KAME project – A research group for implementing IPv6, IPsec and other recent TCP/IP related technologies into BSD UNIX kernels, under BSD license.&lt;br&gt;
&amp;gt; NEC Europe Ltd. established the Network Laboratories in Heidelberg, Germany in 1997, as NEC’s third research facility in Europe. The Heidelberg labs focus on software-oriented research and development for the next generation Internet.&lt;br&gt;
&amp;gt; SAMS-II Project – Space Acceleration Measurement System II. NASA will be measuring the microgravity environment on the International Space Station using a distributed system, consisting of NetBSD.“&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://runcommand.io/2016/06/26/my-condolences-youre-now-the-maintainer-of-a-popular-open-source-project/" target="_blank" rel="nofollow noopener"&gt;My condolences, you’re now the maintainer of a popular open source project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A presentation from a Wordpress conference, about what it is like to be the maintainer of a popular open source project&lt;/li&gt;
&lt;li&gt;The presentation covers the basics:&lt;/li&gt;
&lt;li&gt;Open Source is more than just the license, it is about community and involvement&lt;/li&gt;
&lt;li&gt;The difference between Maintainers and Contributors&lt;/li&gt;
&lt;li&gt;It covers some of the reasons people do not open up their code, and other common problems people run into:

&lt;ul&gt;
&lt;li&gt;“I'm embarrassed by my code” (Hint: so is everyone else, post it anyway, it is the best way to learn)&lt;/li&gt;
&lt;li&gt;“I'm discouraged that I can't finish releases on time”&lt;/li&gt;
&lt;li&gt;“I'm overwhelmed by the PR backlog”&lt;/li&gt;
&lt;li&gt;“I'm frustrated when issues turn into flamewars”&lt;/li&gt;
&lt;li&gt;“I'm overcommitted on my open source involvement”&lt;/li&gt;
&lt;li&gt;“I feel all alone”&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Each of those points is met with advice and possible solutions&lt;/li&gt;
&lt;li&gt;So, there you have it. Open up your code, or join an existing project and help maintain it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.hostingadvice.com/blog/freebsd-project-under-the-hood/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Committer Allan Jude Discusses the Advantages of FreeBSD and His Role in Keeping Millions of Servers Running&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; An interesting twist on our normal news-stories today, we have an article featuring our very own Allan Jude, talking about why FreeBSD and the advantages of working on an open-source project.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “When Allan started his own company hosting websites for video streaming, FreeBSD was the only operating system he had previously used with other hosts. Based on his experience and comfort with it, he trusted the system with the future of his budding business.A decade later, the former-SysAdmin went to a conference focused on the open-source operating system, where he ran into some of the folks on its documentation team. “They inspired me,” he told our team in a recent chat. He began writing documentation but soon wanted to contribute improvements beyond the docs.Today, Allan sits as a FreeBSD Project Committer. It’s rare that you get to chat with someone involved with a massive-scale open-source project like this — rare and awesome.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;From there Allan goes into some of the reasons “Why” FreeBSD, starting with Code Organization being well-maintained and documented:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “The FreeBSD Project functions like an extremely well-organized world all its own. Allan explained the environment: “There’s a documentation page that explains how the file system’s laid out and everything has a place and it always goes in that place.””&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In addition, Allan gives us some insight into his work to bring Boot-Environments to the loader, and other reasons why FreeBSD “just makes sense”&lt;/li&gt;
&lt;li&gt;In summary Allan wraps it up quite nicely:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “An important take-away is that you don’t have to be a major developer with tons of experience to make a difference in the project,” Allan said — and the difference that devs like Allan are making is incredible. If you too want to submit the commit that contributes to the project relied on by millions of web servers, there are plenty of ways to get involved!&lt;/p&gt;

&lt;p&gt;&amp;gt; We’re especially talking to SysAdmins here, as Allan noted that they are the main users of FreeBSD. “Having more SysAdmins involved in the actual build of the system means we can offer the tools they’re looking for — designed the way a SysAdmin would want them designed, not necessarily the way a developer would think makes the most sense”&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://justinholcomb.me/blog/2016/07/03/poudriere-in-bhyve-and-bare-metal.html" target="_blank" rel="nofollow noopener"&gt;A guide to saving electricity and time with poudriere and bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“This article goes over running poudriere to built packages for a Raspberry Pi with the interesting twist of running it both as a bhyve guest and then switching to running on bare metal via Fiber Channel via ctld by sharing the same ZFS volume.”&lt;/li&gt;
&lt;li&gt;“Firstly, poudriere can build packages for different architectures such as ARM. This can save hours of build time compared to building ports from said ARM device.”&lt;/li&gt;
&lt;li&gt;“Secondly, let’s say a person has an always-on device (NAS) running FreeBSD. To save power, this device has a CPU with a low clock-rate and low core count. This low clock-rate and core count is great for saving power but terrible for processor intensive application such as poudriere. Let’s say a person also has another physical server with fast processors and a high CPU count but draws nearly twice the power and a fan noise to match.”&lt;/li&gt;
&lt;li&gt;“To get the best of both worlds, the goal is to build the packages on the fast physical server, power it down, and then start the same ZFS volume in a bhyve environment to serve packages from the always-on device.”&lt;/li&gt;
&lt;li&gt;The tutorial walks through setting up ‘ahost’, the always on machine, ‘fhost’ the fast but noisy build machine, and a raspberry pi&lt;/li&gt;
&lt;li&gt;It also includes creating a zvol, configuring iSCSI over fibre channel and exporting the zvol, booting an iSCSI volume in bhyve, plus installing and setting up poudriere&lt;/li&gt;
&lt;li&gt;This it configures booting over fibre channel, and cross-building armv6 (raspberry pi) packages on the fast build machine&lt;/li&gt;
&lt;li&gt;Then the fast machine is shut down, and the zvol is booted in bhyve on the NAS&lt;/li&gt;
&lt;li&gt;Everything you need to know to make a hybrid physical/virtual machine&lt;/li&gt;
&lt;li&gt;The same setup could also work to run the same bhyve VM from either ahost or fhost&lt;/li&gt;
&lt;li&gt;bhyve does not yet support live migration, but when it does, having common network storage like the zvol will be an important part of that
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Michael Dexter - &lt;a href="mailto:editor@callfortesting.org" target="_blank" rel="nofollow noopener"&gt;editor@callfortesting.org&lt;/a&gt; / &lt;a href="https://twitter.com/michaeldexter" target="_blank" rel="nofollow noopener"&gt;@michaeldexter&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;The RoloDexter
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;iXSystems&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=FFbdQ_05e-0" target="_blank" rel="nofollow noopener"&gt;Children's Minnesota Star Studio Chooses iXsystems' TrueNAS Storage&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/wp-content/uploads/2016/06/FreeBSD-Foundation-June-2016-Update.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation June 2016 Update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD Foundation’s June newsletter is out&lt;/li&gt;
&lt;li&gt;Make sure you submit the &lt;a href="https://www.surveymonkey.com/r/freebsd2016" target="_blank" rel="nofollow noopener"&gt;FreeBSD Community Survey&lt;/a&gt; by July 7th:&lt;/li&gt;
&lt;li&gt;In addition to the opening message from the executive director of the foundation, the update includes details to sponsored work on the FreeBSD VM system, reports from a number of conferences the Foundation attended, including BSDCan&lt;/li&gt;
&lt;li&gt;The results of the foundation's yearly board meeting&lt;/li&gt;
&lt;li&gt;People the foundation recognized for their contributions to FreeBSD at BSDCan&lt;/li&gt;
&lt;li&gt;And an introduction to their new “Getting Started with FreeBSD” project
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.all-nettools.com/forum/showthread.php?34422-Building-the-FreeBSD-OS-from-scratch" target="_blank" rel="nofollow noopener"&gt;[How-To] Building the FreeBSD OS from scratch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A tutorial over at the All-NetTools.com forums that walks through building FreeBSD from scratch&lt;/li&gt;
&lt;li&gt;I am not sure why anyone would want to build Xorg from source, but you can&lt;/li&gt;
&lt;li&gt;It covers everything in quite a bit of detail, from the installation process through adding Xorg and a window manager from source&lt;/li&gt;
&lt;li&gt;It also includes tweaking some device node permissions for easier operation as a non-root user, and configuring the firewall
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
&lt;a href="http://doc.cat-v.org/bell_labs/transparent_wsys/" target="_blank" rel="nofollow noopener"&gt;Window Systems Should Be Transparent&lt;/a&gt; + Rob Pike of AT&amp;amp;T Labs writes about why Window Systems should be transparent&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is an old paper (undated, but I think from the late 80s), but may contain some timeless insights&lt;/li&gt;
&lt;li&gt;“UNIX window systems are unsatisfactory. Because they are cumbersome and complicated, they are unsuitable companions for an operating system that is appreciated for its technical elegance”&lt;/li&gt;
&lt;li&gt;“A good interface should clarify the view, not obscure it”&lt;/li&gt;
&lt;li&gt;“Mux is one window system that is popular and therefore worth studying as an example of good design. (It is not commercially important because it runs only on obsolete hardware.) This paper uses mux as a case study to illustrate some principles that can help keep a user interface simple, comfortable, and unobtrusive. When designing their products, the purveyors of commercial window systems should keep these principles in mind.”&lt;/li&gt;
&lt;li&gt;There are not many commercial window systems anymore, but “open source” was not really a big thing when this paper was written
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://permalink.gmane.org/gmane.comp.standards.posix.austin.general/12877" target="_blank" rel="nofollow noopener"&gt;Roger Faulkner, of Solaris fame passed away &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“RIP Roger Faulkner: creator of the One and True /proc, slayer of the M-to-N threading model -- and the godfather of post-AT&amp;amp;T Unix”&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/bcantrill/status/750442169807171584" target="_blank" rel="nofollow noopener"&gt;@bcantrill: Another great Roger Faulkner story &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://news.ycombinator.com/item?id=4306515" target="_blank" rel="nofollow noopener"&gt;The story of how pgrep -w saved a monitor -- if not a life&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/bcantrill/status/750442169807171584" target="_blank" rel="nofollow noopener"&gt;@bcantrill: With Roger Faulkner, Tim led an engineering coup inside Sun that saved Solaris circa 2.5&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits:&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-June/084843.html" target="_blank" rel="nofollow noopener"&gt;Developer Ed Maste is requesting information from those who are users of libvgl.&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-June/249748.html" target="_blank" rel="nofollow noopener"&gt;HEADS UP: DragonFly 4.5 world reneeds rebuilding&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://blog.pfsense.org/?p=2095" target="_blank" rel="nofollow noopener"&gt;Chris Buechler is leaving the pfSense project, the entire community thanks you for your many years of service &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://ghostbsd.org/10.3_BETA1" target="_blank" rel="nofollow noopener"&gt;GhostBSD 10.3-BETA1 now available&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-June/500671.html" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD adds nvmectl&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://opnsense.org/opnsense-16-1-18-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.1.18 released&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=302332" target="_blank" rel="nofollow noopener"&gt;bhyve_graphics hit CURRENT&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;BUG Update&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/freebsdcentral/status/750053703420350465" target="_blank" rel="nofollow noopener"&gt;FreeBSD Central Twitter account looking for a new owner&lt;/a&gt;  &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2016-July/016732.html" target="_blank" rel="nofollow noopener"&gt;NYCBUG meeting : Meet the Smallest BSDs: RetroBSD and LiteBSD, Brian Callahan&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2016-June/016694.html" target="_blank" rel="nofollow noopener"&gt;NYCBUG install fest @ HOPE&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/semibug/2016-June/000107.html" target="_blank" rel="nofollow noopener"&gt;SemiBUG is looking for presentations for September and beyond&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://knoxbug.org/content/2016-07-26" target="_blank" rel="nofollow noopener"&gt;Caleb Cooper is giving a talk on Crytpo at KnoxBUG on July 26th&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/vvASr64P" target="_blank" rel="nofollow noopener"&gt; Leif - ZFS xfer &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/SznQHq7n" target="_blank" rel="nofollow noopener"&gt; Zach - Python3&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/qkpjKEr0" target="_blank" rel="nofollow noopener"&gt; Dave - Versioning&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/yr7BUmv2" target="_blank" rel="nofollow noopener"&gt; David - Encrypted Disk Images&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/xby81NvC" target="_blank" rel="nofollow noopener"&gt; Eli - TLF in all the wrong places&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today on the show, we are going to be chatting with Michael Dexter about a variety of topics, but of course including bhyve! That plus</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://bsdmag.org/netbsd_intr/" rel="nofollow">NetBSD Introduction</a></h3>

<ul>
<li>We start off today’s episode with a great new NetBSD article!</li>
<li>Siju Oommen George has written an article for BSDMag, which provides a great overview of NetBSD’s beginnings and what it is today.</li>
<li>Of course you can’t start an article about NetBSD without mentioning where the name came from:</li>
</ul>

<p>“The four founders of the NetBSD project, Chris Demetriou, Theo de Raadt, Adam Glass, and Charles Hannum, felt that a more open development model would benefit the project: one centered on portable, clean and correct code. They aimed to produce a unified, multi-platform, production-quality, BSD-based operating system. The name “NetBSD” was suggested by de Raadt, based on the importance and growth of networks, such as the Internet at that time, the distributed and collaborative nature of its development.”</p>

<ul>
<li>From there NetBSD has expanded, and keeping in line with its motto “Of course it runs NetBSD” it has grown to over 57 hardware platforms, including “IA-32, Alpha, PowerPC,SPARC, Raspberry pi 2, SPARC64 and Zaurus”</li>
<li>From there topics such as pkgsrc, SMP, embedded and of course virtualization are all covered, which gives the reader a good overview of what to expect in the modern NetBSD today.</li>
<li>Lastly, in addition to mentioning some of the vendors using NetBSD in a variety of ways, including Point-Of-Sale systems, routers and thin-clients, you may not have known about the research teams which deploy NetBSD:</li>
</ul>

<blockquote>
<p>NASA Lewis Research Center – Satellite Networks and Architectures Branch use NetBSD almost exclusively in their investigation of TCP for use in satellite networks.<br>
KAME project – A research group for implementing IPv6, IPsec and other recent TCP/IP related technologies into BSD UNIX kernels, under BSD license.<br>
NEC Europe Ltd. established the Network Laboratories in Heidelberg, Germany in 1997, as NEC’s third research facility in Europe. The Heidelberg labs focus on software-oriented research and development for the next generation Internet.<br>
SAMS-II Project – Space Acceleration Measurement System II. NASA will be measuring the microgravity environment on the International Space Station using a distributed system, consisting of NetBSD.“</p>

<hr>
</blockquote>

<h3><a href="https://runcommand.io/2016/06/26/my-condolences-youre-now-the-maintainer-of-a-popular-open-source-project/" rel="nofollow">My condolences, you’re now the maintainer of a popular open source project</a></h3>

<ul>
<li>A presentation from a Wordpress conference, about what it is like to be the maintainer of a popular open source project</li>
<li>The presentation covers the basics:</li>
<li>Open Source is more than just the license, it is about community and involvement</li>
<li>The difference between Maintainers and Contributors</li>
<li>It covers some of the reasons people do not open up their code, and other common problems people run into:

<ul>
<li>“I&#39;m embarrassed by my code” (Hint: so is everyone else, post it anyway, it is the best way to learn)</li>
<li>“I&#39;m discouraged that I can&#39;t finish releases on time”</li>
<li>“I&#39;m overwhelmed by the PR backlog”</li>
<li>“I&#39;m frustrated when issues turn into flamewars”</li>
<li>“I&#39;m overcommitted on my open source involvement”</li>
<li>“I feel all alone”</li>
</ul></li>
<li>Each of those points is met with advice and possible solutions</li>
<li>So, there you have it. Open up your code, or join an existing project and help maintain it
***</li>
</ul>

<h3><a href="http://www.hostingadvice.com/blog/freebsd-project-under-the-hood/" rel="nofollow">FreeBSD Committer Allan Jude Discusses the Advantages of FreeBSD and His Role in Keeping Millions of Servers Running</a></h3>

<ul>
<li> An interesting twist on our normal news-stories today, we have an article featuring our very own Allan Jude, talking about why FreeBSD and the advantages of working on an open-source project.</li>
</ul>

<blockquote>
<p>“When Allan started his own company hosting websites for video streaming, FreeBSD was the only operating system he had previously used with other hosts. Based on his experience and comfort with it, he trusted the system with the future of his budding business.A decade later, the former-SysAdmin went to a conference focused on the open-source operating system, where he ran into some of the folks on its documentation team. “They inspired me,” he told our team in a recent chat. He began writing documentation but soon wanted to contribute improvements beyond the docs.Today, Allan sits as a FreeBSD Project Committer. It’s rare that you get to chat with someone involved with a massive-scale open-source project like this — rare and awesome.”</p>
</blockquote>

<ul>
<li>From there Allan goes into some of the reasons “Why” FreeBSD, starting with Code Organization being well-maintained and documented:</li>
</ul>

<blockquote>
<p>“The FreeBSD Project functions like an extremely well-organized world all its own. Allan explained the environment: “There’s a documentation page that explains how the file system’s laid out and everything has a place and it always goes in that place.””</p>

<ul>
<li>In addition, Allan gives us some insight into his work to bring Boot-Environments to the loader, and other reasons why FreeBSD “just makes sense”</li>
<li>In summary Allan wraps it up quite nicely:</li>
</ul>

<p>“An important take-away is that you don’t have to be a major developer with tons of experience to make a difference in the project,” Allan said — and the difference that devs like Allan are making is incredible. If you too want to submit the commit that contributes to the project relied on by millions of web servers, there are plenty of ways to get involved!</p>

<p>We’re especially talking to SysAdmins here, as Allan noted that they are the main users of FreeBSD. “Having more SysAdmins involved in the actual build of the system means we can offer the tools they’re looking for — designed the way a SysAdmin would want them designed, not necessarily the way a developer would think makes the most sense”</p>

<hr>
</blockquote>

<h3><a href="http://justinholcomb.me/blog/2016/07/03/poudriere-in-bhyve-and-bare-metal.html" rel="nofollow">A guide to saving electricity and time with poudriere and bhyve</a></h3>

<ul>
<li>“This article goes over running poudriere to built packages for a Raspberry Pi with the interesting twist of running it both as a bhyve guest and then switching to running on bare metal via Fiber Channel via ctld by sharing the same ZFS volume.”</li>
<li>“Firstly, poudriere can build packages for different architectures such as ARM. This can save hours of build time compared to building ports from said ARM device.”</li>
<li>“Secondly, let’s say a person has an always-on device (NAS) running FreeBSD. To save power, this device has a CPU with a low clock-rate and low core count. This low clock-rate and core count is great for saving power but terrible for processor intensive application such as poudriere. Let’s say a person also has another physical server with fast processors and a high CPU count but draws nearly twice the power and a fan noise to match.”</li>
<li>“To get the best of both worlds, the goal is to build the packages on the fast physical server, power it down, and then start the same ZFS volume in a bhyve environment to serve packages from the always-on device.”</li>
<li>The tutorial walks through setting up ‘ahost’, the always on machine, ‘fhost’ the fast but noisy build machine, and a raspberry pi</li>
<li>It also includes creating a zvol, configuring iSCSI over fibre channel and exporting the zvol, booting an iSCSI volume in bhyve, plus installing and setting up poudriere</li>
<li>This it configures booting over fibre channel, and cross-building armv6 (raspberry pi) packages on the fast build machine</li>
<li>Then the fast machine is shut down, and the zvol is booted in bhyve on the NAS</li>
<li>Everything you need to know to make a hybrid physical/virtual machine</li>
<li>The same setup could also work to run the same bhyve VM from either ahost or fhost</li>
<li>bhyve does not yet support live migration, but when it does, having common network storage like the zvol will be an important part of that
***</li>
</ul>

<h2>Interview - Michael Dexter - <a href="mailto:editor@callfortesting.org" rel="nofollow">editor@callfortesting.org</a> / <a href="https://twitter.com/michaeldexter" rel="nofollow">@michaeldexter</a></h2>

<ul>
<li>The RoloDexter
***</li>
</ul>

<h3>iXSystems</h3>

<ul>
<li><a href="https://www.youtube.com/watch?v=FFbdQ_05e-0" rel="nofollow">Children&#39;s Minnesota Star Studio Chooses iXsystems&#39; TrueNAS Storage</a> 
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/wp-content/uploads/2016/06/FreeBSD-Foundation-June-2016-Update.pdf" rel="nofollow">FreeBSD Foundation June 2016 Update</a></h3>

<ul>
<li>The FreeBSD Foundation’s June newsletter is out</li>
<li>Make sure you submit the <a href="https://www.surveymonkey.com/r/freebsd2016" rel="nofollow">FreeBSD Community Survey</a> by July 7th:</li>
<li>In addition to the opening message from the executive director of the foundation, the update includes details to sponsored work on the FreeBSD VM system, reports from a number of conferences the Foundation attended, including BSDCan</li>
<li>The results of the foundation&#39;s yearly board meeting</li>
<li>People the foundation recognized for their contributions to FreeBSD at BSDCan</li>
<li>And an introduction to their new “Getting Started with FreeBSD” project
***</li>
</ul>

<h3><a href="http://www.all-nettools.com/forum/showthread.php?34422-Building-the-FreeBSD-OS-from-scratch" rel="nofollow">[How-To] Building the FreeBSD OS from scratch</a></h3>

<ul>
<li>A tutorial over at the All-NetTools.com forums that walks through building FreeBSD from scratch</li>
<li>I am not sure why anyone would want to build Xorg from source, but you can</li>
<li>It covers everything in quite a bit of detail, from the installation process through adding Xorg and a window manager from source</li>
<li>It also includes tweaking some device node permissions for easier operation as a non-root user, and configuring the firewall
***</li>
</ul>

<h3><a href="http://doc.cat-v.org/bell_labs/transparent_wsys/" rel="nofollow">Window Systems Should Be Transparent</a> + Rob Pike of AT&amp;T Labs writes about why Window Systems should be transparent</h3>

<ul>
<li>This is an old paper (undated, but I think from the late 80s), but may contain some timeless insights</li>
<li>“UNIX window systems are unsatisfactory. Because they are cumbersome and complicated, they are unsuitable companions for an operating system that is appreciated for its technical elegance”</li>
<li>“A good interface should clarify the view, not obscure it”</li>
<li>“Mux is one window system that is popular and therefore worth studying as an example of good design. (It is not commercially important because it runs only on obsolete hardware.) This paper uses mux as a case study to illustrate some principles that can help keep a user interface simple, comfortable, and unobtrusive. When designing their products, the purveyors of commercial window systems should keep these principles in mind.”</li>
<li>There are not many commercial window systems anymore, but “open source” was not really a big thing when this paper was written
***</li>
</ul>

<h3><a href="http://permalink.gmane.org/gmane.comp.standards.posix.austin.general/12877" rel="nofollow">Roger Faulkner, of Solaris fame passed away </a></h3>

<ul>
<li>“RIP Roger Faulkner: creator of the One and True /proc, slayer of the M-to-N threading model -- and the godfather of post-AT&amp;T Unix”</li>
<li><a href="https://twitter.com/bcantrill/status/750442169807171584" rel="nofollow">@bcantrill: Another great Roger Faulkner story </a> </li>
<li><a href="https://news.ycombinator.com/item?id=4306515" rel="nofollow">The story of how pgrep -w saved a monitor -- if not a life</a> </li>
<li><a href="https://twitter.com/bcantrill/status/750442169807171584" rel="nofollow">@bcantrill: With Roger Faulkner, Tim led an engineering coup inside Sun that saved Solaris circa 2.5</a> 
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><p><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-June/084843.html" rel="nofollow">Developer Ed Maste is requesting information from those who are users of libvgl.</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-June/249748.html" rel="nofollow">HEADS UP: DragonFly 4.5 world reneeds rebuilding</a> </p></li>
<li><p><a href="https://blog.pfsense.org/?p=2095" rel="nofollow">Chris Buechler is leaving the pfSense project, the entire community thanks you for your many years of service </a> </p></li>
<li><p><a href="http://ghostbsd.org/10.3_BETA1" rel="nofollow">GhostBSD 10.3-BETA1 now available</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-June/500671.html" rel="nofollow">DragonFlyBSD adds nvmectl</a> </p></li>
<li><p><a href="https://opnsense.org/opnsense-16-1-18-released/" rel="nofollow">OPNsense 16.1.18 released</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=302332" rel="nofollow">bhyve_graphics hit CURRENT</a> </p>

<hr></li>
</ul>

<h3>BUG Update</h3>

<ul>
<li><p><a href="https://twitter.com/freebsdcentral/status/750053703420350465" rel="nofollow">FreeBSD Central Twitter account looking for a new owner</a>  </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/talk/2016-July/016732.html" rel="nofollow">NYCBUG meeting : Meet the Smallest BSDs: RetroBSD and LiteBSD, Brian Callahan</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/talk/2016-June/016694.html" rel="nofollow">NYCBUG install fest @ HOPE</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/semibug/2016-June/000107.html" rel="nofollow">SemiBUG is looking for presentations for September and beyond</a> </p></li>
<li><p><a href="http://knoxbug.org/content/2016-07-26" rel="nofollow">Caleb Cooper is giving a talk on Crytpo at KnoxBUG on July 26th</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/vvASr64P" rel="nofollow"> Leif - ZFS xfer </a> </li>
<li><a href="http://pastebin.com/SznQHq7n" rel="nofollow"> Zach - Python3</a> </li>
<li><a href="http://pastebin.com/qkpjKEr0" rel="nofollow"> Dave - Versioning</a> </li>
<li><a href="http://pastebin.com/yr7BUmv2" rel="nofollow"> David - Encrypted Disk Images</a> </li>
<li><a href="http://pastebin.com/xby81NvC" rel="nofollow"> Eli - TLF in all the wrong places</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today on the show, we are going to be chatting with Michael Dexter about a variety of topics, but of course including bhyve! That plus</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://bsdmag.org/netbsd_intr/" rel="nofollow">NetBSD Introduction</a></h3>

<ul>
<li>We start off today’s episode with a great new NetBSD article!</li>
<li>Siju Oommen George has written an article for BSDMag, which provides a great overview of NetBSD’s beginnings and what it is today.</li>
<li>Of course you can’t start an article about NetBSD without mentioning where the name came from:</li>
</ul>

<p>“The four founders of the NetBSD project, Chris Demetriou, Theo de Raadt, Adam Glass, and Charles Hannum, felt that a more open development model would benefit the project: one centered on portable, clean and correct code. They aimed to produce a unified, multi-platform, production-quality, BSD-based operating system. The name “NetBSD” was suggested by de Raadt, based on the importance and growth of networks, such as the Internet at that time, the distributed and collaborative nature of its development.”</p>

<ul>
<li>From there NetBSD has expanded, and keeping in line with its motto “Of course it runs NetBSD” it has grown to over 57 hardware platforms, including “IA-32, Alpha, PowerPC,SPARC, Raspberry pi 2, SPARC64 and Zaurus”</li>
<li>From there topics such as pkgsrc, SMP, embedded and of course virtualization are all covered, which gives the reader a good overview of what to expect in the modern NetBSD today.</li>
<li>Lastly, in addition to mentioning some of the vendors using NetBSD in a variety of ways, including Point-Of-Sale systems, routers and thin-clients, you may not have known about the research teams which deploy NetBSD:</li>
</ul>

<blockquote>
<p>NASA Lewis Research Center – Satellite Networks and Architectures Branch use NetBSD almost exclusively in their investigation of TCP for use in satellite networks.<br>
KAME project – A research group for implementing IPv6, IPsec and other recent TCP/IP related technologies into BSD UNIX kernels, under BSD license.<br>
NEC Europe Ltd. established the Network Laboratories in Heidelberg, Germany in 1997, as NEC’s third research facility in Europe. The Heidelberg labs focus on software-oriented research and development for the next generation Internet.<br>
SAMS-II Project – Space Acceleration Measurement System II. NASA will be measuring the microgravity environment on the International Space Station using a distributed system, consisting of NetBSD.“</p>

<hr>
</blockquote>

<h3><a href="https://runcommand.io/2016/06/26/my-condolences-youre-now-the-maintainer-of-a-popular-open-source-project/" rel="nofollow">My condolences, you’re now the maintainer of a popular open source project</a></h3>

<ul>
<li>A presentation from a Wordpress conference, about what it is like to be the maintainer of a popular open source project</li>
<li>The presentation covers the basics:</li>
<li>Open Source is more than just the license, it is about community and involvement</li>
<li>The difference between Maintainers and Contributors</li>
<li>It covers some of the reasons people do not open up their code, and other common problems people run into:

<ul>
<li>“I&#39;m embarrassed by my code” (Hint: so is everyone else, post it anyway, it is the best way to learn)</li>
<li>“I&#39;m discouraged that I can&#39;t finish releases on time”</li>
<li>“I&#39;m overwhelmed by the PR backlog”</li>
<li>“I&#39;m frustrated when issues turn into flamewars”</li>
<li>“I&#39;m overcommitted on my open source involvement”</li>
<li>“I feel all alone”</li>
</ul></li>
<li>Each of those points is met with advice and possible solutions</li>
<li>So, there you have it. Open up your code, or join an existing project and help maintain it
***</li>
</ul>

<h3><a href="http://www.hostingadvice.com/blog/freebsd-project-under-the-hood/" rel="nofollow">FreeBSD Committer Allan Jude Discusses the Advantages of FreeBSD and His Role in Keeping Millions of Servers Running</a></h3>

<ul>
<li> An interesting twist on our normal news-stories today, we have an article featuring our very own Allan Jude, talking about why FreeBSD and the advantages of working on an open-source project.</li>
</ul>

<blockquote>
<p>“When Allan started his own company hosting websites for video streaming, FreeBSD was the only operating system he had previously used with other hosts. Based on his experience and comfort with it, he trusted the system with the future of his budding business.A decade later, the former-SysAdmin went to a conference focused on the open-source operating system, where he ran into some of the folks on its documentation team. “They inspired me,” he told our team in a recent chat. He began writing documentation but soon wanted to contribute improvements beyond the docs.Today, Allan sits as a FreeBSD Project Committer. It’s rare that you get to chat with someone involved with a massive-scale open-source project like this — rare and awesome.”</p>
</blockquote>

<ul>
<li>From there Allan goes into some of the reasons “Why” FreeBSD, starting with Code Organization being well-maintained and documented:</li>
</ul>

<blockquote>
<p>“The FreeBSD Project functions like an extremely well-organized world all its own. Allan explained the environment: “There’s a documentation page that explains how the file system’s laid out and everything has a place and it always goes in that place.””</p>

<ul>
<li>In addition, Allan gives us some insight into his work to bring Boot-Environments to the loader, and other reasons why FreeBSD “just makes sense”</li>
<li>In summary Allan wraps it up quite nicely:</li>
</ul>

<p>“An important take-away is that you don’t have to be a major developer with tons of experience to make a difference in the project,” Allan said — and the difference that devs like Allan are making is incredible. If you too want to submit the commit that contributes to the project relied on by millions of web servers, there are plenty of ways to get involved!</p>

<p>We’re especially talking to SysAdmins here, as Allan noted that they are the main users of FreeBSD. “Having more SysAdmins involved in the actual build of the system means we can offer the tools they’re looking for — designed the way a SysAdmin would want them designed, not necessarily the way a developer would think makes the most sense”</p>

<hr>
</blockquote>

<h3><a href="http://justinholcomb.me/blog/2016/07/03/poudriere-in-bhyve-and-bare-metal.html" rel="nofollow">A guide to saving electricity and time with poudriere and bhyve</a></h3>

<ul>
<li>“This article goes over running poudriere to built packages for a Raspberry Pi with the interesting twist of running it both as a bhyve guest and then switching to running on bare metal via Fiber Channel via ctld by sharing the same ZFS volume.”</li>
<li>“Firstly, poudriere can build packages for different architectures such as ARM. This can save hours of build time compared to building ports from said ARM device.”</li>
<li>“Secondly, let’s say a person has an always-on device (NAS) running FreeBSD. To save power, this device has a CPU with a low clock-rate and low core count. This low clock-rate and core count is great for saving power but terrible for processor intensive application such as poudriere. Let’s say a person also has another physical server with fast processors and a high CPU count but draws nearly twice the power and a fan noise to match.”</li>
<li>“To get the best of both worlds, the goal is to build the packages on the fast physical server, power it down, and then start the same ZFS volume in a bhyve environment to serve packages from the always-on device.”</li>
<li>The tutorial walks through setting up ‘ahost’, the always on machine, ‘fhost’ the fast but noisy build machine, and a raspberry pi</li>
<li>It also includes creating a zvol, configuring iSCSI over fibre channel and exporting the zvol, booting an iSCSI volume in bhyve, plus installing and setting up poudriere</li>
<li>This it configures booting over fibre channel, and cross-building armv6 (raspberry pi) packages on the fast build machine</li>
<li>Then the fast machine is shut down, and the zvol is booted in bhyve on the NAS</li>
<li>Everything you need to know to make a hybrid physical/virtual machine</li>
<li>The same setup could also work to run the same bhyve VM from either ahost or fhost</li>
<li>bhyve does not yet support live migration, but when it does, having common network storage like the zvol will be an important part of that
***</li>
</ul>

<h2>Interview - Michael Dexter - <a href="mailto:editor@callfortesting.org" rel="nofollow">editor@callfortesting.org</a> / <a href="https://twitter.com/michaeldexter" rel="nofollow">@michaeldexter</a></h2>

<ul>
<li>The RoloDexter
***</li>
</ul>

<h3>iXSystems</h3>

<ul>
<li><a href="https://www.youtube.com/watch?v=FFbdQ_05e-0" rel="nofollow">Children&#39;s Minnesota Star Studio Chooses iXsystems&#39; TrueNAS Storage</a> 
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/wp-content/uploads/2016/06/FreeBSD-Foundation-June-2016-Update.pdf" rel="nofollow">FreeBSD Foundation June 2016 Update</a></h3>

<ul>
<li>The FreeBSD Foundation’s June newsletter is out</li>
<li>Make sure you submit the <a href="https://www.surveymonkey.com/r/freebsd2016" rel="nofollow">FreeBSD Community Survey</a> by July 7th:</li>
<li>In addition to the opening message from the executive director of the foundation, the update includes details to sponsored work on the FreeBSD VM system, reports from a number of conferences the Foundation attended, including BSDCan</li>
<li>The results of the foundation&#39;s yearly board meeting</li>
<li>People the foundation recognized for their contributions to FreeBSD at BSDCan</li>
<li>And an introduction to their new “Getting Started with FreeBSD” project
***</li>
</ul>

<h3><a href="http://www.all-nettools.com/forum/showthread.php?34422-Building-the-FreeBSD-OS-from-scratch" rel="nofollow">[How-To] Building the FreeBSD OS from scratch</a></h3>

<ul>
<li>A tutorial over at the All-NetTools.com forums that walks through building FreeBSD from scratch</li>
<li>I am not sure why anyone would want to build Xorg from source, but you can</li>
<li>It covers everything in quite a bit of detail, from the installation process through adding Xorg and a window manager from source</li>
<li>It also includes tweaking some device node permissions for easier operation as a non-root user, and configuring the firewall
***</li>
</ul>

<h3><a href="http://doc.cat-v.org/bell_labs/transparent_wsys/" rel="nofollow">Window Systems Should Be Transparent</a> + Rob Pike of AT&amp;T Labs writes about why Window Systems should be transparent</h3>

<ul>
<li>This is an old paper (undated, but I think from the late 80s), but may contain some timeless insights</li>
<li>“UNIX window systems are unsatisfactory. Because they are cumbersome and complicated, they are unsuitable companions for an operating system that is appreciated for its technical elegance”</li>
<li>“A good interface should clarify the view, not obscure it”</li>
<li>“Mux is one window system that is popular and therefore worth studying as an example of good design. (It is not commercially important because it runs only on obsolete hardware.) This paper uses mux as a case study to illustrate some principles that can help keep a user interface simple, comfortable, and unobtrusive. When designing their products, the purveyors of commercial window systems should keep these principles in mind.”</li>
<li>There are not many commercial window systems anymore, but “open source” was not really a big thing when this paper was written
***</li>
</ul>

<h3><a href="http://permalink.gmane.org/gmane.comp.standards.posix.austin.general/12877" rel="nofollow">Roger Faulkner, of Solaris fame passed away </a></h3>

<ul>
<li>“RIP Roger Faulkner: creator of the One and True /proc, slayer of the M-to-N threading model -- and the godfather of post-AT&amp;T Unix”</li>
<li><a href="https://twitter.com/bcantrill/status/750442169807171584" rel="nofollow">@bcantrill: Another great Roger Faulkner story </a> </li>
<li><a href="https://news.ycombinator.com/item?id=4306515" rel="nofollow">The story of how pgrep -w saved a monitor -- if not a life</a> </li>
<li><a href="https://twitter.com/bcantrill/status/750442169807171584" rel="nofollow">@bcantrill: With Roger Faulkner, Tim led an engineering coup inside Sun that saved Solaris circa 2.5</a> 
***</li>
</ul>

<h2>Beastie Bits:</h2>

<ul>
<li><p><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-June/084843.html" rel="nofollow">Developer Ed Maste is requesting information from those who are users of libvgl.</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-June/249748.html" rel="nofollow">HEADS UP: DragonFly 4.5 world reneeds rebuilding</a> </p></li>
<li><p><a href="https://blog.pfsense.org/?p=2095" rel="nofollow">Chris Buechler is leaving the pfSense project, the entire community thanks you for your many years of service </a> </p></li>
<li><p><a href="http://ghostbsd.org/10.3_BETA1" rel="nofollow">GhostBSD 10.3-BETA1 now available</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-June/500671.html" rel="nofollow">DragonFlyBSD adds nvmectl</a> </p></li>
<li><p><a href="https://opnsense.org/opnsense-16-1-18-released/" rel="nofollow">OPNsense 16.1.18 released</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=302332" rel="nofollow">bhyve_graphics hit CURRENT</a> </p>

<hr></li>
</ul>

<h3>BUG Update</h3>

<ul>
<li><p><a href="https://twitter.com/freebsdcentral/status/750053703420350465" rel="nofollow">FreeBSD Central Twitter account looking for a new owner</a>  </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/talk/2016-July/016732.html" rel="nofollow">NYCBUG meeting : Meet the Smallest BSDs: RetroBSD and LiteBSD, Brian Callahan</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/talk/2016-June/016694.html" rel="nofollow">NYCBUG install fest @ HOPE</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/semibug/2016-June/000107.html" rel="nofollow">SemiBUG is looking for presentations for September and beyond</a> </p></li>
<li><p><a href="http://knoxbug.org/content/2016-07-26" rel="nofollow">Caleb Cooper is giving a talk on Crytpo at KnoxBUG on July 26th</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/vvASr64P" rel="nofollow"> Leif - ZFS xfer </a> </li>
<li><a href="http://pastebin.com/SznQHq7n" rel="nofollow"> Zach - Python3</a> </li>
<li><a href="http://pastebin.com/qkpjKEr0" rel="nofollow"> Dave - Versioning</a> </li>
<li><a href="http://pastebin.com/yr7BUmv2" rel="nofollow"> David - Encrypted Disk Images</a> </li>
<li><a href="http://pastebin.com/xby81NvC" rel="nofollow"> Eli - TLF in all the wrong places</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>148: The place to B...A Robot!</title>
  <link>https://www.bsdnow.tv/148</link>
  <guid isPermaLink="false">47c069f8-5392-4497-a727-c0cb0b4eb050</guid>
  <pubDate>Wed, 29 Jun 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/47c069f8-5392-4497-a727-c0cb0b4eb050.mp3" length="75272404" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, Allan and I are going to be showing you a very interesting interview we did talking about using FreeBSD to drive</itunes:subtitle>
  <itunes:duration>1:44:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, Allan and I are going to be showing you a very interesting interview we did talking about using FreeBSD to drive&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and &amp;lt;br&amp;gt;
Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/administration.html#t-core" target="_blank" rel="nofollow noopener"&gt;FreeBSD Core Team Election&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Core.9 has been elected, and will officially take over from Core.8 on Wednesday, 6 July 2016&lt;/li&gt;
&lt;li&gt;Many thanks to the outgoing members of the core team for their service over the last 2 years&lt;/li&gt;
&lt;li&gt;214 out of 325 eligible voters (65.8%) cast their votes in an election counting 14 candidates.&lt;/li&gt;
&lt;li&gt;The top nine candidates are, in descending order of votes received:&lt;/li&gt;
&lt;li&gt;   180    84.1%    Ed Maste (incumbent)&lt;/li&gt;
&lt;li&gt;   176    82.2%    George V. Neville-Neil (incumbent)&lt;/li&gt;
&lt;li&gt;   171    79.9%    Baptiste Daroussin (incumbent)&lt;/li&gt;
&lt;li&gt;   168    78.5%    John Baldwin&lt;/li&gt;
&lt;li&gt;   166    77.6%    Hiroki Sato (incumbent)&lt;/li&gt;
&lt;li&gt;   147    68.7%    Allan Jude&lt;/li&gt;
&lt;li&gt;   132    61.7%    Kris Moore&lt;/li&gt;
&lt;li&gt;   121    56.5%    Benedict Reuschling&lt;/li&gt;
&lt;li&gt;   108    50.5%    Benno Rice&lt;/li&gt;
&lt;li&gt;There was no tie for ninth.&lt;/li&gt;
&lt;li&gt;BSDNow and the entire community would also like to extend their thanks to all those who stood for election to the core team&lt;/li&gt;
&lt;li&gt;Next week’s core meeting will encompass the members of Core.8 and Core.9, as responsibility for any outstanding items will be passed from outgoing members of core to the new incoming members
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://deftly.net/posts/2016-05-31-why-i-run-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Why I run OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This week we have a good article / blog post talking about why the posted has moved to OpenBSD from Linux. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “One thing I learned during my travels between OSs: consistency is everything.&lt;/p&gt;

&lt;p&gt;&amp;gt; Most operating systems seem to, at least, keep a consistent interface between themselves and binaries / applications. They do this by keeping consistent APIs (Application Programming Interfaces) and ABIs (Application Binary Interfaces). If you take a binary from a really old version of Linux and run or build it on a brand-spanking new install of Linux, it will likely Just Work™. This is great for applications and developers of applications. Vendors can build binaries for distribution and worry less about their product working when it gets out in the wild (sure this binary built in 2016 will run on RedHat AS2.1!!).“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The author then goes through another important part of the consistency argument, with what he calls “UPI” or “User Program Interfaces”. In other words, while the ABI may be stable, what about the end-user tooling that the user directly has to interact with on a daily basis?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “This inconsistency seems to have come to be when Linux started getting wireless support. For some reason someone (vendors, maybe?) decided that ifconfig wasn’t a good place to let users interact with their wireless device. Maybe they felt their device was special? Maybe there were technical reasons? The bottom line is, someone decided to create a new utility to manage a wireless device… and then another one came along… pretty soon there was iwconfig(8), iw(8), ifconfig(8), some funky thing that let windows drivers interface with Linux.. and one called ip(8) I am sure there are others I am forgetting, but I prefer to forget. I have moved onto greener pastures and the knowledge of these programs no longer serves me.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The article then goes through the rundown of how he evaluated the various BSD’s and ultimately settled on OpenBSD:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “OpenBSD won the showdown. It was the most complete, simple, and coherent system. The documentation was thorough, the code was easy to follow &lt;br&gt;
and understand.&lt;br&gt;
It had one command to configure all of the network interfaces!&lt;br&gt;
I didn’t have wireless, but I was able to find a cheap USB adapter that worked by simply running man -k wireless and reading about the USB &lt;br&gt;
entries.&lt;br&gt;
It didn’t have some of the applications I use regularly, so I started reading about ports (intuitively, via man ports!).”&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.tbrodel.me/2016/#netbsd-router" target="_blank" rel="nofollow noopener"&gt;The ultimate NetBSD Router&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&amp;gt; “So yesterday I spent the day setting up a new firewall at home here, based off of this BSD Now tutorial. Having set up a couple of OpenBSD routers before, either based on old laptops, bulky old power-sucking desktops or completely over-specced machines like the Intel NUC, I wanted to get some kind of BSD onto a low-powered ARM board and use that instead.”&lt;br&gt;
&amp;gt; “I've had a couple of Cubietrucks lying around for a while now, I've used them in a couple of art installations, running Debian and Pure Data, but over all they've been a bit disappointing. It's more the manufacturer's fault but they require blobs for the graphics and audio, which Debian won't allow, so as a multimedia board they're dud for video, and only passable for audio work with a usb sound card. So they've been collecting dust.”&lt;br&gt;
&amp;gt; “Only thing missing is a second NIC, luckily I had an Apple USB-&amp;gt;Ethernet dongle lying around, which when I bought it was the cheapest thing I could find on eBay that OpenBSD definitely supported. There, and on NetBSD, it's supported by the axe(4) driver. USB 2.0 works fine for me as I live in Australia and my ISP can only give me 30Mbps, so this should do for the forseeable future.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The article then walks through installing and configuring NetBSD&lt;/li&gt;
&lt;li&gt;Configuration includes: pf, unbound, and dhcpd
&amp;gt; “This project has been really fun, I started with basically no experience with NetBSD and have finished with a really useful, low-powered and robust appliance. It's a testament to the simplicity of the NetBSD system, and the BSD design principles in general, that such a novice as myself could figure this out. The NetBSD project has easily the most polished experience on Allwinner ARM boards, even Debian doesn't make it this easy. It's been a joy running the system, it has the bits I love from OpenBSD; ksh(1), tmux(1), an http daemon in base and of course, pf(4). This is mixed with some of the pragmatism I see in FreeBSD; a willingness to accept blobs if that really is the only way to boot, or get audio, or a video console.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://callfortesting.org/bhyve-boot-environments/" target="_blank" rel="nofollow noopener"&gt;bhyve-Bootable Boot Environments&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a lengthy article also today from our friend Michael Dexter, who asks the basic question “What if multibooting and OS upgrades weren't horrible?”&lt;/li&gt;
&lt;li&gt;No doubt if you’ve been a frequent listener to this show, you’ve heard Allan or Myself talking about ZFS Boot Environments, and how they can “change your life”.&lt;/li&gt;
&lt;li&gt;Well today Michael goes further into detail on how the BE’s work, and how they can be leveraged to do neat things, like installing other versions of an operating system from the original running system.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “If you are reading this, you have probably used a personal computer with a BSD or GNU/Linux operating system and at some point attempted to multiboot between multiple operating systems on the same computer. This goal is typically attempted with complex disk partitioning and a BSD or GNU/Linux boot loader like LILO or GRUB, plus several hours of frustrating experimentation and perhaps data loss. While exotic OS experimentation has driven my virtualization work since the late 1990s, there are very pragmatic reasons for multibooting the same OS on the same hardware, notable for updates and failback to "known good" versions. To its credit, FreeBSD has long had various strategies including the NanoBSD embedded system framework with primary and secondary root partitions, plus the nextboot(8) utility for selecting the "next" kernel with various boot parameters. Get everything set correctly and you can multiboot "with impunity".&lt;/p&gt;

&lt;p&gt;&amp;gt; “That's a good start, and over time we have seen ZFS "boot environments" be used by PC-BSD and FreeNAS to allow for system updates that allow one to fall back to previous versions should something go wrong. Hats off to these efforts but they exist in essentially purpose-built appliance environments. I have long sensed that there is more fun to be had here and a wonderful thing happened with FreeBSD 10.3 and 11.0: Allan Jude added a boot environment menu to the FreeBSD loader”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;From here Michael takes us through the mechanical bits of actually creating a new ZFS dataset (BE) and performing a fresh FreeBSD 10.3 installation into this new boot-environment. &lt;/li&gt;
&lt;li&gt;The twist comes at the end, where he next sets up the BE to be a root NFS for booting in bhyve! This is interesting and gives you a way to test booting into your new environment via a VM, before rebooting the host directly into it.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Edicarla Andrade &amp;amp; Vinícius Zavam - &lt;a href="https://twitter.com/egypcio" target="_blank" rel="nofollow noopener"&gt;@egypcio&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;BSD-Powered Robots&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-June/249717.html" target="_blank" rel="nofollow noopener"&gt;Tomohiro Kasumi explains what “@@” means, in the context of the Hammer filesystem&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A post from the Dragonfly users’ mailing list about what the @@ construct means in the Hammer filesystem&lt;/li&gt;
&lt;li&gt;“@@ represents the existence of a PFS which is logically separated pseudo filesystem space within HAMMER's B-Tree”&lt;/li&gt;
&lt;li&gt;“HAMMER only has 1 large B-Tree per filesystem (not per PFS), so all the PFS exist within that single B-Tree. PFS are separated by localization parameter which is one of the B-Tree keys used to lookup the tree.”&lt;/li&gt;
&lt;li&gt;Each substring in "@@-1:00001" means:

&lt;ol&gt;
&lt;li&gt;"@@" means it's a PFS or snapshot.&lt;/li&gt;
&lt;li&gt;"-1" means it's a master.&lt;/li&gt;
&lt;li&gt;":" is just a separator.&lt;/li&gt;
&lt;li&gt;"00001" means it's PFS#1, where PFS#0 is the default PFS created on newfs. There is no "00000" because that's what's mounted on /HAMMER. PFS# is used for localization parameter.&lt;/li&gt;
&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;“Localization parameter has the highest priority when inserting or looking up B-Tree elements, so fs elements that belong to the same PFS# tend to be localized (clustered) within the B-Tree”&lt;/li&gt;
&lt;li&gt;There is also a note about how snapshots are named: "@@0x00..."&lt;/li&gt;
&lt;li&gt;A user points out that having : in the path can confuse some applications, such as in the case of adding the current directory or a relative path to the $PATH environment variable, which is a colon delimited list of paths&lt;/li&gt;
&lt;li&gt;This seems quite a bit more confusing that the datasets created by ZFS, but they might have other useful properties
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/11.0R/schedule.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 11.0 nearing RC1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve all been eagerly awaiting the pending release of FreeBSD 11.0, and the schedule has now been updated!&lt;/li&gt;
&lt;li&gt;The first release candidate is slated for July 29th!&lt;/li&gt;
&lt;li&gt;If all goes well (and we stick to schedule) there will be another RC2 and possible RC3 release, before 11.0 officially drops near the end of August.&lt;/li&gt;
&lt;li&gt;Start playing with those builds folks, be sure to send your feedback to the team to make this the best .0 release ever!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ecc-comp.blogspot.com/2016/06/tensorflow-on-freebsd.html" target="_blank" rel="nofollow noopener"&gt;TensorFlow on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Next we have a blog post about the experience of a “new” FreeBSD user trying to deploy some non-ported software to his new system.&lt;/li&gt;
&lt;li&gt;Specifically he was interested in running TensorFlow, but not doing a port himself, because in his words: &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “First, I apologize for not supplying a port archive myself. After reading the FreeBSD handbook for creating a port, it's too complex of a task for me right now. I've only been using FreeBSD for two weeks. I would also not like to waste anyone's time giving them a terrible port archive and mess up their system.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;First of all, good ports are often born out of bad ports! Don’t let the porting framework daunt you, give it a go, since that's the only way you are going to learn how to write “good” ports over time. The porters-handbook is a good first place to start, plus the community usually is very helpful in providing feedback.&lt;/li&gt;
&lt;li&gt;He then walks us through the changes made to the TensorFlow code (starting with the assumption that OSX was a good “flavor” to begin porting from) and ultimately compiling. &lt;/li&gt;
&lt;li&gt;This ends up with the creation of a pip package which works!&lt;/li&gt;
&lt;li&gt;A good tutorial, and also very similar to what goes on in the porting process. With this write-up perhaps somebody will take up creating a port of it… hint hint!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://jamesdeagle.blogspot.ca/2016/06/netbsd-new-beginning.html" target="_blank" rel="nofollow noopener"&gt;NetBSD: A New Beginning?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We don’t get enough NetBSD news at times, but this post by James Deagle talks about his adventure with NetBSD 7.0 and making it his “new beginning”&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “After a few months of traipsing around the worlds of SunOS and Linux, I'm back to NetBSD for what I hope will be a lengthy return engagement. And while I'm enamored of NetBSD for all the previously-mentioned reasons, I'm already thinking ahead to some problems to solve, some of which have also been mentioned before.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;He then goes through and lists some of the small nits he’s still running into during the daily workflow&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;YouTube audio - Specifically he mentions that no audio is playing, but wonders if Flash plays some part. (Ideally you’re not using Flash though, in which case you need to check the audio backend FF is using. Try PulseAudio since it seems the best supported. If pulse is already enabled, install ‘pavucontrol’ to make sure audio is playing to the correct sound device)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Slow gaming performance (TuxKart and Celestia) - Check DRI / Xorg? Or is it CPU bound?&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Lastly some unspecified Wireless issues, which typically end up being driver related. (Or use another chipset)&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://reproducible.debian.net/netbsd/netbsd.html" target="_blank" rel="nofollow noopener"&gt;Reproducible NetBSD?  77.7% of the way there&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://gist.github.com/zg/38a3afa112ddf7de4912aafc249ec82f" target="_blank" rel="nofollow noopener"&gt;Create FreeBSD virtual machine using qemu. Run the VM using xhyve.&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://joshcummings.net/pub/FreeBSD" target="_blank" rel="nofollow noopener"&gt;FreeBSD PowerPC 32bit pkg repository (unofficial). ~19,500 packages, more to come&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/05/16/msg000706.html" target="_blank" rel="nofollow noopener"&gt;NetBSD machines at Open Source Conference 2016 Gunma&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://arstechnica.com/apple/2016/06/a-zfs-developers-analysis-of-the-good-and-bad-in-apples-new-apfs-file-system/" target="_blank" rel="nofollow noopener"&gt;Adam Leventhal (of ZFS and DTrace) does an analysis of APFS &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/semibug/2016-June/000106.html" target="_blank" rel="nofollow noopener"&gt;SemiBug June meeting summary&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://knoxbug.org/content/2016-07-26" target="_blank" rel="nofollow noopener"&gt;KnoxBug Meeting&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/nuYTzaG6" target="_blank" rel="nofollow noopener"&gt; Andrew - iocage &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/PzY68hNS" target="_blank" rel="nofollow noopener"&gt; Florian - Arm + GitHub&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/JESGZjLu" target="_blank" rel="nofollow noopener"&gt; Clint - Synth&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/b4LAiPs4" target="_blank" rel="nofollow noopener"&gt; Leonardo - Translations&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/VRc8fvBk" target="_blank" rel="nofollow noopener"&gt; Zachary - Moving things to VMs&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, Allan and I are going to be showing you a very interesting interview we did talking about using FreeBSD to drive</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/administration.html#t-core" rel="nofollow">FreeBSD Core Team Election</a></h3>

<ul>
<li>Core.9 has been elected, and will officially take over from Core.8 on Wednesday, 6 July 2016</li>
<li>Many thanks to the outgoing members of the core team for their service over the last 2 years</li>
<li>214 out of 325 eligible voters (65.8%) cast their votes in an election counting 14 candidates.</li>
<li>The top nine candidates are, in descending order of votes received:</li>
<li>   180    84.1%    Ed Maste (incumbent)</li>
<li>   176    82.2%    George V. Neville-Neil (incumbent)</li>
<li>   171    79.9%    Baptiste Daroussin (incumbent)</li>
<li>   168    78.5%    John Baldwin</li>
<li>   166    77.6%    Hiroki Sato (incumbent)</li>
<li>   147    68.7%    Allan Jude</li>
<li>   132    61.7%    Kris Moore</li>
<li>   121    56.5%    Benedict Reuschling</li>
<li>   108    50.5%    Benno Rice</li>
<li>There was no tie for ninth.</li>
<li>BSDNow and the entire community would also like to extend their thanks to all those who stood for election to the core team</li>
<li>Next week’s core meeting will encompass the members of Core.8 and Core.9, as responsibility for any outstanding items will be passed from outgoing members of core to the new incoming members
***</li>
</ul>

<h3><a href="http://deftly.net/posts/2016-05-31-why-i-run-openbsd.html" rel="nofollow">Why I run OpenBSD</a></h3>

<ul>
<li>This week we have a good article / blog post talking about why the posted has moved to OpenBSD from Linux. </li>
</ul>

<blockquote>
<p>“One thing I learned during my travels between OSs: consistency is everything.</p>

<p>Most operating systems seem to, at least, keep a consistent interface between themselves and binaries / applications. They do this by keeping consistent APIs (Application Programming Interfaces) and ABIs (Application Binary Interfaces). If you take a binary from a really old version of Linux and run or build it on a brand-spanking new install of Linux, it will likely Just Work™. This is great for applications and developers of applications. Vendors can build binaries for distribution and worry less about their product working when it gets out in the wild (sure this binary built in 2016 will run on RedHat AS2.1!!).“</p>
</blockquote>

<ul>
<li>The author then goes through another important part of the consistency argument, with what he calls “UPI” or “User Program Interfaces”. In other words, while the ABI may be stable, what about the end-user tooling that the user directly has to interact with on a daily basis?</li>
</ul>

<blockquote>
<p>“This inconsistency seems to have come to be when Linux started getting wireless support. For some reason someone (vendors, maybe?) decided that ifconfig wasn’t a good place to let users interact with their wireless device. Maybe they felt their device was special? Maybe there were technical reasons? The bottom line is, someone decided to create a new utility to manage a wireless device… and then another one came along… pretty soon there was iwconfig(8), iw(8), ifconfig(8), some funky thing that let windows drivers interface with Linux.. and one called ip(8) I am sure there are others I am forgetting, but I prefer to forget. I have moved onto greener pastures and the knowledge of these programs no longer serves me.”</p>
</blockquote>

<ul>
<li>The article then goes through the rundown of how he evaluated the various BSD’s and ultimately settled on OpenBSD:</li>
</ul>

<blockquote>
<p>“OpenBSD won the showdown. It was the most complete, simple, and coherent system. The documentation was thorough, the code was easy to follow <br>
and understand.<br>
It had one command to configure all of the network interfaces!<br>
I didn’t have wireless, but I was able to find a cheap USB adapter that worked by simply running man -k wireless and reading about the USB <br>
entries.<br>
It didn’t have some of the applications I use regularly, so I started reading about ports (intuitively, via man ports!).”</p>

<hr>
</blockquote>

<h3><a href="http://blog.tbrodel.me/2016/#netbsd-router" rel="nofollow">The ultimate NetBSD Router</a></h3>

<blockquote>
<p>“So yesterday I spent the day setting up a new firewall at home here, based off of this BSD Now tutorial. Having set up a couple of OpenBSD routers before, either based on old laptops, bulky old power-sucking desktops or completely over-specced machines like the Intel NUC, I wanted to get some kind of BSD onto a low-powered ARM board and use that instead.”<br>
“I&#39;ve had a couple of Cubietrucks lying around for a while now, I&#39;ve used them in a couple of art installations, running Debian and Pure Data, but over all they&#39;ve been a bit disappointing. It&#39;s more the manufacturer&#39;s fault but they require blobs for the graphics and audio, which Debian won&#39;t allow, so as a multimedia board they&#39;re dud for video, and only passable for audio work with a usb sound card. So they&#39;ve been collecting dust.”<br>
“Only thing missing is a second NIC, luckily I had an Apple USB-&gt;Ethernet dongle lying around, which when I bought it was the cheapest thing I could find on eBay that OpenBSD definitely supported. There, and on NetBSD, it&#39;s supported by the axe(4) driver. USB 2.0 works fine for me as I live in Australia and my ISP can only give me 30Mbps, so this should do for the forseeable future.”</p>

<ul>
<li>The article then walks through installing and configuring NetBSD</li>
<li>Configuration includes: pf, unbound, and dhcpd
“This project has been really fun, I started with basically no experience with NetBSD and have finished with a really useful, low-powered and robust appliance. It&#39;s a testament to the simplicity of the NetBSD system, and the BSD design principles in general, that such a novice as myself could figure this out. The NetBSD project has easily the most polished experience on Allwinner ARM boards, even Debian doesn&#39;t make it this easy. It&#39;s been a joy running the system, it has the bits I love from OpenBSD; ksh(1), tmux(1), an http daemon in base and of course, pf(4). This is mixed with some of the pragmatism I see in FreeBSD; a willingness to accept blobs if that really is the only way to boot, or get audio, or a video console.”
***</li>
</ul>
</blockquote>

<h3><a href="http://callfortesting.org/bhyve-boot-environments/" rel="nofollow">bhyve-Bootable Boot Environments</a></h3>

<ul>
<li>We have a lengthy article also today from our friend Michael Dexter, who asks the basic question “What if multibooting and OS upgrades weren&#39;t horrible?”</li>
<li>No doubt if you’ve been a frequent listener to this show, you’ve heard Allan or Myself talking about ZFS Boot Environments, and how they can “change your life”.</li>
<li>Well today Michael goes further into detail on how the BE’s work, and how they can be leveraged to do neat things, like installing other versions of an operating system from the original running system.</li>
</ul>

<blockquote>
<p>“If you are reading this, you have probably used a personal computer with a BSD or GNU/Linux operating system and at some point attempted to multiboot between multiple operating systems on the same computer. This goal is typically attempted with complex disk partitioning and a BSD or GNU/Linux boot loader like LILO or GRUB, plus several hours of frustrating experimentation and perhaps data loss. While exotic OS experimentation has driven my virtualization work since the late 1990s, there are very pragmatic reasons for multibooting the same OS on the same hardware, notable for updates and failback to &quot;known good&quot; versions. To its credit, FreeBSD has long had various strategies including the NanoBSD embedded system framework with primary and secondary root partitions, plus the nextboot(8) utility for selecting the &quot;next&quot; kernel with various boot parameters. Get everything set correctly and you can multiboot &quot;with impunity&quot;.</p>

<p>“That&#39;s a good start, and over time we have seen ZFS &quot;boot environments&quot; be used by PC-BSD and FreeNAS to allow for system updates that allow one to fall back to previous versions should something go wrong. Hats off to these efforts but they exist in essentially purpose-built appliance environments. I have long sensed that there is more fun to be had here and a wonderful thing happened with FreeBSD 10.3 and 11.0: Allan Jude added a boot environment menu to the FreeBSD loader”</p>
</blockquote>

<ul>
<li>From here Michael takes us through the mechanical bits of actually creating a new ZFS dataset (BE) and performing a fresh FreeBSD 10.3 installation into this new boot-environment. </li>
<li>The twist comes at the end, where he next sets up the BE to be a root NFS for booting in bhyve! This is interesting and gives you a way to test booting into your new environment via a VM, before rebooting the host directly into it.
***</li>
</ul>

<h2>Interview - Edicarla Andrade &amp; Vinícius Zavam - <a href="https://twitter.com/egypcio" rel="nofollow">@egypcio</a></h2>

<ul>
<li>BSD-Powered Robots</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-June/249717.html" rel="nofollow">Tomohiro Kasumi explains what “@@” means, in the context of the Hammer filesystem</a></h3>

<ul>
<li>A post from the Dragonfly users’ mailing list about what the @@ construct means in the Hammer filesystem</li>
<li>“@@ represents the existence of a PFS which is logically separated pseudo filesystem space within HAMMER&#39;s B-Tree”</li>
<li>“HAMMER only has 1 large B-Tree per filesystem (not per PFS), so all the PFS exist within that single B-Tree. PFS are separated by localization parameter which is one of the B-Tree keys used to lookup the tree.”</li>
<li>Each substring in &quot;@@-1:00001&quot; means:

<ol>
<li>&quot;@@&quot; means it&#39;s a PFS or snapshot.</li>
<li>&quot;-1&quot; means it&#39;s a master.</li>
<li>&quot;:&quot; is just a separator.</li>
<li>&quot;00001&quot; means it&#39;s PFS#1, where PFS#0 is the default PFS created on newfs. There is no &quot;00000&quot; because that&#39;s what&#39;s mounted on /HAMMER. PFS# is used for localization parameter.</li>
</ol></li>
<li>“Localization parameter has the highest priority when inserting or looking up B-Tree elements, so fs elements that belong to the same PFS# tend to be localized (clustered) within the B-Tree”</li>
<li>There is also a note about how snapshots are named: &quot;@@0x00...&quot;</li>
<li>A user points out that having : in the path can confuse some applications, such as in the case of adding the current directory or a relative path to the $PATH environment variable, which is a colon delimited list of paths</li>
<li>This seems quite a bit more confusing that the datasets created by ZFS, but they might have other useful properties
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/11.0R/schedule.html" rel="nofollow">FreeBSD 11.0 nearing RC1</a></h3>

<ul>
<li>We’ve all been eagerly awaiting the pending release of FreeBSD 11.0, and the schedule has now been updated!</li>
<li>The first release candidate is slated for July 29th!</li>
<li>If all goes well (and we stick to schedule) there will be another RC2 and possible RC3 release, before 11.0 officially drops near the end of August.</li>
<li>Start playing with those builds folks, be sure to send your feedback to the team to make this the best .0 release ever!
***</li>
</ul>

<h3><a href="http://ecc-comp.blogspot.com/2016/06/tensorflow-on-freebsd.html" rel="nofollow">TensorFlow on FreeBSD</a></h3>

<ul>
<li>Next we have a blog post about the experience of a “new” FreeBSD user trying to deploy some non-ported software to his new system.</li>
<li>Specifically he was interested in running TensorFlow, but not doing a port himself, because in his words: </li>
</ul>

<blockquote>
<p>“First, I apologize for not supplying a port archive myself. After reading the FreeBSD handbook for creating a port, it&#39;s too complex of a task for me right now. I&#39;ve only been using FreeBSD for two weeks. I would also not like to waste anyone&#39;s time giving them a terrible port archive and mess up their system.”</p>
</blockquote>

<ul>
<li>First of all, good ports are often born out of bad ports! Don’t let the porting framework daunt you, give it a go, since that&#39;s the only way you are going to learn how to write “good” ports over time. The porters-handbook is a good first place to start, plus the community usually is very helpful in providing feedback.</li>
<li>He then walks us through the changes made to the TensorFlow code (starting with the assumption that OSX was a good “flavor” to begin porting from) and ultimately compiling. </li>
<li>This ends up with the creation of a pip package which works!</li>
<li>A good tutorial, and also very similar to what goes on in the porting process. With this write-up perhaps somebody will take up creating a port of it… hint hint!
***</li>
</ul>

<h3><a href="http://jamesdeagle.blogspot.ca/2016/06/netbsd-new-beginning.html" rel="nofollow">NetBSD: A New Beginning?</a></h3>

<ul>
<li>We don’t get enough NetBSD news at times, but this post by James Deagle talks about his adventure with NetBSD 7.0 and making it his “new beginning”</li>
</ul>

<blockquote>
<p>“After a few months of traipsing around the worlds of SunOS and Linux, I&#39;m back to NetBSD for what I hope will be a lengthy return engagement. And while I&#39;m enamored of NetBSD for all the previously-mentioned reasons, I&#39;m already thinking ahead to some problems to solve, some of which have also been mentioned before.”</p>
</blockquote>

<ul>
<li><p>He then goes through and lists some of the small nits he’s still running into during the daily workflow</p></li>
<li><p>YouTube audio - Specifically he mentions that no audio is playing, but wonders if Flash plays some part. (Ideally you’re not using Flash though, in which case you need to check the audio backend FF is using. Try PulseAudio since it seems the best supported. If pulse is already enabled, install ‘pavucontrol’ to make sure audio is playing to the correct sound device)</p></li>
<li><p>Slow gaming performance (TuxKart and Celestia) - Check DRI / Xorg? Or is it CPU bound?</p></li>
<li><p>Lastly some unspecified Wireless issues, which typically end up being driver related. (Or use another chipset)</p>

<hr></li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://reproducible.debian.net/netbsd/netbsd.html" rel="nofollow">Reproducible NetBSD?  77.7% of the way there</a> </p></li>
<li><p><a href="https://gist.github.com/zg/38a3afa112ddf7de4912aafc249ec82f" rel="nofollow">Create FreeBSD virtual machine using qemu. Run the VM using xhyve.</a> </p></li>
<li><p><a href="https://joshcummings.net/pub/FreeBSD" rel="nofollow">FreeBSD PowerPC 32bit pkg repository (unofficial). ~19,500 packages, more to come</a> </p></li>
<li><p><a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/05/16/msg000706.html" rel="nofollow">NetBSD machines at Open Source Conference 2016 Gunma</a> </p></li>
<li><p><a href="http://arstechnica.com/apple/2016/06/a-zfs-developers-analysis-of-the-good-and-bad-in-apples-new-apfs-file-system/" rel="nofollow">Adam Leventhal (of ZFS and DTrace) does an analysis of APFS </a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/semibug/2016-June/000106.html" rel="nofollow">SemiBug June meeting summary</a> </p></li>
<li><p><a href="http://knoxbug.org/content/2016-07-26" rel="nofollow">KnoxBug Meeting</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/nuYTzaG6" rel="nofollow"> Andrew - iocage </a> </li>
<li><a href="http://pastebin.com/PzY68hNS" rel="nofollow"> Florian - Arm + GitHub</a> </li>
<li><a href="http://pastebin.com/JESGZjLu" rel="nofollow"> Clint - Synth</a> </li>
<li><a href="http://pastebin.com/b4LAiPs4" rel="nofollow"> Leonardo - Translations</a> </li>
<li><a href="http://pastebin.com/VRc8fvBk" rel="nofollow"> Zachary - Moving things to VMs</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, Allan and I are going to be showing you a very interesting interview we did talking about using FreeBSD to drive</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/administration.html#t-core" rel="nofollow">FreeBSD Core Team Election</a></h3>

<ul>
<li>Core.9 has been elected, and will officially take over from Core.8 on Wednesday, 6 July 2016</li>
<li>Many thanks to the outgoing members of the core team for their service over the last 2 years</li>
<li>214 out of 325 eligible voters (65.8%) cast their votes in an election counting 14 candidates.</li>
<li>The top nine candidates are, in descending order of votes received:</li>
<li>   180    84.1%    Ed Maste (incumbent)</li>
<li>   176    82.2%    George V. Neville-Neil (incumbent)</li>
<li>   171    79.9%    Baptiste Daroussin (incumbent)</li>
<li>   168    78.5%    John Baldwin</li>
<li>   166    77.6%    Hiroki Sato (incumbent)</li>
<li>   147    68.7%    Allan Jude</li>
<li>   132    61.7%    Kris Moore</li>
<li>   121    56.5%    Benedict Reuschling</li>
<li>   108    50.5%    Benno Rice</li>
<li>There was no tie for ninth.</li>
<li>BSDNow and the entire community would also like to extend their thanks to all those who stood for election to the core team</li>
<li>Next week’s core meeting will encompass the members of Core.8 and Core.9, as responsibility for any outstanding items will be passed from outgoing members of core to the new incoming members
***</li>
</ul>

<h3><a href="http://deftly.net/posts/2016-05-31-why-i-run-openbsd.html" rel="nofollow">Why I run OpenBSD</a></h3>

<ul>
<li>This week we have a good article / blog post talking about why the posted has moved to OpenBSD from Linux. </li>
</ul>

<blockquote>
<p>“One thing I learned during my travels between OSs: consistency is everything.</p>

<p>Most operating systems seem to, at least, keep a consistent interface between themselves and binaries / applications. They do this by keeping consistent APIs (Application Programming Interfaces) and ABIs (Application Binary Interfaces). If you take a binary from a really old version of Linux and run or build it on a brand-spanking new install of Linux, it will likely Just Work™. This is great for applications and developers of applications. Vendors can build binaries for distribution and worry less about their product working when it gets out in the wild (sure this binary built in 2016 will run on RedHat AS2.1!!).“</p>
</blockquote>

<ul>
<li>The author then goes through another important part of the consistency argument, with what he calls “UPI” or “User Program Interfaces”. In other words, while the ABI may be stable, what about the end-user tooling that the user directly has to interact with on a daily basis?</li>
</ul>

<blockquote>
<p>“This inconsistency seems to have come to be when Linux started getting wireless support. For some reason someone (vendors, maybe?) decided that ifconfig wasn’t a good place to let users interact with their wireless device. Maybe they felt their device was special? Maybe there were technical reasons? The bottom line is, someone decided to create a new utility to manage a wireless device… and then another one came along… pretty soon there was iwconfig(8), iw(8), ifconfig(8), some funky thing that let windows drivers interface with Linux.. and one called ip(8) I am sure there are others I am forgetting, but I prefer to forget. I have moved onto greener pastures and the knowledge of these programs no longer serves me.”</p>
</blockquote>

<ul>
<li>The article then goes through the rundown of how he evaluated the various BSD’s and ultimately settled on OpenBSD:</li>
</ul>

<blockquote>
<p>“OpenBSD won the showdown. It was the most complete, simple, and coherent system. The documentation was thorough, the code was easy to follow <br>
and understand.<br>
It had one command to configure all of the network interfaces!<br>
I didn’t have wireless, but I was able to find a cheap USB adapter that worked by simply running man -k wireless and reading about the USB <br>
entries.<br>
It didn’t have some of the applications I use regularly, so I started reading about ports (intuitively, via man ports!).”</p>

<hr>
</blockquote>

<h3><a href="http://blog.tbrodel.me/2016/#netbsd-router" rel="nofollow">The ultimate NetBSD Router</a></h3>

<blockquote>
<p>“So yesterday I spent the day setting up a new firewall at home here, based off of this BSD Now tutorial. Having set up a couple of OpenBSD routers before, either based on old laptops, bulky old power-sucking desktops or completely over-specced machines like the Intel NUC, I wanted to get some kind of BSD onto a low-powered ARM board and use that instead.”<br>
“I&#39;ve had a couple of Cubietrucks lying around for a while now, I&#39;ve used them in a couple of art installations, running Debian and Pure Data, but over all they&#39;ve been a bit disappointing. It&#39;s more the manufacturer&#39;s fault but they require blobs for the graphics and audio, which Debian won&#39;t allow, so as a multimedia board they&#39;re dud for video, and only passable for audio work with a usb sound card. So they&#39;ve been collecting dust.”<br>
“Only thing missing is a second NIC, luckily I had an Apple USB-&gt;Ethernet dongle lying around, which when I bought it was the cheapest thing I could find on eBay that OpenBSD definitely supported. There, and on NetBSD, it&#39;s supported by the axe(4) driver. USB 2.0 works fine for me as I live in Australia and my ISP can only give me 30Mbps, so this should do for the forseeable future.”</p>

<ul>
<li>The article then walks through installing and configuring NetBSD</li>
<li>Configuration includes: pf, unbound, and dhcpd
“This project has been really fun, I started with basically no experience with NetBSD and have finished with a really useful, low-powered and robust appliance. It&#39;s a testament to the simplicity of the NetBSD system, and the BSD design principles in general, that such a novice as myself could figure this out. The NetBSD project has easily the most polished experience on Allwinner ARM boards, even Debian doesn&#39;t make it this easy. It&#39;s been a joy running the system, it has the bits I love from OpenBSD; ksh(1), tmux(1), an http daemon in base and of course, pf(4). This is mixed with some of the pragmatism I see in FreeBSD; a willingness to accept blobs if that really is the only way to boot, or get audio, or a video console.”
***</li>
</ul>
</blockquote>

<h3><a href="http://callfortesting.org/bhyve-boot-environments/" rel="nofollow">bhyve-Bootable Boot Environments</a></h3>

<ul>
<li>We have a lengthy article also today from our friend Michael Dexter, who asks the basic question “What if multibooting and OS upgrades weren&#39;t horrible?”</li>
<li>No doubt if you’ve been a frequent listener to this show, you’ve heard Allan or Myself talking about ZFS Boot Environments, and how they can “change your life”.</li>
<li>Well today Michael goes further into detail on how the BE’s work, and how they can be leveraged to do neat things, like installing other versions of an operating system from the original running system.</li>
</ul>

<blockquote>
<p>“If you are reading this, you have probably used a personal computer with a BSD or GNU/Linux operating system and at some point attempted to multiboot between multiple operating systems on the same computer. This goal is typically attempted with complex disk partitioning and a BSD or GNU/Linux boot loader like LILO or GRUB, plus several hours of frustrating experimentation and perhaps data loss. While exotic OS experimentation has driven my virtualization work since the late 1990s, there are very pragmatic reasons for multibooting the same OS on the same hardware, notable for updates and failback to &quot;known good&quot; versions. To its credit, FreeBSD has long had various strategies including the NanoBSD embedded system framework with primary and secondary root partitions, plus the nextboot(8) utility for selecting the &quot;next&quot; kernel with various boot parameters. Get everything set correctly and you can multiboot &quot;with impunity&quot;.</p>

<p>“That&#39;s a good start, and over time we have seen ZFS &quot;boot environments&quot; be used by PC-BSD and FreeNAS to allow for system updates that allow one to fall back to previous versions should something go wrong. Hats off to these efforts but they exist in essentially purpose-built appliance environments. I have long sensed that there is more fun to be had here and a wonderful thing happened with FreeBSD 10.3 and 11.0: Allan Jude added a boot environment menu to the FreeBSD loader”</p>
</blockquote>

<ul>
<li>From here Michael takes us through the mechanical bits of actually creating a new ZFS dataset (BE) and performing a fresh FreeBSD 10.3 installation into this new boot-environment. </li>
<li>The twist comes at the end, where he next sets up the BE to be a root NFS for booting in bhyve! This is interesting and gives you a way to test booting into your new environment via a VM, before rebooting the host directly into it.
***</li>
</ul>

<h2>Interview - Edicarla Andrade &amp; Vinícius Zavam - <a href="https://twitter.com/egypcio" rel="nofollow">@egypcio</a></h2>

<ul>
<li>BSD-Powered Robots</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-June/249717.html" rel="nofollow">Tomohiro Kasumi explains what “@@” means, in the context of the Hammer filesystem</a></h3>

<ul>
<li>A post from the Dragonfly users’ mailing list about what the @@ construct means in the Hammer filesystem</li>
<li>“@@ represents the existence of a PFS which is logically separated pseudo filesystem space within HAMMER&#39;s B-Tree”</li>
<li>“HAMMER only has 1 large B-Tree per filesystem (not per PFS), so all the PFS exist within that single B-Tree. PFS are separated by localization parameter which is one of the B-Tree keys used to lookup the tree.”</li>
<li>Each substring in &quot;@@-1:00001&quot; means:

<ol>
<li>&quot;@@&quot; means it&#39;s a PFS or snapshot.</li>
<li>&quot;-1&quot; means it&#39;s a master.</li>
<li>&quot;:&quot; is just a separator.</li>
<li>&quot;00001&quot; means it&#39;s PFS#1, where PFS#0 is the default PFS created on newfs. There is no &quot;00000&quot; because that&#39;s what&#39;s mounted on /HAMMER. PFS# is used for localization parameter.</li>
</ol></li>
<li>“Localization parameter has the highest priority when inserting or looking up B-Tree elements, so fs elements that belong to the same PFS# tend to be localized (clustered) within the B-Tree”</li>
<li>There is also a note about how snapshots are named: &quot;@@0x00...&quot;</li>
<li>A user points out that having : in the path can confuse some applications, such as in the case of adding the current directory or a relative path to the $PATH environment variable, which is a colon delimited list of paths</li>
<li>This seems quite a bit more confusing that the datasets created by ZFS, but they might have other useful properties
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/11.0R/schedule.html" rel="nofollow">FreeBSD 11.0 nearing RC1</a></h3>

<ul>
<li>We’ve all been eagerly awaiting the pending release of FreeBSD 11.0, and the schedule has now been updated!</li>
<li>The first release candidate is slated for July 29th!</li>
<li>If all goes well (and we stick to schedule) there will be another RC2 and possible RC3 release, before 11.0 officially drops near the end of August.</li>
<li>Start playing with those builds folks, be sure to send your feedback to the team to make this the best .0 release ever!
***</li>
</ul>

<h3><a href="http://ecc-comp.blogspot.com/2016/06/tensorflow-on-freebsd.html" rel="nofollow">TensorFlow on FreeBSD</a></h3>

<ul>
<li>Next we have a blog post about the experience of a “new” FreeBSD user trying to deploy some non-ported software to his new system.</li>
<li>Specifically he was interested in running TensorFlow, but not doing a port himself, because in his words: </li>
</ul>

<blockquote>
<p>“First, I apologize for not supplying a port archive myself. After reading the FreeBSD handbook for creating a port, it&#39;s too complex of a task for me right now. I&#39;ve only been using FreeBSD for two weeks. I would also not like to waste anyone&#39;s time giving them a terrible port archive and mess up their system.”</p>
</blockquote>

<ul>
<li>First of all, good ports are often born out of bad ports! Don’t let the porting framework daunt you, give it a go, since that&#39;s the only way you are going to learn how to write “good” ports over time. The porters-handbook is a good first place to start, plus the community usually is very helpful in providing feedback.</li>
<li>He then walks us through the changes made to the TensorFlow code (starting with the assumption that OSX was a good “flavor” to begin porting from) and ultimately compiling. </li>
<li>This ends up with the creation of a pip package which works!</li>
<li>A good tutorial, and also very similar to what goes on in the porting process. With this write-up perhaps somebody will take up creating a port of it… hint hint!
***</li>
</ul>

<h3><a href="http://jamesdeagle.blogspot.ca/2016/06/netbsd-new-beginning.html" rel="nofollow">NetBSD: A New Beginning?</a></h3>

<ul>
<li>We don’t get enough NetBSD news at times, but this post by James Deagle talks about his adventure with NetBSD 7.0 and making it his “new beginning”</li>
</ul>

<blockquote>
<p>“After a few months of traipsing around the worlds of SunOS and Linux, I&#39;m back to NetBSD for what I hope will be a lengthy return engagement. And while I&#39;m enamored of NetBSD for all the previously-mentioned reasons, I&#39;m already thinking ahead to some problems to solve, some of which have also been mentioned before.”</p>
</blockquote>

<ul>
<li><p>He then goes through and lists some of the small nits he’s still running into during the daily workflow</p></li>
<li><p>YouTube audio - Specifically he mentions that no audio is playing, but wonders if Flash plays some part. (Ideally you’re not using Flash though, in which case you need to check the audio backend FF is using. Try PulseAudio since it seems the best supported. If pulse is already enabled, install ‘pavucontrol’ to make sure audio is playing to the correct sound device)</p></li>
<li><p>Slow gaming performance (TuxKart and Celestia) - Check DRI / Xorg? Or is it CPU bound?</p></li>
<li><p>Lastly some unspecified Wireless issues, which typically end up being driver related. (Or use another chipset)</p>

<hr></li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://reproducible.debian.net/netbsd/netbsd.html" rel="nofollow">Reproducible NetBSD?  77.7% of the way there</a> </p></li>
<li><p><a href="https://gist.github.com/zg/38a3afa112ddf7de4912aafc249ec82f" rel="nofollow">Create FreeBSD virtual machine using qemu. Run the VM using xhyve.</a> </p></li>
<li><p><a href="https://joshcummings.net/pub/FreeBSD" rel="nofollow">FreeBSD PowerPC 32bit pkg repository (unofficial). ~19,500 packages, more to come</a> </p></li>
<li><p><a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/05/16/msg000706.html" rel="nofollow">NetBSD machines at Open Source Conference 2016 Gunma</a> </p></li>
<li><p><a href="http://arstechnica.com/apple/2016/06/a-zfs-developers-analysis-of-the-good-and-bad-in-apples-new-apfs-file-system/" rel="nofollow">Adam Leventhal (of ZFS and DTrace) does an analysis of APFS </a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/semibug/2016-June/000106.html" rel="nofollow">SemiBug June meeting summary</a> </p></li>
<li><p><a href="http://knoxbug.org/content/2016-07-26" rel="nofollow">KnoxBug Meeting</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/nuYTzaG6" rel="nofollow"> Andrew - iocage </a> </li>
<li><a href="http://pastebin.com/PzY68hNS" rel="nofollow"> Florian - Arm + GitHub</a> </li>
<li><a href="http://pastebin.com/JESGZjLu" rel="nofollow"> Clint - Synth</a> </li>
<li><a href="http://pastebin.com/b4LAiPs4" rel="nofollow"> Leonardo - Translations</a> </li>
<li><a href="http://pastebin.com/VRc8fvBk" rel="nofollow"> Zachary - Moving things to VMs</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>147: Release all the things!</title>
  <link>https://www.bsdnow.tv/147</link>
  <guid isPermaLink="false">5d5709eb-d443-4e84-bf66-b521e3b7c5eb</guid>
  <pubDate>Wed, 22 Jun 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5d5709eb-d443-4e84-bf66-b521e3b7c5eb.mp3" length="72186484" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this episode of BSDNow, we will be talking to Glen Barber and Peter Wemm of the FreeBSD RE and Cluster Admin teams! That plus our</itunes:subtitle>
  <itunes:duration>1:40:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;On this episode of BSDNow, we will be talking to Glen Barber and Peter Wemm of the FreeBSD RE and Cluster Admin teams! That plus our&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and &amp;lt;br&amp;gt;
Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.surveymonkey.com/r/freebsd2016" target="_blank" rel="nofollow noopener"&gt;2016 FreeBSD Community Survey&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We often get comments from our listeners, “I’m not a developer, how can I help out”?&lt;/li&gt;
&lt;li&gt;Well today is your chance to do something. The FreeBSD Foundation has its 2016 Community Survey online, where they are asking for feedback from 
you!&lt;/li&gt;
&lt;li&gt;I just did the survey, it’ll take you about 5 minutes, but gives you a chance to provide valuable feedback to the foundation about things that 
are important to you.&lt;/li&gt;
&lt;li&gt;Be sure to answer in as much detail as possible and the foundation will review and use this feedback for its operations going forward.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.grenadille.net/post/2016/06/17/ART-single-thread-performances" target="_blank" rel="nofollow noopener"&gt;ART, OpenBSDs new routing table, single thread performances&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has changed the way routes are looked up in the kernel as part of their path to an SMP networking stack&lt;/li&gt;
&lt;li&gt;The “Allotment Routing Table” (ART) is a performance tradeoff, where more memory is used to store the routing table, in exchange for faster 
lookups&lt;/li&gt;
&lt;li&gt;With this new arrangement, a full BGP routing table will grow from 130MB to 180MB of memory&lt;/li&gt;
&lt;li&gt;“ART is a free multibit trie based routing table. To keep it simple, it can be seen as using more memory for fewer CPU cycles. In other words, 
we get a faster lookup by wasting memory. The &lt;a href="http://www.hariguchi.org/art/art.pdf" target="_blank" rel="nofollow noopener"&gt;original paper&lt;/a&gt; presents some performance comparisons between 
two ART configurations and the BSD Radix. But how does this apply to OpenBSD?”&lt;/li&gt;
&lt;li&gt;“I asked Hrvoje Popovski to run his packet forwarding test on his Xeon box (E5-2620 v2 @ 2.10GHz, 2400.34 MHz) with ix(4) (82599) interfaces. 
The test setup consist of three machines with the OpenBSD box in the middle”&lt;/li&gt;
&lt;li&gt;“The simulations have been performed with an OpenBSD -current from June 9th. The machine is configured with pf(4) disabled in order to force a 
single route lookup for every IPv4 packet. Based on the result of the lookup the kernel decide if it should forward, deliver or drop the packet”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFfoEV67dBSrKfA8ifpUr6qC" target="_blank" rel="nofollow noopener"&gt;BSDCan 2016 Playlist&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The complete set of videos from BSDCan is online and ready to be consumed&lt;/li&gt;
&lt;li&gt;Remember the good-ole days where we would wait months (or years) to get videos posted from conferences?&lt;/li&gt;
&lt;li&gt;Well, who are we kidding, some conferences STILL do that, but we can’t count BSDCan among them. &lt;/li&gt;
&lt;li&gt;Only two weeks out from this years exciting BSDCan, and &lt;em&gt;all&lt;/em&gt; the videos have now landed on YouTube.&lt;/li&gt;
&lt;li&gt;Granted, this is no substitute for actually being at the conference, but even if you attended you probably missed quite a few of the talks.&lt;/li&gt;
&lt;li&gt;There are no videos of the hallway track, which is the best part of the conference&lt;/li&gt;
&lt;li&gt;Except the dinner discussion of course.&lt;/li&gt;
&lt;li&gt;and don’t forget the hacker lounge
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://jvns.ca/blog/2016/06/13/should-you-be-scared-of-signals/" target="_blank" rel="nofollow noopener"&gt;Should you be scared of Unix signals?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Do you know much about UNIX Signals?&lt;/li&gt;
&lt;li&gt;Are you afraid of their complexity? &lt;/li&gt;
&lt;li&gt;Do you know there are signals other than SIGKILL?&lt;/li&gt;
&lt;li&gt;This article talks about the practical implications of signals from a programming perspective&lt;/li&gt;
&lt;li&gt;The things you need to consider when dealing with signals&lt;/li&gt;
&lt;li&gt;Basically, you register a “signal handler”, the function that will be run when a signal arrives&lt;/li&gt;
&lt;li&gt;As you program is running, if a signal arrives, your program will be interrupted. Its current state will be saved and any system calls in progress 
will return EINTR (Error, Interrupted), then your signal handler will be run.&lt;/li&gt;
&lt;li&gt;Once the signal handler is complete, the state of your application will be restored, and execution will resume&lt;/li&gt;
&lt;li&gt;As long as your program properly handles this interruption, and errors that might result from it (getting EINTR from a read() call, instead of the 
data you expected), then everything should be fine.&lt;/li&gt;
&lt;li&gt;Of course, you need to be careful what you do inside your signal handler, as if you modify any variables or state in your application, it might be 
very confused when it resumes.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Glen and Peter-&lt;/h2&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/emc-advanced-dev/unik" target="_blank" rel="nofollow noopener"&gt;Unik - The Unikernel Compilation and Deployment Platform (uses NetBSD's Rump)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve talked a bit about NetBSD’s RUMP (unikernel) in the past, including articles on how to deploy services using it.&lt;/li&gt;
&lt;li&gt;Now we have an interesting project which makes the process super-easy, and dare-we-say almost “Docker-Like?”&lt;/li&gt;
&lt;li&gt;The Unik project has a fairly complete walkthrough right on their GitHub project page, including details on installation and creating your own 
unikernel containers. &lt;/li&gt;
&lt;li&gt;In addition, it provides instructions on boot-strapping your own Go/Node.js/Python/Java applications, and supports out of Box VCenter / AWS / Qemu 
/ VirtualBox providers.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="" target="_blank" rel="nofollow noopener"&gt;PkgSrc 50th Release Highlights&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;pkgsrc is celebrating its 50th release, and to highlight this, they have posted a series of interviews from people who have been active in the 
project&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_jonathan" target="_blank" rel="nofollow noopener"&gt;pkgsrc 50th release interviews - Jonathan Perkin&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_ryo" target="_blank" rel="nofollow noopener"&gt;pkgsrc 50th release interviews - Ryo ONODERA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interview_with" target="_blank" rel="nofollow noopener"&gt;pkgsrc 50th release interviews - Joerg Sonnenberg&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_sevan" target="_blank" rel="nofollow noopener"&gt;pkgsrc 50th release interviews - Sevan Janiyan&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://justinholcomb.me/blog/2016/02/28/migration-to-freebsd-part1.html" target="_blank" rel="nofollow noopener"&gt;Migrating to FreeBSD from Solaris 11&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://justinholcomb.me/blog/2016/03/12/migration-to-freebsd-part2.html" target="_blank" rel="nofollow noopener"&gt;Part 2&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://justinholcomb.me/blog/2016/03/19/migration-to-freebsd-part3.html" target="_blank" rel="nofollow noopener"&gt;Part 3&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://justinholcomb.me/blog/2016/03/26/migration-to-freebsd-part4.html" target="_blank" rel="nofollow noopener"&gt;Part 4&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://justinholcomb.me/blog/2016/04/03/migration-to-freebsd-part5.html" target="_blank" rel="nofollow noopener"&gt;Part 5&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/alnsn/localpkgsrc/tree/master/firefox-chroot" target="_blank" rel="nofollow noopener"&gt;How to chroot www/firefox on NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for a jail-like method of running FireFox on NetBSD? (Or possibly other BSDs?)&lt;/li&gt;
&lt;li&gt;We have a github repo with details on how to setup and run FireFox using a chroot using a “webuser” account for safety. &lt;/li&gt;
&lt;li&gt;Think of this as a jail alternative, may be useful on systems with no jail support.&lt;/li&gt;
&lt;li&gt;Of interest is the method used to do X forwarding. It uses Xorg TCP listen option (which is often off by default for security reasons). Perhaps SSH 
X forwarding would be a better alternative. (Or nullfs mounts of /tmp)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://github.com/tredly/tredly/releases/tag/v1.0.0-rc.1" target="_blank" rel="nofollow noopener"&gt;Tredly - V1 Release Candidate&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.freebsd.org/pipermail/freebsd-current/2016-June/061775.html" target="_blank" rel="nofollow noopener"&gt;Call for Testing - ypldap testing against OpenLDAP and Microsoft Active 
Directory&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://bsdmag.org/" target="_blank" rel="nofollow noopener"&gt;BSD Magazine, June 2016 Out Now&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-June/500610.html" target="_blank" rel="nofollow noopener"&gt;Hammer2 - Add xxhash to H2 and throw in debug stuff for performance 
testing&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://justinholcomb.me/blog/2016/06/14/chyves-project-preannouncement.html" target="_blank" rel="nofollow noopener"&gt;chyves pre-announcement&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/1hpGrmuL" target="_blank" rel="nofollow noopener"&gt; Michael - Versioning &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/2PkrMGGx" target="_blank" rel="nofollow noopener"&gt; Michael - Removing Encryption &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/q5VdmNxG" target="_blank" rel="nofollow noopener"&gt; Bostjan - PC-BSD Questions&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/2aedLV7d" target="_blank" rel="nofollow noopener"&gt; Fong - ZFS Rollback &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/dneVZkXc" target="_blank" rel="nofollow noopener"&gt; Jochen - Docker on FBSD&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this episode of BSDNow, we will be talking to Glen Barber and Peter Wemm of the FreeBSD RE and Cluster Admin teams! That plus our</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.surveymonkey.com/r/freebsd2016" rel="nofollow">2016 FreeBSD Community Survey</a></h3>

<ul>
<li>We often get comments from our listeners, “I’m not a developer, how can I help out”?</li>
<li>Well today is your chance to do something. The FreeBSD Foundation has its 2016 Community Survey online, where they are asking for feedback from 
you!</li>
<li>I just did the survey, it’ll take you about 5 minutes, but gives you a chance to provide valuable feedback to the foundation about things that 
are important to you.</li>
<li>Be sure to answer in as much detail as possible and the foundation will review and use this feedback for its operations going forward.
***</li>
</ul>

<h3><a href="http://www.grenadille.net/post/2016/06/17/ART-single-thread-performances" rel="nofollow">ART, OpenBSDs new routing table, single thread performances</a></h3>

<ul>
<li>OpenBSD has changed the way routes are looked up in the kernel as part of their path to an SMP networking stack</li>
<li>The “Allotment Routing Table” (ART) is a performance tradeoff, where more memory is used to store the routing table, in exchange for faster 
lookups</li>
<li>With this new arrangement, a full BGP routing table will grow from 130MB to 180MB of memory</li>
<li>“ART is a free multibit trie based routing table. To keep it simple, it can be seen as using more memory for fewer CPU cycles. In other words, 
we get a faster lookup by wasting memory. The <a href="http://www.hariguchi.org/art/art.pdf" rel="nofollow">original paper</a> presents some performance comparisons between 
two ART configurations and the BSD Radix. But how does this apply to OpenBSD?”</li>
<li>“I asked Hrvoje Popovski to run his packet forwarding test on his Xeon box (E5-2620 v2 @ 2.10GHz, 2400.34 MHz) with ix(4) (82599) interfaces. 
The test setup consist of three machines with the OpenBSD box in the middle”</li>
<li>“The simulations have been performed with an OpenBSD -current from June 9th. The machine is configured with pf(4) disabled in order to force a 
single route lookup for every IPv4 packet. Based on the result of the lookup the kernel decide if it should forward, deliver or drop the packet”
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFfoEV67dBSrKfA8ifpUr6qC" rel="nofollow">BSDCan 2016 Playlist</a></h3>

<ul>
<li>The complete set of videos from BSDCan is online and ready to be consumed</li>
<li>Remember the good-ole days where we would wait months (or years) to get videos posted from conferences?</li>
<li>Well, who are we kidding, some conferences STILL do that, but we can’t count BSDCan among them. </li>
<li>Only two weeks out from this years exciting BSDCan, and <em>all</em> the videos have now landed on YouTube.</li>
<li>Granted, this is no substitute for actually being at the conference, but even if you attended you probably missed quite a few of the talks.</li>
<li>There are no videos of the hallway track, which is the best part of the conference</li>
<li>Except the dinner discussion of course.</li>
<li>and don’t forget the hacker lounge
***</li>
</ul>

<h3><a href="http://jvns.ca/blog/2016/06/13/should-you-be-scared-of-signals/" rel="nofollow">Should you be scared of Unix signals?</a></h3>

<ul>
<li>Do you know much about UNIX Signals?</li>
<li>Are you afraid of their complexity? </li>
<li>Do you know there are signals other than SIGKILL?</li>
<li>This article talks about the practical implications of signals from a programming perspective</li>
<li>The things you need to consider when dealing with signals</li>
<li>Basically, you register a “signal handler”, the function that will be run when a signal arrives</li>
<li>As you program is running, if a signal arrives, your program will be interrupted. Its current state will be saved and any system calls in progress 
will return EINTR (Error, Interrupted), then your signal handler will be run.</li>
<li>Once the signal handler is complete, the state of your application will be restored, and execution will resume</li>
<li>As long as your program properly handles this interruption, and errors that might result from it (getting EINTR from a read() call, instead of the 
data you expected), then everything should be fine.</li>
<li>Of course, you need to be careful what you do inside your signal handler, as if you modify any variables or state in your application, it might be 
very confused when it resumes.
***</li>
</ul>

<h2>Interview - Glen and Peter-</h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/emc-advanced-dev/unik" rel="nofollow">Unik - The Unikernel Compilation and Deployment Platform (uses NetBSD&#39;s Rump)</a></h3>

<ul>
<li>We’ve talked a bit about NetBSD’s RUMP (unikernel) in the past, including articles on how to deploy services using it.</li>
<li>Now we have an interesting project which makes the process super-easy, and dare-we-say almost “Docker-Like?”</li>
<li>The Unik project has a fairly complete walkthrough right on their GitHub project page, including details on installation and creating your own 
unikernel containers. </li>
<li>In addition, it provides instructions on boot-strapping your own Go/Node.js/Python/Java applications, and supports out of Box VCenter / AWS / Qemu 
/ VirtualBox providers.
***</li>
</ul>

<h3><a href="" rel="nofollow">PkgSrc 50th Release Highlights</a></h3>

<ul>
<li>pkgsrc is celebrating its 50th release, and to highlight this, they have posted a series of interviews from people who have been active in the 
project</li>
<li><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_jonathan" rel="nofollow">pkgsrc 50th release interviews - Jonathan Perkin</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_ryo" rel="nofollow">pkgsrc 50th release interviews - Ryo ONODERA</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interview_with" rel="nofollow">pkgsrc 50th release interviews - Joerg Sonnenberg</a> </li>
<li><a href="https://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_sevan" rel="nofollow">pkgsrc 50th release interviews - Sevan Janiyan</a> 
***</li>
</ul>

<h3><a href="http://justinholcomb.me/blog/2016/02/28/migration-to-freebsd-part1.html" rel="nofollow">Migrating to FreeBSD from Solaris 11</a></h3>

<ul>
<li><a href="http://justinholcomb.me/blog/2016/03/12/migration-to-freebsd-part2.html" rel="nofollow">Part 2</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/03/19/migration-to-freebsd-part3.html" rel="nofollow">Part 3</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/03/26/migration-to-freebsd-part4.html" rel="nofollow">Part 4</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/04/03/migration-to-freebsd-part5.html" rel="nofollow">Part 5</a> 
***</li>
</ul>

<h3><a href="https://github.com/alnsn/localpkgsrc/tree/master/firefox-chroot" rel="nofollow">How to chroot www/firefox on NetBSD</a></h3>

<ul>
<li>Looking for a jail-like method of running FireFox on NetBSD? (Or possibly other BSDs?)</li>
<li>We have a github repo with details on how to setup and run FireFox using a chroot using a “webuser” account for safety. </li>
<li>Think of this as a jail alternative, may be useful on systems with no jail support.</li>
<li>Of interest is the method used to do X forwarding. It uses Xorg TCP listen option (which is often off by default for security reasons). Perhaps SSH 
X forwarding would be a better alternative. (Or nullfs mounts of /tmp)
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><a href="https://github.com/tredly/tredly/releases/tag/v1.0.0-rc.1" rel="nofollow">Tredly - V1 Release Candidate</a></li>
<li><a href="http://lists.freebsd.org/pipermail/freebsd-current/2016-June/061775.html" rel="nofollow">Call for Testing - ypldap testing against OpenLDAP and Microsoft Active 
Directory</a> </li>
<li><a href="https://bsdmag.org/" rel="nofollow">BSD Magazine, June 2016 Out Now</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-June/500610.html" rel="nofollow">Hammer2 - Add xxhash to H2 and throw in debug stuff for performance 
testing</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/06/14/chyves-project-preannouncement.html" rel="nofollow">chyves pre-announcement</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/1hpGrmuL" rel="nofollow"> Michael - Versioning </a> </li>
<li><a href="http://pastebin.com/2PkrMGGx" rel="nofollow"> Michael - Removing Encryption </a> </li>
<li><a href="http://pastebin.com/q5VdmNxG" rel="nofollow"> Bostjan - PC-BSD Questions</a> </li>
<li><a href="http://pastebin.com/2aedLV7d" rel="nofollow"> Fong - ZFS Rollback </a> </li>
<li><a href="http://pastebin.com/dneVZkXc" rel="nofollow"> Jochen - Docker on FBSD</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this episode of BSDNow, we will be talking to Glen Barber and Peter Wemm of the FreeBSD RE and Cluster Admin teams! That plus our</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.surveymonkey.com/r/freebsd2016" rel="nofollow">2016 FreeBSD Community Survey</a></h3>

<ul>
<li>We often get comments from our listeners, “I’m not a developer, how can I help out”?</li>
<li>Well today is your chance to do something. The FreeBSD Foundation has its 2016 Community Survey online, where they are asking for feedback from 
you!</li>
<li>I just did the survey, it’ll take you about 5 minutes, but gives you a chance to provide valuable feedback to the foundation about things that 
are important to you.</li>
<li>Be sure to answer in as much detail as possible and the foundation will review and use this feedback for its operations going forward.
***</li>
</ul>

<h3><a href="http://www.grenadille.net/post/2016/06/17/ART-single-thread-performances" rel="nofollow">ART, OpenBSDs new routing table, single thread performances</a></h3>

<ul>
<li>OpenBSD has changed the way routes are looked up in the kernel as part of their path to an SMP networking stack</li>
<li>The “Allotment Routing Table” (ART) is a performance tradeoff, where more memory is used to store the routing table, in exchange for faster 
lookups</li>
<li>With this new arrangement, a full BGP routing table will grow from 130MB to 180MB of memory</li>
<li>“ART is a free multibit trie based routing table. To keep it simple, it can be seen as using more memory for fewer CPU cycles. In other words, 
we get a faster lookup by wasting memory. The <a href="http://www.hariguchi.org/art/art.pdf" rel="nofollow">original paper</a> presents some performance comparisons between 
two ART configurations and the BSD Radix. But how does this apply to OpenBSD?”</li>
<li>“I asked Hrvoje Popovski to run his packet forwarding test on his Xeon box (E5-2620 v2 @ 2.10GHz, 2400.34 MHz) with ix(4) (82599) interfaces. 
The test setup consist of three machines with the OpenBSD box in the middle”</li>
<li>“The simulations have been performed with an OpenBSD -current from June 9th. The machine is configured with pf(4) disabled in order to force a 
single route lookup for every IPv4 packet. Based on the result of the lookup the kernel decide if it should forward, deliver or drop the packet”
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLeF8ZihVdpFfoEV67dBSrKfA8ifpUr6qC" rel="nofollow">BSDCan 2016 Playlist</a></h3>

<ul>
<li>The complete set of videos from BSDCan is online and ready to be consumed</li>
<li>Remember the good-ole days where we would wait months (or years) to get videos posted from conferences?</li>
<li>Well, who are we kidding, some conferences STILL do that, but we can’t count BSDCan among them. </li>
<li>Only two weeks out from this years exciting BSDCan, and <em>all</em> the videos have now landed on YouTube.</li>
<li>Granted, this is no substitute for actually being at the conference, but even if you attended you probably missed quite a few of the talks.</li>
<li>There are no videos of the hallway track, which is the best part of the conference</li>
<li>Except the dinner discussion of course.</li>
<li>and don’t forget the hacker lounge
***</li>
</ul>

<h3><a href="http://jvns.ca/blog/2016/06/13/should-you-be-scared-of-signals/" rel="nofollow">Should you be scared of Unix signals?</a></h3>

<ul>
<li>Do you know much about UNIX Signals?</li>
<li>Are you afraid of their complexity? </li>
<li>Do you know there are signals other than SIGKILL?</li>
<li>This article talks about the practical implications of signals from a programming perspective</li>
<li>The things you need to consider when dealing with signals</li>
<li>Basically, you register a “signal handler”, the function that will be run when a signal arrives</li>
<li>As you program is running, if a signal arrives, your program will be interrupted. Its current state will be saved and any system calls in progress 
will return EINTR (Error, Interrupted), then your signal handler will be run.</li>
<li>Once the signal handler is complete, the state of your application will be restored, and execution will resume</li>
<li>As long as your program properly handles this interruption, and errors that might result from it (getting EINTR from a read() call, instead of the 
data you expected), then everything should be fine.</li>
<li>Of course, you need to be careful what you do inside your signal handler, as if you modify any variables or state in your application, it might be 
very confused when it resumes.
***</li>
</ul>

<h2>Interview - Glen and Peter-</h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/emc-advanced-dev/unik" rel="nofollow">Unik - The Unikernel Compilation and Deployment Platform (uses NetBSD&#39;s Rump)</a></h3>

<ul>
<li>We’ve talked a bit about NetBSD’s RUMP (unikernel) in the past, including articles on how to deploy services using it.</li>
<li>Now we have an interesting project which makes the process super-easy, and dare-we-say almost “Docker-Like?”</li>
<li>The Unik project has a fairly complete walkthrough right on their GitHub project page, including details on installation and creating your own 
unikernel containers. </li>
<li>In addition, it provides instructions on boot-strapping your own Go/Node.js/Python/Java applications, and supports out of Box VCenter / AWS / Qemu 
/ VirtualBox providers.
***</li>
</ul>

<h3><a href="" rel="nofollow">PkgSrc 50th Release Highlights</a></h3>

<ul>
<li>pkgsrc is celebrating its 50th release, and to highlight this, they have posted a series of interviews from people who have been active in the 
project</li>
<li><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_jonathan" rel="nofollow">pkgsrc 50th release interviews - Jonathan Perkin</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_ryo" rel="nofollow">pkgsrc 50th release interviews - Ryo ONODERA</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interview_with" rel="nofollow">pkgsrc 50th release interviews - Joerg Sonnenberg</a> </li>
<li><a href="https://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interviews_sevan" rel="nofollow">pkgsrc 50th release interviews - Sevan Janiyan</a> 
***</li>
</ul>

<h3><a href="http://justinholcomb.me/blog/2016/02/28/migration-to-freebsd-part1.html" rel="nofollow">Migrating to FreeBSD from Solaris 11</a></h3>

<ul>
<li><a href="http://justinholcomb.me/blog/2016/03/12/migration-to-freebsd-part2.html" rel="nofollow">Part 2</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/03/19/migration-to-freebsd-part3.html" rel="nofollow">Part 3</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/03/26/migration-to-freebsd-part4.html" rel="nofollow">Part 4</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/04/03/migration-to-freebsd-part5.html" rel="nofollow">Part 5</a> 
***</li>
</ul>

<h3><a href="https://github.com/alnsn/localpkgsrc/tree/master/firefox-chroot" rel="nofollow">How to chroot www/firefox on NetBSD</a></h3>

<ul>
<li>Looking for a jail-like method of running FireFox on NetBSD? (Or possibly other BSDs?)</li>
<li>We have a github repo with details on how to setup and run FireFox using a chroot using a “webuser” account for safety. </li>
<li>Think of this as a jail alternative, may be useful on systems with no jail support.</li>
<li>Of interest is the method used to do X forwarding. It uses Xorg TCP listen option (which is often off by default for security reasons). Perhaps SSH 
X forwarding would be a better alternative. (Or nullfs mounts of /tmp)
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><a href="https://github.com/tredly/tredly/releases/tag/v1.0.0-rc.1" rel="nofollow">Tredly - V1 Release Candidate</a></li>
<li><a href="http://lists.freebsd.org/pipermail/freebsd-current/2016-June/061775.html" rel="nofollow">Call for Testing - ypldap testing against OpenLDAP and Microsoft Active 
Directory</a> </li>
<li><a href="https://bsdmag.org/" rel="nofollow">BSD Magazine, June 2016 Out Now</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-June/500610.html" rel="nofollow">Hammer2 - Add xxhash to H2 and throw in debug stuff for performance 
testing</a> </li>
<li><a href="http://justinholcomb.me/blog/2016/06/14/chyves-project-preannouncement.html" rel="nofollow">chyves pre-announcement</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/1hpGrmuL" rel="nofollow"> Michael - Versioning </a> </li>
<li><a href="http://pastebin.com/2PkrMGGx" rel="nofollow"> Michael - Removing Encryption </a> </li>
<li><a href="http://pastebin.com/q5VdmNxG" rel="nofollow"> Bostjan - PC-BSD Questions</a> </li>
<li><a href="http://pastebin.com/2aedLV7d" rel="nofollow"> Fong - ZFS Rollback </a> </li>
<li><a href="http://pastebin.com/dneVZkXc" rel="nofollow"> Jochen - Docker on FBSD</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>146: Music to Beastie’s ears</title>
  <link>https://www.bsdnow.tv/146</link>
  <guid isPermaLink="false">65789003-28e4-49f2-83a2-80f129d71d0d</guid>
  <pubDate>Thu, 16 Jun 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/65789003-28e4-49f2-83a2-80f129d71d0d.mp3" length="46132564" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Kris is on vacation this week, so allan flies solo, provides a recap of BSDCan &amp; cover's a boatload of news including Microsoft</itunes:subtitle>
  <itunes:duration>1:04:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Kris is on vacation this week, so allan flies solo, provides a recap of BSDCan &amp;amp; cover's a boatload of news including Microsoft&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdcan.org/2016/" target="_blank" rel="nofollow noopener"&gt;BSDCan Recap and Live Stream Videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.openbsd.org/papers" target="_blank" rel="nofollow noopener"&gt;OpenBSD BSDCan 2016 papers now available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://allanjude.com/bsd/BSDCan2016_-_GELIBoot.pdf" target="_blank" rel="nofollow noopener"&gt;Allan’s slides &lt;/a&gt; &lt;a href="http://allanjude.com/bsd/AsiaBSDCon2016_geliboot_pdf1a.pdf" target="_blank" rel="nofollow noopener"&gt;and Paper &lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=LFgxAHkrSTg" target="_blank" rel="nofollow noopener"&gt;Michael W Lucas presents Allan with a gift &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2698" target="_blank" rel="nofollow noopener"&gt;“FreeBSD Mastery: Advanced ZedFS” &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Highlighted Tweets:

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://twitter.com/Keltounet/status/740344735194320896" target="_blank" rel="nofollow noopener"&gt;Groff Arrives at BSDCan &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/freebsdfndation/status/742456950676393984" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation recognizes the contributions of Bryan Drewery, Rod Grimes, Warren Block, &amp;amp; Gleb Smirnoff &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/__briancallahan/status/741854476340858880" target="_blank" rel="nofollow noopener"&gt;A moment of silence and shots in memory in Benjamin Perrault @creepingfur &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/Keltounet/status/741763867471155201" target="_blank" rel="nofollow noopener"&gt;@gvnn3 sells the FreeBSD Foundation shirt off of his back for Charity &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/cperciva/status/741375414967410688" target="_blank" rel="nofollow noopener"&gt;Michael W. Lucas asks Matt Ahrens how to pronounce ZFS, “You can pronounce ZFS however you like, but if you pronounce it 'reiserfs', people might be confused.” &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/BSDCan/status/741420633007874050" target="_blank" rel="nofollow noopener"&gt;Sysadmin T-Shirt &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/SeanChittenden/status/740904105388978176" target="_blank" rel="nofollow noopener"&gt;FreeBSD Dev Summit ran out of room on the chalkboards listing accomplishments of 11.0 &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/Keltounet/status/740928627471159296" target="_blank" rel="nofollow noopener"&gt;List of things people have or want for FreeBSD 12 &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/kprovst/status/741322268480049152?cn=bWVudGlvbg%3D%3D&amp;amp;refsrc=email" target="_blank" rel="nofollow noopener"&gt;Matt Ahrens signing Allan’s ZFS book &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/cperciva/status/741707948469157889" target="_blank" rel="nofollow noopener"&gt;FreeBSD’s new marketing strategy &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/HippyWizard/status/741768670704066560" target="_blank" rel="nofollow noopener"&gt;Charity Auction: systemd whoopie cushion &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/juliefriday/status/741948048788586496" target="_blank" rel="nofollow noopener"&gt;Embarass OpenBSD’s @HenningBrauer by donating $10 to charity for a selfie with him wearing a Linux t-shirt &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://twitter.com/GroffTheBSDGoat/status/742415390798716928" target="_blank" rel="nofollow noopener"&gt;@GroffTheBSDGoat changes handlers, from @HenningBrauer to @GavinAtkinson &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=AOidjSS7Hsg" target="_blank" rel="nofollow noopener"&gt;Day 1 Video &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=z7pDnBO5wSM" target="_blank" rel="nofollow noopener"&gt;Day 2 Video &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=z7pDnBO5wSM&amp;amp;feature=youtu.be&amp;amp;list=PLeF8ZihVdpFfoEV67dBSrKfA8ifpUr6qC&amp;amp;t=4440" target="_blank" rel="nofollow noopener"&gt;Allan’s GELIBoot talk (day 2) &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://azure.microsoft.com/en-us/blog/freebsd-now-available-in-azure-marketplace/" target="_blank" rel="nofollow noopener"&gt;Media Coverage of Microsoft + FreeBSD story&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Microsoft has released their own custom image of FreeBSD 10.3 for the Azure Cloud&lt;/li&gt;
&lt;li&gt;“This means that not only can you quickly bring-up a FreeBSD VM in Azure, but also that in the event you need technical support, Microsoft support engineers can assist.”&lt;/li&gt;
&lt;li&gt;“Microsoft is the publisher of the FreeBSD image in the marketplace rather than the FreeBSD Foundation. The FreeBSD Foundation is supported by donations from the FreeBSD community, including companies that build their solutions on FreeBSD. They are not a solution provider or an ISV with a support organization but rather rely on a very active community that support one another. In order to ensure our customers have an enterprise SLA for their FreeBSD VMs running in Azure, we took on the work of building, testing, releasing and maintaining the image in order to remove that burden from the Foundation. We will continue to partner closely with the Foundation as we make further investments in FreeBSD on Hyper-V and in Azure.”&lt;/li&gt;
&lt;li&gt;"It's quite a significant milestone for FreeBSD community and for Microsoft to publish a supported FreeBSD image on Azure Marketplace. We really appreciate Microsoft's commitment and investment in FreeBSD project". - Justin T. Gibbs, President of FreeBSD Foundation&lt;/li&gt;
&lt;li&gt;Microsoft took a FreeBSD 10.3-RELEASE image and added additional patches, most of which they have upstreamed but that were too late for the regular 10.3 release cycle.&lt;/li&gt;
&lt;li&gt;Rather than requiring users to use a snapshot of the stable/10 branch, which would complicate the user experience, and complicate the job of the Microsoft support engineers, they created their own “certified” release&lt;/li&gt;
&lt;li&gt;This allows Microsoft to selectively deploy errata fixes to the image as well&lt;/li&gt;
&lt;li&gt;It is not clear how this affects update mechanisms like freebsd-update(8)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.theregister.co.uk/2016/06/09/microsoft_freebsd/" target="_blank" rel="nofollow noopener"&gt;The Register &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.theinquirer.net/inquirer/news/2461070/microsoft-creates-own-distribution-of-freebsd-for-azure-developers" target="_blank" rel="nofollow noopener"&gt;The Inquirer &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.infoworld.com/article/3082090/open-source-tools/is-microsoft-publishing-its-own-freebsd-yes-and-no.html" target="_blank" rel="nofollow noopener"&gt;Infoworld &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://thehackernews.com/2016/06/microsoft-azure-freebsd.html" target="_blank" rel="nofollow noopener"&gt;The Hacker News &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://windowsreport.com/microsoft-freebsd-10-3-ready-made-vm-image-azure/" target="_blank" rel="nofollow noopener"&gt;Windows Report &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://news.thewindowsclub.com/microsoft-freebsd-operating-system-84375/" target="_blank" rel="nofollow noopener"&gt;Windows Club &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/select-works-poorly" target="_blank" rel="nofollow noopener"&gt;Select works poorly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“At the bottom of the OpenBSD man page for select is a little note. “Internally to the kernel, select() and pselect() work poorly if multiple processes wait on the same file descriptor.” There’s a similar warning in the poll man page. Where does this warning come from and what does it mean?”&lt;/li&gt;
&lt;li&gt;Ted found that at first glance, OpenBSD’s select() appears to be quite bad:&lt;/li&gt;
&lt;li&gt;“whenever some data gets written, we call wakeup(&amp;amp;selwait);. Based on what we’ve seen so far, one can conclude that this is likely to be inefficient. Every time any socket has some data available, we wake up every selecting process in the system. Works poorly indeed.”&lt;/li&gt;
&lt;li&gt;After further investigation, it turns out to not be quite as bad&lt;/li&gt;
&lt;li&gt;When the select() is first setup, the PID of the process that cares about the FD is recorded in the selinfo struct&lt;/li&gt;
&lt;li&gt;If a second process runs select() on the same FD, the SI_COLL (Select Collision) flag is set on the selinfo struct&lt;/li&gt;
&lt;li&gt;When selwakeup() is called, if SI_COLL is set, all select()ing processes are woken up, and the sysctl kern.nselcoll is incremented. If the flag is not set, and only a single PID is waiting for activity on that FD, only that process is woken up&lt;/li&gt;
&lt;li&gt;“This is not an intractable problem. kevent avoids it entirely. Other implementations may too. But practically, does it need to be solved? My laptop says it’s happened 43 times. A server with substantially more uptime says 0. Doesn’t seem so bad.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Hans Petter Selasky - &lt;a href="mailto:hps@freebsd.org" target="_blank" rel="nofollow noopener"&gt;hps@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/user" target="_blank" rel="nofollow noopener"&gt;@twitter&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Designing FreeBSD’s USB drivers, hooking up a piano to FreeBSD &amp;amp; more!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.tedunangst.com/flak/post/timeline-of-libexpat-random-vulnerability" target="_blank" rel="nofollow noopener"&gt;Timeline of libexpat random vulnerability&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://news.ycombinator.com/item?id=11804565" target="_blank" rel="nofollow noopener"&gt;Do you use FreeBSD as web server? Why or why not?&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://kristerw.blogspot.sg/2016/05/20-years-of-netbsd-code-bloat.html" target="_blank" rel="nofollow noopener"&gt;20 years of NetBSD code Bloat&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://jcs.org/statuses/2016/06/08/740606952149942272/" target="_blank" rel="nofollow noopener"&gt;HP Chromebook 13 now booting OpenBSD&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://web.stanford.edu/class/cs124/lec/124-UnixForPoets.pdf" target="_blank" rel="nofollow noopener"&gt;UNIX for Poets &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://distrowatch.com/weekly.php?issue=20160530#upgrades" target="_blank" rel="nofollow noopener"&gt;Comparing live version upgrade methods&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://www.reddit.com/r/BSD/comments/4n3flx/my_life_with_freebsd_on_a_thinkpad_x220/" target="_blank" rel="nofollow noopener"&gt;My life with FreeBSD on a Thinkpad X220&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Kris is on vacation this week, so allan flies solo, provides a recap of BSDCan &amp; cover&#39;s a boatload of news including Microsoft</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.bsdcan.org/2016/" rel="nofollow">BSDCan Recap and Live Stream Videos</a></h3>

<ul>
<li><a href="http://www.openbsd.org/papers" rel="nofollow">OpenBSD BSDCan 2016 papers now available</a></li>
<li><a href="http://allanjude.com/bsd/BSDCan2016_-_GELIBoot.pdf" rel="nofollow">Allan’s slides </a> <a href="http://allanjude.com/bsd/AsiaBSDCon2016_geliboot_pdf1a.pdf" rel="nofollow">and Paper </a></li>
<li><a href="https://www.youtube.com/watch?v=LFgxAHkrSTg" rel="nofollow">Michael W Lucas presents Allan with a gift </a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2698" rel="nofollow">“FreeBSD Mastery: Advanced ZedFS” </a></li>
<li>Highlighted Tweets:

<ul>
<li><a href="https://twitter.com/Keltounet/status/740344735194320896" rel="nofollow">Groff Arrives at BSDCan </a></li>
<li><a href="https://twitter.com/freebsdfndation/status/742456950676393984" rel="nofollow">FreeBSD Foundation recognizes the contributions of Bryan Drewery, Rod Grimes, Warren Block, &amp; Gleb Smirnoff </a></li>
<li><a href="https://twitter.com/__briancallahan/status/741854476340858880" rel="nofollow">A moment of silence and shots in memory in Benjamin Perrault @creepingfur </a></li>
<li><a href="https://twitter.com/Keltounet/status/741763867471155201" rel="nofollow">@gvnn3 sells the FreeBSD Foundation shirt off of his back for Charity </a></li>
<li><a href="https://twitter.com/cperciva/status/741375414967410688" rel="nofollow">Michael W. Lucas asks Matt Ahrens how to pronounce ZFS, “You can pronounce ZFS however you like, but if you pronounce it &#39;reiserfs&#39;, people might be confused.” </a></li>
<li><a href="https://twitter.com/BSDCan/status/741420633007874050" rel="nofollow">Sysadmin T-Shirt </a></li>
<li><a href="https://twitter.com/SeanChittenden/status/740904105388978176" rel="nofollow">FreeBSD Dev Summit ran out of room on the chalkboards listing accomplishments of 11.0 </a></li>
<li><a href="https://twitter.com/Keltounet/status/740928627471159296" rel="nofollow">List of things people have or want for FreeBSD 12 </a></li>
<li><a href="https://twitter.com/kprovst/status/741322268480049152?cn=bWVudGlvbg%3D%3D&refsrc=email" rel="nofollow">Matt Ahrens signing Allan’s ZFS book </a></li>
<li><a href="https://twitter.com/cperciva/status/741707948469157889" rel="nofollow">FreeBSD’s new marketing strategy </a></li>
<li><a href="https://twitter.com/HippyWizard/status/741768670704066560" rel="nofollow">Charity Auction: systemd whoopie cushion </a></li>
<li><a href="https://twitter.com/juliefriday/status/741948048788586496" rel="nofollow">Embarass OpenBSD’s @HenningBrauer by donating $10 to charity for a selfie with him wearing a Linux t-shirt </a></li>
<li><a href="https://twitter.com/GroffTheBSDGoat/status/742415390798716928" rel="nofollow">@GroffTheBSDGoat changes handlers, from @HenningBrauer to @GavinAtkinson </a></li>
</ul></li>
<li><a href="https://www.youtube.com/watch?v=AOidjSS7Hsg" rel="nofollow">Day 1 Video </a></li>
<li><a href="https://www.youtube.com/watch?v=z7pDnBO5wSM" rel="nofollow">Day 2 Video </a></li>
<li><a href="https://www.youtube.com/watch?v=z7pDnBO5wSM&feature=youtu.be&list=PLeF8ZihVdpFfoEV67dBSrKfA8ifpUr6qC&t=4440" rel="nofollow">Allan’s GELIBoot talk (day 2) </a>
***</li>
</ul>

<h3><a href="https://azure.microsoft.com/en-us/blog/freebsd-now-available-in-azure-marketplace/" rel="nofollow">Media Coverage of Microsoft + FreeBSD story</a></h3>

<ul>
<li>Microsoft has released their own custom image of FreeBSD 10.3 for the Azure Cloud</li>
<li>“This means that not only can you quickly bring-up a FreeBSD VM in Azure, but also that in the event you need technical support, Microsoft support engineers can assist.”</li>
<li>“Microsoft is the publisher of the FreeBSD image in the marketplace rather than the FreeBSD Foundation. The FreeBSD Foundation is supported by donations from the FreeBSD community, including companies that build their solutions on FreeBSD. They are not a solution provider or an ISV with a support organization but rather rely on a very active community that support one another. In order to ensure our customers have an enterprise SLA for their FreeBSD VMs running in Azure, we took on the work of building, testing, releasing and maintaining the image in order to remove that burden from the Foundation. We will continue to partner closely with the Foundation as we make further investments in FreeBSD on Hyper-V and in Azure.”</li>
<li>&quot;It&#39;s quite a significant milestone for FreeBSD community and for Microsoft to publish a supported FreeBSD image on Azure Marketplace. We really appreciate Microsoft&#39;s commitment and investment in FreeBSD project&quot;. - Justin T. Gibbs, President of FreeBSD Foundation</li>
<li>Microsoft took a FreeBSD 10.3-RELEASE image and added additional patches, most of which they have upstreamed but that were too late for the regular 10.3 release cycle.</li>
<li>Rather than requiring users to use a snapshot of the stable/10 branch, which would complicate the user experience, and complicate the job of the Microsoft support engineers, they created their own “certified” release</li>
<li>This allows Microsoft to selectively deploy errata fixes to the image as well</li>
<li>It is not clear how this affects update mechanisms like freebsd-update(8)</li>
<li><a href="http://www.theregister.co.uk/2016/06/09/microsoft_freebsd/" rel="nofollow">The Register </a></li>
<li><a href="http://www.theinquirer.net/inquirer/news/2461070/microsoft-creates-own-distribution-of-freebsd-for-azure-developers" rel="nofollow">The Inquirer </a></li>
<li><a href="http://www.infoworld.com/article/3082090/open-source-tools/is-microsoft-publishing-its-own-freebsd-yes-and-no.html" rel="nofollow">Infoworld </a></li>
<li><a href="http://thehackernews.com/2016/06/microsoft-azure-freebsd.html" rel="nofollow">The Hacker News </a></li>
<li><a href="http://windowsreport.com/microsoft-freebsd-10-3-ready-made-vm-image-azure/" rel="nofollow">Windows Report </a></li>
<li><a href="http://news.thewindowsclub.com/microsoft-freebsd-operating-system-84375/" rel="nofollow">Windows Club </a>
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/select-works-poorly" rel="nofollow">Select works poorly</a></h3>

<ul>
<li>“At the bottom of the OpenBSD man page for select is a little note. “Internally to the kernel, select() and pselect() work poorly if multiple processes wait on the same file descriptor.” There’s a similar warning in the poll man page. Where does this warning come from and what does it mean?”</li>
<li>Ted found that at first glance, OpenBSD’s select() appears to be quite bad:</li>
<li>“whenever some data gets written, we call wakeup(&amp;selwait);. Based on what we’ve seen so far, one can conclude that this is likely to be inefficient. Every time any socket has some data available, we wake up every selecting process in the system. Works poorly indeed.”</li>
<li>After further investigation, it turns out to not be quite as bad</li>
<li>When the select() is first setup, the PID of the process that cares about the FD is recorded in the selinfo struct</li>
<li>If a second process runs select() on the same FD, the SI_COLL (Select Collision) flag is set on the selinfo struct</li>
<li>When selwakeup() is called, if SI_COLL is set, all select()ing processes are woken up, and the sysctl kern.nselcoll is incremented. If the flag is not set, and only a single PID is waiting for activity on that FD, only that process is woken up</li>
<li>“This is not an intractable problem. kevent avoids it entirely. Other implementations may too. But practically, does it need to be solved? My laptop says it’s happened 43 times. A server with substantially more uptime says 0. Doesn’t seem so bad.”
***</li>
</ul>

<h2>Interview - Hans Petter Selasky - <a href="mailto:hps@freebsd.org" rel="nofollow">hps@freebsd.org</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<ul>
<li>Designing FreeBSD’s USB drivers, hooking up a piano to FreeBSD &amp; more!
***</li>
</ul>

<h2>News Roundup</h2>

<ul>
<li><p><a href="http://www.tedunangst.com/flak/post/timeline-of-libexpat-random-vulnerability" rel="nofollow">Timeline of libexpat random vulnerability</a></p></li>
<li><p><a href="https://news.ycombinator.com/item?id=11804565" rel="nofollow">Do you use FreeBSD as web server? Why or why not?</a></p></li>
<li><p><a href="http://kristerw.blogspot.sg/2016/05/20-years-of-netbsd-code-bloat.html" rel="nofollow">20 years of NetBSD code Bloat</a></p></li>
<li><p><a href="https://jcs.org/statuses/2016/06/08/740606952149942272/" rel="nofollow">HP Chromebook 13 now booting OpenBSD</a></p></li>
<li><p><a href="https://web.stanford.edu/class/cs124/lec/124-UnixForPoets.pdf" rel="nofollow">UNIX for Poets </a></p></li>
<li><p><a href="https://distrowatch.com/weekly.php?issue=20160530#upgrades" rel="nofollow">Comparing live version upgrade methods</a></p></li>
<li><p><a href="https://www.reddit.com/r/BSD/comments/4n3flx/my_life_with_freebsd_on_a_thinkpad_x220/" rel="nofollow">My life with FreeBSD on a Thinkpad X220</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Kris is on vacation this week, so allan flies solo, provides a recap of BSDCan &amp; cover&#39;s a boatload of news including Microsoft</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.bsdcan.org/2016/" rel="nofollow">BSDCan Recap and Live Stream Videos</a></h3>

<ul>
<li><a href="http://www.openbsd.org/papers" rel="nofollow">OpenBSD BSDCan 2016 papers now available</a></li>
<li><a href="http://allanjude.com/bsd/BSDCan2016_-_GELIBoot.pdf" rel="nofollow">Allan’s slides </a> <a href="http://allanjude.com/bsd/AsiaBSDCon2016_geliboot_pdf1a.pdf" rel="nofollow">and Paper </a></li>
<li><a href="https://www.youtube.com/watch?v=LFgxAHkrSTg" rel="nofollow">Michael W Lucas presents Allan with a gift </a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2698" rel="nofollow">“FreeBSD Mastery: Advanced ZedFS” </a></li>
<li>Highlighted Tweets:

<ul>
<li><a href="https://twitter.com/Keltounet/status/740344735194320896" rel="nofollow">Groff Arrives at BSDCan </a></li>
<li><a href="https://twitter.com/freebsdfndation/status/742456950676393984" rel="nofollow">FreeBSD Foundation recognizes the contributions of Bryan Drewery, Rod Grimes, Warren Block, &amp; Gleb Smirnoff </a></li>
<li><a href="https://twitter.com/__briancallahan/status/741854476340858880" rel="nofollow">A moment of silence and shots in memory in Benjamin Perrault @creepingfur </a></li>
<li><a href="https://twitter.com/Keltounet/status/741763867471155201" rel="nofollow">@gvnn3 sells the FreeBSD Foundation shirt off of his back for Charity </a></li>
<li><a href="https://twitter.com/cperciva/status/741375414967410688" rel="nofollow">Michael W. Lucas asks Matt Ahrens how to pronounce ZFS, “You can pronounce ZFS however you like, but if you pronounce it &#39;reiserfs&#39;, people might be confused.” </a></li>
<li><a href="https://twitter.com/BSDCan/status/741420633007874050" rel="nofollow">Sysadmin T-Shirt </a></li>
<li><a href="https://twitter.com/SeanChittenden/status/740904105388978176" rel="nofollow">FreeBSD Dev Summit ran out of room on the chalkboards listing accomplishments of 11.0 </a></li>
<li><a href="https://twitter.com/Keltounet/status/740928627471159296" rel="nofollow">List of things people have or want for FreeBSD 12 </a></li>
<li><a href="https://twitter.com/kprovst/status/741322268480049152?cn=bWVudGlvbg%3D%3D&refsrc=email" rel="nofollow">Matt Ahrens signing Allan’s ZFS book </a></li>
<li><a href="https://twitter.com/cperciva/status/741707948469157889" rel="nofollow">FreeBSD’s new marketing strategy </a></li>
<li><a href="https://twitter.com/HippyWizard/status/741768670704066560" rel="nofollow">Charity Auction: systemd whoopie cushion </a></li>
<li><a href="https://twitter.com/juliefriday/status/741948048788586496" rel="nofollow">Embarass OpenBSD’s @HenningBrauer by donating $10 to charity for a selfie with him wearing a Linux t-shirt </a></li>
<li><a href="https://twitter.com/GroffTheBSDGoat/status/742415390798716928" rel="nofollow">@GroffTheBSDGoat changes handlers, from @HenningBrauer to @GavinAtkinson </a></li>
</ul></li>
<li><a href="https://www.youtube.com/watch?v=AOidjSS7Hsg" rel="nofollow">Day 1 Video </a></li>
<li><a href="https://www.youtube.com/watch?v=z7pDnBO5wSM" rel="nofollow">Day 2 Video </a></li>
<li><a href="https://www.youtube.com/watch?v=z7pDnBO5wSM&feature=youtu.be&list=PLeF8ZihVdpFfoEV67dBSrKfA8ifpUr6qC&t=4440" rel="nofollow">Allan’s GELIBoot talk (day 2) </a>
***</li>
</ul>

<h3><a href="https://azure.microsoft.com/en-us/blog/freebsd-now-available-in-azure-marketplace/" rel="nofollow">Media Coverage of Microsoft + FreeBSD story</a></h3>

<ul>
<li>Microsoft has released their own custom image of FreeBSD 10.3 for the Azure Cloud</li>
<li>“This means that not only can you quickly bring-up a FreeBSD VM in Azure, but also that in the event you need technical support, Microsoft support engineers can assist.”</li>
<li>“Microsoft is the publisher of the FreeBSD image in the marketplace rather than the FreeBSD Foundation. The FreeBSD Foundation is supported by donations from the FreeBSD community, including companies that build their solutions on FreeBSD. They are not a solution provider or an ISV with a support organization but rather rely on a very active community that support one another. In order to ensure our customers have an enterprise SLA for their FreeBSD VMs running in Azure, we took on the work of building, testing, releasing and maintaining the image in order to remove that burden from the Foundation. We will continue to partner closely with the Foundation as we make further investments in FreeBSD on Hyper-V and in Azure.”</li>
<li>&quot;It&#39;s quite a significant milestone for FreeBSD community and for Microsoft to publish a supported FreeBSD image on Azure Marketplace. We really appreciate Microsoft&#39;s commitment and investment in FreeBSD project&quot;. - Justin T. Gibbs, President of FreeBSD Foundation</li>
<li>Microsoft took a FreeBSD 10.3-RELEASE image and added additional patches, most of which they have upstreamed but that were too late for the regular 10.3 release cycle.</li>
<li>Rather than requiring users to use a snapshot of the stable/10 branch, which would complicate the user experience, and complicate the job of the Microsoft support engineers, they created their own “certified” release</li>
<li>This allows Microsoft to selectively deploy errata fixes to the image as well</li>
<li>It is not clear how this affects update mechanisms like freebsd-update(8)</li>
<li><a href="http://www.theregister.co.uk/2016/06/09/microsoft_freebsd/" rel="nofollow">The Register </a></li>
<li><a href="http://www.theinquirer.net/inquirer/news/2461070/microsoft-creates-own-distribution-of-freebsd-for-azure-developers" rel="nofollow">The Inquirer </a></li>
<li><a href="http://www.infoworld.com/article/3082090/open-source-tools/is-microsoft-publishing-its-own-freebsd-yes-and-no.html" rel="nofollow">Infoworld </a></li>
<li><a href="http://thehackernews.com/2016/06/microsoft-azure-freebsd.html" rel="nofollow">The Hacker News </a></li>
<li><a href="http://windowsreport.com/microsoft-freebsd-10-3-ready-made-vm-image-azure/" rel="nofollow">Windows Report </a></li>
<li><a href="http://news.thewindowsclub.com/microsoft-freebsd-operating-system-84375/" rel="nofollow">Windows Club </a>
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/select-works-poorly" rel="nofollow">Select works poorly</a></h3>

<ul>
<li>“At the bottom of the OpenBSD man page for select is a little note. “Internally to the kernel, select() and pselect() work poorly if multiple processes wait on the same file descriptor.” There’s a similar warning in the poll man page. Where does this warning come from and what does it mean?”</li>
<li>Ted found that at first glance, OpenBSD’s select() appears to be quite bad:</li>
<li>“whenever some data gets written, we call wakeup(&amp;selwait);. Based on what we’ve seen so far, one can conclude that this is likely to be inefficient. Every time any socket has some data available, we wake up every selecting process in the system. Works poorly indeed.”</li>
<li>After further investigation, it turns out to not be quite as bad</li>
<li>When the select() is first setup, the PID of the process that cares about the FD is recorded in the selinfo struct</li>
<li>If a second process runs select() on the same FD, the SI_COLL (Select Collision) flag is set on the selinfo struct</li>
<li>When selwakeup() is called, if SI_COLL is set, all select()ing processes are woken up, and the sysctl kern.nselcoll is incremented. If the flag is not set, and only a single PID is waiting for activity on that FD, only that process is woken up</li>
<li>“This is not an intractable problem. kevent avoids it entirely. Other implementations may too. But practically, does it need to be solved? My laptop says it’s happened 43 times. A server with substantially more uptime says 0. Doesn’t seem so bad.”
***</li>
</ul>

<h2>Interview - Hans Petter Selasky - <a href="mailto:hps@freebsd.org" rel="nofollow">hps@freebsd.org</a> / <a href="https://twitter.com/user" rel="nofollow">@twitter</a></h2>

<ul>
<li>Designing FreeBSD’s USB drivers, hooking up a piano to FreeBSD &amp; more!
***</li>
</ul>

<h2>News Roundup</h2>

<ul>
<li><p><a href="http://www.tedunangst.com/flak/post/timeline-of-libexpat-random-vulnerability" rel="nofollow">Timeline of libexpat random vulnerability</a></p></li>
<li><p><a href="https://news.ycombinator.com/item?id=11804565" rel="nofollow">Do you use FreeBSD as web server? Why or why not?</a></p></li>
<li><p><a href="http://kristerw.blogspot.sg/2016/05/20-years-of-netbsd-code-bloat.html" rel="nofollow">20 years of NetBSD code Bloat</a></p></li>
<li><p><a href="https://jcs.org/statuses/2016/06/08/740606952149942272/" rel="nofollow">HP Chromebook 13 now booting OpenBSD</a></p></li>
<li><p><a href="https://web.stanford.edu/class/cs124/lec/124-UnixForPoets.pdf" rel="nofollow">UNIX for Poets </a></p></li>
<li><p><a href="https://distrowatch.com/weekly.php?issue=20160530#upgrades" rel="nofollow">Comparing live version upgrade methods</a></p></li>
<li><p><a href="https://www.reddit.com/r/BSD/comments/4n3flx/my_life_with_freebsd_on_a_thinkpad_x220/" rel="nofollow">My life with FreeBSD on a Thinkpad X220</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>145: At the Core of it all</title>
  <link>https://www.bsdnow.tv/145</link>
  <guid isPermaLink="false">95c07cb8-0807-4cdc-bd2f-80c2a089f669</guid>
  <pubDate>Wed, 08 Jun 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/95c07cb8-0807-4cdc-bd2f-80c2a089f669.mp3" length="51492820" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It’s BSDCan time! Allan and I are both enjoying what is sure to be a super-busy week, but don’t think we’ve forgotten about</itunes:subtitle>
  <itunes:duration>1:11:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It’s BSDCan time! Allan and I are both enjoying what is sure to be a super-busy week, but don’t think we’ve forgotten about&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and &amp;lt;br&amp;gt;
Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Benno Rice - &lt;a href="mailto:benno@freebsd.org" target="_blank" rel="nofollow noopener"&gt;benno@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/jeamland" target="_blank" rel="nofollow noopener"&gt;@jeamland&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Manager, OS &amp;amp; Networking at EMC Isilon&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=dIageYT0Vgg" target="_blank" rel="nofollow noopener"&gt;Emily Dunham: Community Automation &lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;1U Rackmount Server - 4 Bay Hot-Swap SAS/SATA Drive Bays 400W Redundant Power Supply  -  Single Socket Embedded CPU (48 cores) - 8 DIMM Slots with &lt;br&gt;
16GB DIMMs for a total of 128GB RAM – Dual Gigabit LAN, Dual 10GbE SFP+ and 1 x 40Gb QSFP+ port, (1) PCI-E Expansion Slots + IPMI Dedicated LAN - &lt;br&gt;
Cavium ThunderX ARM CN8890 48 Core ThunderX CPU - 2.5GHz per core&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;System has 128GB RAM, 4 x 2TB SATA HDD, Additional Intel i350 (2 x 1GbE) &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.tedunangst.com/flak/post/file-considered-harmful" target="_blank" rel="nofollow noopener"&gt;file considered harmful&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/problame/talkintrozfs2016" target="_blank" rel="nofollow noopener"&gt;An open source talk on ZFS. “Intro to ZFS” as a set of open source slides for the community to build on, and to reuse. Go give this talk at your local conference. &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160529145411" target="_blank" rel="nofollow noopener"&gt;ARMv7 now has a bootloader&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=300966" target="_blank" rel="nofollow noopener"&gt;SHA256/512 speed improvements in FreeBSD 11 &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interview_with" target="_blank" rel="nofollow noopener"&gt;pkgsrc 50th release interviews - Joerg Sonnenberg&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249636.html" target="_blank" rel="nofollow noopener"&gt;DFly versus PC-BSD on a Laptop&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=301059" target="_blank" rel="nofollow noopener"&gt;FreeBSD ifconfig can print subnet masks in CIDR or dotted-quad, finally &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/4Y6VYSyN" target="_blank" rel="nofollow noopener"&gt; Eli - Getting rid of ports?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/w8hsMtbc" target="_blank" rel="nofollow noopener"&gt; Morgan - Best way to admin jails?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/mqSJk0pP" target="_blank" rel="nofollow noopener"&gt; Simon - Use existing pkgs in poudriere&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/1M7HLAXs" target="_blank" rel="nofollow noopener"&gt; Pete - Lots of Q’s&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/NTVBvtC5" target="_blank" rel="nofollow noopener"&gt; Van - Made the switch&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It’s BSDCan time! Allan and I are both enjoying what is sure to be a super-busy week, but don’t think we’ve forgotten about</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Benno Rice - <a href="mailto:benno@freebsd.org" rel="nofollow">benno@freebsd.org</a> / <a href="https://twitter.com/jeamland" rel="nofollow">@jeamland</a></h2>

<ul>
<li><p>Manager, OS &amp; Networking at EMC Isilon</p></li>
<li><p><a href="https://www.youtube.com/watch?v=dIageYT0Vgg" rel="nofollow">Emily Dunham: Community Automation </a></p>

<hr></li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><p>1U Rackmount Server - 4 Bay Hot-Swap SAS/SATA Drive Bays 400W Redundant Power Supply  -  Single Socket Embedded CPU (48 cores) - 8 DIMM Slots with <br>
16GB DIMMs for a total of 128GB RAM – Dual Gigabit LAN, Dual 10GbE SFP+ and 1 x 40Gb QSFP+ port, (1) PCI-E Expansion Slots + IPMI Dedicated LAN - <br>
Cavium ThunderX ARM CN8890 48 Core ThunderX CPU - 2.5GHz per core</p></li>
<li><p>System has 128GB RAM, 4 x 2TB SATA HDD, Additional Intel i350 (2 x 1GbE) </p>

<hr></li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://www.tedunangst.com/flak/post/file-considered-harmful" rel="nofollow">file considered harmful</a></p></li>
<li><p><a href="https://github.com/problame/talkintrozfs2016" rel="nofollow">An open source talk on ZFS. “Intro to ZFS” as a set of open source slides for the community to build on, and to reuse. Go give this talk at your local conference. </a> </p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160529145411" rel="nofollow">ARMv7 now has a bootloader</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=300966" rel="nofollow">SHA256/512 speed improvements in FreeBSD 11 </a></p></li>
<li><p><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interview_with" rel="nofollow">pkgsrc 50th release interviews - Joerg Sonnenberg</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249636.html" rel="nofollow">DFly versus PC-BSD on a Laptop</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=301059" rel="nofollow">FreeBSD ifconfig can print subnet masks in CIDR or dotted-quad, finally </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/4Y6VYSyN" rel="nofollow"> Eli - Getting rid of ports?</a></li>
<li><a href="http://pastebin.com/w8hsMtbc" rel="nofollow"> Morgan - Best way to admin jails?</a></li>
<li><a href="http://pastebin.com/mqSJk0pP" rel="nofollow"> Simon - Use existing pkgs in poudriere</a></li>
<li><a href="http://pastebin.com/1M7HLAXs" rel="nofollow"> Pete - Lots of Q’s</a></li>
<li><a href="http://pastebin.com/NTVBvtC5" rel="nofollow"> Van - Made the switch</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It’s BSDCan time! Allan and I are both enjoying what is sure to be a super-busy week, but don’t think we’ve forgotten about</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and <br>
Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" <br>
alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Benno Rice - <a href="mailto:benno@freebsd.org" rel="nofollow">benno@freebsd.org</a> / <a href="https://twitter.com/jeamland" rel="nofollow">@jeamland</a></h2>

<ul>
<li><p>Manager, OS &amp; Networking at EMC Isilon</p></li>
<li><p><a href="https://www.youtube.com/watch?v=dIageYT0Vgg" rel="nofollow">Emily Dunham: Community Automation </a></p>

<hr></li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><p>1U Rackmount Server - 4 Bay Hot-Swap SAS/SATA Drive Bays 400W Redundant Power Supply  -  Single Socket Embedded CPU (48 cores) - 8 DIMM Slots with <br>
16GB DIMMs for a total of 128GB RAM – Dual Gigabit LAN, Dual 10GbE SFP+ and 1 x 40Gb QSFP+ port, (1) PCI-E Expansion Slots + IPMI Dedicated LAN - <br>
Cavium ThunderX ARM CN8890 48 Core ThunderX CPU - 2.5GHz per core</p></li>
<li><p>System has 128GB RAM, 4 x 2TB SATA HDD, Additional Intel i350 (2 x 1GbE) </p>

<hr></li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://www.tedunangst.com/flak/post/file-considered-harmful" rel="nofollow">file considered harmful</a></p></li>
<li><p><a href="https://github.com/problame/talkintrozfs2016" rel="nofollow">An open source talk on ZFS. “Intro to ZFS” as a set of open source slides for the community to build on, and to reuse. Go give this talk at your local conference. </a> </p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160529145411" rel="nofollow">ARMv7 now has a bootloader</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=300966" rel="nofollow">SHA256/512 speed improvements in FreeBSD 11 </a></p></li>
<li><p><a href="http://blog.netbsd.org/tnf/entry/pkgsrc_50th_release_interview_with" rel="nofollow">pkgsrc 50th release interviews - Joerg Sonnenberg</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249636.html" rel="nofollow">DFly versus PC-BSD on a Laptop</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=301059" rel="nofollow">FreeBSD ifconfig can print subnet masks in CIDR or dotted-quad, finally </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/4Y6VYSyN" rel="nofollow"> Eli - Getting rid of ports?</a></li>
<li><a href="http://pastebin.com/w8hsMtbc" rel="nofollow"> Morgan - Best way to admin jails?</a></li>
<li><a href="http://pastebin.com/mqSJk0pP" rel="nofollow"> Simon - Use existing pkgs in poudriere</a></li>
<li><a href="http://pastebin.com/1M7HLAXs" rel="nofollow"> Pete - Lots of Q’s</a></li>
<li><a href="http://pastebin.com/NTVBvtC5" rel="nofollow"> Van - Made the switch</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>144: The PF life</title>
  <link>https://www.bsdnow.tv/144</link>
  <guid isPermaLink="false">88258e16-7914-442e-9f73-ae58b6a26468</guid>
  <pubDate>Wed, 01 Jun 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/88258e16-7914-442e-9f73-ae58b6a26468.mp3" length="46038964" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It’s only one-week away from BSDCan, both Allan and I are excited to meet some of you in person! However, the show keeps on</itunes:subtitle>
  <itunes:duration>1:03:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It’s only one-week away from BSDCan, both Allan and I are excited to meet some of you in person! However, the show keeps on&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.dotsecurity.io/" target="_blank" rel="nofollow noopener"&gt;dotSecurity 2016 - Theo de Raadt - Privilege Separation and Pledge&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=a_EYdzGyNWs" target="_blank" rel="nofollow noopener"&gt;Video&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.openbsd.org/papers/dot2016.pdf" target="_blank" rel="nofollow noopener"&gt;Slides&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Interested in Privilege Separation and security in general? If so, then you are in for a treat, we have both the video and slides from Theo de Raadt at dotSecurity 2016.&lt;/li&gt;
&lt;li&gt;Specifically the the talk starts off looking at Pledge (no copyright issues with the pictures I hope??) and how their NTP daemon uses it.&lt;/li&gt;
&lt;li&gt;After going through some internals, Theo reveals that around 10% of programs “pledged” so far were found to be trying to do actions outside of their security scope.&lt;/li&gt;
&lt;li&gt;On the future-work side, they mention going back and looking at OpenSSH privilege separation next, as well as working with other OS’s that may want pledge support.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2016-May/004471.html" target="_blank" rel="nofollow noopener"&gt;bhyve now supports UEFI GOP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The log awaited UEFI GOP (&lt;a href="https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#GOP" target="_blank" rel="nofollow noopener"&gt;Graphics Output Protocol&lt;/a&gt;) features has landed in bhyve&lt;/li&gt;
&lt;li&gt;This provides emulated graphics via an internal VNC server, allowing users to have full graphical access to the guest OS&lt;/li&gt;
&lt;li&gt;This allows installation of Windows guests without needing to create a modified ISO with an unattended installation script&lt;/li&gt;
&lt;li&gt;The code has not actually landed in FreeBSD head yet, but has been committed to a project branch&lt;/li&gt;
&lt;li&gt;Following a few simple commands, you can compile the new bhyve binary on your -CURRENT system and get started right away&lt;/li&gt;
&lt;li&gt;This feature is expected to be included in the upcoming FreeBSD 11.0&lt;/li&gt;
&lt;li&gt;This commit drop also brings with it:

&lt;ul&gt;
&lt;li&gt;XHCI -- an emulated usb tablet device that provides exact mouse positioning in supported OSs&lt;/li&gt;
&lt;li&gt;PS2 mouse for fallback if the guest does not support XHCI (Windows 7)&lt;/li&gt;
&lt;li&gt;PS2 keyboard&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;“The code has been tested with Windows 7/8/8.1/10 and Server 2k12/2k16, Ubuntu 15.10, and FreeBSD 10.3/11-CURRENT”&lt;/li&gt;
&lt;li&gt;“For VNC clients, TightVNC, TigherVNC, and RealVNC (aka VNC Viewer) have been tested on various hosts. The OSX VNC client is known not to work.”&lt;/li&gt;
&lt;li&gt;The VNC server supports an optional ‘wait’ parameter, that causes the VM to not actually boot until the VNC client connects, allowing you to interrupt the boot process if need be&lt;/li&gt;
&lt;li&gt;&lt;a href="http://justinholcomb.me/blog/2016/05/28/bhyve-uefi-gop-support.html" target="_blank" rel="nofollow noopener"&gt;Related user blog post &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=300829" target="_blank" rel="nofollow noopener"&gt;SVN commit&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=300906" target="_blank" rel="nofollow noopener"&gt;zfsd lands in FreeBSD HEAD, in time for 11.0-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;zfsd has been committed to FreeBSD -CURRENT in time to be included in FreeBSD 11.0&lt;/li&gt;
&lt;li&gt;zfsd is the missing piece required to make ‘hot spares’ work properly in FreeBSD ZFS&lt;/li&gt;
&lt;li&gt;“zfsd attempts to resolve ZFS faults that the kernel can't resolve by itself. It listens to devctl(4) events, which is how the kernel notifies of events such as I/O errors and disk removals.  Zfsd attempts to resolve these faults by activating or deactivating hotspares and onlining offline vdevs.”&lt;/li&gt;
&lt;li&gt;“The administrator never interacts with zfsd directly.  Instead, he controls its behavior indirectly through zpool configuration.  There are two ways to influence zfsd: assigning hotspares and setting pool properties.  Currently, only the &lt;em&gt;autoreplace&lt;/em&gt; property has any effect.  See zpool(8) for details.”&lt;/li&gt;
&lt;li&gt;So, what example does it do?&lt;/li&gt;
&lt;li&gt;Device Removal: “When a leaf vdev disappears, zfsd will activate any available hotspare.”&lt;/li&gt;
&lt;li&gt;Device Arrival: “When a new GEOM device appears, zfsd will attempt to read its ZFS label, if any.  If it matches a previously removed vdev on an active pool, zfsd will online it.  Once resilvering completes, any active hotspare will detach automatically.”&lt;/li&gt;
&lt;li&gt;So if you disconnect a drive, then reconnect it, it will automatically be brought back online. Since ZFS is smart, the resilver will only have to copy data that has changed since the device went offline.&lt;/li&gt;
&lt;li&gt;“If the new device has no ZFS label but its physical path matches the physical path of a previously removed vdev on an active pool, and that pool has the autoreplace property set, then zfsd will replace the missing vdev with the newly arrived device.  Once resilvering completes, any active hotspare will detach automatically.”&lt;/li&gt;
&lt;li&gt;If the new drive is in the same slot in your hot swap array as a failed device, it will be used as a replacement immediately.&lt;/li&gt;
&lt;li&gt;vdev degrade or fault events: “If a vdev becomes degraded or faulted, zfsd will activate any available hotspare. If a leaf vdev generates more than 50 I/O errors in a 60 second period, then zfsd will mark that vdev as FAULTED.  zfs(4) will no longer issue any I/Os to it.  zfsd will activate 
a hotspare if one is available.” Same for checksum errors.&lt;/li&gt;
&lt;li&gt;So if zfsd detects a drive is going bad, it brings the hotspare online before it is too late&lt;/li&gt;
&lt;li&gt;Spare addition: “If the system administrator adds a hotspare to a pool that is already degraded, zfsd will activate the spare.”&lt;/li&gt;
&lt;li&gt;Resilver complete: “zfsd will detach any hotspare once a permanent replacement finishes resilvering.”&lt;/li&gt;
&lt;li&gt;Physical path change: “If the physical path of an existing disk changes, zfsd will attempt to replace any missing disk with the same physical path, if its pool's autoreplace property is set.”&lt;/li&gt;
&lt;li&gt;In general, this tool means less reliance on the system administrator to keep the pool healthy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160527203200" target="_blank" rel="nofollow noopener"&gt;W&lt;sup&gt;X&lt;/sup&gt; now mandatory in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve talked a bit about W&lt;sup&gt;X&lt;/sup&gt; in the past. (Refresher: Memory being writable and executable at once)&lt;/li&gt;
&lt;li&gt;Well, this major security no-no is no-more on OpenBSD. Theo has committed a change which now prevents violations of this policy:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “W&lt;sup&gt;X&lt;/sup&gt; violations are no longer permitted by default.  A kernel log message is generated, and mprotect/mmap return ENOTSUP.  If the sysctl(8) flag kern.wxabort is set then a SIGABRT occurs instead, for gdb use or coredump creation.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There are a few cases where you may still need W&lt;sup&gt;X,&lt;/sup&gt; which Theo points out can be enabled on a file-system basis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “W&lt;sup&gt;X&lt;/sup&gt; violating programs can be permitted on a ffs/nfs filesystem-basis, using the "wxallowed" mount option.  One day far in the future upstream software developers will understand that W&lt;sup&gt;X&lt;/sup&gt; violations are a tremendously risky practice and that style of programming will be banished outright.  Until then, we recommend most users need to use the wxallowed option on their /usr/local filesystem.  At least your other filesystems don't permit such programs.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This is a great ability to grow, since now users can begin doing auditing of programs that violate this principle and making noise to upstream.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Kristof Provost - &lt;a href="mailto:kp@freebsd.org" target="_blank" rel="nofollow noopener"&gt;kp@freebsd.org&lt;/a&gt; &lt;a href="https://twitter.com/kprovst" target="_blank" rel="nofollow noopener"&gt;@kprovst&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;pf improvements on FreeBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://ericmccorkleblog.wordpress.com/2016/05/28/freebsd-geli-support/" target="_blank" rel="nofollow noopener"&gt;GELI Support for the EFI Loader &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve had Allan’s work to bring GELI support to the GPT / BIOS / ZFS loader for a while now, but the missing piece has been support for EFI.&lt;/li&gt;
&lt;li&gt;No longer, Eric McCorkle has posted a blog entry (with relevant github links) introducing us to his work to bring GELI encryption support to EFI.&lt;/li&gt;
&lt;li&gt;First the bad-news. This won’t make it into 11.0. (Maybe PC-BSD, TBD)&lt;/li&gt;
&lt;li&gt;Next he explains why this is more than just a new feature, but a re-factor of the EFI boot code:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I have already written extensively about my EFI refactoring here.  The reason for undertaking this effort, however, was driven by GELI support.  Early in my work on this, I had implemented a non-EFI “providers” framework in boot1 in order to support the notion of disk partitions that may contain sub-partitions.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This was deeply unsatisfying to me for several reasons:

&lt;ul&gt;
&lt;li&gt;It implemented a lot of the same functionality that exists in the EFI framework.&lt;/li&gt;
&lt;li&gt;It involved implementing a GPT partition driver to deal with partition tables inside GELI partitions (GPT detection and support is guaranteed by the EFI spec).&lt;/li&gt;
&lt;li&gt;The interface between the EFI framework and the custom “providers” framework was awkward.&lt;/li&gt;
&lt;li&gt;The driver was completely boot1-specific, and exporting it to something like GRUB probably involved a total rewrite.&lt;/li&gt;
&lt;li&gt;Implementing it within loader was going to involve a lot of code duplication.&lt;/li&gt;
&lt;li&gt;There was no obvious was to pass keys between boot1, loader, and the kernel.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;With the issues known, Eric seems pleased with the results of the conversion so far:

&lt;ul&gt;
&lt;li&gt;The GELI driver can be extracted from the FreeBSD codebase without too much trouble.&lt;/li&gt;
&lt;li&gt;While I was unable to go all the way to the EFI driver model, the only blocker is the bcache code, and once that is resolved, we can have hotplug support in the boot loader!&lt;/li&gt;
&lt;li&gt;The boot1 and loader codebases are now sharing all the backend drivers, and boot1 has been reduced to one very small source file.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;An interesting read, looking forward to playing with EFI more in the future!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2016-michael-lucas/" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD 2016: Michael W. Lucas&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;On this edition of “Faces of FreeBSD”, Michael W Lucas tells the story of how he got started with FreeBSD&lt;/li&gt;
&lt;li&gt;After an amusing re-telling of his childhood (The words “Purina Monkey Chow” were mentioned), he then tells us how he got into BSD.&lt;/li&gt;
&lt;li&gt;His being thrown into the project may sound familiar to many: &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I came in at 11 PM one night and was told “The DNS administrator just got walked out the door. You’re the new lead DNS administrator. Make those servers work. Good luck.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;From there (because he wanted more sleep), he began ripping out the systems that had been failing and waking him up at night. Good-bye UnixWare, Good-bye Solaris, hello BSD!&lt;/li&gt;
&lt;li&gt;A very amusing read, check it out!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=ugct9-Mm7Ls" target="_blank" rel="nofollow noopener"&gt;High Availability with PostgreSQL on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A talk by Sean Chittenden, who we interviewed previously on episode &lt;a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" target="_blank" rel="nofollow noopener"&gt;Episode 95 &lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Explains how to setup Multi Data Center High Availability for PostgreSQL using consul&lt;/li&gt;
&lt;li&gt;Goes into how consul works, how it does the election, the gossip protocol, etc&lt;/li&gt;
&lt;li&gt;The HA setup uses DNS Failover, and the pros and cons of that approach are discussed&lt;/li&gt;
&lt;li&gt;Then he walks through the implementation details, and example configuration
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.bsddesktop.com/images/" target="_blank" rel="nofollow noopener"&gt;New FreeBSD i915 testing images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Still need users to test the Linux Kernel 4.6 DRM update to FreeBSD’s graphics stack&lt;/li&gt;
&lt;li&gt;Download the test image and write it to a USB stick and boot from it&lt;/li&gt;
&lt;li&gt;It will not modify your installed system, it runs entirely off of the USB drive&lt;/li&gt;
&lt;li&gt;Allows you to test the updated drivers without having to install the development branch on your device&lt;/li&gt;
&lt;li&gt; you can tell them that ATI/AMD support will be coming shortly&lt;/li&gt;
&lt;li&gt; and that stability has been steadily improving&lt;/li&gt;
&lt;li&gt; and that I'll do another announcement as soon as I've had a chance to test the newest Xorg bits
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.cotcli.com/post/The-Very-Basics/" target="_blank" rel="nofollow noopener"&gt;Comfortable on the CLI: Series Part 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://gist.github.com/gonzopancho/8e7df7a826e9a2949b36ed2a9d30312e" target="_blank" rel="nofollow noopener"&gt;FreeBSD Booting on the Netgate uFW, a smaller-than-a-raspberry-pi dual port firewall&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/gonzopancho/status/737874921435594753" target="_blank" rel="nofollow noopener"&gt;Picture of uFW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://gist.github.com/gonzopancho/8f20b50487a4f7de56e99448866a147d" target="_blank" rel="nofollow noopener"&gt;uFW OpenSSL Benchmarks&lt;/a&gt;&lt;br&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It’s only one-week away from BSDCan, both Allan and I are excited to meet some of you in person! However, the show keeps on</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.dotsecurity.io/" rel="nofollow">dotSecurity 2016 - Theo de Raadt - Privilege Separation and Pledge</a></h3>

<ul>
<li><a href="https://www.youtube.com/watch?v=a_EYdzGyNWs" rel="nofollow">Video</a> </li>
<li><a href="https://www.openbsd.org/papers/dot2016.pdf" rel="nofollow">Slides</a> </li>
<li>Interested in Privilege Separation and security in general? If so, then you are in for a treat, we have both the video and slides from Theo de Raadt at dotSecurity 2016.</li>
<li>Specifically the the talk starts off looking at Pledge (no copyright issues with the pictures I hope??) and how their NTP daemon uses it.</li>
<li>After going through some internals, Theo reveals that around 10% of programs “pledged” so far were found to be trying to do actions outside of their security scope.</li>
<li>On the future-work side, they mention going back and looking at OpenSSH privilege separation next, as well as working with other OS’s that may want pledge support.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2016-May/004471.html" rel="nofollow">bhyve now supports UEFI GOP</a></h3>

<ul>
<li>The log awaited UEFI GOP (<a href="https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#GOP" rel="nofollow">Graphics Output Protocol</a>) features has landed in bhyve</li>
<li>This provides emulated graphics via an internal VNC server, allowing users to have full graphical access to the guest OS</li>
<li>This allows installation of Windows guests without needing to create a modified ISO with an unattended installation script</li>
<li>The code has not actually landed in FreeBSD head yet, but has been committed to a project branch</li>
<li>Following a few simple commands, you can compile the new bhyve binary on your -CURRENT system and get started right away</li>
<li>This feature is expected to be included in the upcoming FreeBSD 11.0</li>
<li>This commit drop also brings with it:

<ul>
<li>XHCI -- an emulated usb tablet device that provides exact mouse positioning in supported OSs</li>
<li>PS2 mouse for fallback if the guest does not support XHCI (Windows 7)</li>
<li>PS2 keyboard</li>
</ul></li>
<li>“The code has been tested with Windows 7/8/8.1/10 and Server 2k12/2k16, Ubuntu 15.10, and FreeBSD 10.3/11-CURRENT”</li>
<li>“For VNC clients, TightVNC, TigherVNC, and RealVNC (aka VNC Viewer) have been tested on various hosts. The OSX VNC client is known not to work.”</li>
<li>The VNC server supports an optional ‘wait’ parameter, that causes the VM to not actually boot until the VNC client connects, allowing you to interrupt the boot process if need be</li>
<li><a href="http://justinholcomb.me/blog/2016/05/28/bhyve-uefi-gop-support.html" rel="nofollow">Related user blog post </a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=300829" rel="nofollow">SVN commit</a>
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=300906" rel="nofollow">zfsd lands in FreeBSD HEAD, in time for 11.0-RELEASE</a></h3>

<ul>
<li>zfsd has been committed to FreeBSD -CURRENT in time to be included in FreeBSD 11.0</li>
<li>zfsd is the missing piece required to make ‘hot spares’ work properly in FreeBSD ZFS</li>
<li>“zfsd attempts to resolve ZFS faults that the kernel can&#39;t resolve by itself. It listens to devctl(4) events, which is how the kernel notifies of events such as I/O errors and disk removals.  Zfsd attempts to resolve these faults by activating or deactivating hotspares and onlining offline vdevs.”</li>
<li>“The administrator never interacts with zfsd directly.  Instead, he controls its behavior indirectly through zpool configuration.  There are two ways to influence zfsd: assigning hotspares and setting pool properties.  Currently, only the <em>autoreplace</em> property has any effect.  See zpool(8) for details.”</li>
<li>So, what example does it do?</li>
<li>Device Removal: “When a leaf vdev disappears, zfsd will activate any available hotspare.”</li>
<li>Device Arrival: “When a new GEOM device appears, zfsd will attempt to read its ZFS label, if any.  If it matches a previously removed vdev on an active pool, zfsd will online it.  Once resilvering completes, any active hotspare will detach automatically.”</li>
<li>So if you disconnect a drive, then reconnect it, it will automatically be brought back online. Since ZFS is smart, the resilver will only have to copy data that has changed since the device went offline.</li>
<li>“If the new device has no ZFS label but its physical path matches the physical path of a previously removed vdev on an active pool, and that pool has the autoreplace property set, then zfsd will replace the missing vdev with the newly arrived device.  Once resilvering completes, any active hotspare will detach automatically.”</li>
<li>If the new drive is in the same slot in your hot swap array as a failed device, it will be used as a replacement immediately.</li>
<li>vdev degrade or fault events: “If a vdev becomes degraded or faulted, zfsd will activate any available hotspare. If a leaf vdev generates more than 50 I/O errors in a 60 second period, then zfsd will mark that vdev as FAULTED.  zfs(4) will no longer issue any I/Os to it.  zfsd will activate 
a hotspare if one is available.” Same for checksum errors.</li>
<li>So if zfsd detects a drive is going bad, it brings the hotspare online before it is too late</li>
<li>Spare addition: “If the system administrator adds a hotspare to a pool that is already degraded, zfsd will activate the spare.”</li>
<li>Resilver complete: “zfsd will detach any hotspare once a permanent replacement finishes resilvering.”</li>
<li>Physical path change: “If the physical path of an existing disk changes, zfsd will attempt to replace any missing disk with the same physical path, if its pool&#39;s autoreplace property is set.”</li>
<li>In general, this tool means less reliance on the system administrator to keep the pool healthy
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160527203200" rel="nofollow">W<sup>X</sup> now mandatory in OpenBSD</a></h3>

<ul>
<li>We’ve talked a bit about W<sup>X</sup> in the past. (Refresher: Memory being writable and executable at once)</li>
<li>Well, this major security no-no is no-more on OpenBSD. Theo has committed a change which now prevents violations of this policy:</li>
</ul>

<blockquote>
<p>“W<sup>X</sup> violations are no longer permitted by default.  A kernel log message is generated, and mprotect/mmap return ENOTSUP.  If the sysctl(8) flag kern.wxabort is set then a SIGABRT occurs instead, for gdb use or coredump creation.”</p>
</blockquote>

<ul>
<li>There are a few cases where you may still need W<sup>X,</sup> which Theo points out can be enabled on a file-system basis.</li>
</ul>

<blockquote>
<p>“W<sup>X</sup> violating programs can be permitted on a ffs/nfs filesystem-basis, using the &quot;wxallowed&quot; mount option.  One day far in the future upstream software developers will understand that W<sup>X</sup> violations are a tremendously risky practice and that style of programming will be banished outright.  Until then, we recommend most users need to use the wxallowed option on their /usr/local filesystem.  At least your other filesystems don&#39;t permit such programs.”</p>
</blockquote>

<ul>
<li>This is a great ability to grow, since now users can begin doing auditing of programs that violate this principle and making noise to upstream.
***</li>
</ul>

<h2>Interview - Kristof Provost - <a href="mailto:kp@freebsd.org" rel="nofollow">kp@freebsd.org</a> <a href="https://twitter.com/kprovst" rel="nofollow">@kprovst</a></h2>

<ul>
<li>pf improvements on FreeBSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://ericmccorkleblog.wordpress.com/2016/05/28/freebsd-geli-support/" rel="nofollow">GELI Support for the EFI Loader </a></h3>

<ul>
<li>We’ve had Allan’s work to bring GELI support to the GPT / BIOS / ZFS loader for a while now, but the missing piece has been support for EFI.</li>
<li>No longer, Eric McCorkle has posted a blog entry (with relevant github links) introducing us to his work to bring GELI encryption support to EFI.</li>
<li>First the bad-news. This won’t make it into 11.0. (Maybe PC-BSD, TBD)</li>
<li>Next he explains why this is more than just a new feature, but a re-factor of the EFI boot code:</li>
</ul>

<blockquote>
<p>I have already written extensively about my EFI refactoring here.  The reason for undertaking this effort, however, was driven by GELI support.  Early in my work on this, I had implemented a non-EFI “providers” framework in boot1 in order to support the notion of disk partitions that may contain sub-partitions.</p>
</blockquote>

<ul>
<li>This was deeply unsatisfying to me for several reasons:

<ul>
<li>It implemented a lot of the same functionality that exists in the EFI framework.</li>
<li>It involved implementing a GPT partition driver to deal with partition tables inside GELI partitions (GPT detection and support is guaranteed by the EFI spec).</li>
<li>The interface between the EFI framework and the custom “providers” framework was awkward.</li>
<li>The driver was completely boot1-specific, and exporting it to something like GRUB probably involved a total rewrite.</li>
<li>Implementing it within loader was going to involve a lot of code duplication.</li>
<li>There was no obvious was to pass keys between boot1, loader, and the kernel.</li>
</ul></li>
<li>With the issues known, Eric seems pleased with the results of the conversion so far:

<ul>
<li>The GELI driver can be extracted from the FreeBSD codebase without too much trouble.</li>
<li>While I was unable to go all the way to the EFI driver model, the only blocker is the bcache code, and once that is resolved, we can have hotplug support in the boot loader!</li>
<li>The boot1 and loader codebases are now sharing all the backend drivers, and boot1 has been reduced to one very small source file.</li>
</ul></li>
<li>An interesting read, looking forward to playing with EFI more in the future!
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2016-michael-lucas/" rel="nofollow">Faces of FreeBSD 2016: Michael W. Lucas</a></h3>

<ul>
<li>On this edition of “Faces of FreeBSD”, Michael W Lucas tells the story of how he got started with FreeBSD</li>
<li>After an amusing re-telling of his childhood (The words “Purina Monkey Chow” were mentioned), he then tells us how he got into BSD.</li>
<li>His being thrown into the project may sound familiar to many: </li>
</ul>

<blockquote>
<p>I came in at 11 PM one night and was told “The DNS administrator just got walked out the door. You’re the new lead DNS administrator. Make those servers work. Good luck.”</p>
</blockquote>

<ul>
<li>From there (because he wanted more sleep), he began ripping out the systems that had been failing and waking him up at night. Good-bye UnixWare, Good-bye Solaris, hello BSD!</li>
<li>A very amusing read, check it out!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=ugct9-Mm7Ls" rel="nofollow">High Availability with PostgreSQL on FreeBSD</a></h3>

<ul>
<li>A talk by Sean Chittenden, who we interviewed previously on episode <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">Episode 95 </a></li>
<li>Explains how to setup Multi Data Center High Availability for PostgreSQL using consul</li>
<li>Goes into how consul works, how it does the election, the gossip protocol, etc</li>
<li>The HA setup uses DNS Failover, and the pros and cons of that approach are discussed</li>
<li>Then he walks through the implementation details, and example configuration
***</li>
</ul>

<h3><a href="http://www.bsddesktop.com/images/" rel="nofollow">New FreeBSD i915 testing images</a></h3>

<ul>
<li>Still need users to test the Linux Kernel 4.6 DRM update to FreeBSD’s graphics stack</li>
<li>Download the test image and write it to a USB stick and boot from it</li>
<li>It will not modify your installed system, it runs entirely off of the USB drive</li>
<li>Allows you to test the updated drivers without having to install the development branch on your device</li>
<li><mmacy> you can tell them that ATI/AMD support will be coming shortly</li>
<li><mmacy> and that stability has been steadily improving</li>
<li><mmacy> and that I&#39;ll do another announcement as soon as I&#39;ve had a chance to test the newest Xorg bits
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.cotcli.com/post/The-Very-Basics/" rel="nofollow">Comfortable on the CLI: Series Part 1</a></li>
<li><a href="https://gist.github.com/gonzopancho/8e7df7a826e9a2949b36ed2a9d30312e" rel="nofollow">FreeBSD Booting on the Netgate uFW, a smaller-than-a-raspberry-pi dual port firewall</a> </li>
<li><a href="https://twitter.com/gonzopancho/status/737874921435594753" rel="nofollow">Picture of uFW</a> </li>
<li><a href="https://gist.github.com/gonzopancho/8f20b50487a4f7de56e99448866a147d" rel="nofollow">uFW OpenSSL Benchmarks</a><br>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It’s only one-week away from BSDCan, both Allan and I are excited to meet some of you in person! However, the show keeps on</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.dotsecurity.io/" rel="nofollow">dotSecurity 2016 - Theo de Raadt - Privilege Separation and Pledge</a></h3>

<ul>
<li><a href="https://www.youtube.com/watch?v=a_EYdzGyNWs" rel="nofollow">Video</a> </li>
<li><a href="https://www.openbsd.org/papers/dot2016.pdf" rel="nofollow">Slides</a> </li>
<li>Interested in Privilege Separation and security in general? If so, then you are in for a treat, we have both the video and slides from Theo de Raadt at dotSecurity 2016.</li>
<li>Specifically the the talk starts off looking at Pledge (no copyright issues with the pictures I hope??) and how their NTP daemon uses it.</li>
<li>After going through some internals, Theo reveals that around 10% of programs “pledged” so far were found to be trying to do actions outside of their security scope.</li>
<li>On the future-work side, they mention going back and looking at OpenSSH privilege separation next, as well as working with other OS’s that may want pledge support.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2016-May/004471.html" rel="nofollow">bhyve now supports UEFI GOP</a></h3>

<ul>
<li>The log awaited UEFI GOP (<a href="https://en.wikipedia.org/wiki/Unified_Extensible_Firmware_Interface#GOP" rel="nofollow">Graphics Output Protocol</a>) features has landed in bhyve</li>
<li>This provides emulated graphics via an internal VNC server, allowing users to have full graphical access to the guest OS</li>
<li>This allows installation of Windows guests without needing to create a modified ISO with an unattended installation script</li>
<li>The code has not actually landed in FreeBSD head yet, but has been committed to a project branch</li>
<li>Following a few simple commands, you can compile the new bhyve binary on your -CURRENT system and get started right away</li>
<li>This feature is expected to be included in the upcoming FreeBSD 11.0</li>
<li>This commit drop also brings with it:

<ul>
<li>XHCI -- an emulated usb tablet device that provides exact mouse positioning in supported OSs</li>
<li>PS2 mouse for fallback if the guest does not support XHCI (Windows 7)</li>
<li>PS2 keyboard</li>
</ul></li>
<li>“The code has been tested with Windows 7/8/8.1/10 and Server 2k12/2k16, Ubuntu 15.10, and FreeBSD 10.3/11-CURRENT”</li>
<li>“For VNC clients, TightVNC, TigherVNC, and RealVNC (aka VNC Viewer) have been tested on various hosts. The OSX VNC client is known not to work.”</li>
<li>The VNC server supports an optional ‘wait’ parameter, that causes the VM to not actually boot until the VNC client connects, allowing you to interrupt the boot process if need be</li>
<li><a href="http://justinholcomb.me/blog/2016/05/28/bhyve-uefi-gop-support.html" rel="nofollow">Related user blog post </a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=300829" rel="nofollow">SVN commit</a>
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=300906" rel="nofollow">zfsd lands in FreeBSD HEAD, in time for 11.0-RELEASE</a></h3>

<ul>
<li>zfsd has been committed to FreeBSD -CURRENT in time to be included in FreeBSD 11.0</li>
<li>zfsd is the missing piece required to make ‘hot spares’ work properly in FreeBSD ZFS</li>
<li>“zfsd attempts to resolve ZFS faults that the kernel can&#39;t resolve by itself. It listens to devctl(4) events, which is how the kernel notifies of events such as I/O errors and disk removals.  Zfsd attempts to resolve these faults by activating or deactivating hotspares and onlining offline vdevs.”</li>
<li>“The administrator never interacts with zfsd directly.  Instead, he controls its behavior indirectly through zpool configuration.  There are two ways to influence zfsd: assigning hotspares and setting pool properties.  Currently, only the <em>autoreplace</em> property has any effect.  See zpool(8) for details.”</li>
<li>So, what example does it do?</li>
<li>Device Removal: “When a leaf vdev disappears, zfsd will activate any available hotspare.”</li>
<li>Device Arrival: “When a new GEOM device appears, zfsd will attempt to read its ZFS label, if any.  If it matches a previously removed vdev on an active pool, zfsd will online it.  Once resilvering completes, any active hotspare will detach automatically.”</li>
<li>So if you disconnect a drive, then reconnect it, it will automatically be brought back online. Since ZFS is smart, the resilver will only have to copy data that has changed since the device went offline.</li>
<li>“If the new device has no ZFS label but its physical path matches the physical path of a previously removed vdev on an active pool, and that pool has the autoreplace property set, then zfsd will replace the missing vdev with the newly arrived device.  Once resilvering completes, any active hotspare will detach automatically.”</li>
<li>If the new drive is in the same slot in your hot swap array as a failed device, it will be used as a replacement immediately.</li>
<li>vdev degrade or fault events: “If a vdev becomes degraded or faulted, zfsd will activate any available hotspare. If a leaf vdev generates more than 50 I/O errors in a 60 second period, then zfsd will mark that vdev as FAULTED.  zfs(4) will no longer issue any I/Os to it.  zfsd will activate 
a hotspare if one is available.” Same for checksum errors.</li>
<li>So if zfsd detects a drive is going bad, it brings the hotspare online before it is too late</li>
<li>Spare addition: “If the system administrator adds a hotspare to a pool that is already degraded, zfsd will activate the spare.”</li>
<li>Resilver complete: “zfsd will detach any hotspare once a permanent replacement finishes resilvering.”</li>
<li>Physical path change: “If the physical path of an existing disk changes, zfsd will attempt to replace any missing disk with the same physical path, if its pool&#39;s autoreplace property is set.”</li>
<li>In general, this tool means less reliance on the system administrator to keep the pool healthy
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160527203200" rel="nofollow">W<sup>X</sup> now mandatory in OpenBSD</a></h3>

<ul>
<li>We’ve talked a bit about W<sup>X</sup> in the past. (Refresher: Memory being writable and executable at once)</li>
<li>Well, this major security no-no is no-more on OpenBSD. Theo has committed a change which now prevents violations of this policy:</li>
</ul>

<blockquote>
<p>“W<sup>X</sup> violations are no longer permitted by default.  A kernel log message is generated, and mprotect/mmap return ENOTSUP.  If the sysctl(8) flag kern.wxabort is set then a SIGABRT occurs instead, for gdb use or coredump creation.”</p>
</blockquote>

<ul>
<li>There are a few cases where you may still need W<sup>X,</sup> which Theo points out can be enabled on a file-system basis.</li>
</ul>

<blockquote>
<p>“W<sup>X</sup> violating programs can be permitted on a ffs/nfs filesystem-basis, using the &quot;wxallowed&quot; mount option.  One day far in the future upstream software developers will understand that W<sup>X</sup> violations are a tremendously risky practice and that style of programming will be banished outright.  Until then, we recommend most users need to use the wxallowed option on their /usr/local filesystem.  At least your other filesystems don&#39;t permit such programs.”</p>
</blockquote>

<ul>
<li>This is a great ability to grow, since now users can begin doing auditing of programs that violate this principle and making noise to upstream.
***</li>
</ul>

<h2>Interview - Kristof Provost - <a href="mailto:kp@freebsd.org" rel="nofollow">kp@freebsd.org</a> <a href="https://twitter.com/kprovst" rel="nofollow">@kprovst</a></h2>

<ul>
<li>pf improvements on FreeBSD
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://ericmccorkleblog.wordpress.com/2016/05/28/freebsd-geli-support/" rel="nofollow">GELI Support for the EFI Loader </a></h3>

<ul>
<li>We’ve had Allan’s work to bring GELI support to the GPT / BIOS / ZFS loader for a while now, but the missing piece has been support for EFI.</li>
<li>No longer, Eric McCorkle has posted a blog entry (with relevant github links) introducing us to his work to bring GELI encryption support to EFI.</li>
<li>First the bad-news. This won’t make it into 11.0. (Maybe PC-BSD, TBD)</li>
<li>Next he explains why this is more than just a new feature, but a re-factor of the EFI boot code:</li>
</ul>

<blockquote>
<p>I have already written extensively about my EFI refactoring here.  The reason for undertaking this effort, however, was driven by GELI support.  Early in my work on this, I had implemented a non-EFI “providers” framework in boot1 in order to support the notion of disk partitions that may contain sub-partitions.</p>
</blockquote>

<ul>
<li>This was deeply unsatisfying to me for several reasons:

<ul>
<li>It implemented a lot of the same functionality that exists in the EFI framework.</li>
<li>It involved implementing a GPT partition driver to deal with partition tables inside GELI partitions (GPT detection and support is guaranteed by the EFI spec).</li>
<li>The interface between the EFI framework and the custom “providers” framework was awkward.</li>
<li>The driver was completely boot1-specific, and exporting it to something like GRUB probably involved a total rewrite.</li>
<li>Implementing it within loader was going to involve a lot of code duplication.</li>
<li>There was no obvious was to pass keys between boot1, loader, and the kernel.</li>
</ul></li>
<li>With the issues known, Eric seems pleased with the results of the conversion so far:

<ul>
<li>The GELI driver can be extracted from the FreeBSD codebase without too much trouble.</li>
<li>While I was unable to go all the way to the EFI driver model, the only blocker is the bcache code, and once that is resolved, we can have hotplug support in the boot loader!</li>
<li>The boot1 and loader codebases are now sharing all the backend drivers, and boot1 has been reduced to one very small source file.</li>
</ul></li>
<li>An interesting read, looking forward to playing with EFI more in the future!
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2016-michael-lucas/" rel="nofollow">Faces of FreeBSD 2016: Michael W. Lucas</a></h3>

<ul>
<li>On this edition of “Faces of FreeBSD”, Michael W Lucas tells the story of how he got started with FreeBSD</li>
<li>After an amusing re-telling of his childhood (The words “Purina Monkey Chow” were mentioned), he then tells us how he got into BSD.</li>
<li>His being thrown into the project may sound familiar to many: </li>
</ul>

<blockquote>
<p>I came in at 11 PM one night and was told “The DNS administrator just got walked out the door. You’re the new lead DNS administrator. Make those servers work. Good luck.”</p>
</blockquote>

<ul>
<li>From there (because he wanted more sleep), he began ripping out the systems that had been failing and waking him up at night. Good-bye UnixWare, Good-bye Solaris, hello BSD!</li>
<li>A very amusing read, check it out!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=ugct9-Mm7Ls" rel="nofollow">High Availability with PostgreSQL on FreeBSD</a></h3>

<ul>
<li>A talk by Sean Chittenden, who we interviewed previously on episode <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">Episode 95 </a></li>
<li>Explains how to setup Multi Data Center High Availability for PostgreSQL using consul</li>
<li>Goes into how consul works, how it does the election, the gossip protocol, etc</li>
<li>The HA setup uses DNS Failover, and the pros and cons of that approach are discussed</li>
<li>Then he walks through the implementation details, and example configuration
***</li>
</ul>

<h3><a href="http://www.bsddesktop.com/images/" rel="nofollow">New FreeBSD i915 testing images</a></h3>

<ul>
<li>Still need users to test the Linux Kernel 4.6 DRM update to FreeBSD’s graphics stack</li>
<li>Download the test image and write it to a USB stick and boot from it</li>
<li>It will not modify your installed system, it runs entirely off of the USB drive</li>
<li>Allows you to test the updated drivers without having to install the development branch on your device</li>
<li><mmacy> you can tell them that ATI/AMD support will be coming shortly</li>
<li><mmacy> and that stability has been steadily improving</li>
<li><mmacy> and that I&#39;ll do another announcement as soon as I&#39;ve had a chance to test the newest Xorg bits
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="https://www.cotcli.com/post/The-Very-Basics/" rel="nofollow">Comfortable on the CLI: Series Part 1</a></li>
<li><a href="https://gist.github.com/gonzopancho/8e7df7a826e9a2949b36ed2a9d30312e" rel="nofollow">FreeBSD Booting on the Netgate uFW, a smaller-than-a-raspberry-pi dual port firewall</a> </li>
<li><a href="https://twitter.com/gonzopancho/status/737874921435594753" rel="nofollow">Picture of uFW</a> </li>
<li><a href="https://gist.github.com/gonzopancho/8f20b50487a4f7de56e99448866a147d" rel="nofollow">uFW OpenSSL Benchmarks</a><br>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>143: One small step for DRM, one giant leap for BSD</title>
  <link>https://www.bsdnow.tv/143</link>
  <guid isPermaLink="false">de687a92-fb4a-4af8-92f5-a8e5aeee2999</guid>
  <pubDate>Wed, 25 May 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/de687a92-fb4a-4af8-92f5-a8e5aeee2999.mp3" length="86056564" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we have an interview with Matthew Macy, who has some exciting news to share with us regarding the state of graphics</itunes:subtitle>
  <itunes:duration>1:59:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we have an interview with Matthew Macy, who has some exciting news to share with us regarding the state of graphics&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.cochard.me/2016/05/playing-with-freebsd-packet-filter.html" target="_blank" rel="nofollow noopener"&gt;How the number of states affects pf’s performance of FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt; Our friend Olivier of FreeNAS and BSDRP fame has an interesting blog post this week detailing his unique issue with finding a firewall that can handle upwards of 4 million state table entries.&lt;/li&gt;
&lt;li&gt;He begins in the article with benchmarking the defaults, since without that we don’t have a framework to compare the later results.  All done on his  Netgate RCC-VE 4860 (4 cores ATOM C2558, 8GB RAM) under FreeBSD 10.3.&lt;/li&gt;
&lt;li&gt;“We notice a little performance impact when we reach the default 10K state table limit: From 413Kpps with 128 states in-used, it lower to 372Kpps.”&lt;/li&gt;
&lt;li&gt;With the initial benchmarks done and graphed, he then starts the tuning process by adjusting the “net.pf.states_hashsize”sysctl, and then playing with the number of states for the firewall to keep.&lt;/li&gt;
&lt;li&gt;“For the next bench, the number of flow will be fixed for generating 9800 pf state entries, but I will try different value of pf.states_hashsize until the maximum allowed on my 8GB RAM server (still with the default max states of 10k):”&lt;/li&gt;
&lt;li&gt;Then he cranks it up to 4 million states&lt;/li&gt;
&lt;li&gt;“There is only 12% performance penalty between pf 128 pf states and 4 million pf states.”&lt;/li&gt;
&lt;li&gt;“With 10M state, pf performance lower to 362Kpps: Still only 12% lower performance than with only 128 states”&lt;/li&gt;
&lt;li&gt;He then looks at what this does of pfsync, the protocol to sync the state table between two redundant pf firewalls&lt;/li&gt;
&lt;li&gt;Conclusions:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There need to be a linear relationship between the pf hard-limit of states and the pf.states_hashsize; RAM needed for pf.states_hashsize = pf.states_hashsize * 80 Byte and pf.states_hashsize should be a power of 2 (from the manual page); Even small hardware can manage large number of sessions (it's a matter of RAM),  but under too lot's of pressure pfsync will suffer.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.learnbchs.org/" target="_blank" rel="nofollow noopener"&gt;Introducing the BCHS Stack = BSD, C, httpd, SQLite&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Pronounced Beaches&lt;/li&gt;
&lt;li&gt;“It's a hipster-free, open source software stack for web applications”&lt;/li&gt;
&lt;li&gt;“Don't just write C. Write portable and secure C.”&lt;/li&gt;
&lt;li&gt;“Get to know your security tools. OpenBSD has systrace(4) and pledge(2). FreeBSD has capsicum(4).”&lt;/li&gt;
&lt;li&gt;“Statically scan your binary with LLVM” and “Run your application under valgrind”&lt;/li&gt;
&lt;li&gt;“Don't forget: BSD is a community of professionals. Go to conferences (EuroBSDCon, AsiaBSDCon, BSDCan, etc.)”&lt;/li&gt;
&lt;li&gt;This seems like a really interesting project, we’ll have to get Kristaps Dzonsons back on the show to talk about it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.rootbsd.net/kb/339/Installing-OpenBSDandsharp039s-httpd-server-MariaDB-PHP-56-on-OpenBSD-59.html" target="_blank" rel="nofollow noopener"&gt;Installing OpenBSD's httpd server, MariaDB, PHP 5.6 on OpenBSD 5.9&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking to deploy your next web-stack on OpenBSD 5.9? If so this next article from rootbsd.net is for you.&lt;/li&gt;
&lt;li&gt;Specifically it will walk you through the process of getting OpenBSD’s own httpd server up and running, followed by MariaDB and PHP 5.6.&lt;/li&gt;
&lt;li&gt;Most of the setup is pretty straight-forward, the httpd syntax may be different to you, if this is your first time trying it out.&lt;/li&gt;
&lt;li&gt;Once the various packages are installed / configured, the rest of the tutorial will be easy, walking you through the standard hello world PHP script, and enabling the services to run at reboot.&lt;/li&gt;
&lt;li&gt;A good article for those wanting to start hosting PHP/DB content (wordpress anyone?) on your OpenBSD system.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.varnish-cache.org/news/20160425_website.html" target="_blank" rel="nofollow noopener"&gt;The infrastructure behind Varnish &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Dogfooding. It’s a term you hear often in the software community, which essentially means to “Run your own stuff”. Today we have an article by PKH over at varnish-cache, talking about what that means to them.&lt;/li&gt;
&lt;li&gt;Specifically, they recently went through a website upgrade, which will enable them to run more of their own stuff. &lt;/li&gt;
&lt;li&gt;He has a great quote on what OS they use:“So, dogfood: Obviously FreeBSD. Apart from the obvious reason that I wrote a lot of FreeBSD and can get world-class support by bugging my buddies about it, there are two equally serious reasons for the Varnish Project to run on FreeBSD: Dogfood and jails.Varnish Cache is not “software for Linux”, it is software for any competent UNIX-like operating system, and FreeBSD is our primary “keep us honest about this” platform.“&lt;/li&gt;
&lt;li&gt;He then goes through the process of explaining how they would setup a new Varnish-cache website, or upgrade it. &lt;/li&gt;
&lt;li&gt;All together a great read, and if you are one of the admin-types, you really should pay attention to how they build from the ground up. Some valuable knowledge here which every admin should try to replicate.&lt;/li&gt;
&lt;li&gt;I can not reiterate the value of having your config files in a private source control repo strongly enough&lt;/li&gt;
&lt;li&gt;The biggest take-away is: “And by doing it this way, I know it will work next time also.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Matt Macy - &lt;a href="mailto:mmacy@nextbsd.org" target="_blank" rel="nofollow noopener"&gt;mmacy@nextbsd.org&lt;/a&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-x11/2016-May/017560.html" target="_blank" rel="nofollow noopener"&gt;Graphics Stack Update&lt;/a&gt;
&lt;/h2&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-May/000238.html" target="_blank" rel="nofollow noopener"&gt;Followup on packaging base with pkg(8)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In spite of the heroic last minute effort by a team of contributors, pkg’d base will not be ready in time for FreeBSD 11.0&lt;/li&gt;
&lt;li&gt;There are just too many issues that were discovered during testing&lt;/li&gt;
&lt;li&gt;The plan is to continue using freebsd-update in the meantime, and introduce a pkg based upgrade mechanism in FreeBSD 11.1&lt;/li&gt;
&lt;li&gt;With the new support model for the FreeBSD 11 branch, 11.1 may come sooner than with previous major releases
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/internal/bylaws.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Core Election&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It is time once again for the FreeBSD Core Election&lt;/li&gt;
&lt;li&gt;Application period begins: Wednesday, 18 May 2016 at 18:00:00 UTC&lt;/li&gt;
&lt;li&gt;Application period ends: Wednesday, 25 May 2016 at 18:00:00 UTC&lt;/li&gt;
&lt;li&gt;Voting begins: Wednesday, 25 May 2016 at 18:00:00 UTC&lt;/li&gt;
&lt;li&gt;Voting ends: Wednesday, 22 June 2016 at 18:00:00 UTC&lt;/li&gt;
&lt;li&gt;Results announced Wednesday, 29 June 2016&lt;/li&gt;
&lt;li&gt;New core team takes office: Wednesday, 6 July 2016&lt;/li&gt;
&lt;li&gt;As of the time I was writing these notes, 3 hours before the application deadline, the candidates are:&lt;/li&gt;
&lt;li&gt;Allan Jude: Filling in the potholes&lt;/li&gt;
&lt;li&gt;Marcelo Araujo: We are not vampires, but we need new blood.&lt;/li&gt;
&lt;li&gt;Baptiste Daroussin (incumbent): Keep on improving&lt;/li&gt;
&lt;li&gt;Benedict Reuschling: Learn and Teach&lt;/li&gt;
&lt;li&gt;Benno Rice: Revitalising The Community&lt;/li&gt;
&lt;li&gt;Devin Teske: Here to help&lt;/li&gt;
&lt;li&gt;Ed Maste (incumbent): FreeBSD is people&lt;/li&gt;
&lt;li&gt;George V. Neville-Neil (incumbent): There is much to do…&lt;/li&gt;
&lt;li&gt;Hiroki Sato (incumbent): Keep up with our good community and technical strength&lt;/li&gt;
&lt;li&gt;John Baldwin: Ready to work&lt;/li&gt;
&lt;li&gt;Juli Mallett: Caring for community.&lt;/li&gt;
&lt;li&gt;Kris Moore: User-Focused&lt;/li&gt;
&lt;li&gt;Mathieu Arnold: Someone ask for fresh blood ?&lt;/li&gt;
&lt;li&gt;Ollivier Robert: Caring for the project and you, its developers&lt;/li&gt;
&lt;li&gt;The deadline for applications is around the time we finish recording the live show&lt;/li&gt;
&lt;li&gt;We welcome any of the candidates to schedule an interview in the next few weeks. We will make an attempt to hunt many of them down at BSDCan as well.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249620.html" target="_blank" rel="nofollow noopener"&gt;Wayland/Weston with XWayland works on DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We haven’t talked a lot about Wayland on BSD recently (or much at all), but today we have a post from Peter to the dragonfly mailing list, detailing his experience with it.&lt;/li&gt;
&lt;li&gt;Specifically he talks about getting XWayland working, which provides the compat bits for native X applications to run on WayLand displays.&lt;/li&gt;
&lt;li&gt;So far on the working list of apps:
“gtk3:

&lt;ul&gt;
&lt;li&gt;gedit&lt;/li&gt;
&lt;li&gt;nautilus&lt;/li&gt;
&lt;li&gt;evince&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;xfce4:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;xfce4-terminal&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;atril&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;firefox&lt;/li&gt;
&lt;li&gt;spyder&lt;/li&gt;
&lt;li&gt;scilab”&lt;/li&gt;
&lt;li&gt;A pretty impressive list, although he said “chrome” failed with a seg-fault&lt;/li&gt;
&lt;li&gt;This is something I’m personally interested in. Now with the newer DRM bits landing in FreeBSD, perhaps it’s time for some further looking into Wayland.
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.ca/2016/05/updating-broadcom-softmac-driver-bwn-or.html" target="_blank" rel="nofollow noopener"&gt;Broadcom WiFi driver update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this blog post Adrian Chadd talks about his recent work on the bwn(4) driver for Broadcom WiFi chips&lt;/li&gt;
&lt;li&gt;This work has added support for a number of older 802.11g chips, including the one from 2009-era Macbooks&lt;/li&gt;
&lt;li&gt;Work is ongoing, and the hope is to add 802.11n and 5ghz support as well&lt;/li&gt;
&lt;li&gt;Adrian is mentoring a number of developers working on embedded or wifi related things, to try to increase the projects bandwidth in those areas&lt;/li&gt;
&lt;li&gt;If you are interested in driver development, or wifi internals, the blog post has lots of interesting details and covers the story of Adrian’s recent adventures in bringing the drivers up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://arxiv.org/abs/1605.05810" target="_blank" rel="nofollow noopener"&gt;The Design of the NetBSD I/O Subsystems (2002)&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.ilsistemista.net/index.php/virtualization/47-zfs-btrfs-xfs-ext4-and-lvm-with-kvm-a-storage-performance-comparison.html?print=true" target="_blank" rel="nofollow noopener"&gt;ZFS, BTRFS, XFS, EXT4 and LVM with KVM – a storage performance comparison&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.freshports.org/lang/swift/" target="_blank" rel="nofollow noopener"&gt;Swift added to FreeBSD Ports&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=146391388912602&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;misc@openbsd: 'NSA addition to ifconfig'&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://paperswelove.org/2015/video/ryan-zezeski-memory-by-the-slab/" target="_blank" rel="nofollow noopener"&gt;Papers We Love: Memory by the Slab: The Tale of Bonwick's Slab Allocator &lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/HRRyfxev" target="_blank" rel="nofollow noopener"&gt; Lars - Poudriere&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/fESV1egk" target="_blank" rel="nofollow noopener"&gt; Warren - .NET&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/kQecpA1X" target="_blank" rel="nofollow noopener"&gt; Eddy - Sys Init&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/5096cGXr" target="_blank" rel="nofollow noopener"&gt; Tim - ZFS Resources&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/rYr1CDcV" target="_blank" rel="nofollow noopener"&gt; Morgan - Ports and Kernel&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we have an interview with Matthew Macy, who has some exciting news to share with us regarding the state of graphics</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.cochard.me/2016/05/playing-with-freebsd-packet-filter.html" rel="nofollow">How the number of states affects pf’s performance of FreeBSD</a></h3>

<ul>
<li> Our friend Olivier of FreeNAS and BSDRP fame has an interesting blog post this week detailing his unique issue with finding a firewall that can handle upwards of 4 million state table entries.</li>
<li>He begins in the article with benchmarking the defaults, since without that we don’t have a framework to compare the later results.  All done on his  Netgate RCC-VE 4860 (4 cores ATOM C2558, 8GB RAM) under FreeBSD 10.3.</li>
<li>“We notice a little performance impact when we reach the default 10K state table limit: From 413Kpps with 128 states in-used, it lower to 372Kpps.”</li>
<li>With the initial benchmarks done and graphed, he then starts the tuning process by adjusting the “net.pf.states_hashsize”sysctl, and then playing with the number of states for the firewall to keep.</li>
<li>“For the next bench, the number of flow will be fixed for generating 9800 pf state entries, but I will try different value of pf.states_hashsize until the maximum allowed on my 8GB RAM server (still with the default max states of 10k):”</li>
<li>Then he cranks it up to 4 million states</li>
<li>“There is only 12% performance penalty between pf 128 pf states and 4 million pf states.”</li>
<li>“With 10M state, pf performance lower to 362Kpps: Still only 12% lower performance than with only 128 states”</li>
<li>He then looks at what this does of pfsync, the protocol to sync the state table between two redundant pf firewalls</li>
<li>Conclusions:</li>
</ul>

<p>There need to be a linear relationship between the pf hard-limit of states and the pf.states_hashsize; RAM needed for pf.states_hashsize = pf.states_hashsize * 80 Byte and pf.states_hashsize should be a power of 2 (from the manual page); Even small hardware can manage large number of sessions (it&#39;s a matter of RAM),  but under too lot&#39;s of pressure pfsync will suffer.</p>

<hr>

<h3><a href="http://www.learnbchs.org/" rel="nofollow">Introducing the BCHS Stack = BSD, C, httpd, SQLite</a></h3>

<ul>
<li>Pronounced Beaches</li>
<li>“It&#39;s a hipster-free, open source software stack for web applications”</li>
<li>“Don&#39;t just write C. Write portable and secure C.”</li>
<li>“Get to know your security tools. OpenBSD has systrace(4) and pledge(2). FreeBSD has capsicum(4).”</li>
<li>“Statically scan your binary with LLVM” and “Run your application under valgrind”</li>
<li>“Don&#39;t forget: BSD is a community of professionals. Go to conferences (EuroBSDCon, AsiaBSDCon, BSDCan, etc.)”</li>
<li>This seems like a really interesting project, we’ll have to get Kristaps Dzonsons back on the show to talk about it
***</li>
</ul>

<h3><a href="https://www.rootbsd.net/kb/339/Installing-OpenBSDandsharp039s-httpd-server-MariaDB-PHP-56-on-OpenBSD-59.html" rel="nofollow">Installing OpenBSD&#39;s httpd server, MariaDB, PHP 5.6 on OpenBSD 5.9</a></h3>

<ul>
<li>Looking to deploy your next web-stack on OpenBSD 5.9? If so this next article from rootbsd.net is for you.</li>
<li>Specifically it will walk you through the process of getting OpenBSD’s own httpd server up and running, followed by MariaDB and PHP 5.6.</li>
<li>Most of the setup is pretty straight-forward, the httpd syntax may be different to you, if this is your first time trying it out.</li>
<li>Once the various packages are installed / configured, the rest of the tutorial will be easy, walking you through the standard hello world PHP script, and enabling the services to run at reboot.</li>
<li>A good article for those wanting to start hosting PHP/DB content (wordpress anyone?) on your OpenBSD system.
***</li>
</ul>

<h3><a href="https://www.varnish-cache.org/news/20160425_website.html" rel="nofollow">The infrastructure behind Varnish </a></h3>

<ul>
<li>Dogfooding. It’s a term you hear often in the software community, which essentially means to “Run your own stuff”. Today we have an article by PKH over at varnish-cache, talking about what that means to them.</li>
<li>Specifically, they recently went through a website upgrade, which will enable them to run more of their own stuff. </li>
<li>He has a great quote on what OS they use:“So, dogfood: Obviously FreeBSD. Apart from the obvious reason that I wrote a lot of FreeBSD and can get world-class support by bugging my buddies about it, there are two equally serious reasons for the Varnish Project to run on FreeBSD: Dogfood and jails.Varnish Cache is not “software for Linux”, it is software for any competent UNIX-like operating system, and FreeBSD is our primary “keep us honest about this” platform.“</li>
<li>He then goes through the process of explaining how they would setup a new Varnish-cache website, or upgrade it. </li>
<li>All together a great read, and if you are one of the admin-types, you really should pay attention to how they build from the ground up. Some valuable knowledge here which every admin should try to replicate.</li>
<li>I can not reiterate the value of having your config files in a private source control repo strongly enough</li>
<li>The biggest take-away is: “And by doing it this way, I know it will work next time also.”
***</li>
</ul>

<h2>Interview - Matt Macy - <a href="mailto:mmacy@nextbsd.org" rel="nofollow">mmacy@nextbsd.org</a><a href="https://lists.freebsd.org/pipermail/freebsd-x11/2016-May/017560.html" rel="nofollow">Graphics Stack Update</a></h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-May/000238.html" rel="nofollow">Followup on packaging base with pkg(8)</a></h3>

<ul>
<li>In spite of the heroic last minute effort by a team of contributors, pkg’d base will not be ready in time for FreeBSD 11.0</li>
<li>There are just too many issues that were discovered during testing</li>
<li>The plan is to continue using freebsd-update in the meantime, and introduce a pkg based upgrade mechanism in FreeBSD 11.1</li>
<li>With the new support model for the FreeBSD 11 branch, 11.1 may come sooner than with previous major releases
***</li>
</ul>

<h3><a href="https://www.freebsd.org/internal/bylaws.html" rel="nofollow">FreeBSD Core Election</a></h3>

<ul>
<li>It is time once again for the FreeBSD Core Election</li>
<li>Application period begins: Wednesday, 18 May 2016 at 18:00:00 UTC</li>
<li>Application period ends: Wednesday, 25 May 2016 at 18:00:00 UTC</li>
<li>Voting begins: Wednesday, 25 May 2016 at 18:00:00 UTC</li>
<li>Voting ends: Wednesday, 22 June 2016 at 18:00:00 UTC</li>
<li>Results announced Wednesday, 29 June 2016</li>
<li>New core team takes office: Wednesday, 6 July 2016</li>
<li>As of the time I was writing these notes, 3 hours before the application deadline, the candidates are:</li>
<li>Allan Jude: Filling in the potholes</li>
<li>Marcelo Araujo: We are not vampires, but we need new blood.</li>
<li>Baptiste Daroussin (incumbent): Keep on improving</li>
<li>Benedict Reuschling: Learn and Teach</li>
<li>Benno Rice: Revitalising The Community</li>
<li>Devin Teske: Here to help</li>
<li>Ed Maste (incumbent): FreeBSD is people</li>
<li>George V. Neville-Neil (incumbent): There is much to do…</li>
<li>Hiroki Sato (incumbent): Keep up with our good community and technical strength</li>
<li>John Baldwin: Ready to work</li>
<li>Juli Mallett: Caring for community.</li>
<li>Kris Moore: User-Focused</li>
<li>Mathieu Arnold: Someone ask for fresh blood ?</li>
<li>Ollivier Robert: Caring for the project and you, its developers</li>
<li>The deadline for applications is around the time we finish recording the live show</li>
<li>We welcome any of the candidates to schedule an interview in the next few weeks. We will make an attempt to hunt many of them down at BSDCan as well.
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249620.html" rel="nofollow">Wayland/Weston with XWayland works on DragonFly</a></h3>

<ul>
<li>We haven’t talked a lot about Wayland on BSD recently (or much at all), but today we have a post from Peter to the dragonfly mailing list, detailing his experience with it.</li>
<li>Specifically he talks about getting XWayland working, which provides the compat bits for native X applications to run on WayLand displays.</li>
<li>So far on the working list of apps:
“gtk3:

<ul>
<li>gedit</li>
<li>nautilus</li>
<li>evince</li>
</ul></li>
</ul>

<p>xfce4:</p>

<ul>
<li>xfce4-terminal</li>
<li><p>atril</p>

<ul>
<li>firefox</li>
<li>spyder</li>
<li>scilab”</li>
<li>A pretty impressive list, although he said “chrome” failed with a seg-fault</li>
<li>This is something I’m personally interested in. Now with the newer DRM bits landing in FreeBSD, perhaps it’s time for some further looking into Wayland.
***</li>
</ul></li>
</ul>

<h3><a href="http://adrianchadd.blogspot.ca/2016/05/updating-broadcom-softmac-driver-bwn-or.html" rel="nofollow">Broadcom WiFi driver update</a></h3>

<ul>
<li>In this blog post Adrian Chadd talks about his recent work on the bwn(4) driver for Broadcom WiFi chips</li>
<li>This work has added support for a number of older 802.11g chips, including the one from 2009-era Macbooks</li>
<li>Work is ongoing, and the hope is to add 802.11n and 5ghz support as well</li>
<li>Adrian is mentoring a number of developers working on embedded or wifi related things, to try to increase the projects bandwidth in those areas</li>
<li>If you are interested in driver development, or wifi internals, the blog post has lots of interesting details and covers the story of Adrian’s recent adventures in bringing the drivers up
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="http://arxiv.org/abs/1605.05810" rel="nofollow">The Design of the NetBSD I/O Subsystems (2002)</a></p>

<p><a href="http://www.ilsistemista.net/index.php/virtualization/47-zfs-btrfs-xfs-ext4-and-lvm-with-kvm-a-storage-performance-comparison.html?print=true" rel="nofollow">ZFS, BTRFS, XFS, EXT4 and LVM with KVM – a storage performance comparison</a> </p>

<p><a href="http://www.freshports.org/lang/swift/" rel="nofollow">Swift added to FreeBSD Ports</a></p>

<p><a href="http://marc.info/?l=openbsd-misc&m=146391388912602&w=2" rel="nofollow">misc@openbsd: &#39;NSA addition to ifconfig&#39;</a></p>

<p><a href="http://paperswelove.org/2015/video/ryan-zezeski-memory-by-the-slab/" rel="nofollow">Papers We Love: Memory by the Slab: The Tale of Bonwick&#39;s Slab Allocator </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/HRRyfxev" rel="nofollow"> Lars - Poudriere</a> </li>
<li><a href="http://pastebin.com/fESV1egk" rel="nofollow"> Warren - .NET</a> </li>
<li><a href="http://pastebin.com/kQecpA1X" rel="nofollow"> Eddy - Sys Init</a> </li>
<li><a href="http://pastebin.com/5096cGXr" rel="nofollow"> Tim - ZFS Resources</a> </li>
<li><a href="http://pastebin.com/rYr1CDcV" rel="nofollow"> Morgan - Ports and Kernel</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we have an interview with Matthew Macy, who has some exciting news to share with us regarding the state of graphics</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.cochard.me/2016/05/playing-with-freebsd-packet-filter.html" rel="nofollow">How the number of states affects pf’s performance of FreeBSD</a></h3>

<ul>
<li> Our friend Olivier of FreeNAS and BSDRP fame has an interesting blog post this week detailing his unique issue with finding a firewall that can handle upwards of 4 million state table entries.</li>
<li>He begins in the article with benchmarking the defaults, since without that we don’t have a framework to compare the later results.  All done on his  Netgate RCC-VE 4860 (4 cores ATOM C2558, 8GB RAM) under FreeBSD 10.3.</li>
<li>“We notice a little performance impact when we reach the default 10K state table limit: From 413Kpps with 128 states in-used, it lower to 372Kpps.”</li>
<li>With the initial benchmarks done and graphed, he then starts the tuning process by adjusting the “net.pf.states_hashsize”sysctl, and then playing with the number of states for the firewall to keep.</li>
<li>“For the next bench, the number of flow will be fixed for generating 9800 pf state entries, but I will try different value of pf.states_hashsize until the maximum allowed on my 8GB RAM server (still with the default max states of 10k):”</li>
<li>Then he cranks it up to 4 million states</li>
<li>“There is only 12% performance penalty between pf 128 pf states and 4 million pf states.”</li>
<li>“With 10M state, pf performance lower to 362Kpps: Still only 12% lower performance than with only 128 states”</li>
<li>He then looks at what this does of pfsync, the protocol to sync the state table between two redundant pf firewalls</li>
<li>Conclusions:</li>
</ul>

<p>There need to be a linear relationship between the pf hard-limit of states and the pf.states_hashsize; RAM needed for pf.states_hashsize = pf.states_hashsize * 80 Byte and pf.states_hashsize should be a power of 2 (from the manual page); Even small hardware can manage large number of sessions (it&#39;s a matter of RAM),  but under too lot&#39;s of pressure pfsync will suffer.</p>

<hr>

<h3><a href="http://www.learnbchs.org/" rel="nofollow">Introducing the BCHS Stack = BSD, C, httpd, SQLite</a></h3>

<ul>
<li>Pronounced Beaches</li>
<li>“It&#39;s a hipster-free, open source software stack for web applications”</li>
<li>“Don&#39;t just write C. Write portable and secure C.”</li>
<li>“Get to know your security tools. OpenBSD has systrace(4) and pledge(2). FreeBSD has capsicum(4).”</li>
<li>“Statically scan your binary with LLVM” and “Run your application under valgrind”</li>
<li>“Don&#39;t forget: BSD is a community of professionals. Go to conferences (EuroBSDCon, AsiaBSDCon, BSDCan, etc.)”</li>
<li>This seems like a really interesting project, we’ll have to get Kristaps Dzonsons back on the show to talk about it
***</li>
</ul>

<h3><a href="https://www.rootbsd.net/kb/339/Installing-OpenBSDandsharp039s-httpd-server-MariaDB-PHP-56-on-OpenBSD-59.html" rel="nofollow">Installing OpenBSD&#39;s httpd server, MariaDB, PHP 5.6 on OpenBSD 5.9</a></h3>

<ul>
<li>Looking to deploy your next web-stack on OpenBSD 5.9? If so this next article from rootbsd.net is for you.</li>
<li>Specifically it will walk you through the process of getting OpenBSD’s own httpd server up and running, followed by MariaDB and PHP 5.6.</li>
<li>Most of the setup is pretty straight-forward, the httpd syntax may be different to you, if this is your first time trying it out.</li>
<li>Once the various packages are installed / configured, the rest of the tutorial will be easy, walking you through the standard hello world PHP script, and enabling the services to run at reboot.</li>
<li>A good article for those wanting to start hosting PHP/DB content (wordpress anyone?) on your OpenBSD system.
***</li>
</ul>

<h3><a href="https://www.varnish-cache.org/news/20160425_website.html" rel="nofollow">The infrastructure behind Varnish </a></h3>

<ul>
<li>Dogfooding. It’s a term you hear often in the software community, which essentially means to “Run your own stuff”. Today we have an article by PKH over at varnish-cache, talking about what that means to them.</li>
<li>Specifically, they recently went through a website upgrade, which will enable them to run more of their own stuff. </li>
<li>He has a great quote on what OS they use:“So, dogfood: Obviously FreeBSD. Apart from the obvious reason that I wrote a lot of FreeBSD and can get world-class support by bugging my buddies about it, there are two equally serious reasons for the Varnish Project to run on FreeBSD: Dogfood and jails.Varnish Cache is not “software for Linux”, it is software for any competent UNIX-like operating system, and FreeBSD is our primary “keep us honest about this” platform.“</li>
<li>He then goes through the process of explaining how they would setup a new Varnish-cache website, or upgrade it. </li>
<li>All together a great read, and if you are one of the admin-types, you really should pay attention to how they build from the ground up. Some valuable knowledge here which every admin should try to replicate.</li>
<li>I can not reiterate the value of having your config files in a private source control repo strongly enough</li>
<li>The biggest take-away is: “And by doing it this way, I know it will work next time also.”
***</li>
</ul>

<h2>Interview - Matt Macy - <a href="mailto:mmacy@nextbsd.org" rel="nofollow">mmacy@nextbsd.org</a><a href="https://lists.freebsd.org/pipermail/freebsd-x11/2016-May/017560.html" rel="nofollow">Graphics Stack Update</a></h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-May/000238.html" rel="nofollow">Followup on packaging base with pkg(8)</a></h3>

<ul>
<li>In spite of the heroic last minute effort by a team of contributors, pkg’d base will not be ready in time for FreeBSD 11.0</li>
<li>There are just too many issues that were discovered during testing</li>
<li>The plan is to continue using freebsd-update in the meantime, and introduce a pkg based upgrade mechanism in FreeBSD 11.1</li>
<li>With the new support model for the FreeBSD 11 branch, 11.1 may come sooner than with previous major releases
***</li>
</ul>

<h3><a href="https://www.freebsd.org/internal/bylaws.html" rel="nofollow">FreeBSD Core Election</a></h3>

<ul>
<li>It is time once again for the FreeBSD Core Election</li>
<li>Application period begins: Wednesday, 18 May 2016 at 18:00:00 UTC</li>
<li>Application period ends: Wednesday, 25 May 2016 at 18:00:00 UTC</li>
<li>Voting begins: Wednesday, 25 May 2016 at 18:00:00 UTC</li>
<li>Voting ends: Wednesday, 22 June 2016 at 18:00:00 UTC</li>
<li>Results announced Wednesday, 29 June 2016</li>
<li>New core team takes office: Wednesday, 6 July 2016</li>
<li>As of the time I was writing these notes, 3 hours before the application deadline, the candidates are:</li>
<li>Allan Jude: Filling in the potholes</li>
<li>Marcelo Araujo: We are not vampires, but we need new blood.</li>
<li>Baptiste Daroussin (incumbent): Keep on improving</li>
<li>Benedict Reuschling: Learn and Teach</li>
<li>Benno Rice: Revitalising The Community</li>
<li>Devin Teske: Here to help</li>
<li>Ed Maste (incumbent): FreeBSD is people</li>
<li>George V. Neville-Neil (incumbent): There is much to do…</li>
<li>Hiroki Sato (incumbent): Keep up with our good community and technical strength</li>
<li>John Baldwin: Ready to work</li>
<li>Juli Mallett: Caring for community.</li>
<li>Kris Moore: User-Focused</li>
<li>Mathieu Arnold: Someone ask for fresh blood ?</li>
<li>Ollivier Robert: Caring for the project and you, its developers</li>
<li>The deadline for applications is around the time we finish recording the live show</li>
<li>We welcome any of the candidates to schedule an interview in the next few weeks. We will make an attempt to hunt many of them down at BSDCan as well.
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249620.html" rel="nofollow">Wayland/Weston with XWayland works on DragonFly</a></h3>

<ul>
<li>We haven’t talked a lot about Wayland on BSD recently (or much at all), but today we have a post from Peter to the dragonfly mailing list, detailing his experience with it.</li>
<li>Specifically he talks about getting XWayland working, which provides the compat bits for native X applications to run on WayLand displays.</li>
<li>So far on the working list of apps:
“gtk3:

<ul>
<li>gedit</li>
<li>nautilus</li>
<li>evince</li>
</ul></li>
</ul>

<p>xfce4:</p>

<ul>
<li>xfce4-terminal</li>
<li><p>atril</p>

<ul>
<li>firefox</li>
<li>spyder</li>
<li>scilab”</li>
<li>A pretty impressive list, although he said “chrome” failed with a seg-fault</li>
<li>This is something I’m personally interested in. Now with the newer DRM bits landing in FreeBSD, perhaps it’s time for some further looking into Wayland.
***</li>
</ul></li>
</ul>

<h3><a href="http://adrianchadd.blogspot.ca/2016/05/updating-broadcom-softmac-driver-bwn-or.html" rel="nofollow">Broadcom WiFi driver update</a></h3>

<ul>
<li>In this blog post Adrian Chadd talks about his recent work on the bwn(4) driver for Broadcom WiFi chips</li>
<li>This work has added support for a number of older 802.11g chips, including the one from 2009-era Macbooks</li>
<li>Work is ongoing, and the hope is to add 802.11n and 5ghz support as well</li>
<li>Adrian is mentoring a number of developers working on embedded or wifi related things, to try to increase the projects bandwidth in those areas</li>
<li>If you are interested in driver development, or wifi internals, the blog post has lots of interesting details and covers the story of Adrian’s recent adventures in bringing the drivers up
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="http://arxiv.org/abs/1605.05810" rel="nofollow">The Design of the NetBSD I/O Subsystems (2002)</a></p>

<p><a href="http://www.ilsistemista.net/index.php/virtualization/47-zfs-btrfs-xfs-ext4-and-lvm-with-kvm-a-storage-performance-comparison.html?print=true" rel="nofollow">ZFS, BTRFS, XFS, EXT4 and LVM with KVM – a storage performance comparison</a> </p>

<p><a href="http://www.freshports.org/lang/swift/" rel="nofollow">Swift added to FreeBSD Ports</a></p>

<p><a href="http://marc.info/?l=openbsd-misc&m=146391388912602&w=2" rel="nofollow">misc@openbsd: &#39;NSA addition to ifconfig&#39;</a></p>

<p><a href="http://paperswelove.org/2015/video/ryan-zezeski-memory-by-the-slab/" rel="nofollow">Papers We Love: Memory by the Slab: The Tale of Bonwick&#39;s Slab Allocator </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/HRRyfxev" rel="nofollow"> Lars - Poudriere</a> </li>
<li><a href="http://pastebin.com/fESV1egk" rel="nofollow"> Warren - .NET</a> </li>
<li><a href="http://pastebin.com/kQecpA1X" rel="nofollow"> Eddy - Sys Init</a> </li>
<li><a href="http://pastebin.com/5096cGXr" rel="nofollow"> Tim - ZFS Resources</a> </li>
<li><a href="http://pastebin.com/rYr1CDcV" rel="nofollow"> Morgan - Ports and Kernel</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>142: Diving for BSD Perls</title>
  <link>https://www.bsdnow.tv/142</link>
  <guid isPermaLink="false">0a4f8b9a-8fcf-431a-9247-afadb21893c0</guid>
  <pubDate>Wed, 18 May 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0a4f8b9a-8fcf-431a-9247-afadb21893c0.mp3" length="69742804" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we have all the latest news and stories! Plus an interview with BSD developer Alfred Perlstein, that you</itunes:subtitle>
  <itunes:duration>1:36:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we have all the latest news and stories! Plus an interview with BSD developer Alfred Perlstein, that you&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://bsdmag.org/download/reusing_openbsd/" target="_blank" rel="nofollow noopener"&gt;The May issus of BSDMag is now out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;GhostBSD&lt;/li&gt;
&lt;li&gt;Reusing OpenBSD's arc4random in multi-threaded user space programs&lt;/li&gt;
&lt;li&gt;Securing VPN's with GRE / Strongswan&lt;/li&gt;
&lt;li&gt;Installing XFCE 4.12 on NetBSD 7&lt;/li&gt;
&lt;li&gt;Interview with Fernando Rodriguez, the co-founder of KeepCoding
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.acumensecurity.net/fpt_wx_ext-1-a-rundown/" target="_blank" rel="nofollow noopener"&gt;A rundown of the FPT_W&lt;sup&gt;X_EXT.1&lt;/sup&gt; security reqiurement for General Purpose Operating Systems by the NSA&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.commoncriteriaportal.org/files/ppfiles/pp_os_v4.1-vr.pdf" target="_blank" rel="nofollow noopener"&gt;NIST/NSA Validation Scheme Report&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The SFR or Security Functional Requirement requires that; "The OS shall prevent allocation of any memory region with both write and execute permissions except for [assignment: list of exceptions]."&lt;/li&gt;
&lt;li&gt;While nearly all operating systems currently support the use of the NX bit, or the equivalent on processors such as SPARC and ARM, and will correctly mark the stack as non-executable, the fact remains that this in and of itself is deemed insufficient by NIST and NSA.&lt;/li&gt;
&lt;li&gt;OpenBSD 5.8, FreeBSD, Solaris, RHEL, and most other Linux distro have failed.&lt;/li&gt;
&lt;li&gt;HardenedBSD passes all three tests out of the box.&lt;/li&gt;
&lt;li&gt;NetBSD will do so with a single sysctl tweak. Since they are using the PaX model, anything else using PaX, such as a grsecurity-enabled Linux distribution pass these assurance activities as well.&lt;/li&gt;
&lt;li&gt;OpenBSD 5.9 does not allow memory mapping due to W&lt;sup&gt;X&lt;/sup&gt; being enforced by the kernel, however the kernel will panic if there are any attempts to create such mappings.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://distrowatch.com/weekly.php?issue=20160516#freebsd" target="_blank" rel="nofollow noopener"&gt;DistroWatch reviews new features in FreeBSD 10.3&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DistroWatch did a review of FreeBSD 10.3&lt;/li&gt;
&lt;li&gt;They ran into a few problems, but hopefully those can be fixed&lt;/li&gt;
&lt;li&gt;An issue with beadm setting the canmount property incorrectly causing the ZFS BE menu to not work as expected should be resolved in the next version, thanks to a patch from kmoore&lt;/li&gt;
&lt;li&gt;The limitations of the Linux 64 support are what they are, CentOS 6 is still fairly popular with enterprise software, but hopefully some folks are interested in working on bringing the syscall emulation forward&lt;/li&gt;
&lt;li&gt;In a third issue, the reviewer seemed to have issues SSHing from inside the jail. This likely has to do with how they got a console in the jail. I remember having problems with this in the past, something about a secure console.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.salon.com/2000/05/16/chapter_2_part_one/" target="_blank" rel="nofollow noopener"&gt;BSD Unix: Power to the people, from the code&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Salon.com has a very long article, chronicling much of the history behind BSD UNIX.&lt;/li&gt;
&lt;li&gt;It starts with detailing the humble origins of BSD, starting with Bill Joy in the mid-70’s, and then goes through details on how it rapidly grew, and the influence that the University of Berkeley had on open-source. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “But too much focus on Joy, a favorite target for business magazine hagiography, obscures the larger picture. Berkeley’s most important contribution was not software; it was the way Berkeley created software. At Berkeley, a small core group — never more than four people at any one time — coordinated the contributions of an ever-growing network of far-flung, mostly volunteer programmers into progressive releases of steadily improving software. In so doing, they codified a template for what is now referred to as the “open-source software development methodology.” Put more simply, the Berkeley hackers set up a system for creating free software.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The article goes on to talk about some of the back and forth between Linux and BSD, and why Linux has captured more of the market in recent years, but BSD is far from throwing in the towel.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “BSD patriots argue that the battle is far from over, that BSD is technically superior and will therefore win in the end. That’s for the future to determine. What’s indisputable is BSD’s contribution in the past. Even if, by 1975, Berkeley’s Free Speech Movement was a relic belonging to a fast-fading generation, on the fourth floor of Evans Hall, where Joy shared an office, the free-software movement was just beginning.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;An excellent article (If a bit long), but well worth your time to understand the origins of what we consider modern day BSD, and how the University of Berkley helped shape it.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ixsystems.com" target="_blank" rel="nofollow noopener"&gt;iXsystems&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/blog/serverenvy-10000-terabytes/" target="_blank" rel="nofollow noopener"&gt;#ServerEnvy: It's over 10,000 Terabytes!&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Alfred Perlstein - &lt;a href="mailto:alfred@freebsd.org" target="_blank" rel="nofollow noopener"&gt;alfred@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/splbio" target="_blank" rel="nofollow noopener"&gt;@splbio&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Using BSD for projects
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/dotnet/coreclr/pull/4504/files" target="_blank" rel="nofollow noopener"&gt;.NET framework ported to NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This pull request adds basic support for the .NET framework on NetBSD 7.x amd64&lt;/li&gt;
&lt;li&gt;It includes documentation on how to get the .NET framework installed&lt;/li&gt;
&lt;li&gt;It uses pkgsrc to bootstrap the required tools&lt;/li&gt;
&lt;li&gt;pkgsrc-wip is used to get the actual .NET framework, as porting is still in progress&lt;/li&gt;
&lt;li&gt;The .NET Core-CLR is now available for: FreeBSD, Linux, NetBSD, and OS X
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=146281531025185&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD SROP mitigation – call for testing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new technique for exploiting flaws in applications and operating systems has been developed, called SROP&lt;/li&gt;
&lt;li&gt;“we describe Sigreturn Oriented Programming (SROP), a novel technique for exploits and   backdoors in UNIX-like systems. Like return-oriented programming (ROP), sigreturn  oriented  programming  constructs  what  is  known  as a  ‘weird  machine’  that  can  be  programmed  by  attackers  to change  the  behavior  of  a  process.  To  program  the  machine, attackers  set  up  fake  signal  frames  and  initiate  returns  from signals that the kernel never really delivered. This is possible, because  UNIX  stores  signal  frames  on  the  process’  stack.”&lt;/li&gt;
&lt;li&gt;“Sigreturn oriented programming is interesting for attackers, OS  developers  and  academics.  For  attackers,  the  technique is  very  versatile,  with  pre-conditions  that  are  different  from those  of  existing  exploitation  techniques  like  ROP.  Moreover, unlike  ROP,  sigreturn  oriented  programming  programs  are portable. For OS developers, the technique presents a problem that has been present in one of the two main operating system families  from  its  inception,  while  the  fixes  (which  we  also present)  are  non-trivial.  From  a  more  academic  viewpoint,  it is  also  interesting  because  we  show  that  sigreturn  oriented programming  is  Turing  complete.”&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.cs.vu.nl/%7Eherbertb/papers/srop_sp14.pdf" target="_blank" rel="nofollow noopener"&gt;Paper describing SROP &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;OpenBSD has developed a mitigation against SROP&lt;/li&gt;
&lt;li&gt;“Utilizing a trick from kbind(2), the kernel now only accepts signal returns from the PC address of the sigreturn(2) syscall in the signal trampoline.  Since the signal trampoline page is randomized placed per process, it is only known by directly returning from a signal handler.”&lt;/li&gt;
&lt;li&gt;“As well, the sigcontext provided to sigreturn(2) now contains a magic cookie constructed from a per-process cookie XOR'd against the address of the signal context.”&lt;/li&gt;
&lt;li&gt;This is just a draft of the patch, not yet considered production quality
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/supradix/rumprun-packages/tree/33d9cc3a65a39e32b4bc8034c151a5d7e0b89f66/tor" target="_blank" rel="nofollow noopener"&gt;Running Tor in a NetBSD rump unikernel&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve talked about “rump” kernels before, and also Tor pretty frequently, but this new github project combines the two!&lt;/li&gt;
&lt;li&gt;Specifically, this set of Makefile and scripts will prep a system to run Tor via the Unikernel through Qemu.&lt;/li&gt;
&lt;li&gt;The script mainly describes how to do the initial setup on Linux, using iptables, but could easily be adapted to a BSD if somebody wants to do so. (Send them a pull request with the instructions!)&lt;/li&gt;
&lt;li&gt;All in all, this is a fascinating way to run a Tor node or relay, in the most minimal operating environment possible.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.mindrot.org/pipermail/openssh-unix-dev/2016-May/035069.html" target="_blank" rel="nofollow noopener"&gt;An update on SSH protocol 1 ("we're most of the way towards fully deprecating SSH protocol 1"&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Damien Miller has given us an update on the status of the “SSH protocol 1”, and the current plans to deprecate it in an upcoming version of openssh.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “We've had this old protocol in various stages of deprecation for almost 10 years and it has been compile-time disabled for about a year.&lt;br&gt;
&amp;gt; Downstream vendors, to their credit, have included this change in recent OS releases by shipping OpenSSH packages that disable protocol 1 by default and/or offering separate, non-default packages to enable it.&lt;/p&gt;

&lt;p&gt;&amp;gt; This seems to have proceeded far more smoothly than even my most optimistic hopes, so this gives us greater confidence that we can complete the removal of protocol 1 soon. We want to do this partly to hasten the demise of this cryptographic trainwreck, but also because doing so removes a lot of legacy code from OpenSSH that inflates our attack surface. Having it gone will make our jobs quite a bit easier as we maintain and refactor.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The current time-line looks like removing server-size protocol 1 support this August after OpenSSH 7.4 is released, leaving client-side disabled.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Then a year from now (June 2017) all protocol 1 code will be removed.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://teespring.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;Last day to get your BSDNow Shirts! Order now, wear at BSDCan!&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/atxhack4change/2016-project-proposals/issues/15" target="_blank" rel="nofollow noopener"&gt;Move local government (Austin TX) from Microsoft Windows (incl. Office) to Linux and/or PC-BSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2016-May/016642.html" target="_blank" rel="nofollow noopener"&gt;Plan9 boot camp is back... and already at capacity. Another opportunity may come in September&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://functionallyparanoid.com/2016/04/22/smaller-is-better/" target="_blank" rel="nofollow noopener"&gt;Smaller is better - building an openbsd based router&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://i.redditmedia.com/KAjSscL9XOUdpIEWBQF1qi3QMr7zWgeETzQM6m3B4mY.jpg?w=1024&amp;amp;s=e8c08a7d4c4cea0256adb69b1e7c1887" target="_blank" rel="nofollow noopener"&gt;Baby Unix&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://security.freebsd.org/advisories/FreeBSD-SA-16:19.sendmsg.asc" target="_blank" rel="nofollow noopener"&gt;Security Update for FreeBSD&lt;/a&gt; &amp;amp; &lt;a href="https://security.freebsd.org/advisories/FreeBSD-SA-16:18.atkbd.asc" target="_blank" rel="nofollow noopener"&gt;Another security update for FreeBSD&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ZknTuKGv" target="_blank" rel="nofollow noopener"&gt; Eric - The iX experience&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/M760ZmHQ" target="_blank" rel="nofollow noopener"&gt; Mike - Building Ports&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Pi0AFghV" target="_blank" rel="nofollow noopener"&gt; David - ZFS Backups&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/EQ7envez" target="_blank" rel="nofollow noopener"&gt; James - BSD VPS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/p0HPDisH" target="_blank" rel="nofollow noopener"&gt; Rich - ZFS Followup&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we have all the latest news and stories! Plus an interview with BSD developer Alfred Perlstein, that you</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://bsdmag.org/download/reusing_openbsd/" rel="nofollow">The May issus of BSDMag is now out</a></h3>

<ul>
<li>GhostBSD</li>
<li>Reusing OpenBSD&#39;s arc4random in multi-threaded user space programs</li>
<li>Securing VPN&#39;s with GRE / Strongswan</li>
<li>Installing XFCE 4.12 on NetBSD 7</li>
<li>Interview with Fernando Rodriguez, the co-founder of KeepCoding
***</li>
</ul>

<h3><a href="http://blog.acumensecurity.net/fpt_wx_ext-1-a-rundown/" rel="nofollow">A rundown of the FPT_W<sup>X_EXT.1</sup> security reqiurement for General Purpose Operating Systems by the NSA</a></h3>

<ul>
<li><a href="https://www.commoncriteriaportal.org/files/ppfiles/pp_os_v4.1-vr.pdf" rel="nofollow">NIST/NSA Validation Scheme Report</a> </li>
<li>The SFR or Security Functional Requirement requires that; &quot;The OS shall prevent allocation of any memory region with both write and execute permissions except for [assignment: list of exceptions].&quot;</li>
<li>While nearly all operating systems currently support the use of the NX bit, or the equivalent on processors such as SPARC and ARM, and will correctly mark the stack as non-executable, the fact remains that this in and of itself is deemed insufficient by NIST and NSA.</li>
<li>OpenBSD 5.8, FreeBSD, Solaris, RHEL, and most other Linux distro have failed.</li>
<li>HardenedBSD passes all three tests out of the box.</li>
<li>NetBSD will do so with a single sysctl tweak. Since they are using the PaX model, anything else using PaX, such as a grsecurity-enabled Linux distribution pass these assurance activities as well.</li>
<li>OpenBSD 5.9 does not allow memory mapping due to W<sup>X</sup> being enforced by the kernel, however the kernel will panic if there are any attempts to create such mappings.
***</li>
</ul>

<h3><a href="https://distrowatch.com/weekly.php?issue=20160516#freebsd" rel="nofollow">DistroWatch reviews new features in FreeBSD 10.3</a></h3>

<ul>
<li>DistroWatch did a review of FreeBSD 10.3</li>
<li>They ran into a few problems, but hopefully those can be fixed</li>
<li>An issue with beadm setting the canmount property incorrectly causing the ZFS BE menu to not work as expected should be resolved in the next version, thanks to a patch from kmoore</li>
<li>The limitations of the Linux 64 support are what they are, CentOS 6 is still fairly popular with enterprise software, but hopefully some folks are interested in working on bringing the syscall emulation forward</li>
<li>In a third issue, the reviewer seemed to have issues SSHing from inside the jail. This likely has to do with how they got a console in the jail. I remember having problems with this in the past, something about a secure console.
***</li>
</ul>

<h3><a href="https://www.salon.com/2000/05/16/chapter_2_part_one/" rel="nofollow">BSD Unix: Power to the people, from the code</a></h3>

<ul>
<li>Salon.com has a very long article, chronicling much of the history behind BSD UNIX.</li>
<li>It starts with detailing the humble origins of BSD, starting with Bill Joy in the mid-70’s, and then goes through details on how it rapidly grew, and the influence that the University of Berkeley had on open-source. </li>
</ul>

<blockquote>
<p>“But too much focus on Joy, a favorite target for business magazine hagiography, obscures the larger picture. Berkeley’s most important contribution was not software; it was the way Berkeley created software. At Berkeley, a small core group — never more than four people at any one time — coordinated the contributions of an ever-growing network of far-flung, mostly volunteer programmers into progressive releases of steadily improving software. In so doing, they codified a template for what is now referred to as the “open-source software development methodology.” Put more simply, the Berkeley hackers set up a system for creating free software.”</p>
</blockquote>

<ul>
<li>The article goes on to talk about some of the back and forth between Linux and BSD, and why Linux has captured more of the market in recent years, but BSD is far from throwing in the towel.</li>
</ul>

<blockquote>
<p>“BSD patriots argue that the battle is far from over, that BSD is technically superior and will therefore win in the end. That’s for the future to determine. What’s indisputable is BSD’s contribution in the past. Even if, by 1975, Berkeley’s Free Speech Movement was a relic belonging to a fast-fading generation, on the fourth floor of Evans Hall, where Joy shared an office, the free-software movement was just beginning.”</p>
</blockquote>

<ul>
<li>An excellent article (If a bit long), but well worth your time to understand the origins of what we consider modern day BSD, and how the University of Berkley helped shape it.
***</li>
</ul>

<h3><a href="http://ixsystems.com" rel="nofollow">iXsystems</a></h3>

<ul>
<li><a href="https://www.ixsystems.com/blog/serverenvy-10000-terabytes/" rel="nofollow">#ServerEnvy: It&#39;s over 10,000 Terabytes!</a> 
***</li>
</ul>

<h2>Interview - Alfred Perlstein - <a href="mailto:alfred@freebsd.org" rel="nofollow">alfred@freebsd.org</a> / <a href="https://twitter.com/splbio" rel="nofollow">@splbio</a></h2>

<ul>
<li>Using BSD for projects
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/dotnet/coreclr/pull/4504/files" rel="nofollow">.NET framework ported to NetBSD</a></h3>

<ul>
<li>This pull request adds basic support for the .NET framework on NetBSD 7.x amd64</li>
<li>It includes documentation on how to get the .NET framework installed</li>
<li>It uses pkgsrc to bootstrap the required tools</li>
<li>pkgsrc-wip is used to get the actual .NET framework, as porting is still in progress</li>
<li>The .NET Core-CLR is now available for: FreeBSD, Linux, NetBSD, and OS X
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-tech&m=146281531025185&w=2" rel="nofollow">OpenBSD SROP mitigation – call for testing</a></h3>

<ul>
<li>A new technique for exploiting flaws in applications and operating systems has been developed, called SROP</li>
<li>“we describe Sigreturn Oriented Programming (SROP), a novel technique for exploits and   backdoors in UNIX-like systems. Like return-oriented programming (ROP), sigreturn  oriented  programming  constructs  what  is  known  as a  ‘weird  machine’  that  can  be  programmed  by  attackers  to change  the  behavior  of  a  process.  To  program  the  machine, attackers  set  up  fake  signal  frames  and  initiate  returns  from signals that the kernel never really delivered. This is possible, because  UNIX  stores  signal  frames  on  the  process’  stack.”</li>
<li>“Sigreturn oriented programming is interesting for attackers, OS  developers  and  academics.  For  attackers,  the  technique is  very  versatile,  with  pre-conditions  that  are  different  from those  of  existing  exploitation  techniques  like  ROP.  Moreover, unlike  ROP,  sigreturn  oriented  programming  programs  are portable. For OS developers, the technique presents a problem that has been present in one of the two main operating system families  from  its  inception,  while  the  fixes  (which  we  also present)  are  non-trivial.  From  a  more  academic  viewpoint,  it is  also  interesting  because  we  show  that  sigreturn  oriented programming  is  Turing  complete.”</li>
<li><a href="http://www.cs.vu.nl/%7Eherbertb/papers/srop_sp14.pdf" rel="nofollow">Paper describing SROP </a> </li>
<li>OpenBSD has developed a mitigation against SROP</li>
<li>“Utilizing a trick from kbind(2), the kernel now only accepts signal returns from the PC address of the sigreturn(2) syscall in the signal trampoline.  Since the signal trampoline page is randomized placed per process, it is only known by directly returning from a signal handler.”</li>
<li>“As well, the sigcontext provided to sigreturn(2) now contains a magic cookie constructed from a per-process cookie XOR&#39;d against the address of the signal context.”</li>
<li>This is just a draft of the patch, not yet considered production quality
***</li>
</ul>

<h3><a href="https://github.com/supradix/rumprun-packages/tree/33d9cc3a65a39e32b4bc8034c151a5d7e0b89f66/tor" rel="nofollow">Running Tor in a NetBSD rump unikernel</a></h3>

<ul>
<li>We’ve talked about “rump” kernels before, and also Tor pretty frequently, but this new github project combines the two!</li>
<li>Specifically, this set of Makefile and scripts will prep a system to run Tor via the Unikernel through Qemu.</li>
<li>The script mainly describes how to do the initial setup on Linux, using iptables, but could easily be adapted to a BSD if somebody wants to do so. (Send them a pull request with the instructions!)</li>
<li>All in all, this is a fascinating way to run a Tor node or relay, in the most minimal operating environment possible.
***</li>
</ul>

<h3><a href="http://lists.mindrot.org/pipermail/openssh-unix-dev/2016-May/035069.html" rel="nofollow">An update on SSH protocol 1 (&quot;we&#39;re most of the way towards fully deprecating SSH protocol 1&quot;</a></h3>

<ul>
<li>Damien Miller has given us an update on the status of the “SSH protocol 1”, and the current plans to deprecate it in an upcoming version of openssh.</li>
</ul>

<blockquote>
<p>“We&#39;ve had this old protocol in various stages of deprecation for almost 10 years and it has been compile-time disabled for about a year.<br>
Downstream vendors, to their credit, have included this change in recent OS releases by shipping OpenSSH packages that disable protocol 1 by default and/or offering separate, non-default packages to enable it.</p>

<p>This seems to have proceeded far more smoothly than even my most optimistic hopes, so this gives us greater confidence that we can complete the removal of protocol 1 soon. We want to do this partly to hasten the demise of this cryptographic trainwreck, but also because doing so removes a lot of legacy code from OpenSSH that inflates our attack surface. Having it gone will make our jobs quite a bit easier as we maintain and refactor.”</p>
</blockquote>

<ul>
<li><p>The current time-line looks like removing server-size protocol 1 support this August after OpenSSH 7.4 is released, leaving client-side disabled.</p></li>
<li><p>Then a year from now (June 2017) all protocol 1 code will be removed.</p>

<hr></li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://teespring.com/bsdnow" rel="nofollow">Last day to get your BSDNow Shirts! Order now, wear at BSDCan!</a> </p></li>
<li><p><a href="https://github.com/atxhack4change/2016-project-proposals/issues/15" rel="nofollow">Move local government (Austin TX) from Microsoft Windows (incl. Office) to Linux and/or PC-BSD</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/talk/2016-May/016642.html" rel="nofollow">Plan9 boot camp is back... and already at capacity. Another opportunity may come in September</a> </p></li>
<li><p><a href="https://functionallyparanoid.com/2016/04/22/smaller-is-better/" rel="nofollow">Smaller is better - building an openbsd based router</a> </p></li>
<li><p><a href="https://i.redditmedia.com/KAjSscL9XOUdpIEWBQF1qi3QMr7zWgeETzQM6m3B4mY.jpg?w=1024&s=e8c08a7d4c4cea0256adb69b1e7c1887" rel="nofollow">Baby Unix</a> </p></li>
<li><p><a href="https://security.freebsd.org/advisories/FreeBSD-SA-16:19.sendmsg.asc" rel="nofollow">Security Update for FreeBSD</a> &amp; <a href="https://security.freebsd.org/advisories/FreeBSD-SA-16:18.atkbd.asc" rel="nofollow">Another security update for FreeBSD</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ZknTuKGv" rel="nofollow"> Eric - The iX experience</a> </li>
<li><a href="http://pastebin.com/M760ZmHQ" rel="nofollow"> Mike - Building Ports</a> </li>
<li><a href="http://pastebin.com/Pi0AFghV" rel="nofollow"> David - ZFS Backups</a> </li>
<li><a href="http://pastebin.com/EQ7envez" rel="nofollow"> James - BSD VPS</a> </li>
<li><a href="http://pastebin.com/p0HPDisH" rel="nofollow"> Rich - ZFS Followup</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we have all the latest news and stories! Plus an interview with BSD developer Alfred Perlstein, that you</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://bsdmag.org/download/reusing_openbsd/" rel="nofollow">The May issus of BSDMag is now out</a></h3>

<ul>
<li>GhostBSD</li>
<li>Reusing OpenBSD&#39;s arc4random in multi-threaded user space programs</li>
<li>Securing VPN&#39;s with GRE / Strongswan</li>
<li>Installing XFCE 4.12 on NetBSD 7</li>
<li>Interview with Fernando Rodriguez, the co-founder of KeepCoding
***</li>
</ul>

<h3><a href="http://blog.acumensecurity.net/fpt_wx_ext-1-a-rundown/" rel="nofollow">A rundown of the FPT_W<sup>X_EXT.1</sup> security reqiurement for General Purpose Operating Systems by the NSA</a></h3>

<ul>
<li><a href="https://www.commoncriteriaportal.org/files/ppfiles/pp_os_v4.1-vr.pdf" rel="nofollow">NIST/NSA Validation Scheme Report</a> </li>
<li>The SFR or Security Functional Requirement requires that; &quot;The OS shall prevent allocation of any memory region with both write and execute permissions except for [assignment: list of exceptions].&quot;</li>
<li>While nearly all operating systems currently support the use of the NX bit, or the equivalent on processors such as SPARC and ARM, and will correctly mark the stack as non-executable, the fact remains that this in and of itself is deemed insufficient by NIST and NSA.</li>
<li>OpenBSD 5.8, FreeBSD, Solaris, RHEL, and most other Linux distro have failed.</li>
<li>HardenedBSD passes all three tests out of the box.</li>
<li>NetBSD will do so with a single sysctl tweak. Since they are using the PaX model, anything else using PaX, such as a grsecurity-enabled Linux distribution pass these assurance activities as well.</li>
<li>OpenBSD 5.9 does not allow memory mapping due to W<sup>X</sup> being enforced by the kernel, however the kernel will panic if there are any attempts to create such mappings.
***</li>
</ul>

<h3><a href="https://distrowatch.com/weekly.php?issue=20160516#freebsd" rel="nofollow">DistroWatch reviews new features in FreeBSD 10.3</a></h3>

<ul>
<li>DistroWatch did a review of FreeBSD 10.3</li>
<li>They ran into a few problems, but hopefully those can be fixed</li>
<li>An issue with beadm setting the canmount property incorrectly causing the ZFS BE menu to not work as expected should be resolved in the next version, thanks to a patch from kmoore</li>
<li>The limitations of the Linux 64 support are what they are, CentOS 6 is still fairly popular with enterprise software, but hopefully some folks are interested in working on bringing the syscall emulation forward</li>
<li>In a third issue, the reviewer seemed to have issues SSHing from inside the jail. This likely has to do with how they got a console in the jail. I remember having problems with this in the past, something about a secure console.
***</li>
</ul>

<h3><a href="https://www.salon.com/2000/05/16/chapter_2_part_one/" rel="nofollow">BSD Unix: Power to the people, from the code</a></h3>

<ul>
<li>Salon.com has a very long article, chronicling much of the history behind BSD UNIX.</li>
<li>It starts with detailing the humble origins of BSD, starting with Bill Joy in the mid-70’s, and then goes through details on how it rapidly grew, and the influence that the University of Berkeley had on open-source. </li>
</ul>

<blockquote>
<p>“But too much focus on Joy, a favorite target for business magazine hagiography, obscures the larger picture. Berkeley’s most important contribution was not software; it was the way Berkeley created software. At Berkeley, a small core group — never more than four people at any one time — coordinated the contributions of an ever-growing network of far-flung, mostly volunteer programmers into progressive releases of steadily improving software. In so doing, they codified a template for what is now referred to as the “open-source software development methodology.” Put more simply, the Berkeley hackers set up a system for creating free software.”</p>
</blockquote>

<ul>
<li>The article goes on to talk about some of the back and forth between Linux and BSD, and why Linux has captured more of the market in recent years, but BSD is far from throwing in the towel.</li>
</ul>

<blockquote>
<p>“BSD patriots argue that the battle is far from over, that BSD is technically superior and will therefore win in the end. That’s for the future to determine. What’s indisputable is BSD’s contribution in the past. Even if, by 1975, Berkeley’s Free Speech Movement was a relic belonging to a fast-fading generation, on the fourth floor of Evans Hall, where Joy shared an office, the free-software movement was just beginning.”</p>
</blockquote>

<ul>
<li>An excellent article (If a bit long), but well worth your time to understand the origins of what we consider modern day BSD, and how the University of Berkley helped shape it.
***</li>
</ul>

<h3><a href="http://ixsystems.com" rel="nofollow">iXsystems</a></h3>

<ul>
<li><a href="https://www.ixsystems.com/blog/serverenvy-10000-terabytes/" rel="nofollow">#ServerEnvy: It&#39;s over 10,000 Terabytes!</a> 
***</li>
</ul>

<h2>Interview - Alfred Perlstein - <a href="mailto:alfred@freebsd.org" rel="nofollow">alfred@freebsd.org</a> / <a href="https://twitter.com/splbio" rel="nofollow">@splbio</a></h2>

<ul>
<li>Using BSD for projects
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/dotnet/coreclr/pull/4504/files" rel="nofollow">.NET framework ported to NetBSD</a></h3>

<ul>
<li>This pull request adds basic support for the .NET framework on NetBSD 7.x amd64</li>
<li>It includes documentation on how to get the .NET framework installed</li>
<li>It uses pkgsrc to bootstrap the required tools</li>
<li>pkgsrc-wip is used to get the actual .NET framework, as porting is still in progress</li>
<li>The .NET Core-CLR is now available for: FreeBSD, Linux, NetBSD, and OS X
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-tech&m=146281531025185&w=2" rel="nofollow">OpenBSD SROP mitigation – call for testing</a></h3>

<ul>
<li>A new technique for exploiting flaws in applications and operating systems has been developed, called SROP</li>
<li>“we describe Sigreturn Oriented Programming (SROP), a novel technique for exploits and   backdoors in UNIX-like systems. Like return-oriented programming (ROP), sigreturn  oriented  programming  constructs  what  is  known  as a  ‘weird  machine’  that  can  be  programmed  by  attackers  to change  the  behavior  of  a  process.  To  program  the  machine, attackers  set  up  fake  signal  frames  and  initiate  returns  from signals that the kernel never really delivered. This is possible, because  UNIX  stores  signal  frames  on  the  process’  stack.”</li>
<li>“Sigreturn oriented programming is interesting for attackers, OS  developers  and  academics.  For  attackers,  the  technique is  very  versatile,  with  pre-conditions  that  are  different  from those  of  existing  exploitation  techniques  like  ROP.  Moreover, unlike  ROP,  sigreturn  oriented  programming  programs  are portable. For OS developers, the technique presents a problem that has been present in one of the two main operating system families  from  its  inception,  while  the  fixes  (which  we  also present)  are  non-trivial.  From  a  more  academic  viewpoint,  it is  also  interesting  because  we  show  that  sigreturn  oriented programming  is  Turing  complete.”</li>
<li><a href="http://www.cs.vu.nl/%7Eherbertb/papers/srop_sp14.pdf" rel="nofollow">Paper describing SROP </a> </li>
<li>OpenBSD has developed a mitigation against SROP</li>
<li>“Utilizing a trick from kbind(2), the kernel now only accepts signal returns from the PC address of the sigreturn(2) syscall in the signal trampoline.  Since the signal trampoline page is randomized placed per process, it is only known by directly returning from a signal handler.”</li>
<li>“As well, the sigcontext provided to sigreturn(2) now contains a magic cookie constructed from a per-process cookie XOR&#39;d against the address of the signal context.”</li>
<li>This is just a draft of the patch, not yet considered production quality
***</li>
</ul>

<h3><a href="https://github.com/supradix/rumprun-packages/tree/33d9cc3a65a39e32b4bc8034c151a5d7e0b89f66/tor" rel="nofollow">Running Tor in a NetBSD rump unikernel</a></h3>

<ul>
<li>We’ve talked about “rump” kernels before, and also Tor pretty frequently, but this new github project combines the two!</li>
<li>Specifically, this set of Makefile and scripts will prep a system to run Tor via the Unikernel through Qemu.</li>
<li>The script mainly describes how to do the initial setup on Linux, using iptables, but could easily be adapted to a BSD if somebody wants to do so. (Send them a pull request with the instructions!)</li>
<li>All in all, this is a fascinating way to run a Tor node or relay, in the most minimal operating environment possible.
***</li>
</ul>

<h3><a href="http://lists.mindrot.org/pipermail/openssh-unix-dev/2016-May/035069.html" rel="nofollow">An update on SSH protocol 1 (&quot;we&#39;re most of the way towards fully deprecating SSH protocol 1&quot;</a></h3>

<ul>
<li>Damien Miller has given us an update on the status of the “SSH protocol 1”, and the current plans to deprecate it in an upcoming version of openssh.</li>
</ul>

<blockquote>
<p>“We&#39;ve had this old protocol in various stages of deprecation for almost 10 years and it has been compile-time disabled for about a year.<br>
Downstream vendors, to their credit, have included this change in recent OS releases by shipping OpenSSH packages that disable protocol 1 by default and/or offering separate, non-default packages to enable it.</p>

<p>This seems to have proceeded far more smoothly than even my most optimistic hopes, so this gives us greater confidence that we can complete the removal of protocol 1 soon. We want to do this partly to hasten the demise of this cryptographic trainwreck, but also because doing so removes a lot of legacy code from OpenSSH that inflates our attack surface. Having it gone will make our jobs quite a bit easier as we maintain and refactor.”</p>
</blockquote>

<ul>
<li><p>The current time-line looks like removing server-size protocol 1 support this August after OpenSSH 7.4 is released, leaving client-side disabled.</p></li>
<li><p>Then a year from now (June 2017) all protocol 1 code will be removed.</p>

<hr></li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://teespring.com/bsdnow" rel="nofollow">Last day to get your BSDNow Shirts! Order now, wear at BSDCan!</a> </p></li>
<li><p><a href="https://github.com/atxhack4change/2016-project-proposals/issues/15" rel="nofollow">Move local government (Austin TX) from Microsoft Windows (incl. Office) to Linux and/or PC-BSD</a> </p></li>
<li><p><a href="http://lists.nycbug.org/pipermail/talk/2016-May/016642.html" rel="nofollow">Plan9 boot camp is back... and already at capacity. Another opportunity may come in September</a> </p></li>
<li><p><a href="https://functionallyparanoid.com/2016/04/22/smaller-is-better/" rel="nofollow">Smaller is better - building an openbsd based router</a> </p></li>
<li><p><a href="https://i.redditmedia.com/KAjSscL9XOUdpIEWBQF1qi3QMr7zWgeETzQM6m3B4mY.jpg?w=1024&s=e8c08a7d4c4cea0256adb69b1e7c1887" rel="nofollow">Baby Unix</a> </p></li>
<li><p><a href="https://security.freebsd.org/advisories/FreeBSD-SA-16:19.sendmsg.asc" rel="nofollow">Security Update for FreeBSD</a> &amp; <a href="https://security.freebsd.org/advisories/FreeBSD-SA-16:18.atkbd.asc" rel="nofollow">Another security update for FreeBSD</a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ZknTuKGv" rel="nofollow"> Eric - The iX experience</a> </li>
<li><a href="http://pastebin.com/M760ZmHQ" rel="nofollow"> Mike - Building Ports</a> </li>
<li><a href="http://pastebin.com/Pi0AFghV" rel="nofollow"> David - ZFS Backups</a> </li>
<li><a href="http://pastebin.com/EQ7envez" rel="nofollow"> James - BSD VPS</a> </li>
<li><a href="http://pastebin.com/p0HPDisH" rel="nofollow"> Rich - ZFS Followup</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>141: BSD Likes Ike!</title>
  <link>https://www.bsdnow.tv/141</link>
  <guid isPermaLink="false">ce14c795-4c84-4fcb-962e-611036c7abfa</guid>
  <pubDate>Wed, 11 May 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ce14c795-4c84-4fcb-962e-611036c7abfa.mp3" length="72815476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we have all the latest news and stories! Plus we’ll be hearing more about OpnSense from the man himself, Ike!</itunes:subtitle>
  <itunes:duration>1:41:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we have all the latest news and stories! Plus we’ll be hearing more about OpnSense from the man himself, Ike!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/regarding-embargoes" target="_blank" rel="nofollow noopener"&gt;Regarding Embargoes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy TedU has a great thought piece today on the idea of “embargoes” for security advisories. &lt;/li&gt;
&lt;li&gt;This all stemmed from a recent incident with LibreSSL patches from embargoed OpenSSL vulns, that accidentally got committed too early. &lt;/li&gt;
&lt;li&gt;Ted makes a pretty good case on the difficulties of having embargos, and maybe the reason there shouldn’t be. Couple of quotes to give you a taste:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “There are several difficulties maintaining embargoes. Keeping secrets is against human nature. I don’t want to be the one who leaks, but if I see something that looks like the secret is out, it’s a relief to be able to speak freely. There is a bias towards recognizing such signs where they may not really exist. (Exacerbated by broad embargoes where some parts leak but other parts don’t. It’s actually very hard to tell what’s not publicly known when you know everything.)&lt;/p&gt;

&lt;p&gt;&amp;gt; The most thorough embargo and release timeline reconstruction is the heartbleed timeline. It’s another great case study. Who exactly decided who were the haves and have nots? Was it determined by who needed to know or who you needed to know? Eventually the dam started to crack.”&lt;/p&gt;

&lt;p&gt;&amp;gt; “When Cloudflare brags that they get advance notice of vulnerabilities, attracting more customers, and therefore requiring even more early access, how are smaller players to compete? What happens if you’re not big enough to prenotify?&lt;/p&gt;

&lt;p&gt;&amp;gt; Sometimes vulnerabilities are announced unplanned. Zero day cyber missiles are part of our reality, which means end users don’t really have the luxury of only patching on Tuesday. They need to apply patches when they appear. If applying patches at inconvenient times is a problem, make it not a problem. Not really a gripe about embargoes per se, but the scheduled timing of coordinated release at the end of the embargo is catering to a problem that shouldn’t exist.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;I will admit that CloudFlare bragging around Heartbleed was upsetting&lt;/li&gt;
&lt;li&gt;The biggest issue here is the difficulty with coordinating so many open source projects, which are often done by volunteers, in different countries and time zones&lt;/li&gt;
&lt;li&gt;The other issue is determining when the secret is “out of the bag”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/faq/current.html#r20160507" target="_blank" rel="nofollow noopener"&gt;MAJOR ABI BREAK: csu, ld.so, libc, libpthread update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD warns those following the -current (development) branch to be careful as they upgrade because of a major ABI break that will result in applications not working&lt;/li&gt;
&lt;li&gt;“Handling of single-threaded programs is now closer to multi-threaded, with ld.so and libc.a doing thread information base (TIB) allocation. Threaded programs from before the 2016/03/19 csu and ld.so update will no longer run. An updated ld.so must be built and installed before running make build.”&lt;/li&gt;
&lt;li&gt;A special note for those on PowerPC: “PowerPC has been updated to offset the TIB from the hardware register. As a result, all threaded programs are broken until they have been rebuilt with the new libc and libpthread. perl must be built after building the libraries and before building the rest of base.”&lt;/li&gt;
&lt;li&gt;“The definitions of environ and __progname for dynamically linked programs have been moved from the C startup code to ld.so(1). An updated ld.so must be built and installed before running make build.”&lt;/li&gt;
&lt;li&gt;The link provides instructions on how to update your system properly
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://random-notes-of-a-sysadmin.blogspot.be/2016/04/howto-install-freebsd-103-on-vmware.html" target="_blank" rel="nofollow noopener"&gt;How to install FreeBSD 10.3 on VMWare Workstation 12 Pro&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This tutorial starts at the very basics, running through the FreeBSD installer&lt;/li&gt;
&lt;li&gt;But then it goes on to configuring the machine specifically for VMWare&lt;/li&gt;
&lt;li&gt;After the system has been booted, the tutorial walks through installing the VMWare tools&lt;/li&gt;
&lt;li&gt;Then networking is configured in both VMWare and FreeBSD&lt;/li&gt;
&lt;li&gt;A small hack is required to make the VMWare tools startup script wait until the network is up&lt;/li&gt;
&lt;li&gt;A very nice tutorial for people using VMWare&lt;/li&gt;
&lt;li&gt;I am working on a patch to bsdinstall to ensure that the swap partition is put before the main partition, so it can more easily be resized if you later decide you need more space in your VM&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=299371" target="_blank" rel="nofollow noopener"&gt;the camcontrol reprobe subcommand has been added &lt;/a&gt;,&lt;/li&gt;
&lt;li&gt;“This makes it possible to manually force updating capacity data after the disk got resized. Without it it might be necessary to reboot before FreeBSD notices updated disk size under eg VMWare.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.59/" target="_blank" rel="nofollow noopener"&gt;BSD Router project releases v1.59&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve talked about the BSD Router project a bit in the past, but today we have a brand new release to bring to you. &lt;/li&gt;
&lt;li&gt;For those who don’t remember, the BSDrp is a router aimed at replacing more of your big-commercial type systems.&lt;/li&gt;
&lt;li&gt;First up in the new hotness, we have it based upon recently released FreeBSD 10.3!&lt;/li&gt;
&lt;li&gt;In addition, there is a new package: New package: mlvpn (aggregated network links in order to benefit from the bandwidth of multiple links)&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Other packages have gotten a bump with this release as well: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;bsnmp-ucd to 0.4.2&lt;/li&gt;
&lt;li&gt;dma to 0.11&lt;/li&gt;
&lt;li&gt;dmidecode to 3.0&lt;/li&gt;
&lt;li&gt;exabgp to 3.4.15&lt;/li&gt;
&lt;li&gt;iperf3 to 3.1.2&lt;/li&gt;
&lt;li&gt;monit to 5.17&lt;/li&gt;
&lt;li&gt;mpd5 to 5.8&lt;/li&gt;
&lt;li&gt;openvpn to 2.3.10&lt;/li&gt;
&lt;li&gt;python to 2.7.11&lt;/li&gt;
&lt;li&gt;quagga to 1.0.20160315&lt;/li&gt;
&lt;li&gt;strongswan to 5.4.0&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;What are you waiting for? Amd64 and i386 images are ready for you to download now. &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Isaac (.Ike) Levy -&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://semibug.org/" target="_blank" rel="nofollow noopener"&gt;See Ike again at SEMIBug in Troy, Michigan on May 17th&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/tredly/" target="_blank" rel="nofollow noopener"&gt;Tredly - Prebuilt containers on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.reddit.com/r/freebsd/comments/4gggw8/introducing_tredly_containers_for_unix_freebsd/" target="_blank" rel="nofollow noopener"&gt;Discussion regarding its GPLv3 licensing&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A new “container” solution called “Trendly” has started making some news around various tech sites.&lt;/li&gt;
&lt;li&gt;In particular, this new project uses FreeBSD as its base OS and jail functionality in the backend.&lt;/li&gt;
&lt;li&gt;Their solution seems based around the idea of shipping containers as manifests, such as lists of packages to install and configuration knobs. &lt;/li&gt;
&lt;li&gt;The project is still rather new, and we’ll be keeping an eye on it for the future.&lt;/li&gt;
&lt;li&gt;One notable change already though, it was (for some reason) released under GPLv3. Understandably this caused quite a ruckus with various folks in the community, since it’s built specifically on BSD. Since this, the code has been re-licensed as MIT, which is far more in the spirit of a traditional BSD license. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.netbsd.org/changes/changes-8.0.html#nvme%284%29" target="_blank" rel="nofollow noopener"&gt;NVMe driver added to NetBSD - ported from OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD has gained support for Non-Volatile Memory Express, the new standard for PCIe attached Flash Memory&lt;/li&gt;
&lt;li&gt;The change of interface from SATA to NVMe offers a number of advantages, mostly, it doesn’t require the device to pretend to be a spinning disk&lt;/li&gt;
&lt;li&gt;One of the biggest advantages is that it supports completing multiple operations at once, with the Intel hardware I have tested, 63 I/Os can happen concurrently, so a very large queue depth is required to keep the device busy. The 64th I/O channel is reserved for administrative commands, to keep them from being delayed by the large queue depth&lt;/li&gt;
&lt;li&gt;The device I tested could read at 3800 MB/s, and write 1700MB/s, something that wouldn’t be possible with a normal SSD&lt;/li&gt;
&lt;li&gt;It is interesting that NetBSD took the NVMe support from OpenBSD, whereas the FreeBSD implementation was contributed directly by Intel&lt;/li&gt;
&lt;li&gt;This may have to do with that fact that OpenBSD’s device model is closer to that of NetBSD&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://mail-index.netbsd.org/source-changes/2016/05/01/msg074367.html" target="_blank" rel="nofollow noopener"&gt;Commit Log &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://teespring.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;New BSDNow T-Shirts&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;By popular demand, we have created a more subtle BSDNow shirt&lt;/li&gt;
&lt;li&gt;Featuring only the smallish BSDNow logo over the left breast&lt;/li&gt;
&lt;li&gt;Available in a number of styles (T-Shirt, Women’s T-Shirt, Long Sleeve, and Hoodie) as well as a number of colours: Black, Blue, Grey, and White&lt;/li&gt;
&lt;li&gt;The hope is that enough orders come though so we can get them shipped in and your sweaty little hands in time for BSDCan. (I’ll be wearing mine, will you B...SD?)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://teespring.com/bsd105" target="_blank" rel="nofollow noopener"&gt;If you still want one of our now-famous “The Usual BSD’s” t-shirts, you can also indicate your interest here, and once 10 or more shirts are ordered, a reprint will happen automatically&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.pcbsd.org/pipermail/testing/2016-May/010616.html" target="_blank" rel="nofollow noopener"&gt;PC-BSD 11-CURRENT with Package Base&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for a way to play with the new FreeBSD base package system?&lt;/li&gt;
&lt;li&gt;This month’s PC-BSD -CURRENT image now used packages for base system installation, and is asking for testers to help find bugs.&lt;/li&gt;
&lt;li&gt;Known issues so far: 

&lt;ul&gt;
&lt;li&gt;setuid binaries (Fix in works)&lt;/li&gt;
&lt;li&gt;Missing tzone files&lt;/li&gt;
&lt;li&gt;Distrib packages&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;If all that doesn’t scare you away, then give it a whirl! Upgrades for previous APRIL images are now online also.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;BeastieBits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2016-05-05/libressl-hardenedbsd-base" target="_blank" rel="nofollow noopener"&gt;HardenedBSD + LibreSSL&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=6k1Mf0c6YW8" target="_blank" rel="nofollow noopener"&gt;Michael Dexter's talk at LFNW 2016 is the 2nd highest youtube views from this years conference&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://ggr.com/why-openbsd-is-important-to-me.html" target="_blank" rel="nofollow noopener"&gt;Why OpenBSD is important to me&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249581.html" target="_blank" rel="nofollow noopener"&gt;Study of nginx-1.9.12 performance/latency on DragonFlyBSD-g67a73&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.geeklan.co.uk/?p=2109" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD / OpenBSD / NetBSD as a virtualised guest on Online.net&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://zinascii.com/2016/the-illumos-syscall-handler.html" target="_blank" rel="nofollow noopener"&gt;The interesting story of how IllumOS syscalls work &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://mezzantrop.wordpress.com/portfolio/the-beast/" target="_blank" rel="nofollow noopener"&gt;The BeaST is the FreeBSD based dual-controller reliable storage system concept with aim to implement ZFS and in-memory cache.&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-May/500352.html" target="_blank" rel="nofollow noopener"&gt;Francois Tigeot updates the drm/i915 driver to match what’s in Linux kernel 4.3&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/ed_maste/status/730450314889924608" target="_blank" rel="nofollow noopener"&gt;FreeBSD is working on the update to Linux Kernel 4.6, we may finally get ahead of Dragonfly! &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/RT7tVtQ7" target="_blank" rel="nofollow noopener"&gt; Oskar - Torrent Jail&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/VkpMeims" target="_blank" rel="nofollow noopener"&gt; Shane - ZFS Delete&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/MmQ00Sv1" target="_blank" rel="nofollow noopener"&gt; Adam - Zimbra Port&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/Xx9TkX7A" target="_blank" rel="nofollow noopener"&gt; Ray - PC-BSD - FrameBuffer&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ncYxqpg3" target="_blank" rel="nofollow noopener"&gt; Richard - ZFS Backups&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we have all the latest news and stories! Plus we’ll be hearing more about OpnSense from the man himself, Ike!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/regarding-embargoes" rel="nofollow">Regarding Embargoes</a></h3>

<ul>
<li>Our buddy TedU has a great thought piece today on the idea of “embargoes” for security advisories. </li>
<li>This all stemmed from a recent incident with LibreSSL patches from embargoed OpenSSL vulns, that accidentally got committed too early. </li>
<li>Ted makes a pretty good case on the difficulties of having embargos, and maybe the reason there shouldn’t be. Couple of quotes to give you a taste:</li>
</ul>

<blockquote>
<p>“There are several difficulties maintaining embargoes. Keeping secrets is against human nature. I don’t want to be the one who leaks, but if I see something that looks like the secret is out, it’s a relief to be able to speak freely. There is a bias towards recognizing such signs where they may not really exist. (Exacerbated by broad embargoes where some parts leak but other parts don’t. It’s actually very hard to tell what’s not publicly known when you know everything.)</p>

<p>The most thorough embargo and release timeline reconstruction is the heartbleed timeline. It’s another great case study. Who exactly decided who were the haves and have nots? Was it determined by who needed to know or who you needed to know? Eventually the dam started to crack.”</p>

<p>“When Cloudflare brags that they get advance notice of vulnerabilities, attracting more customers, and therefore requiring even more early access, how are smaller players to compete? What happens if you’re not big enough to prenotify?</p>

<p>Sometimes vulnerabilities are announced unplanned. Zero day cyber missiles are part of our reality, which means end users don’t really have the luxury of only patching on Tuesday. They need to apply patches when they appear. If applying patches at inconvenient times is a problem, make it not a problem. Not really a gripe about embargoes per se, but the scheduled timing of coordinated release at the end of the embargo is catering to a problem that shouldn’t exist.”</p>
</blockquote>

<ul>
<li>I will admit that CloudFlare bragging around Heartbleed was upsetting</li>
<li>The biggest issue here is the difficulty with coordinating so many open source projects, which are often done by volunteers, in different countries and time zones</li>
<li>The other issue is determining when the secret is “out of the bag”
***</li>
</ul>

<h3><a href="http://www.openbsd.org/faq/current.html#r20160507" rel="nofollow">MAJOR ABI BREAK: csu, ld.so, libc, libpthread update</a></h3>

<ul>
<li>OpenBSD warns those following the -current (development) branch to be careful as they upgrade because of a major ABI break that will result in applications not working</li>
<li>“Handling of single-threaded programs is now closer to multi-threaded, with ld.so and libc.a doing thread information base (TIB) allocation. Threaded programs from before the 2016/03/19 csu and ld.so update will no longer run. An updated ld.so must be built and installed before running make build.”</li>
<li>A special note for those on PowerPC: “PowerPC has been updated to offset the TIB from the hardware register. As a result, all threaded programs are broken until they have been rebuilt with the new libc and libpthread. perl must be built after building the libraries and before building the rest of base.”</li>
<li>“The definitions of environ and __progname for dynamically linked programs have been moved from the C startup code to ld.so(1). An updated ld.so must be built and installed before running make build.”</li>
<li>The link provides instructions on how to update your system properly
***</li>
</ul>

<h3><a href="http://random-notes-of-a-sysadmin.blogspot.be/2016/04/howto-install-freebsd-103-on-vmware.html" rel="nofollow">How to install FreeBSD 10.3 on VMWare Workstation 12 Pro</a></h3>

<ul>
<li>This tutorial starts at the very basics, running through the FreeBSD installer</li>
<li>But then it goes on to configuring the machine specifically for VMWare</li>
<li>After the system has been booted, the tutorial walks through installing the VMWare tools</li>
<li>Then networking is configured in both VMWare and FreeBSD</li>
<li>A small hack is required to make the VMWare tools startup script wait until the network is up</li>
<li>A very nice tutorial for people using VMWare</li>
<li>I am working on a patch to bsdinstall to ensure that the swap partition is put before the main partition, so it can more easily be resized if you later decide you need more space in your VM</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=299371" rel="nofollow">the camcontrol reprobe subcommand has been added </a>,</li>
<li>“This makes it possible to manually force updating capacity data after the disk got resized. Without it it might be necessary to reboot before FreeBSD notices updated disk size under eg VMWare.”
***</li>
</ul>

<h3><a href="https://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.59/" rel="nofollow">BSD Router project releases v1.59</a></h3>

<ul>
<li>We’ve talked about the BSD Router project a bit in the past, but today we have a brand new release to bring to you. </li>
<li>For those who don’t remember, the BSDrp is a router aimed at replacing more of your big-commercial type systems.</li>
<li>First up in the new hotness, we have it based upon recently released FreeBSD 10.3!</li>
<li>In addition, there is a new package: New package: mlvpn (aggregated network links in order to benefit from the bandwidth of multiple links)</li>
<li><p>Other packages have gotten a bump with this release as well: </p>

<ul>
<li>bsnmp-ucd to 0.4.2</li>
<li>dma to 0.11</li>
<li>dmidecode to 3.0</li>
<li>exabgp to 3.4.15</li>
<li>iperf3 to 3.1.2</li>
<li>monit to 5.17</li>
<li>mpd5 to 5.8</li>
<li>openvpn to 2.3.10</li>
<li>python to 2.7.11</li>
<li>quagga to 1.0.20160315</li>
<li>strongswan to 5.4.0</li>
</ul></li>
<li><p>What are you waiting for? Amd64 and i386 images are ready for you to download now. </p>

<hr></li>
</ul>

<h2>Interview - Isaac (.Ike) Levy -</h2>

<ul>
<li><a href="http://semibug.org/" rel="nofollow">See Ike again at SEMIBug in Troy, Michigan on May 17th</a> 
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/tredly/" rel="nofollow">Tredly - Prebuilt containers on FreeBSD</a></h3>

<ul>
<li><a href="https://www.reddit.com/r/freebsd/comments/4gggw8/introducing_tredly_containers_for_unix_freebsd/" rel="nofollow">Discussion regarding its GPLv3 licensing</a></li>
<li>A new “container” solution called “Trendly” has started making some news around various tech sites.</li>
<li>In particular, this new project uses FreeBSD as its base OS and jail functionality in the backend.</li>
<li>Their solution seems based around the idea of shipping containers as manifests, such as lists of packages to install and configuration knobs. </li>
<li>The project is still rather new, and we’ll be keeping an eye on it for the future.</li>
<li>One notable change already though, it was (for some reason) released under GPLv3. Understandably this caused quite a ruckus with various folks in the community, since it’s built specifically on BSD. Since this, the code has been re-licensed as MIT, which is far more in the spirit of a traditional BSD license. 
***</li>
</ul>

<h3><a href="https://www.netbsd.org/changes/changes-8.0.html#nvme%284%29" rel="nofollow">NVMe driver added to NetBSD - ported from OpenBSD</a></h3>

<ul>
<li>NetBSD has gained support for Non-Volatile Memory Express, the new standard for PCIe attached Flash Memory</li>
<li>The change of interface from SATA to NVMe offers a number of advantages, mostly, it doesn’t require the device to pretend to be a spinning disk</li>
<li>One of the biggest advantages is that it supports completing multiple operations at once, with the Intel hardware I have tested, 63 I/Os can happen concurrently, so a very large queue depth is required to keep the device busy. The 64th I/O channel is reserved for administrative commands, to keep them from being delayed by the large queue depth</li>
<li>The device I tested could read at 3800 MB/s, and write 1700MB/s, something that wouldn’t be possible with a normal SSD</li>
<li>It is interesting that NetBSD took the NVMe support from OpenBSD, whereas the FreeBSD implementation was contributed directly by Intel</li>
<li>This may have to do with that fact that OpenBSD’s device model is closer to that of NetBSD</li>
<li><a href="http://mail-index.netbsd.org/source-changes/2016/05/01/msg074367.html" rel="nofollow">Commit Log </a> 
***</li>
</ul>

<h3><a href="https://teespring.com/bsdnow" rel="nofollow">New BSDNow T-Shirts</a></h3>

<ul>
<li>By popular demand, we have created a more subtle BSDNow shirt</li>
<li>Featuring only the smallish BSDNow logo over the left breast</li>
<li>Available in a number of styles (T-Shirt, Women’s T-Shirt, Long Sleeve, and Hoodie) as well as a number of colours: Black, Blue, Grey, and White</li>
<li>The hope is that enough orders come though so we can get them shipped in and your sweaty little hands in time for BSDCan. (I’ll be wearing mine, will you B...SD?)</li>
<li><a href="https://teespring.com/bsd105" rel="nofollow">If you still want one of our now-famous “The Usual BSD’s” t-shirts, you can also indicate your interest here, and once 10 or more shirts are ordered, a reprint will happen automatically</a> 
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2016-May/010616.html" rel="nofollow">PC-BSD 11-CURRENT with Package Base</a></h3>

<ul>
<li>Looking for a way to play with the new FreeBSD base package system?</li>
<li>This month’s PC-BSD -CURRENT image now used packages for base system installation, and is asking for testers to help find bugs.</li>
<li>Known issues so far: 

<ul>
<li>setuid binaries (Fix in works)</li>
<li>Missing tzone files</li>
<li>Distrib packages</li>
</ul></li>
<li>If all that doesn’t scare you away, then give it a whirl! Upgrades for previous APRIL images are now online also.
***</li>
</ul>

<h2>BeastieBits</h2>

<ul>
<li><p><a href="https://hardenedbsd.org/article/shawn-webb/2016-05-05/libressl-hardenedbsd-base" rel="nofollow">HardenedBSD + LibreSSL</a> </p></li>
<li><p><a href="https://www.youtube.com/watch?v=6k1Mf0c6YW8" rel="nofollow">Michael Dexter&#39;s talk at LFNW 2016 is the 2nd highest youtube views from this years conference</a> </p></li>
<li><p><a href="http://ggr.com/why-openbsd-is-important-to-me.html" rel="nofollow">Why OpenBSD is important to me</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249581.html" rel="nofollow">Study of nginx-1.9.12 performance/latency on DragonFlyBSD-g67a73</a> </p></li>
<li><p><a href="https://www.geeklan.co.uk/?p=2109" rel="nofollow">Running FreeBSD / OpenBSD / NetBSD as a virtualised guest on Online.net</a> </p></li>
<li><p><a href="http://zinascii.com/2016/the-illumos-syscall-handler.html" rel="nofollow">The interesting story of how IllumOS syscalls work </a> </p></li>
<li><p><a href="https://mezzantrop.wordpress.com/portfolio/the-beast/" rel="nofollow">The BeaST is the FreeBSD based dual-controller reliable storage system concept with aim to implement ZFS and in-memory cache.</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-May/500352.html" rel="nofollow">Francois Tigeot updates the drm/i915 driver to match what’s in Linux kernel 4.3</a> </p></li>
<li><p><a href="https://twitter.com/ed_maste/status/730450314889924608" rel="nofollow">FreeBSD is working on the update to Linux Kernel 4.6, we may finally get ahead of Dragonfly! </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/RT7tVtQ7" rel="nofollow"> Oskar - Torrent Jail</a> </li>
<li><a href="http://pastebin.com/VkpMeims" rel="nofollow"> Shane - ZFS Delete</a> </li>
<li><a href="http://pastebin.com/MmQ00Sv1" rel="nofollow"> Adam - Zimbra Port</a> </li>
<li><a href="http://pastebin.com/Xx9TkX7A" rel="nofollow"> Ray - PC-BSD - FrameBuffer</a> </li>
<li><a href="http://pastebin.com/ncYxqpg3" rel="nofollow"> Richard - ZFS Backups</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we have all the latest news and stories! Plus we’ll be hearing more about OpnSense from the man himself, Ike!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/regarding-embargoes" rel="nofollow">Regarding Embargoes</a></h3>

<ul>
<li>Our buddy TedU has a great thought piece today on the idea of “embargoes” for security advisories. </li>
<li>This all stemmed from a recent incident with LibreSSL patches from embargoed OpenSSL vulns, that accidentally got committed too early. </li>
<li>Ted makes a pretty good case on the difficulties of having embargos, and maybe the reason there shouldn’t be. Couple of quotes to give you a taste:</li>
</ul>

<blockquote>
<p>“There are several difficulties maintaining embargoes. Keeping secrets is against human nature. I don’t want to be the one who leaks, but if I see something that looks like the secret is out, it’s a relief to be able to speak freely. There is a bias towards recognizing such signs where they may not really exist. (Exacerbated by broad embargoes where some parts leak but other parts don’t. It’s actually very hard to tell what’s not publicly known when you know everything.)</p>

<p>The most thorough embargo and release timeline reconstruction is the heartbleed timeline. It’s another great case study. Who exactly decided who were the haves and have nots? Was it determined by who needed to know or who you needed to know? Eventually the dam started to crack.”</p>

<p>“When Cloudflare brags that they get advance notice of vulnerabilities, attracting more customers, and therefore requiring even more early access, how are smaller players to compete? What happens if you’re not big enough to prenotify?</p>

<p>Sometimes vulnerabilities are announced unplanned. Zero day cyber missiles are part of our reality, which means end users don’t really have the luxury of only patching on Tuesday. They need to apply patches when they appear. If applying patches at inconvenient times is a problem, make it not a problem. Not really a gripe about embargoes per se, but the scheduled timing of coordinated release at the end of the embargo is catering to a problem that shouldn’t exist.”</p>
</blockquote>

<ul>
<li>I will admit that CloudFlare bragging around Heartbleed was upsetting</li>
<li>The biggest issue here is the difficulty with coordinating so many open source projects, which are often done by volunteers, in different countries and time zones</li>
<li>The other issue is determining when the secret is “out of the bag”
***</li>
</ul>

<h3><a href="http://www.openbsd.org/faq/current.html#r20160507" rel="nofollow">MAJOR ABI BREAK: csu, ld.so, libc, libpthread update</a></h3>

<ul>
<li>OpenBSD warns those following the -current (development) branch to be careful as they upgrade because of a major ABI break that will result in applications not working</li>
<li>“Handling of single-threaded programs is now closer to multi-threaded, with ld.so and libc.a doing thread information base (TIB) allocation. Threaded programs from before the 2016/03/19 csu and ld.so update will no longer run. An updated ld.so must be built and installed before running make build.”</li>
<li>A special note for those on PowerPC: “PowerPC has been updated to offset the TIB from the hardware register. As a result, all threaded programs are broken until they have been rebuilt with the new libc and libpthread. perl must be built after building the libraries and before building the rest of base.”</li>
<li>“The definitions of environ and __progname for dynamically linked programs have been moved from the C startup code to ld.so(1). An updated ld.so must be built and installed before running make build.”</li>
<li>The link provides instructions on how to update your system properly
***</li>
</ul>

<h3><a href="http://random-notes-of-a-sysadmin.blogspot.be/2016/04/howto-install-freebsd-103-on-vmware.html" rel="nofollow">How to install FreeBSD 10.3 on VMWare Workstation 12 Pro</a></h3>

<ul>
<li>This tutorial starts at the very basics, running through the FreeBSD installer</li>
<li>But then it goes on to configuring the machine specifically for VMWare</li>
<li>After the system has been booted, the tutorial walks through installing the VMWare tools</li>
<li>Then networking is configured in both VMWare and FreeBSD</li>
<li>A small hack is required to make the VMWare tools startup script wait until the network is up</li>
<li>A very nice tutorial for people using VMWare</li>
<li>I am working on a patch to bsdinstall to ensure that the swap partition is put before the main partition, so it can more easily be resized if you later decide you need more space in your VM</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=299371" rel="nofollow">the camcontrol reprobe subcommand has been added </a>,</li>
<li>“This makes it possible to manually force updating capacity data after the disk got resized. Without it it might be necessary to reboot before FreeBSD notices updated disk size under eg VMWare.”
***</li>
</ul>

<h3><a href="https://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.59/" rel="nofollow">BSD Router project releases v1.59</a></h3>

<ul>
<li>We’ve talked about the BSD Router project a bit in the past, but today we have a brand new release to bring to you. </li>
<li>For those who don’t remember, the BSDrp is a router aimed at replacing more of your big-commercial type systems.</li>
<li>First up in the new hotness, we have it based upon recently released FreeBSD 10.3!</li>
<li>In addition, there is a new package: New package: mlvpn (aggregated network links in order to benefit from the bandwidth of multiple links)</li>
<li><p>Other packages have gotten a bump with this release as well: </p>

<ul>
<li>bsnmp-ucd to 0.4.2</li>
<li>dma to 0.11</li>
<li>dmidecode to 3.0</li>
<li>exabgp to 3.4.15</li>
<li>iperf3 to 3.1.2</li>
<li>monit to 5.17</li>
<li>mpd5 to 5.8</li>
<li>openvpn to 2.3.10</li>
<li>python to 2.7.11</li>
<li>quagga to 1.0.20160315</li>
<li>strongswan to 5.4.0</li>
</ul></li>
<li><p>What are you waiting for? Amd64 and i386 images are ready for you to download now. </p>

<hr></li>
</ul>

<h2>Interview - Isaac (.Ike) Levy -</h2>

<ul>
<li><a href="http://semibug.org/" rel="nofollow">See Ike again at SEMIBug in Troy, Michigan on May 17th</a> 
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://github.com/tredly/" rel="nofollow">Tredly - Prebuilt containers on FreeBSD</a></h3>

<ul>
<li><a href="https://www.reddit.com/r/freebsd/comments/4gggw8/introducing_tredly_containers_for_unix_freebsd/" rel="nofollow">Discussion regarding its GPLv3 licensing</a></li>
<li>A new “container” solution called “Trendly” has started making some news around various tech sites.</li>
<li>In particular, this new project uses FreeBSD as its base OS and jail functionality in the backend.</li>
<li>Their solution seems based around the idea of shipping containers as manifests, such as lists of packages to install and configuration knobs. </li>
<li>The project is still rather new, and we’ll be keeping an eye on it for the future.</li>
<li>One notable change already though, it was (for some reason) released under GPLv3. Understandably this caused quite a ruckus with various folks in the community, since it’s built specifically on BSD. Since this, the code has been re-licensed as MIT, which is far more in the spirit of a traditional BSD license. 
***</li>
</ul>

<h3><a href="https://www.netbsd.org/changes/changes-8.0.html#nvme%284%29" rel="nofollow">NVMe driver added to NetBSD - ported from OpenBSD</a></h3>

<ul>
<li>NetBSD has gained support for Non-Volatile Memory Express, the new standard for PCIe attached Flash Memory</li>
<li>The change of interface from SATA to NVMe offers a number of advantages, mostly, it doesn’t require the device to pretend to be a spinning disk</li>
<li>One of the biggest advantages is that it supports completing multiple operations at once, with the Intel hardware I have tested, 63 I/Os can happen concurrently, so a very large queue depth is required to keep the device busy. The 64th I/O channel is reserved for administrative commands, to keep them from being delayed by the large queue depth</li>
<li>The device I tested could read at 3800 MB/s, and write 1700MB/s, something that wouldn’t be possible with a normal SSD</li>
<li>It is interesting that NetBSD took the NVMe support from OpenBSD, whereas the FreeBSD implementation was contributed directly by Intel</li>
<li>This may have to do with that fact that OpenBSD’s device model is closer to that of NetBSD</li>
<li><a href="http://mail-index.netbsd.org/source-changes/2016/05/01/msg074367.html" rel="nofollow">Commit Log </a> 
***</li>
</ul>

<h3><a href="https://teespring.com/bsdnow" rel="nofollow">New BSDNow T-Shirts</a></h3>

<ul>
<li>By popular demand, we have created a more subtle BSDNow shirt</li>
<li>Featuring only the smallish BSDNow logo over the left breast</li>
<li>Available in a number of styles (T-Shirt, Women’s T-Shirt, Long Sleeve, and Hoodie) as well as a number of colours: Black, Blue, Grey, and White</li>
<li>The hope is that enough orders come though so we can get them shipped in and your sweaty little hands in time for BSDCan. (I’ll be wearing mine, will you B...SD?)</li>
<li><a href="https://teespring.com/bsd105" rel="nofollow">If you still want one of our now-famous “The Usual BSD’s” t-shirts, you can also indicate your interest here, and once 10 or more shirts are ordered, a reprint will happen automatically</a> 
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2016-May/010616.html" rel="nofollow">PC-BSD 11-CURRENT with Package Base</a></h3>

<ul>
<li>Looking for a way to play with the new FreeBSD base package system?</li>
<li>This month’s PC-BSD -CURRENT image now used packages for base system installation, and is asking for testers to help find bugs.</li>
<li>Known issues so far: 

<ul>
<li>setuid binaries (Fix in works)</li>
<li>Missing tzone files</li>
<li>Distrib packages</li>
</ul></li>
<li>If all that doesn’t scare you away, then give it a whirl! Upgrades for previous APRIL images are now online also.
***</li>
</ul>

<h2>BeastieBits</h2>

<ul>
<li><p><a href="https://hardenedbsd.org/article/shawn-webb/2016-05-05/libressl-hardenedbsd-base" rel="nofollow">HardenedBSD + LibreSSL</a> </p></li>
<li><p><a href="https://www.youtube.com/watch?v=6k1Mf0c6YW8" rel="nofollow">Michael Dexter&#39;s talk at LFNW 2016 is the 2nd highest youtube views from this years conference</a> </p></li>
<li><p><a href="http://ggr.com/why-openbsd-is-important-to-me.html" rel="nofollow">Why OpenBSD is important to me</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-May/249581.html" rel="nofollow">Study of nginx-1.9.12 performance/latency on DragonFlyBSD-g67a73</a> </p></li>
<li><p><a href="https://www.geeklan.co.uk/?p=2109" rel="nofollow">Running FreeBSD / OpenBSD / NetBSD as a virtualised guest on Online.net</a> </p></li>
<li><p><a href="http://zinascii.com/2016/the-illumos-syscall-handler.html" rel="nofollow">The interesting story of how IllumOS syscalls work </a> </p></li>
<li><p><a href="https://mezzantrop.wordpress.com/portfolio/the-beast/" rel="nofollow">The BeaST is the FreeBSD based dual-controller reliable storage system concept with aim to implement ZFS and in-memory cache.</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-May/500352.html" rel="nofollow">Francois Tigeot updates the drm/i915 driver to match what’s in Linux kernel 4.3</a> </p></li>
<li><p><a href="https://twitter.com/ed_maste/status/730450314889924608" rel="nofollow">FreeBSD is working on the update to Linux Kernel 4.6, we may finally get ahead of Dragonfly! </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/RT7tVtQ7" rel="nofollow"> Oskar - Torrent Jail</a> </li>
<li><a href="http://pastebin.com/VkpMeims" rel="nofollow"> Shane - ZFS Delete</a> </li>
<li><a href="http://pastebin.com/MmQ00Sv1" rel="nofollow"> Adam - Zimbra Port</a> </li>
<li><a href="http://pastebin.com/Xx9TkX7A" rel="nofollow"> Ray - PC-BSD - FrameBuffer</a> </li>
<li><a href="http://pastebin.com/ncYxqpg3" rel="nofollow"> Richard - ZFS Backups</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>140: Tracing it back to BSD</title>
  <link>https://www.bsdnow.tv/140</link>
  <guid isPermaLink="false">2f09a59d-90ec-4052-a4ef-e41c1eaac3be</guid>
  <pubDate>Wed, 04 May 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2f09a59d-90ec-4052-a4ef-e41c1eaac3be.mp3" length="65543188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, Allan is back in down from Europe! We’ll get to hear some of his wrap-up and get caught up on the latest BSD</itunes:subtitle>
  <itunes:duration>1:31:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, Allan is back in down from Europe! We’ll get to hear some of his wrap-up and get caught up on the latest BSD&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.freebsd.org/news/status/report-2016-01-2016-03.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Quarterly Report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This quarterly status report starts with a rather interesting introduction by Warren Block&lt;/li&gt;
&lt;li&gt;ASLR&lt;/li&gt;
&lt;li&gt;Porting CEPH to FreeBSD&lt;/li&gt;
&lt;li&gt;RCTL I/O Rate Limiting&lt;/li&gt;
&lt;li&gt;The Graphics Stack on FreeBSD (Haswell is in, work is progressing on the next update)&lt;/li&gt;
&lt;li&gt;CAM I/O Scheduler&lt;/li&gt;
&lt;li&gt;NFS Server updates, working around the 16 group limit, and implementing pNFS, allowing NFS to scale beyond a single server&lt;/li&gt;
&lt;li&gt;Static Analysis of the FreeBSD Kernel with PVS Studio&lt;/li&gt;
&lt;li&gt;PCI-express HotPlug&lt;/li&gt;
&lt;li&gt;GitLab Port committed!&lt;/li&gt;
&lt;li&gt;WITH_FAST_DEPEND and other improvements to the FreeBSD build system&lt;/li&gt;
&lt;li&gt;Lots of other interesting stuff
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/a-prog-by-any-other-name" target="_blank" rel="nofollow noopener"&gt;A Prog By Any Other Name&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst looks at what goes into the name of a program&lt;/li&gt;
&lt;li&gt;“Sometimes two similar programs are really the same program with two names. For example, grep and egrep are two commands that perform very similar functions and are therefore implemented as a single program. Running ls -i and observing the inode number of each file will reveal that there is only one file. Calling the program egrep is a shorthand for -E and does the same thing.”&lt;/li&gt;
&lt;li&gt;So BSD provides __progname in libc, so a program can tell what its name is&lt;/li&gt;
&lt;li&gt;But, what if it has more than one name?&lt;/li&gt;
&lt;li&gt;“In fact, every program has three names: its name in the filesystem, the name it has been invoked with, and whatever it believes its own name to be.”&lt;/li&gt;
&lt;li&gt;Of course it is not that easy. &lt;/li&gt;
&lt;li&gt;“there’s another set of choices for each name, the full path and the basename”&lt;/li&gt;
&lt;li&gt;“It’s even possible on some systems for argv[0] to be NULL.”&lt;/li&gt;
&lt;li&gt;He then goes on to rename doas (the OpenBSD light replacement for sudo) to banana and discuss what happens&lt;/li&gt;
&lt;li&gt;“On that note, another possible bug is to realize that syslog by default uses progname. A user may be able to evade log monitoring by invoking doas with a different name. (Just fixed.)”&lt;/li&gt;
&lt;li&gt;Another interesting article from our friend Ted
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
&lt;a href="https://summerofcode.withgoogle.com/organizations/4892834293350400/" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt; and &lt;a href="https://summerofcode.withgoogle.com/organizations/6246531984261120/" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt;   Google Summer of Code projects have been announced&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Some FreeBSD highlights:

&lt;ul&gt;
&lt;li&gt;Add SCSI passthrough to CTL (share an optical drive via iSCSI)&lt;/li&gt;
&lt;li&gt;Add USB target mode driver based on CTL (share a USB device via iSCSI)&lt;/li&gt;
&lt;li&gt;API to link created /dev entries to sysctl nodes&lt;/li&gt;
&lt;li&gt;Implement Ethernet Ring Protection Switching (ERPS)&lt;/li&gt;
&lt;li&gt;HD Audio device model in userspace for bhyve&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Some NetBSD highlights:

&lt;ul&gt;
&lt;li&gt;Implement Ext4fs support in ReadOnly mode&lt;/li&gt;
&lt;li&gt;NPF and blacklistd web interface&lt;/li&gt;
&lt;li&gt;Port U-Boot so it can be compiled on NetBSD&lt;/li&gt;
&lt;li&gt;Split debug symbols for pkgsrc builds
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/libressl-more-vague-promises" target="_blank" rel="nofollow noopener"&gt;libressl - more vague priomises&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We haven’t had a Ted U article on the show as of late, however this week we get several! In his next entry “LibreSSL, more vague promises”&lt;/li&gt;
&lt;li&gt;He then goes into some detail on what has happened with LibreSSL in the past while, as well as future plans going forward. &lt;/li&gt;
&lt;li&gt;“With an eye to the future, what new promises can we make? Some time ago I joked that we only promised to make a better TLS implementation, not a better TLS. Remains true, but fortunately there are people working on that, too. TLS 1.3 support is on the short term watchlist. The good news is we may be ahead of the game, having already removed compression. How much more work can there be?”&lt;/li&gt;
&lt;li&gt;“LibreSSL integrated the draft chacha20-poly1305 construction from BoringSSL. The IETF has since standardized a slightly different version because if it were the same it wouldn’t be different. Support for standard variant, and the beginning of deprecation for the existing code, should be landing very shortly. Incidentally, some people got bent out of shape because shipping chacha20 meant exposing non IANA approved numbers to Internet. No promises that won’t happen again.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Samy Al Bahra - &lt;a href="https://twitter.com/0xF390" target="_blank" rel="nofollow noopener"&gt;@0xF390&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Backtrace
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=146161167911029&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;systrace(1) is removed for OpenBSD 6.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has removed systrace, an older mechanism for limiting what syscalls an application can make&lt;/li&gt;
&lt;li&gt;It is mostly replaced by the pledge() system&lt;/li&gt;
&lt;li&gt;OpenBSD was the first implementation, most others have been unmaintained for some time&lt;/li&gt;
&lt;li&gt;The last reported Linux version was for kernel 2.6.1&lt;/li&gt;
&lt;li&gt;NetBSD removed systrace in 2007
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/playlist?list=PLE726R7YUJTePGvo0Zga2juUBxxFTH4Bk" target="_blank" rel="nofollow noopener"&gt;pfSense Video Series: Comprehensive Guide To pfSense 2.3&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A series of videos (11 so far), about pfSense&lt;/li&gt;
&lt;li&gt;Covers Why you would use it, how to pick your hardware, and installation&lt;/li&gt;
&lt;li&gt;Then the series covers some networking basics, to make sure you are up to speed before configuring your pfSense&lt;/li&gt;
&lt;li&gt;Then a comprehensive tour of the WebUI&lt;/li&gt;
&lt;li&gt;Then goes on to cover graphing, backing up and restoring configuration&lt;/li&gt;
&lt;li&gt;There are also videos on running DHCP, NTP, and DNS servers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://duck.co/blog/post/303/2016-foss-donations-announcement" target="_blank" rel="nofollow noopener"&gt;DuckDuckGo announces its 2016 FOSS Donations &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The theme is “raising the standard of trust online”&lt;/li&gt;
&lt;li&gt;Supported projects include:&lt;/li&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160503085227&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation announces DuckDuckGo as a Gold Sponsor&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;the Freedom of the Press Foundation for SecureDrop&lt;/li&gt;
&lt;li&gt;the Freenet Project&lt;/li&gt;
&lt;li&gt;the CrypTech Project&lt;/li&gt;
&lt;li&gt;the Tor Project&lt;/li&gt;
&lt;li&gt;Fight for the Future for Save Security&lt;/li&gt;
&lt;li&gt;Open Source Technology Improvement Fund for VeraCrypt (based on TrueCrypt)&lt;/li&gt;
&lt;li&gt;Riseup Labs for LEAP (LEAP Encryption Access Project)&lt;/li&gt;
&lt;li&gt;GPGTools for GPGMail
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://fossforce.com/2016/04/bsd-linuxfest-northwest/" target="_blank" rel="nofollow noopener"&gt;Larry the BSD Guy hangs up his hat at FOSS Force&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After 15 years, Larry the BSD Guy has decided to hang it up, and walk into the sunset! (Figuratively of course)&lt;/li&gt;
&lt;li&gt;After wrapping up coverage of recent LinuxFest NorthWest (Which he didn’t attend), Larry has decided it’s time for a change and is giving up his column over at FOSS Force, as well as stepping away from all things technical. &lt;/li&gt;
&lt;li&gt;His last write-up is a good one, and he has some nice plugs for both Dru Lavigne and Michael Dexter of the BSD community. &lt;/li&gt;
&lt;li&gt;He will be missed, but we wish him all the luck with the future! He also puts out the plug that FOSS Force will be needing a new columnist in the near future, so if you are interested please let them know!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://blather.michaelwlucas.com/archives/2648" target="_blank" rel="nofollow noopener"&gt;If you sponsored “FreeBSD Mastery: Advanced ZFS”, check your mail box &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://marc.info/?l=freebsd-ports&amp;amp;m=146001143408868&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;pkg-1.7.0 is an order of magnitude slower than pkg-1.6.4&lt;/a&gt; -- Caused by a problem not in pkg&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/blog/linuxfest-northwest-2016/" target="_blank" rel="nofollow noopener"&gt;LinuxFest Northwest 2016 Recap&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.linuxfestnorthwest.org/2016/sessions/doc-egyptian" target="_blank" rel="nofollow noopener"&gt;Dru Lavigne's 'Doc like an Egyption' talk from LFNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.linuxfestnorthwest.org/2016/sessions/devil-details-switching-bsd-linux" target="_blank" rel="nofollow noopener"&gt;Michael Dexters' 'Switching to BSD from Linux' talk from LFNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.linuxfestnorthwest.org/2016/sessions/20-year-and-counting-secrets-enduring-user-groups" target="_blank" rel="nofollow noopener"&gt;Michael Dexters' 'Secrets to enduring user groups' talk from LFNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdfoundation.org/journal/" target="_blank" rel="nofollow noopener"&gt;January issue of Freebsd Journal online for free&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://ghostbsd.org/10.3_alpha1" target="_blank" rel="nofollow noopener"&gt;Ghost BSD releases 10.3 Alpha1 for testing&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.freebsdnews.com/2016/04/15/eurobsdcon-2016-call-for-papers/" target="_blank" rel="nofollow noopener"&gt;EuroBSDcon 2016 - Call for Papers - Dealine: May 8th&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.knoxbug.org/content/knoxbug-maiden-voyage" target="_blank" rel="nofollow noopener"&gt;KnoxBUG Initial Meeting&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.netways.de/en/events_trainings/osdc/archive/osdc2016/" target="_blank" rel="nofollow noopener"&gt;Photos, slides, and videos from the Open Source Data Center Conference &lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/KDnyWf6Y" target="_blank" rel="nofollow noopener"&gt; Mohammad - Replication&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/mAbRwbEF" target="_blank" rel="nofollow noopener"&gt; John - Rolling new packages&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/BNa6pyir" target="_blank" rel="nofollow noopener"&gt;Clint - Unicast&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/KDjS2Hxa" target="_blank" rel="nofollow noopener"&gt; Bill - GhostBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ABUUtzWM" target="_blank" rel="nofollow noopener"&gt; Charles - BSD Videos&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, Allan is back in down from Europe! We’ll get to hear some of his wrap-up and get caught up on the latest BSD</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.freebsd.org/news/status/report-2016-01-2016-03.html" rel="nofollow">FreeBSD Quarterly Report</a></h3>

<ul>
<li>This quarterly status report starts with a rather interesting introduction by Warren Block</li>
<li>ASLR</li>
<li>Porting CEPH to FreeBSD</li>
<li>RCTL I/O Rate Limiting</li>
<li>The Graphics Stack on FreeBSD (Haswell is in, work is progressing on the next update)</li>
<li>CAM I/O Scheduler</li>
<li>NFS Server updates, working around the 16 group limit, and implementing pNFS, allowing NFS to scale beyond a single server</li>
<li>Static Analysis of the FreeBSD Kernel with PVS Studio</li>
<li>PCI-express HotPlug</li>
<li>GitLab Port committed!</li>
<li>WITH_FAST_DEPEND and other improvements to the FreeBSD build system</li>
<li>Lots of other interesting stuff
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/a-prog-by-any-other-name" rel="nofollow">A Prog By Any Other Name</a></h3>

<ul>
<li>Ted Unangst looks at what goes into the name of a program</li>
<li>“Sometimes two similar programs are really the same program with two names. For example, grep and egrep are two commands that perform very similar functions and are therefore implemented as a single program. Running ls -i and observing the inode number of each file will reveal that there is only one file. Calling the program egrep is a shorthand for -E and does the same thing.”</li>
<li>So BSD provides __progname in libc, so a program can tell what its name is</li>
<li>But, what if it has more than one name?</li>
<li>“In fact, every program has three names: its name in the filesystem, the name it has been invoked with, and whatever it believes its own name to be.”</li>
<li>Of course it is not that easy. </li>
<li>“there’s another set of choices for each name, the full path and the basename”</li>
<li>“It’s even possible on some systems for argv[0] to be NULL.”</li>
<li>He then goes on to rename doas (the OpenBSD light replacement for sudo) to banana and discuss what happens</li>
<li>“On that note, another possible bug is to realize that syslog by default uses progname. A user may be able to evade log monitoring by invoking doas with a different name. (Just fixed.)”</li>
<li>Another interesting article from our friend Ted
***</li>
</ul>

<h3><a href="https://summerofcode.withgoogle.com/organizations/4892834293350400/" rel="nofollow">FreeBSD</a> and <a href="https://summerofcode.withgoogle.com/organizations/6246531984261120/" rel="nofollow">NetBSD</a>   Google Summer of Code projects have been announced</h3>

<ul>
<li>Some FreeBSD highlights:

<ul>
<li>Add SCSI passthrough to CTL (share an optical drive via iSCSI)</li>
<li>Add USB target mode driver based on CTL (share a USB device via iSCSI)</li>
<li>API to link created /dev entries to sysctl nodes</li>
<li>Implement Ethernet Ring Protection Switching (ERPS)</li>
<li>HD Audio device model in userspace for bhyve</li>
</ul></li>
<li>Some NetBSD highlights:

<ul>
<li>Implement Ext4fs support in ReadOnly mode</li>
<li>NPF and blacklistd web interface</li>
<li>Port U-Boot so it can be compiled on NetBSD</li>
<li>Split debug symbols for pkgsrc builds
***</li>
</ul></li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/libressl-more-vague-promises" rel="nofollow">libressl - more vague priomises</a></h3>

<ul>
<li>We haven’t had a Ted U article on the show as of late, however this week we get several! In his next entry “LibreSSL, more vague promises”</li>
<li>He then goes into some detail on what has happened with LibreSSL in the past while, as well as future plans going forward. </li>
<li>“With an eye to the future, what new promises can we make? Some time ago I joked that we only promised to make a better TLS implementation, not a better TLS. Remains true, but fortunately there are people working on that, too. TLS 1.3 support is on the short term watchlist. The good news is we may be ahead of the game, having already removed compression. How much more work can there be?”</li>
<li>“LibreSSL integrated the draft chacha20-poly1305 construction from BoringSSL. The IETF has since standardized a slightly different version because if it were the same it wouldn’t be different. Support for standard variant, and the beginning of deprecation for the existing code, should be landing very shortly. Incidentally, some people got bent out of shape because shipping chacha20 meant exposing non IANA approved numbers to Internet. No promises that won’t happen again.”
***</li>
</ul>

<h2>Interview - Samy Al Bahra - <a href="https://twitter.com/0xF390" rel="nofollow">@0xF390</a></h2>

<ul>
<li>Backtrace
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=146161167911029&w=2" rel="nofollow">systrace(1) is removed for OpenBSD 6.0</a></h3>

<ul>
<li>OpenBSD has removed systrace, an older mechanism for limiting what syscalls an application can make</li>
<li>It is mostly replaced by the pledge() system</li>
<li>OpenBSD was the first implementation, most others have been unmaintained for some time</li>
<li>The last reported Linux version was for kernel 2.6.1</li>
<li>NetBSD removed systrace in 2007
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLE726R7YUJTePGvo0Zga2juUBxxFTH4Bk" rel="nofollow">pfSense Video Series: Comprehensive Guide To pfSense 2.3</a></h3>

<ul>
<li>A series of videos (11 so far), about pfSense</li>
<li>Covers Why you would use it, how to pick your hardware, and installation</li>
<li>Then the series covers some networking basics, to make sure you are up to speed before configuring your pfSense</li>
<li>Then a comprehensive tour of the WebUI</li>
<li>Then goes on to cover graphing, backing up and restoring configuration</li>
<li>There are also videos on running DHCP, NTP, and DNS servers
***</li>
</ul>

<h3><a href="https://duck.co/blog/post/303/2016-foss-donations-announcement" rel="nofollow">DuckDuckGo announces its 2016 FOSS Donations </a></h3>

<ul>
<li>The theme is “raising the standard of trust online”</li>
<li>Supported projects include:</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160503085227&mode=expanded" rel="nofollow">OpenBSD Foundation announces DuckDuckGo as a Gold Sponsor</a></li>
<li>the Freedom of the Press Foundation for SecureDrop</li>
<li>the Freenet Project</li>
<li>the CrypTech Project</li>
<li>the Tor Project</li>
<li>Fight for the Future for Save Security</li>
<li>Open Source Technology Improvement Fund for VeraCrypt (based on TrueCrypt)</li>
<li>Riseup Labs for LEAP (LEAP Encryption Access Project)</li>
<li>GPGTools for GPGMail
***</li>
</ul>

<h3><a href="http://fossforce.com/2016/04/bsd-linuxfest-northwest/" rel="nofollow">Larry the BSD Guy hangs up his hat at FOSS Force</a></h3>

<ul>
<li>After 15 years, Larry the BSD Guy has decided to hang it up, and walk into the sunset! (Figuratively of course)</li>
<li>After wrapping up coverage of recent LinuxFest NorthWest (Which he didn’t attend), Larry has decided it’s time for a change and is giving up his column over at FOSS Force, as well as stepping away from all things technical. </li>
<li>His last write-up is a good one, and he has some nice plugs for both Dru Lavigne and Michael Dexter of the BSD community. </li>
<li>He will be missed, but we wish him all the luck with the future! He also puts out the plug that FOSS Force will be needing a new columnist in the near future, so if you are interested please let them know!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://blather.michaelwlucas.com/archives/2648" rel="nofollow">If you sponsored “FreeBSD Mastery: Advanced ZFS”, check your mail box </a> </li>
<li><a href="https://marc.info/?l=freebsd-ports&m=146001143408868&w=2" rel="nofollow">pkg-1.7.0 is an order of magnitude slower than pkg-1.6.4</a> -- Caused by a problem not in pkg</li>
<li><a href="https://www.ixsystems.com/blog/linuxfest-northwest-2016/" rel="nofollow">LinuxFest Northwest 2016 Recap</a> </li>
<li><a href="https://www.linuxfestnorthwest.org/2016/sessions/doc-egyptian" rel="nofollow">Dru Lavigne&#39;s &#39;Doc like an Egyption&#39; talk from LFNW</a> </li>
<li><a href="https://www.linuxfestnorthwest.org/2016/sessions/devil-details-switching-bsd-linux" rel="nofollow">Michael Dexters&#39; &#39;Switching to BSD from Linux&#39; talk from LFNW</a> </li>
<li><a href="https://www.linuxfestnorthwest.org/2016/sessions/20-year-and-counting-secrets-enduring-user-groups" rel="nofollow">Michael Dexters&#39; &#39;Secrets to enduring user groups&#39; talk from LFNW</a> </li>
<li><a href="https://www.freebsdfoundation.org/journal/" rel="nofollow">January issue of Freebsd Journal online for free</a></li>
<li><a href="http://ghostbsd.org/10.3_alpha1" rel="nofollow">Ghost BSD releases 10.3 Alpha1 for testing</a> </li>
<li><a href="https://www.freebsdnews.com/2016/04/15/eurobsdcon-2016-call-for-papers/" rel="nofollow">EuroBSDcon 2016 - Call for Papers - Dealine: May 8th</a></li>
<li><a href="http://www.knoxbug.org/content/knoxbug-maiden-voyage" rel="nofollow">KnoxBUG Initial Meeting</a> </li>
<li><a href="https://www.netways.de/en/events_trainings/osdc/archive/osdc2016/" rel="nofollow">Photos, slides, and videos from the Open Source Data Center Conference </a>
*** </li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/KDnyWf6Y" rel="nofollow"> Mohammad - Replication</a> </li>
<li><a href="http://pastebin.com/mAbRwbEF" rel="nofollow"> John - Rolling new packages</a> </li>
<li><a href="http://pastebin.com/BNa6pyir" rel="nofollow">Clint - Unicast</a> </li>
<li><a href="http://pastebin.com/KDjS2Hxa" rel="nofollow"> Bill - GhostBSD</a> </li>
<li><a href="http://pastebin.com/ABUUtzWM" rel="nofollow"> Charles - BSD Videos</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, Allan is back in down from Europe! We’ll get to hear some of his wrap-up and get caught up on the latest BSD</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.freebsd.org/news/status/report-2016-01-2016-03.html" rel="nofollow">FreeBSD Quarterly Report</a></h3>

<ul>
<li>This quarterly status report starts with a rather interesting introduction by Warren Block</li>
<li>ASLR</li>
<li>Porting CEPH to FreeBSD</li>
<li>RCTL I/O Rate Limiting</li>
<li>The Graphics Stack on FreeBSD (Haswell is in, work is progressing on the next update)</li>
<li>CAM I/O Scheduler</li>
<li>NFS Server updates, working around the 16 group limit, and implementing pNFS, allowing NFS to scale beyond a single server</li>
<li>Static Analysis of the FreeBSD Kernel with PVS Studio</li>
<li>PCI-express HotPlug</li>
<li>GitLab Port committed!</li>
<li>WITH_FAST_DEPEND and other improvements to the FreeBSD build system</li>
<li>Lots of other interesting stuff
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/a-prog-by-any-other-name" rel="nofollow">A Prog By Any Other Name</a></h3>

<ul>
<li>Ted Unangst looks at what goes into the name of a program</li>
<li>“Sometimes two similar programs are really the same program with two names. For example, grep and egrep are two commands that perform very similar functions and are therefore implemented as a single program. Running ls -i and observing the inode number of each file will reveal that there is only one file. Calling the program egrep is a shorthand for -E and does the same thing.”</li>
<li>So BSD provides __progname in libc, so a program can tell what its name is</li>
<li>But, what if it has more than one name?</li>
<li>“In fact, every program has three names: its name in the filesystem, the name it has been invoked with, and whatever it believes its own name to be.”</li>
<li>Of course it is not that easy. </li>
<li>“there’s another set of choices for each name, the full path and the basename”</li>
<li>“It’s even possible on some systems for argv[0] to be NULL.”</li>
<li>He then goes on to rename doas (the OpenBSD light replacement for sudo) to banana and discuss what happens</li>
<li>“On that note, another possible bug is to realize that syslog by default uses progname. A user may be able to evade log monitoring by invoking doas with a different name. (Just fixed.)”</li>
<li>Another interesting article from our friend Ted
***</li>
</ul>

<h3><a href="https://summerofcode.withgoogle.com/organizations/4892834293350400/" rel="nofollow">FreeBSD</a> and <a href="https://summerofcode.withgoogle.com/organizations/6246531984261120/" rel="nofollow">NetBSD</a>   Google Summer of Code projects have been announced</h3>

<ul>
<li>Some FreeBSD highlights:

<ul>
<li>Add SCSI passthrough to CTL (share an optical drive via iSCSI)</li>
<li>Add USB target mode driver based on CTL (share a USB device via iSCSI)</li>
<li>API to link created /dev entries to sysctl nodes</li>
<li>Implement Ethernet Ring Protection Switching (ERPS)</li>
<li>HD Audio device model in userspace for bhyve</li>
</ul></li>
<li>Some NetBSD highlights:

<ul>
<li>Implement Ext4fs support in ReadOnly mode</li>
<li>NPF and blacklistd web interface</li>
<li>Port U-Boot so it can be compiled on NetBSD</li>
<li>Split debug symbols for pkgsrc builds
***</li>
</ul></li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/libressl-more-vague-promises" rel="nofollow">libressl - more vague priomises</a></h3>

<ul>
<li>We haven’t had a Ted U article on the show as of late, however this week we get several! In his next entry “LibreSSL, more vague promises”</li>
<li>He then goes into some detail on what has happened with LibreSSL in the past while, as well as future plans going forward. </li>
<li>“With an eye to the future, what new promises can we make? Some time ago I joked that we only promised to make a better TLS implementation, not a better TLS. Remains true, but fortunately there are people working on that, too. TLS 1.3 support is on the short term watchlist. The good news is we may be ahead of the game, having already removed compression. How much more work can there be?”</li>
<li>“LibreSSL integrated the draft chacha20-poly1305 construction from BoringSSL. The IETF has since standardized a slightly different version because if it were the same it wouldn’t be different. Support for standard variant, and the beginning of deprecation for the existing code, should be landing very shortly. Incidentally, some people got bent out of shape because shipping chacha20 meant exposing non IANA approved numbers to Internet. No promises that won’t happen again.”
***</li>
</ul>

<h2>Interview - Samy Al Bahra - <a href="https://twitter.com/0xF390" rel="nofollow">@0xF390</a></h2>

<ul>
<li>Backtrace
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=146161167911029&w=2" rel="nofollow">systrace(1) is removed for OpenBSD 6.0</a></h3>

<ul>
<li>OpenBSD has removed systrace, an older mechanism for limiting what syscalls an application can make</li>
<li>It is mostly replaced by the pledge() system</li>
<li>OpenBSD was the first implementation, most others have been unmaintained for some time</li>
<li>The last reported Linux version was for kernel 2.6.1</li>
<li>NetBSD removed systrace in 2007
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLE726R7YUJTePGvo0Zga2juUBxxFTH4Bk" rel="nofollow">pfSense Video Series: Comprehensive Guide To pfSense 2.3</a></h3>

<ul>
<li>A series of videos (11 so far), about pfSense</li>
<li>Covers Why you would use it, how to pick your hardware, and installation</li>
<li>Then the series covers some networking basics, to make sure you are up to speed before configuring your pfSense</li>
<li>Then a comprehensive tour of the WebUI</li>
<li>Then goes on to cover graphing, backing up and restoring configuration</li>
<li>There are also videos on running DHCP, NTP, and DNS servers
***</li>
</ul>

<h3><a href="https://duck.co/blog/post/303/2016-foss-donations-announcement" rel="nofollow">DuckDuckGo announces its 2016 FOSS Donations </a></h3>

<ul>
<li>The theme is “raising the standard of trust online”</li>
<li>Supported projects include:</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160503085227&mode=expanded" rel="nofollow">OpenBSD Foundation announces DuckDuckGo as a Gold Sponsor</a></li>
<li>the Freedom of the Press Foundation for SecureDrop</li>
<li>the Freenet Project</li>
<li>the CrypTech Project</li>
<li>the Tor Project</li>
<li>Fight for the Future for Save Security</li>
<li>Open Source Technology Improvement Fund for VeraCrypt (based on TrueCrypt)</li>
<li>Riseup Labs for LEAP (LEAP Encryption Access Project)</li>
<li>GPGTools for GPGMail
***</li>
</ul>

<h3><a href="http://fossforce.com/2016/04/bsd-linuxfest-northwest/" rel="nofollow">Larry the BSD Guy hangs up his hat at FOSS Force</a></h3>

<ul>
<li>After 15 years, Larry the BSD Guy has decided to hang it up, and walk into the sunset! (Figuratively of course)</li>
<li>After wrapping up coverage of recent LinuxFest NorthWest (Which he didn’t attend), Larry has decided it’s time for a change and is giving up his column over at FOSS Force, as well as stepping away from all things technical. </li>
<li>His last write-up is a good one, and he has some nice plugs for both Dru Lavigne and Michael Dexter of the BSD community. </li>
<li>He will be missed, but we wish him all the luck with the future! He also puts out the plug that FOSS Force will be needing a new columnist in the near future, so if you are interested please let them know!
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><a href="http://blather.michaelwlucas.com/archives/2648" rel="nofollow">If you sponsored “FreeBSD Mastery: Advanced ZFS”, check your mail box </a> </li>
<li><a href="https://marc.info/?l=freebsd-ports&m=146001143408868&w=2" rel="nofollow">pkg-1.7.0 is an order of magnitude slower than pkg-1.6.4</a> -- Caused by a problem not in pkg</li>
<li><a href="https://www.ixsystems.com/blog/linuxfest-northwest-2016/" rel="nofollow">LinuxFest Northwest 2016 Recap</a> </li>
<li><a href="https://www.linuxfestnorthwest.org/2016/sessions/doc-egyptian" rel="nofollow">Dru Lavigne&#39;s &#39;Doc like an Egyption&#39; talk from LFNW</a> </li>
<li><a href="https://www.linuxfestnorthwest.org/2016/sessions/devil-details-switching-bsd-linux" rel="nofollow">Michael Dexters&#39; &#39;Switching to BSD from Linux&#39; talk from LFNW</a> </li>
<li><a href="https://www.linuxfestnorthwest.org/2016/sessions/20-year-and-counting-secrets-enduring-user-groups" rel="nofollow">Michael Dexters&#39; &#39;Secrets to enduring user groups&#39; talk from LFNW</a> </li>
<li><a href="https://www.freebsdfoundation.org/journal/" rel="nofollow">January issue of Freebsd Journal online for free</a></li>
<li><a href="http://ghostbsd.org/10.3_alpha1" rel="nofollow">Ghost BSD releases 10.3 Alpha1 for testing</a> </li>
<li><a href="https://www.freebsdnews.com/2016/04/15/eurobsdcon-2016-call-for-papers/" rel="nofollow">EuroBSDcon 2016 - Call for Papers - Dealine: May 8th</a></li>
<li><a href="http://www.knoxbug.org/content/knoxbug-maiden-voyage" rel="nofollow">KnoxBUG Initial Meeting</a> </li>
<li><a href="https://www.netways.de/en/events_trainings/osdc/archive/osdc2016/" rel="nofollow">Photos, slides, and videos from the Open Source Data Center Conference </a>
*** </li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/KDnyWf6Y" rel="nofollow"> Mohammad - Replication</a> </li>
<li><a href="http://pastebin.com/mAbRwbEF" rel="nofollow"> John - Rolling new packages</a> </li>
<li><a href="http://pastebin.com/BNa6pyir" rel="nofollow">Clint - Unicast</a> </li>
<li><a href="http://pastebin.com/KDjS2Hxa" rel="nofollow"> Bill - GhostBSD</a> </li>
<li><a href="http://pastebin.com/ABUUtzWM" rel="nofollow"> Charles - BSD Videos</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>139: Cheri-picking BSD</title>
  <link>https://www.bsdnow.tv/139</link>
  <guid isPermaLink="false">5aeb1bdc-48f8-4b0b-b1e6-2bce2bd11ffc</guid>
  <pubDate>Wed, 27 Apr 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5aeb1bdc-48f8-4b0b-b1e6-2bce2bd11ffc.mp3" length="50138068" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, Allan is out of town, but since when has that ever stopped us from bringing you a new episode of BSDNow? We have news,</itunes:subtitle>
  <itunes:duration>1:09:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, Allan is out of town, but since when has that ever stopped us from bringing you a new episode of BSDNow? We have news,&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/FileSyncProblem" target="_blank" rel="nofollow noopener"&gt;Unix's file durability problem&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another article by Chris Siebenmann from the University of Toronto&lt;/li&gt;
&lt;li&gt;This time, the issue was a lost comment on his Python based blog which uses files on disk rather than a database&lt;/li&gt;
&lt;li&gt;After an unexpected restart of the system, a recently posted comment no longer existed&lt;/li&gt;
&lt;li&gt;The post goes on to investigate what the ‘right way’ to ensure file durability is&lt;/li&gt;
&lt;li&gt;The answer, as you might expect, is “it depends…”&lt;/li&gt;
&lt;li&gt;Normally, fsync() should work, but it seems with ext4 and some other file systems, you must also fsync() the directory where the file was created, or it might not be possible to find the file after a crash&lt;/li&gt;
&lt;li&gt;Do you need to fsync() the parent of that directory too? Then what is fdatasync() for? What about just calling sync()?&lt;/li&gt;
&lt;li&gt;“One issue is that unlike many other Unix API issues, it's impossible to test to see if you got it all correct and complete. If your steps are incomplete, you don't get any errors; your data is just silently sometimes at risk. Even with a test setup to create system crashes or abrupt power loss (which VMs make much easier), you need uncommon instrumentation to know things like if your OS actually issued disk flushes or just did normal buffered writes. And straightforward testing can't tell you if what you're doing will work all the time, because what is required varies by Unix, kernel version, and the specific filesystem involved.”&lt;/li&gt;
&lt;li&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/python/HowISyncDataDWiki" target="_blank" rel="nofollow noopener"&gt;Second post by author: How I'm trying to do durable disk writes &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://news.ycombinator.com/item?id=11511269" target="_blank" rel="nofollow noopener"&gt;Additional Discussion on Hacker News&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;The discussion on HN also gets into AIO and other more complicated facilities, but even those seem to be vague about when your data is actually safe&lt;/li&gt;
&lt;li&gt;At least ZFS ensures you never get half of your new data, and half of your old data.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://raymii.org/s/tutorials/FreeBSD_10.3-release_Openstack_Image.html" target="_blank" rel="nofollow noopener"&gt;Build a FreeBSD 10.3-release Openstack Image with bsd-cloudinit&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Are you using FreeBSD and OpenStack or would you like to be? We next have a great tutorial which explains the ins-and-outs of doing exactly that.&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;Remy van Elst brings us a great walkthrough on his site on how to get started, and hint it involves just a few ‘pip’ commands. &lt;/li&gt;
&lt;li&gt;After getting the initial Python tools bootstrapped, next he shows us how to save our OpenStack settings in a sourceable shell command, which comes in handy before doing admin on a instance.&lt;/li&gt;
&lt;li&gt;Next the ‘glance’ and ‘cinder’ tools are used to upload the target OS ISO file and then create a volume for it to install onto.&lt;/li&gt;
&lt;li&gt;Next the VM is started and some specific steps are outlined on getting FreeBSD 10.3 installed into the instance. It includes some helpful hints as how to fix a mountroot error, if you installed to ada0, but need to mount via vtdb0 instead now. &lt;/li&gt;
&lt;li&gt;After the installation is finished, the prep for ‘cloudinit’ is done, and the resulting image is compressed and made ready for deployment. &lt;/li&gt;
&lt;li&gt;We’ve kinda stepped through some of the more gory steps here, but if OpenStack is something you work with, this tutorial should be at the top of your “must read” list.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160411201504" target="_blank" rel="nofollow noopener"&gt;Undeadly and HTTPS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Undeadly, the OpenBSD journal, is thinking of moving to HTTPS only&lt;/li&gt;
&lt;li&gt;In order to do this, they would like some help rewriting part of the site&lt;/li&gt;
&lt;li&gt;Currently, when you login to post comments, this is done over HTTPS, but to an stunnel instance running a custom script that gives you a cookie, and sends you back to the non-HTTPS site&lt;/li&gt;
&lt;li&gt;They would like to better integrate the authentication system, and otherwise improve the code for the site&lt;/li&gt;
&lt;li&gt;There is some pushback as well, questioning whether it makes sense to block users who are unable to use HTTPS for one reason or another&lt;/li&gt;
&lt;li&gt;I think it makes sense to have the site default to HTTPS, but, maybe HTTPS only doesn’t make sense. There is nothing private on the site, other than the authentication system which is optional, not required to post a comment.&lt;/li&gt;
&lt;li&gt;There is also some discussion about the code for the site, including the fact that when the code was released, the salt for the password database was included&lt;/li&gt;
&lt;li&gt;This is not actually a security problem, but the discussion may be interesting to some viewers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/journal/browser-based-edition/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal March/April Edition &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The next issue of the FreeBSD Journal is here, and this time it is about Teaching with Operating Systems&lt;/li&gt;
&lt;li&gt;In addition to the usual columns, including: svn update, the ports report, a conference report from FOSDEM, a meetup report from PortsCamp Taipei, A book review of "The Algorithm Design Manual", and the Events Calendar; there are a set of feature articles about teaching&lt;/li&gt;
&lt;li&gt;Teaching with FreeBSD through Tracing, Analysis, and Experimentation&lt;/li&gt;
&lt;li&gt;CHERI: Building a foundation for secure, trusted computing bases&lt;/li&gt;
&lt;li&gt;A brief history of Fast Filesystems&lt;/li&gt;
&lt;li&gt;There is also an interview with Gleb Smirnoff, a member of the Core team, release engineering, and the deputy security officer, as well as a senior software developer at Netflix&lt;/li&gt;
&lt;li&gt;Get the latest issue from your favourite mobile store, or the “Desktop Edition” directly in your browser from the FreeBSD Foundation’s website
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brooks Davis - &lt;a href="mailto:brooks@FreeBSD.org" target="_blank" rel="nofollow noopener"&gt;brooks@FreeBSD.org&lt;/a&gt; / &lt;a href="https://twitter.com/brooksdavis" target="_blank" rel="nofollow noopener"&gt;@brooksdavis&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;CHERI and Capabilities
***&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://www.ixsystems.com/blog/truenas-three-peats/" target="_blank" rel="nofollow noopener"&gt;TrueNAS Three-Peats!!!&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://linux.softpedia.com/blog/ubuntubsd-is-looking-to-become-an-official-ubuntu-flavor-502746.shtml" target="_blank" rel="nofollow noopener"&gt;UbuntuBSD Is Looking To Become An Official Ubuntu Flavor&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;You may recall a few weeks back that we were a bit surprised by the UbuntuBSD project and its longevity / goals.&lt;/li&gt;
&lt;li&gt;However the project seems to be pushing forward, with news on softpedia.com that they are now seeking to become an ‘official’ Ubuntu Flavor. &lt;/li&gt;
&lt;li&gt;They’ve already released a forth beta, so it seems the project currently has some developers pushing it forward:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; "I would like to contribute all my work to Ubuntu Community and, if you think it is worthy, make ubuntuBSD an official Ubuntu project like Xubuntu or Edubuntu," said Jon Boden. "If you're interested, please let me know how would you like me to proceed."&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.appliedcompscilab.com/its_just_bits/index.html" target="_blank" rel="nofollow noopener"&gt;It's Just Bits&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have next an interesting blog post talking about the idea that “It’s just all bits!”&lt;/li&gt;
&lt;li&gt;The author then takes us down the idea of no matter how old or mysterious the code may be, in the end it is ending up as bits arranged a certain way.&lt;/li&gt;
&lt;li&gt;Then the article transitions and takes us through the idea that old bits, and bits that have grown too large should often be good candidates for replacement by “simpler” bits, using OpenBSD as an example. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “The OpenBSD community exemplifies this in many ways by taking existing solutions and simplifying them. Processing man pages is as old as Unix, and even in the 21st century OpenBSD has taken the time to rewrite the existing solution to be simpler and safer. It's just bits that need to be turned into other bits. Similarly, OpenBSD has introduced doas as an alternative to sudo. While not replacing sudo entirely, doas makes the 99.99% case of what people use sudo for easier and safer. They are just bits that need to be authenticated. “&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All in all, a good read, and it reinforces the point that nothing is really truly “finished”. As computing advances and new technologies / practices are made available, sometimes it makes a lot of sense to go back and re-write things in order to simplify the complexity that has snuck in over time.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2016-April/084288.html" target="_blank" rel="nofollow noopener"&gt;Disk IO limiting is coming to FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;A much requested feature for both Jails and VM’s on FreeBSD has just landed with experimental support in -HEAD, Disk IO limiting!&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The Commit message states as follows:&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “Add four new RCTL resources - readbps, readiops, writebps and writeiops,&lt;br&gt;
&amp;gt;  for limiting disk (actually filesystem) IO.&lt;/p&gt;

&lt;p&gt;&amp;gt;  Note that in some cases these limits are not quite precise. It's ok,&lt;br&gt;
&amp;gt;  as long as it's within some reasonable bounds.&lt;/p&gt;

&lt;p&gt;&amp;gt;  Testing - and review of the code, in particular the VFS and VM parts - is&lt;br&gt;
&amp;gt;  very welcome.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Well, what are you waiting for? This is a fantastic new feature which I’m sure will get incorporated into other tools for controlling jails and VM’s down the road.&lt;/li&gt;
&lt;li&gt;If you give it a spin, be sure to report back bugs so they can get quashed in time for 11.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;BeastieBits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://news.softpedia.com/news/pc-bsd-10-3-is-the-last-in-the-series-pc-bsd-11-0-arrives-later-this-year-502570.shtml" target="_blank" rel="nofollow noopener"&gt;PC-BSD 10.3 Is the Last in the Series, PC-BSD 11.0 Arrives Later This Year&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/source-changes/2016/04/10/msg073939.html" target="_blank" rel="nofollow noopener"&gt;ASLR now on by default in NetBSD amd64&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-April/228682.html" target="_blank" rel="nofollow noopener"&gt;Daniel Bilik's fix for hangs on Baytrail&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.pgcon.org/2016/" target="_blank" rel="nofollow noopener"&gt;Don’t forget about PGCon 2016&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://2016.eurobsdcon.org/call-for-papers/" target="_blank" rel="nofollow noopener"&gt;Get your paper in for EuroBSDCon 2016, deadline is May 8th&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/QdGWn0TW" target="_blank" rel="nofollow noopener"&gt; John - Destroy all Dataset&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/43YkwBjP" target="_blank" rel="nofollow noopener"&gt; Thomas - Misc Questions&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/gdi3pswe" target="_blank" rel="nofollow noopener"&gt; Ben - ZFS Copy&lt;/a&gt;&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/E9n938D1" target="_blank" rel="nofollow noopener"&gt; Bryson - SysV IPC&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/bgGTmbDG" target="_blank" rel="nofollow noopener"&gt; Drin - IPSEC &lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, Allan is out of town, but since when has that ever stopped us from bringing you a new episode of BSDNow? We have news,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/FileSyncProblem" rel="nofollow">Unix&#39;s file durability problem</a></h3>

<ul>
<li>Another article by Chris Siebenmann from the University of Toronto</li>
<li>This time, the issue was a lost comment on his Python based blog which uses files on disk rather than a database</li>
<li>After an unexpected restart of the system, a recently posted comment no longer existed</li>
<li>The post goes on to investigate what the ‘right way’ to ensure file durability is</li>
<li>The answer, as you might expect, is “it depends…”</li>
<li>Normally, fsync() should work, but it seems with ext4 and some other file systems, you must also fsync() the directory where the file was created, or it might not be possible to find the file after a crash</li>
<li>Do you need to fsync() the parent of that directory too? Then what is fdatasync() for? What about just calling sync()?</li>
<li>“One issue is that unlike many other Unix API issues, it&#39;s impossible to test to see if you got it all correct and complete. If your steps are incomplete, you don&#39;t get any errors; your data is just silently sometimes at risk. Even with a test setup to create system crashes or abrupt power loss (which VMs make much easier), you need uncommon instrumentation to know things like if your OS actually issued disk flushes or just did normal buffered writes. And straightforward testing can&#39;t tell you if what you&#39;re doing will work all the time, because what is required varies by Unix, kernel version, and the specific filesystem involved.”</li>
<li><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/python/HowISyncDataDWiki" rel="nofollow">Second post by author: How I&#39;m trying to do durable disk writes </a></li>
<li><a href="https://news.ycombinator.com/item?id=11511269" rel="nofollow">Additional Discussion on Hacker News</a> </li>
<li>The discussion on HN also gets into AIO and other more complicated facilities, but even those seem to be vague about when your data is actually safe</li>
<li>At least ZFS ensures you never get half of your new data, and half of your old data.
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.3-release_Openstack_Image.html" rel="nofollow">Build a FreeBSD 10.3-release Openstack Image with bsd-cloudinit</a></h3>

<ul>
<li>Are you using FreeBSD and OpenStack or would you like to be? We next have a great tutorial which explains the ins-and-outs of doing exactly that.<br></li>
<li>Remy van Elst brings us a great walkthrough on his site on how to get started, and hint it involves just a few ‘pip’ commands. </li>
<li>After getting the initial Python tools bootstrapped, next he shows us how to save our OpenStack settings in a sourceable shell command, which comes in handy before doing admin on a instance.</li>
<li>Next the ‘glance’ and ‘cinder’ tools are used to upload the target OS ISO file and then create a volume for it to install onto.</li>
<li>Next the VM is started and some specific steps are outlined on getting FreeBSD 10.3 installed into the instance. It includes some helpful hints as how to fix a mountroot error, if you installed to ada0, but need to mount via vtdb0 instead now. </li>
<li>After the installation is finished, the prep for ‘cloudinit’ is done, and the resulting image is compressed and made ready for deployment. </li>
<li>We’ve kinda stepped through some of the more gory steps here, but if OpenStack is something you work with, this tutorial should be at the top of your “must read” list.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160411201504" rel="nofollow">Undeadly and HTTPS</a></h3>

<ul>
<li>Undeadly, the OpenBSD journal, is thinking of moving to HTTPS only</li>
<li>In order to do this, they would like some help rewriting part of the site</li>
<li>Currently, when you login to post comments, this is done over HTTPS, but to an stunnel instance running a custom script that gives you a cookie, and sends you back to the non-HTTPS site</li>
<li>They would like to better integrate the authentication system, and otherwise improve the code for the site</li>
<li>There is some pushback as well, questioning whether it makes sense to block users who are unable to use HTTPS for one reason or another</li>
<li>I think it makes sense to have the site default to HTTPS, but, maybe HTTPS only doesn’t make sense. There is nothing private on the site, other than the authentication system which is optional, not required to post a comment.</li>
<li>There is also some discussion about the code for the site, including the fact that when the code was released, the salt for the password database was included</li>
<li>This is not actually a security problem, but the discussion may be interesting to some viewers
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/journal/browser-based-edition/" rel="nofollow">FreeBSD Journal March/April Edition </a></h3>

<ul>
<li>The next issue of the FreeBSD Journal is here, and this time it is about Teaching with Operating Systems</li>
<li>In addition to the usual columns, including: svn update, the ports report, a conference report from FOSDEM, a meetup report from PortsCamp Taipei, A book review of &quot;The Algorithm Design Manual&quot;, and the Events Calendar; there are a set of feature articles about teaching</li>
<li>Teaching with FreeBSD through Tracing, Analysis, and Experimentation</li>
<li>CHERI: Building a foundation for secure, trusted computing bases</li>
<li>A brief history of Fast Filesystems</li>
<li>There is also an interview with Gleb Smirnoff, a member of the Core team, release engineering, and the deputy security officer, as well as a senior software developer at Netflix</li>
<li>Get the latest issue from your favourite mobile store, or the “Desktop Edition” directly in your browser from the FreeBSD Foundation’s website
***</li>
</ul>

<h2>Interview - Brooks Davis - <a href="mailto:brooks@FreeBSD.org" rel="nofollow">brooks@FreeBSD.org</a> / <a href="https://twitter.com/brooksdavis" rel="nofollow">@brooksdavis</a></h2>

<ul>
<li>CHERI and Capabilities
***</li>
</ul>

<p><a href="https://www.ixsystems.com/blog/truenas-three-peats/" rel="nofollow">TrueNAS Three-Peats!!!</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://linux.softpedia.com/blog/ubuntubsd-is-looking-to-become-an-official-ubuntu-flavor-502746.shtml" rel="nofollow">UbuntuBSD Is Looking To Become An Official Ubuntu Flavor</a></h3>

<ul>
<li>You may recall a few weeks back that we were a bit surprised by the UbuntuBSD project and its longevity / goals.</li>
<li>However the project seems to be pushing forward, with news on softpedia.com that they are now seeking to become an ‘official’ Ubuntu Flavor. </li>
<li>They’ve already released a forth beta, so it seems the project currently has some developers pushing it forward:</li>
</ul>

<blockquote>
<p>&quot;I would like to contribute all my work to Ubuntu Community and, if you think it is worthy, make ubuntuBSD an official Ubuntu project like Xubuntu or Edubuntu,&quot; said Jon Boden. &quot;If you&#39;re interested, please let me know how would you like me to proceed.&quot;</p>

<hr>
</blockquote>

<h3><a href="http://blog.appliedcompscilab.com/its_just_bits/index.html" rel="nofollow">It&#39;s Just Bits</a></h3>

<ul>
<li>We have next an interesting blog post talking about the idea that “It’s just all bits!”</li>
<li>The author then takes us down the idea of no matter how old or mysterious the code may be, in the end it is ending up as bits arranged a certain way.</li>
<li>Then the article transitions and takes us through the idea that old bits, and bits that have grown too large should often be good candidates for replacement by “simpler” bits, using OpenBSD as an example. </li>
</ul>

<blockquote>
<p>“The OpenBSD community exemplifies this in many ways by taking existing solutions and simplifying them. Processing man pages is as old as Unix, and even in the 21st century OpenBSD has taken the time to rewrite the existing solution to be simpler and safer. It&#39;s just bits that need to be turned into other bits. Similarly, OpenBSD has introduced doas as an alternative to sudo. While not replacing sudo entirely, doas makes the 99.99% case of what people use sudo for easier and safer. They are just bits that need to be authenticated. “</p>
</blockquote>

<ul>
<li>All in all, a good read, and it reinforces the point that nothing is really truly “finished”. As computing advances and new technologies / practices are made available, sometimes it makes a lot of sense to go back and re-write things in order to simplify the complexity that has snuck in over time.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2016-April/084288.html" rel="nofollow">Disk IO limiting is coming to FreeBSD</a></h3>

<ul>
<li><p>A much requested feature for both Jails and VM’s on FreeBSD has just landed with experimental support in -HEAD, Disk IO limiting!</p></li>
<li><p>The Commit message states as follows:</p></li>
</ul>

<blockquote>
<p>“Add four new RCTL resources - readbps, readiops, writebps and writeiops,<br>
 for limiting disk (actually filesystem) IO.</p>

<p>Note that in some cases these limits are not quite precise. It&#39;s ok,<br>
 as long as it&#39;s within some reasonable bounds.</p>

<p>Testing - and review of the code, in particular the VFS and VM parts - is<br>
 very welcome.”</p>
</blockquote>

<ul>
<li>Well, what are you waiting for? This is a fantastic new feature which I’m sure will get incorporated into other tools for controlling jails and VM’s down the road.</li>
<li>If you give it a spin, be sure to report back bugs so they can get quashed in time for 11.
***</li>
</ul>

<h3>BeastieBits</h3>

<ul>
<li><p><a href="http://news.softpedia.com/news/pc-bsd-10-3-is-the-last-in-the-series-pc-bsd-11-0-arrives-later-this-year-502570.shtml" rel="nofollow">PC-BSD 10.3 Is the Last in the Series, PC-BSD 11.0 Arrives Later This Year</a></p></li>
<li><p><a href="http://mail-index.netbsd.org/source-changes/2016/04/10/msg073939.html" rel="nofollow">ASLR now on by default in NetBSD amd64</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-April/228682.html" rel="nofollow">Daniel Bilik&#39;s fix for hangs on Baytrail</a> </p></li>
<li><p><a href="http://www.pgcon.org/2016/" rel="nofollow">Don’t forget about PGCon 2016</a> </p></li>
<li><p><a href="https://2016.eurobsdcon.org/call-for-papers/" rel="nofollow">Get your paper in for EuroBSDCon 2016, deadline is May 8th</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/QdGWn0TW" rel="nofollow"> John - Destroy all Dataset</a> </li>
<li><a href="http://pastebin.com/43YkwBjP" rel="nofollow"> Thomas - Misc Questions</a> </li>
<li><a href="http://pastebin.com/gdi3pswe" rel="nofollow"> Ben - ZFS Copy</a><br></li>
<li><a href="http://pastebin.com/E9n938D1" rel="nofollow"> Bryson - SysV IPC</a> </li>
<li><a href="http://pastebin.com/bgGTmbDG" rel="nofollow"> Drin - IPSEC </a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, Allan is out of town, but since when has that ever stopped us from bringing you a new episode of BSDNow? We have news,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/FileSyncProblem" rel="nofollow">Unix&#39;s file durability problem</a></h3>

<ul>
<li>Another article by Chris Siebenmann from the University of Toronto</li>
<li>This time, the issue was a lost comment on his Python based blog which uses files on disk rather than a database</li>
<li>After an unexpected restart of the system, a recently posted comment no longer existed</li>
<li>The post goes on to investigate what the ‘right way’ to ensure file durability is</li>
<li>The answer, as you might expect, is “it depends…”</li>
<li>Normally, fsync() should work, but it seems with ext4 and some other file systems, you must also fsync() the directory where the file was created, or it might not be possible to find the file after a crash</li>
<li>Do you need to fsync() the parent of that directory too? Then what is fdatasync() for? What about just calling sync()?</li>
<li>“One issue is that unlike many other Unix API issues, it&#39;s impossible to test to see if you got it all correct and complete. If your steps are incomplete, you don&#39;t get any errors; your data is just silently sometimes at risk. Even with a test setup to create system crashes or abrupt power loss (which VMs make much easier), you need uncommon instrumentation to know things like if your OS actually issued disk flushes or just did normal buffered writes. And straightforward testing can&#39;t tell you if what you&#39;re doing will work all the time, because what is required varies by Unix, kernel version, and the specific filesystem involved.”</li>
<li><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/python/HowISyncDataDWiki" rel="nofollow">Second post by author: How I&#39;m trying to do durable disk writes </a></li>
<li><a href="https://news.ycombinator.com/item?id=11511269" rel="nofollow">Additional Discussion on Hacker News</a> </li>
<li>The discussion on HN also gets into AIO and other more complicated facilities, but even those seem to be vague about when your data is actually safe</li>
<li>At least ZFS ensures you never get half of your new data, and half of your old data.
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.3-release_Openstack_Image.html" rel="nofollow">Build a FreeBSD 10.3-release Openstack Image with bsd-cloudinit</a></h3>

<ul>
<li>Are you using FreeBSD and OpenStack or would you like to be? We next have a great tutorial which explains the ins-and-outs of doing exactly that.<br></li>
<li>Remy van Elst brings us a great walkthrough on his site on how to get started, and hint it involves just a few ‘pip’ commands. </li>
<li>After getting the initial Python tools bootstrapped, next he shows us how to save our OpenStack settings in a sourceable shell command, which comes in handy before doing admin on a instance.</li>
<li>Next the ‘glance’ and ‘cinder’ tools are used to upload the target OS ISO file and then create a volume for it to install onto.</li>
<li>Next the VM is started and some specific steps are outlined on getting FreeBSD 10.3 installed into the instance. It includes some helpful hints as how to fix a mountroot error, if you installed to ada0, but need to mount via vtdb0 instead now. </li>
<li>After the installation is finished, the prep for ‘cloudinit’ is done, and the resulting image is compressed and made ready for deployment. </li>
<li>We’ve kinda stepped through some of the more gory steps here, but if OpenStack is something you work with, this tutorial should be at the top of your “must read” list.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160411201504" rel="nofollow">Undeadly and HTTPS</a></h3>

<ul>
<li>Undeadly, the OpenBSD journal, is thinking of moving to HTTPS only</li>
<li>In order to do this, they would like some help rewriting part of the site</li>
<li>Currently, when you login to post comments, this is done over HTTPS, but to an stunnel instance running a custom script that gives you a cookie, and sends you back to the non-HTTPS site</li>
<li>They would like to better integrate the authentication system, and otherwise improve the code for the site</li>
<li>There is some pushback as well, questioning whether it makes sense to block users who are unable to use HTTPS for one reason or another</li>
<li>I think it makes sense to have the site default to HTTPS, but, maybe HTTPS only doesn’t make sense. There is nothing private on the site, other than the authentication system which is optional, not required to post a comment.</li>
<li>There is also some discussion about the code for the site, including the fact that when the code was released, the salt for the password database was included</li>
<li>This is not actually a security problem, but the discussion may be interesting to some viewers
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/journal/browser-based-edition/" rel="nofollow">FreeBSD Journal March/April Edition </a></h3>

<ul>
<li>The next issue of the FreeBSD Journal is here, and this time it is about Teaching with Operating Systems</li>
<li>In addition to the usual columns, including: svn update, the ports report, a conference report from FOSDEM, a meetup report from PortsCamp Taipei, A book review of &quot;The Algorithm Design Manual&quot;, and the Events Calendar; there are a set of feature articles about teaching</li>
<li>Teaching with FreeBSD through Tracing, Analysis, and Experimentation</li>
<li>CHERI: Building a foundation for secure, trusted computing bases</li>
<li>A brief history of Fast Filesystems</li>
<li>There is also an interview with Gleb Smirnoff, a member of the Core team, release engineering, and the deputy security officer, as well as a senior software developer at Netflix</li>
<li>Get the latest issue from your favourite mobile store, or the “Desktop Edition” directly in your browser from the FreeBSD Foundation’s website
***</li>
</ul>

<h2>Interview - Brooks Davis - <a href="mailto:brooks@FreeBSD.org" rel="nofollow">brooks@FreeBSD.org</a> / <a href="https://twitter.com/brooksdavis" rel="nofollow">@brooksdavis</a></h2>

<ul>
<li>CHERI and Capabilities
***</li>
</ul>

<p><a href="https://www.ixsystems.com/blog/truenas-three-peats/" rel="nofollow">TrueNAS Three-Peats!!!</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://linux.softpedia.com/blog/ubuntubsd-is-looking-to-become-an-official-ubuntu-flavor-502746.shtml" rel="nofollow">UbuntuBSD Is Looking To Become An Official Ubuntu Flavor</a></h3>

<ul>
<li>You may recall a few weeks back that we were a bit surprised by the UbuntuBSD project and its longevity / goals.</li>
<li>However the project seems to be pushing forward, with news on softpedia.com that they are now seeking to become an ‘official’ Ubuntu Flavor. </li>
<li>They’ve already released a forth beta, so it seems the project currently has some developers pushing it forward:</li>
</ul>

<blockquote>
<p>&quot;I would like to contribute all my work to Ubuntu Community and, if you think it is worthy, make ubuntuBSD an official Ubuntu project like Xubuntu or Edubuntu,&quot; said Jon Boden. &quot;If you&#39;re interested, please let me know how would you like me to proceed.&quot;</p>

<hr>
</blockquote>

<h3><a href="http://blog.appliedcompscilab.com/its_just_bits/index.html" rel="nofollow">It&#39;s Just Bits</a></h3>

<ul>
<li>We have next an interesting blog post talking about the idea that “It’s just all bits!”</li>
<li>The author then takes us down the idea of no matter how old or mysterious the code may be, in the end it is ending up as bits arranged a certain way.</li>
<li>Then the article transitions and takes us through the idea that old bits, and bits that have grown too large should often be good candidates for replacement by “simpler” bits, using OpenBSD as an example. </li>
</ul>

<blockquote>
<p>“The OpenBSD community exemplifies this in many ways by taking existing solutions and simplifying them. Processing man pages is as old as Unix, and even in the 21st century OpenBSD has taken the time to rewrite the existing solution to be simpler and safer. It&#39;s just bits that need to be turned into other bits. Similarly, OpenBSD has introduced doas as an alternative to sudo. While not replacing sudo entirely, doas makes the 99.99% case of what people use sudo for easier and safer. They are just bits that need to be authenticated. “</p>
</blockquote>

<ul>
<li>All in all, a good read, and it reinforces the point that nothing is really truly “finished”. As computing advances and new technologies / practices are made available, sometimes it makes a lot of sense to go back and re-write things in order to simplify the complexity that has snuck in over time.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2016-April/084288.html" rel="nofollow">Disk IO limiting is coming to FreeBSD</a></h3>

<ul>
<li><p>A much requested feature for both Jails and VM’s on FreeBSD has just landed with experimental support in -HEAD, Disk IO limiting!</p></li>
<li><p>The Commit message states as follows:</p></li>
</ul>

<blockquote>
<p>“Add four new RCTL resources - readbps, readiops, writebps and writeiops,<br>
 for limiting disk (actually filesystem) IO.</p>

<p>Note that in some cases these limits are not quite precise. It&#39;s ok,<br>
 as long as it&#39;s within some reasonable bounds.</p>

<p>Testing - and review of the code, in particular the VFS and VM parts - is<br>
 very welcome.”</p>
</blockquote>

<ul>
<li>Well, what are you waiting for? This is a fantastic new feature which I’m sure will get incorporated into other tools for controlling jails and VM’s down the road.</li>
<li>If you give it a spin, be sure to report back bugs so they can get quashed in time for 11.
***</li>
</ul>

<h3>BeastieBits</h3>

<ul>
<li><p><a href="http://news.softpedia.com/news/pc-bsd-10-3-is-the-last-in-the-series-pc-bsd-11-0-arrives-later-this-year-502570.shtml" rel="nofollow">PC-BSD 10.3 Is the Last in the Series, PC-BSD 11.0 Arrives Later This Year</a></p></li>
<li><p><a href="http://mail-index.netbsd.org/source-changes/2016/04/10/msg073939.html" rel="nofollow">ASLR now on by default in NetBSD amd64</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-April/228682.html" rel="nofollow">Daniel Bilik&#39;s fix for hangs on Baytrail</a> </p></li>
<li><p><a href="http://www.pgcon.org/2016/" rel="nofollow">Don’t forget about PGCon 2016</a> </p></li>
<li><p><a href="https://2016.eurobsdcon.org/call-for-papers/" rel="nofollow">Get your paper in for EuroBSDCon 2016, deadline is May 8th</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/QdGWn0TW" rel="nofollow"> John - Destroy all Dataset</a> </li>
<li><a href="http://pastebin.com/43YkwBjP" rel="nofollow"> Thomas - Misc Questions</a> </li>
<li><a href="http://pastebin.com/gdi3pswe" rel="nofollow"> Ben - ZFS Copy</a><br></li>
<li><a href="http://pastebin.com/E9n938D1" rel="nofollow"> Bryson - SysV IPC</a> </li>
<li><a href="http://pastebin.com/bgGTmbDG" rel="nofollow"> Drin - IPSEC </a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>138: Rushing into BSD</title>
  <link>https://www.bsdnow.tv/138</link>
  <guid isPermaLink="false">76132fe6-471f-4b50-bf70-f6fdf784b561</guid>
  <pubDate>Wed, 20 Apr 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/76132fe6-471f-4b50-bf70-f6fdf784b561.mp3" length="69487348" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we will be talking to Benedict Reushling about his role with the FreeBSD foundation and the journey that took him</itunes:subtitle>
  <itunes:duration>1:36:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we will be talking to Benedict Reushling about his role with the FreeBSD foundation and the journey that took him&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2016-04-15/introducing-full-pie-support" target="_blank" rel="nofollow noopener"&gt;HardenedBSD introduces full PIE support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PIE base for amd64 and i386&lt;/li&gt;
&lt;li&gt;Only nine applications are not compiled as PIEs&lt;/li&gt;
&lt;li&gt;Tested PIE base on several amd64 systems, both virtualized and bare metal&lt;/li&gt;
&lt;li&gt;Hoped to be to enabled it for ARM64 before or during BSDCan.&lt;/li&gt;
&lt;li&gt;Shawn will be bringing ten Raspberry Pi 3 devices (which are ARM64) with to BSDCan, eight of which will be given out to lucky individuals. “We want the BSD community to hack on them and get ARM64/Aarch64 fully functional on them.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://m.cacm.acm.org/magazines/2016/3/198874-lessons-learned-from-30-years-of-minix/fulltext" target="_blank" rel="nofollow noopener"&gt;Lessons learned from 30 years of MINIX&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Eat your own dog food.&lt;/li&gt;
&lt;li&gt;By not relying on idiosyncratic features of the hardware, one makes porting to new platforms much easier.&lt;/li&gt;
&lt;li&gt;The Internet is like an elephant; it never forgets.&lt;/li&gt;
&lt;li&gt;When standards exist (such as ANSI Standard C) stick to them.&lt;/li&gt;
&lt;li&gt;Even after you have adopted a strategy, you should nevertheless reexamine it from time to time.&lt;/li&gt;
&lt;li&gt;Keep focused on your real goal, Einstein was right: Things should be as simple as possible but not simpler.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=2008" target="_blank" rel="nofollow noopener"&gt;pfSense 2.3 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Rewrite of the webGUI utilizing Bootstrap&lt;/li&gt;
&lt;li&gt;TLS v1.0 disabled for the GUI&lt;/li&gt;
&lt;li&gt;Moved to a FreeBSD 10.3-RELEASE base&lt;/li&gt;
&lt;li&gt;PHP Upgraded to 5.6&lt;/li&gt;
&lt;li&gt;The "Full Backup" feature has been deprecated&lt;/li&gt;
&lt;li&gt;Closed 760 total tickets of which 137 are fixed bugs&lt;/li&gt;
&lt;li&gt;Known Regressions&lt;/li&gt;
&lt;li&gt;OpenVPN topology change&lt;/li&gt;
&lt;li&gt;IP aliases with CARP IP parent lose their parent interface association post-upgrade&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;IPsec IPComp does not work.&lt;/li&gt;
&lt;li&gt;IGMP Proxy does not work with VLAN interfaces.&lt;/li&gt;
&lt;li&gt;Many other updates and changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-16-1-10-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.1.10 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;openvpn: revive windows installer binaries&lt;/li&gt;
&lt;li&gt;system: improved config history and backup pages layout&lt;/li&gt;
&lt;li&gt;system: increased backup count default from 30 to 60&lt;/li&gt;
&lt;li&gt;system: /var /tmp MFS awareness for crash dumps added&lt;/li&gt;
&lt;li&gt;trust: add “IP security IKE intermediate” to server key usage&lt;/li&gt;
&lt;li&gt;firmware: moved reboot, halt and defaults pages to new home&lt;/li&gt;
&lt;li&gt;languages: updates to Russian, French, German and Japanese&lt;/li&gt;
&lt;li&gt;Many other updates and changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Benedict Reuschling - &lt;a href="mailto:bcr@freebsd.org" target="_blank" rel="nofollow noopener"&gt;bcr@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD Foundation in Europe
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2016-04-11-write-opinionated-workarounds.html" target="_blank" rel="nofollow noopener"&gt;Write opinionated workarounds&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Colin Percival has written a great blog post this past week, specifically talking about his policy of writing “opinionated workarounds”.&lt;/li&gt;
&lt;li&gt;The idea came about due to his working on multi-platform software, and the frustrations of dealing with POSIX violations&lt;/li&gt;
&lt;li&gt;The crux of the post is how he deals with these workarounds. Specifically by &lt;em&gt;only&lt;/em&gt; applying them to the particular system in which it was required. And doing so loudly. &lt;/li&gt;
&lt;li&gt;This has some important benefits. First, it doesn’t potentially expose other systems to bugs / security flaws when a workaround doesn’t 
“work” on a system for which it wasn’t designed. Secondly it’s important to complain. Loudly. This lets the user know that they are running on a system that doesn’t adhere to POSIX compliance, and maybe even get the attention of a developer who could remedy the situation.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2016-003.txt.asc" target="_blank" rel="nofollow noopener"&gt;Privilege escalation in calendar(1)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;File this one under “Ouch that hurts” a new security vuln has been posted, this time against NetBSD’s ‘calendar’ command.&lt;/li&gt;
&lt;li&gt;Specifically it looks like some of the daily scripts uses the ‘-a’ flag, which requires super-user privs in order to process all users calendar files and mail the results.&lt;/li&gt;
&lt;li&gt;However the bug occurred because the calendar command didn’t drop priv properly before executing external commands (whoops!)&lt;/li&gt;
&lt;li&gt;To workaround you can set run_calendar=NO in the daily.conf file, or apply the fixed binary from upstream.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.pgcon.org/2016/" target="_blank" rel="nofollow noopener"&gt;PGCon 2016&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PGCon 2016 is now only 4 weeks away&lt;/li&gt;
&lt;li&gt;The conference will be held at the University of Ottawa (same venue as BSDCan) from May 17th to 20th&lt;/li&gt;
&lt;li&gt;Tutorials: 17-18 May 2016 (Tue &amp;amp; Wed)&lt;/li&gt;
&lt;li&gt;Talks: 19-20 May 2016 (Thu-Fri)&lt;/li&gt;
&lt;li&gt;Wednesday is a developer unconference.&lt;/li&gt;
&lt;li&gt;Saturday is a user unconference.&lt;/li&gt;
&lt;li&gt;“PGCon is an annual conference for users and developers of PostgreSQL, a leading relational database, which just happens to be open source. PGCon is the place to meet, discuss, build relationships, learn valuable insights, and generally chat about the work you are doing with PostgreSQL. If you want to learn why so many people are moving to PostgreSQL, PGCon will be the place to find out why. Whether you are a casual user or you've been working with PostgreSQL for years, PGCon will have something for you.”&lt;/li&gt;
&lt;li&gt;New to PGSQL? Just a user? Long time developers? This conference has something for you. &lt;a href="https://www.pgcon.org/2016/schedule/events.en.html" target="_blank" rel="nofollow noopener"&gt;A great lineup of talks&lt;/a&gt;, plus unconference days focused on both users and developers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://2016.eurobsdcon.org/call-for-papers/" target="_blank" rel="nofollow noopener"&gt;CfP EuroBSDCon 2016&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The call for papers has been issued for EuroBSDCon 2016 in Belgrade, Serbia&lt;/li&gt;
&lt;li&gt;The conference will be held from the 22nd to 25th of September, 2016&lt;/li&gt;
&lt;li&gt;The deadline for talk submissions is: Sunday the 8th of May, 2016&lt;/li&gt;
&lt;li&gt;Submit your talk or tutorial proposal before it is too late
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.michaelwlucas.com/nonfiction/fmaz" target="_blank" rel="nofollow noopener"&gt;“FreeBSD Mastery: Advanced ZFS” has officially been released &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://gist.github.com/ligurio/f6114bd1df371047dd80ea9b8a55c104" target="_blank" rel="nofollow noopener"&gt;Support of OpenBSD pledge(2) in programming Languages&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://daemonforums.org/showthread.php?t=9781" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon 2016 -Call for Presentations&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/talks_about_blacklistd" target="_blank" rel="nofollow noopener"&gt;Christos Zoulas talks about blacklistd&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2617" target="_blank" rel="nofollow noopener"&gt;Penguicon 2016 Lucas Track Schedule&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/HiiDpGcT" target="_blank" rel="nofollow noopener"&gt; Peter - NVME&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/L5XeVS1H" target="_blank" rel="nofollow noopener"&gt; Jeremy - Wireless Gear&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/yrCEnkWt" target="_blank" rel="nofollow noopener"&gt; Ted - Rpi2 Packages&lt;/a&gt; - &lt;a href="https://wiki.freebsd.org/FreeBSD/arm/crossbuild" target="_blank" rel="nofollow noopener"&gt;Cross Building Wiki&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/pYFC1vdQ" target="_blank" rel="nofollow noopener"&gt; Geoff - Jail Failover&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/WEgN0ZVw" target="_blank" rel="nofollow noopener"&gt; Zach - Graphical Bhyve?&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we will be talking to Benedict Reushling about his role with the FreeBSD foundation and the journey that took him</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2016-04-15/introducing-full-pie-support" rel="nofollow">HardenedBSD introduces full PIE support</a></h3>

<ul>
<li>PIE base for amd64 and i386</li>
<li>Only nine applications are not compiled as PIEs</li>
<li>Tested PIE base on several amd64 systems, both virtualized and bare metal</li>
<li>Hoped to be to enabled it for ARM64 before or during BSDCan.</li>
<li>Shawn will be bringing ten Raspberry Pi 3 devices (which are ARM64) with to BSDCan, eight of which will be given out to lucky individuals. “We want the BSD community to hack on them and get ARM64/Aarch64 fully functional on them.”
***</li>
</ul>

<h3><a href="http://m.cacm.acm.org/magazines/2016/3/198874-lessons-learned-from-30-years-of-minix/fulltext" rel="nofollow">Lessons learned from 30 years of MINIX</a></h3>

<ul>
<li>Eat your own dog food.</li>
<li>By not relying on idiosyncratic features of the hardware, one makes porting to new platforms much easier.</li>
<li>The Internet is like an elephant; it never forgets.</li>
<li>When standards exist (such as ANSI Standard C) stick to them.</li>
<li>Even after you have adopted a strategy, you should nevertheless reexamine it from time to time.</li>
<li>Keep focused on your real goal, Einstein was right: Things should be as simple as possible but not simpler.
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=2008" rel="nofollow">pfSense 2.3 released</a></h3>

<ul>
<li>Rewrite of the webGUI utilizing Bootstrap</li>
<li>TLS v1.0 disabled for the GUI</li>
<li>Moved to a FreeBSD 10.3-RELEASE base</li>
<li>PHP Upgraded to 5.6</li>
<li>The &quot;Full Backup&quot; feature has been deprecated</li>
<li>Closed 760 total tickets of which 137 are fixed bugs</li>
<li>Known Regressions</li>
<li>OpenVPN topology change</li>
<li>IP aliases with CARP IP parent lose their parent interface association post-upgrade<br></li>
<li>IPsec IPComp does not work.</li>
<li>IGMP Proxy does not work with VLAN interfaces.</li>
<li>Many other updates and changes
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-16-1-10-released/" rel="nofollow">OPNsense 16.1.10 released</a></h3>

<ul>
<li>openvpn: revive windows installer binaries</li>
<li>system: improved config history and backup pages layout</li>
<li>system: increased backup count default from 30 to 60</li>
<li>system: /var /tmp MFS awareness for crash dumps added</li>
<li>trust: add “IP security IKE intermediate” to server key usage</li>
<li>firmware: moved reboot, halt and defaults pages to new home</li>
<li>languages: updates to Russian, French, German and Japanese</li>
<li>Many other updates and changes
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<ul>
<li>FreeBSD Foundation in Europe
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2016-04-11-write-opinionated-workarounds.html" rel="nofollow">Write opinionated workarounds</a></h3>

<ul>
<li>Colin Percival has written a great blog post this past week, specifically talking about his policy of writing “opinionated workarounds”.</li>
<li>The idea came about due to his working on multi-platform software, and the frustrations of dealing with POSIX violations</li>
<li>The crux of the post is how he deals with these workarounds. Specifically by <em>only</em> applying them to the particular system in which it was required. And doing so loudly. </li>
<li>This has some important benefits. First, it doesn’t potentially expose other systems to bugs / security flaws when a workaround doesn’t 
“work” on a system for which it wasn’t designed. Secondly it’s important to complain. Loudly. This lets the user know that they are running on a system that doesn’t adhere to POSIX compliance, and maybe even get the attention of a developer who could remedy the situation.
***</li>
</ul>

<h3><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2016-003.txt.asc" rel="nofollow">Privilege escalation in calendar(1)</a></h3>

<ul>
<li>File this one under “Ouch that hurts” a new security vuln has been posted, this time against NetBSD’s ‘calendar’ command.</li>
<li>Specifically it looks like some of the daily scripts uses the ‘-a’ flag, which requires super-user privs in order to process all users calendar files and mail the results.</li>
<li>However the bug occurred because the calendar command didn’t drop priv properly before executing external commands (whoops!)</li>
<li>To workaround you can set run_calendar=NO in the daily.conf file, or apply the fixed binary from upstream.
***</li>
</ul>

<h3><a href="http://www.pgcon.org/2016/" rel="nofollow">PGCon 2016</a></h3>

<ul>
<li>PGCon 2016 is now only 4 weeks away</li>
<li>The conference will be held at the University of Ottawa (same venue as BSDCan) from May 17th to 20th</li>
<li>Tutorials: 17-18 May 2016 (Tue &amp; Wed)</li>
<li>Talks: 19-20 May 2016 (Thu-Fri)</li>
<li>Wednesday is a developer unconference.</li>
<li>Saturday is a user unconference.</li>
<li>“PGCon is an annual conference for users and developers of PostgreSQL, a leading relational database, which just happens to be open source. PGCon is the place to meet, discuss, build relationships, learn valuable insights, and generally chat about the work you are doing with PostgreSQL. If you want to learn why so many people are moving to PostgreSQL, PGCon will be the place to find out why. Whether you are a casual user or you&#39;ve been working with PostgreSQL for years, PGCon will have something for you.”</li>
<li>New to PGSQL? Just a user? Long time developers? This conference has something for you. <a href="https://www.pgcon.org/2016/schedule/events.en.html" rel="nofollow">A great lineup of talks</a>, plus unconference days focused on both users and developers
***</li>
</ul>

<h3><a href="https://2016.eurobsdcon.org/call-for-papers/" rel="nofollow">CfP EuroBSDCon 2016</a></h3>

<ul>
<li>The call for papers has been issued for EuroBSDCon 2016 in Belgrade, Serbia</li>
<li>The conference will be held from the 22nd to 25th of September, 2016</li>
<li>The deadline for talk submissions is: Sunday the 8th of May, 2016</li>
<li>Submit your talk or tutorial proposal before it is too late
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.michaelwlucas.com/nonfiction/fmaz" rel="nofollow">“FreeBSD Mastery: Advanced ZFS” has officially been released </a> </p></li>
<li><p><a href="https://gist.github.com/ligurio/f6114bd1df371047dd80ea9b8a55c104" rel="nofollow">Support of OpenBSD pledge(2) in programming Languages</a> </p></li>
<li><p><a href="http://daemonforums.org/showthread.php?t=9781" rel="nofollow">pkgsrcCon 2016 -Call for Presentations</a></p></li>
<li><p><a href="http://blog.netbsd.org/tnf/entry/talks_about_blacklistd" rel="nofollow">Christos Zoulas talks about blacklistd</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2617" rel="nofollow">Penguicon 2016 Lucas Track Schedule</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/HiiDpGcT" rel="nofollow"> Peter - NVME</a> </li>
<li><a href="http://pastebin.com/L5XeVS1H" rel="nofollow"> Jeremy - Wireless Gear</a> </li>
<li><a href="http://pastebin.com/yrCEnkWt" rel="nofollow"> Ted - Rpi2 Packages</a> - <a href="https://wiki.freebsd.org/FreeBSD/arm/crossbuild" rel="nofollow">Cross Building Wiki</a> </li>
<li><a href="http://pastebin.com/pYFC1vdQ" rel="nofollow"> Geoff - Jail Failover</a> </li>
<li><a href="http://pastebin.com/WEgN0ZVw" rel="nofollow"> Zach - Graphical Bhyve?</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we will be talking to Benedict Reushling about his role with the FreeBSD foundation and the journey that took him</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2016-04-15/introducing-full-pie-support" rel="nofollow">HardenedBSD introduces full PIE support</a></h3>

<ul>
<li>PIE base for amd64 and i386</li>
<li>Only nine applications are not compiled as PIEs</li>
<li>Tested PIE base on several amd64 systems, both virtualized and bare metal</li>
<li>Hoped to be to enabled it for ARM64 before or during BSDCan.</li>
<li>Shawn will be bringing ten Raspberry Pi 3 devices (which are ARM64) with to BSDCan, eight of which will be given out to lucky individuals. “We want the BSD community to hack on them and get ARM64/Aarch64 fully functional on them.”
***</li>
</ul>

<h3><a href="http://m.cacm.acm.org/magazines/2016/3/198874-lessons-learned-from-30-years-of-minix/fulltext" rel="nofollow">Lessons learned from 30 years of MINIX</a></h3>

<ul>
<li>Eat your own dog food.</li>
<li>By not relying on idiosyncratic features of the hardware, one makes porting to new platforms much easier.</li>
<li>The Internet is like an elephant; it never forgets.</li>
<li>When standards exist (such as ANSI Standard C) stick to them.</li>
<li>Even after you have adopted a strategy, you should nevertheless reexamine it from time to time.</li>
<li>Keep focused on your real goal, Einstein was right: Things should be as simple as possible but not simpler.
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=2008" rel="nofollow">pfSense 2.3 released</a></h3>

<ul>
<li>Rewrite of the webGUI utilizing Bootstrap</li>
<li>TLS v1.0 disabled for the GUI</li>
<li>Moved to a FreeBSD 10.3-RELEASE base</li>
<li>PHP Upgraded to 5.6</li>
<li>The &quot;Full Backup&quot; feature has been deprecated</li>
<li>Closed 760 total tickets of which 137 are fixed bugs</li>
<li>Known Regressions</li>
<li>OpenVPN topology change</li>
<li>IP aliases with CARP IP parent lose their parent interface association post-upgrade<br></li>
<li>IPsec IPComp does not work.</li>
<li>IGMP Proxy does not work with VLAN interfaces.</li>
<li>Many other updates and changes
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-16-1-10-released/" rel="nofollow">OPNsense 16.1.10 released</a></h3>

<ul>
<li>openvpn: revive windows installer binaries</li>
<li>system: improved config history and backup pages layout</li>
<li>system: increased backup count default from 30 to 60</li>
<li>system: /var /tmp MFS awareness for crash dumps added</li>
<li>trust: add “IP security IKE intermediate” to server key usage</li>
<li>firmware: moved reboot, halt and defaults pages to new home</li>
<li>languages: updates to Russian, French, German and Japanese</li>
<li>Many other updates and changes
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<ul>
<li>FreeBSD Foundation in Europe
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2016-04-11-write-opinionated-workarounds.html" rel="nofollow">Write opinionated workarounds</a></h3>

<ul>
<li>Colin Percival has written a great blog post this past week, specifically talking about his policy of writing “opinionated workarounds”.</li>
<li>The idea came about due to his working on multi-platform software, and the frustrations of dealing with POSIX violations</li>
<li>The crux of the post is how he deals with these workarounds. Specifically by <em>only</em> applying them to the particular system in which it was required. And doing so loudly. </li>
<li>This has some important benefits. First, it doesn’t potentially expose other systems to bugs / security flaws when a workaround doesn’t 
“work” on a system for which it wasn’t designed. Secondly it’s important to complain. Loudly. This lets the user know that they are running on a system that doesn’t adhere to POSIX compliance, and maybe even get the attention of a developer who could remedy the situation.
***</li>
</ul>

<h3><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2016-003.txt.asc" rel="nofollow">Privilege escalation in calendar(1)</a></h3>

<ul>
<li>File this one under “Ouch that hurts” a new security vuln has been posted, this time against NetBSD’s ‘calendar’ command.</li>
<li>Specifically it looks like some of the daily scripts uses the ‘-a’ flag, which requires super-user privs in order to process all users calendar files and mail the results.</li>
<li>However the bug occurred because the calendar command didn’t drop priv properly before executing external commands (whoops!)</li>
<li>To workaround you can set run_calendar=NO in the daily.conf file, or apply the fixed binary from upstream.
***</li>
</ul>

<h3><a href="http://www.pgcon.org/2016/" rel="nofollow">PGCon 2016</a></h3>

<ul>
<li>PGCon 2016 is now only 4 weeks away</li>
<li>The conference will be held at the University of Ottawa (same venue as BSDCan) from May 17th to 20th</li>
<li>Tutorials: 17-18 May 2016 (Tue &amp; Wed)</li>
<li>Talks: 19-20 May 2016 (Thu-Fri)</li>
<li>Wednesday is a developer unconference.</li>
<li>Saturday is a user unconference.</li>
<li>“PGCon is an annual conference for users and developers of PostgreSQL, a leading relational database, which just happens to be open source. PGCon is the place to meet, discuss, build relationships, learn valuable insights, and generally chat about the work you are doing with PostgreSQL. If you want to learn why so many people are moving to PostgreSQL, PGCon will be the place to find out why. Whether you are a casual user or you&#39;ve been working with PostgreSQL for years, PGCon will have something for you.”</li>
<li>New to PGSQL? Just a user? Long time developers? This conference has something for you. <a href="https://www.pgcon.org/2016/schedule/events.en.html" rel="nofollow">A great lineup of talks</a>, plus unconference days focused on both users and developers
***</li>
</ul>

<h3><a href="https://2016.eurobsdcon.org/call-for-papers/" rel="nofollow">CfP EuroBSDCon 2016</a></h3>

<ul>
<li>The call for papers has been issued for EuroBSDCon 2016 in Belgrade, Serbia</li>
<li>The conference will be held from the 22nd to 25th of September, 2016</li>
<li>The deadline for talk submissions is: Sunday the 8th of May, 2016</li>
<li>Submit your talk or tutorial proposal before it is too late
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://www.michaelwlucas.com/nonfiction/fmaz" rel="nofollow">“FreeBSD Mastery: Advanced ZFS” has officially been released </a> </p></li>
<li><p><a href="https://gist.github.com/ligurio/f6114bd1df371047dd80ea9b8a55c104" rel="nofollow">Support of OpenBSD pledge(2) in programming Languages</a> </p></li>
<li><p><a href="http://daemonforums.org/showthread.php?t=9781" rel="nofollow">pkgsrcCon 2016 -Call for Presentations</a></p></li>
<li><p><a href="http://blog.netbsd.org/tnf/entry/talks_about_blacklistd" rel="nofollow">Christos Zoulas talks about blacklistd</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2617" rel="nofollow">Penguicon 2016 Lucas Track Schedule</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/HiiDpGcT" rel="nofollow"> Peter - NVME</a> </li>
<li><a href="http://pastebin.com/L5XeVS1H" rel="nofollow"> Jeremy - Wireless Gear</a> </li>
<li><a href="http://pastebin.com/yrCEnkWt" rel="nofollow"> Ted - Rpi2 Packages</a> - <a href="https://wiki.freebsd.org/FreeBSD/arm/crossbuild" rel="nofollow">Cross Building Wiki</a> </li>
<li><a href="http://pastebin.com/pYFC1vdQ" rel="nofollow"> Geoff - Jail Failover</a> </li>
<li><a href="http://pastebin.com/WEgN0ZVw" rel="nofollow"> Zach - Graphical Bhyve?</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>137: FreeNAS Mini XL</title>
  <link>https://www.bsdnow.tv/137</link>
  <guid isPermaLink="false">9d4cd10e-3ef9-4849-8a3d-de5a4dfc4542</guid>
  <pubDate>Wed, 13 Apr 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9d4cd10e-3ef9-4849-8a3d-de5a4dfc4542.mp3" length="28774228" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now, I’m out of town for the week, but we have a special unboxing video to share with you, that you won’t want to miss. That, plus the latest BSD news, is coming your way right now!</itunes:subtitle>
  <itunes:duration>39:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSD Now, I’m out of town for the week, but we have a special unboxing video to share with you, that you won’t want to miss. That, plus the latest BSD news, is coming your way right now!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.cochard.me/2016/01/example-of-freebsd-bug-hunting-session.html" target="_blank" rel="nofollow noopener"&gt;Example of a FreeBSD bug hunting session by a simple user&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Don’t be fooled, Olivier Cochard-Labbé is a bit more than just a FreeBSD user&lt;/li&gt;
&lt;li&gt;Original founder of the FreeNAS project many years ago, and currently leads the BSD Router Project (designed as a replacement for “Big Iron” routers like Cisco’s etc)&lt;/li&gt;
&lt;li&gt;However, he is not actually a committer on any of the BSD projects, and is mostly focused on networking, rather than development, so it is fair to call him a user&lt;/li&gt;
&lt;li&gt;He walks us through a bug hunting session that started when he updated his wireless router&lt;/li&gt;
&lt;li&gt;“My wireless-router configuration was complex: it involves routing, wireless in hostap mode, ipfw, snort, bridge, openvpn, etc.”&lt;/li&gt;
&lt;li&gt;Provides helpful advice on writing problem reports to developers, including trying to reproduce your issue with as minimal a setup as possible. This both reduces the amount of setup a developer has to do to try to recreate your issue, and can often make it more obvious where the problem actually lies&lt;/li&gt;
&lt;li&gt;As you might expect, the more he researched the problem, the more questions he had&lt;/li&gt;
&lt;li&gt;The journey goes through the kernel debugger, learning dtrace, and reading some source code&lt;/li&gt;
&lt;li&gt;In the end it seems the problem is that the bridge interface marks itself as down if none of the interfaces are in an ‘UP’ state. The wireless interface was in the unknown state, and was actually up, but when the wired interface was disconnected, this caused the bridge to mark it self as down.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ribalinux.blogspot.com/2016/04/how-to-install-openbsd-59-plus-xfce.html" target="_blank" rel="nofollow noopener"&gt;How-to Install OpenBSD 5.9 plus XFCE desktop and basic applications&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Now this is the way to do videos. Over at the RibaLinux blogspot site, we have a great video showing how to setup and install OpenBSD 5.9 with XFCE and basic desktop applications.&lt;/li&gt;
&lt;li&gt;Along with the video tutorial, another nicety is the commands-used script, so you can see exactly how the setup was done, without having to pause/rewind the video to keep up. &lt;a href="http://ribalinux.blogspot.com/2016/04/how-to-install-pc-bsd-103.html" target="_blank" rel="nofollow noopener"&gt;How to install PC-BSD 10.3&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;In addition to the OpenBSD 5.9 setup video, they just published a PC-BSD 10.3 installation video as well, check it out!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://gist.github.com/tanb/f8fefa22332edc7a641d" target="_blank" rel="nofollow noopener"&gt;FreeBSD on xhyve tutorial&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Originally only able to boot linux, xhyve, a “sort of” port of bhyve to OS X, can now run FreeBSD&lt;/li&gt;
&lt;li&gt;This tutorial makes it much easier, providing a script&lt;/li&gt;
&lt;li&gt;There are a few small command line flag differences from bhyve on FreeBSD&lt;/li&gt;
&lt;li&gt;The tutorial also covers sharing a directory between the guest and the host, resizing and growing the disk for the guest, and converting a QEMU image to be run under xhyve
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.unixmen.com/configure-sshguard-ipfw-firewall-freebsd" target="_blank" rel="nofollow noopener"&gt;How to Configure SSHguard With IPFW Firewall On FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It’s been a while, but UNIXMen has dropped on us another FreeBSD tutorial, this time on how to setup IPFW and ‘sshguard’ to protect your system.&lt;/li&gt;
&lt;li&gt;In this tutorial they first lay down the rationale for picking IPFW as the firewall, but the reasons mainly boil down to IPFW being developed primarily on FreeBSD, and as such isn’t lagging behind when it comes to features / support.&lt;/li&gt;
&lt;li&gt;Interestingly enough, they also go the route of adding their own /usr/local/etc/rc.firewall script which will be used to specify TCP/UDP ports to open through IPFW via the rc.conf file&lt;/li&gt;
&lt;li&gt;Once that setup is complete (which you can just copy-n-paste) they then move onto ‘sshguard’ setup.&lt;/li&gt;
&lt;li&gt;Specifically you’ll need to be sure to install the correct port/pkg, sshguard-ipfw in order to work in this setup, although sshguard-pf and friends are available also.&lt;/li&gt;
&lt;li&gt;The article mentions that the name ‘sshguard’ can also be misleading, since it can be used to detect brute force attempts into a number of services.&lt;/li&gt;
&lt;li&gt;From there a bunch of configuration is thrown at you, which will allow you to start making the most out of sshguard’s potential, well worth your read if you are using IPFW, or even PF and want to get the basics down of using sshguard properly.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;FreeNAS Mini XL Video Unboxing&lt;/h2&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://i.imgur.com/NJ7lpso.png" target="_blank" rel="nofollow noopener"&gt;Amazon lists FreeBSD as 'Other Linux'&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-April/459667.html" target="_blank" rel="nofollow noopener"&gt;sbin/hammer: Make hammer commands print root volume path&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-April/459674.html" target="_blank" rel="nofollow noopener"&gt;sbin/hammer: Print volume list after volume-add|del&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/mwlauthor/status/716328414072872960" target="_blank" rel="nofollow noopener"&gt;Front cover reveal for the upcoming 'FreeBSD Mastery: Advanced ZFS" book&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;If you don’t already have one, get your &lt;a href="http://linuxpillow.blogspot.com/2016/03/world-backup-day.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Pillow&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://pastebin.com/raw/JBbMj87t" target="_blank" rel="nofollow noopener"&gt; Daniel - SysVIPC&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/raw/54ngYVEN" target="_blank" rel="nofollow noopener"&gt; Shane - OpenToonz&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now, I’m out of town for the week, but we have a special unboxing video to share with you, that you won’t want to miss. That, plus the latest BSD news, is coming your way right now!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.cochard.me/2016/01/example-of-freebsd-bug-hunting-session.html" rel="nofollow">Example of a FreeBSD bug hunting session by a simple user</a></h3>

<ul>
<li>Don’t be fooled, Olivier Cochard-Labbé is a bit more than just a FreeBSD user</li>
<li>Original founder of the FreeNAS project many years ago, and currently leads the BSD Router Project (designed as a replacement for “Big Iron” routers like Cisco’s etc)</li>
<li>However, he is not actually a committer on any of the BSD projects, and is mostly focused on networking, rather than development, so it is fair to call him a user</li>
<li>He walks us through a bug hunting session that started when he updated his wireless router</li>
<li>“My wireless-router configuration was complex: it involves routing, wireless in hostap mode, ipfw, snort, bridge, openvpn, etc.”</li>
<li>Provides helpful advice on writing problem reports to developers, including trying to reproduce your issue with as minimal a setup as possible. This both reduces the amount of setup a developer has to do to try to recreate your issue, and can often make it more obvious where the problem actually lies</li>
<li>As you might expect, the more he researched the problem, the more questions he had</li>
<li>The journey goes through the kernel debugger, learning dtrace, and reading some source code</li>
<li>In the end it seems the problem is that the bridge interface marks itself as down if none of the interfaces are in an ‘UP’ state. The wireless interface was in the unknown state, and was actually up, but when the wired interface was disconnected, this caused the bridge to mark it self as down.
***</li>
</ul>

<h3><a href="http://ribalinux.blogspot.com/2016/04/how-to-install-openbsd-59-plus-xfce.html" rel="nofollow">How-to Install OpenBSD 5.9 plus XFCE desktop and basic applications</a></h3>

<ul>
<li>Now this is the way to do videos. Over at the RibaLinux blogspot site, we have a great video showing how to setup and install OpenBSD 5.9 with XFCE and basic desktop applications.</li>
<li>Along with the video tutorial, another nicety is the commands-used script, so you can see exactly how the setup was done, without having to pause/rewind the video to keep up. <a href="http://ribalinux.blogspot.com/2016/04/how-to-install-pc-bsd-103.html" rel="nofollow">How to install PC-BSD 10.3</a> </li>
<li>In addition to the OpenBSD 5.9 setup video, they just published a PC-BSD 10.3 installation video as well, check it out!
***</li>
</ul>

<h3><a href="https://gist.github.com/tanb/f8fefa22332edc7a641d" rel="nofollow">FreeBSD on xhyve tutorial</a></h3>

<ul>
<li>Originally only able to boot linux, xhyve, a “sort of” port of bhyve to OS X, can now run FreeBSD</li>
<li>This tutorial makes it much easier, providing a script</li>
<li>There are a few small command line flag differences from bhyve on FreeBSD</li>
<li>The tutorial also covers sharing a directory between the guest and the host, resizing and growing the disk for the guest, and converting a QEMU image to be run under xhyve
***</li>
</ul>

<h3><a href="http://www.unixmen.com/configure-sshguard-ipfw-firewall-freebsd" rel="nofollow">How to Configure SSHguard With IPFW Firewall On FreeBSD</a></h3>

<ul>
<li>It’s been a while, but UNIXMen has dropped on us another FreeBSD tutorial, this time on how to setup IPFW and ‘sshguard’ to protect your system.</li>
<li>In this tutorial they first lay down the rationale for picking IPFW as the firewall, but the reasons mainly boil down to IPFW being developed primarily on FreeBSD, and as such isn’t lagging behind when it comes to features / support.</li>
<li>Interestingly enough, they also go the route of adding their own /usr/local/etc/rc.firewall script which will be used to specify TCP/UDP ports to open through IPFW via the rc.conf file</li>
<li>Once that setup is complete (which you can just copy-n-paste) they then move onto ‘sshguard’ setup.</li>
<li>Specifically you’ll need to be sure to install the correct port/pkg, sshguard-ipfw in order to work in this setup, although sshguard-pf and friends are available also.</li>
<li>The article mentions that the name ‘sshguard’ can also be misleading, since it can be used to detect brute force attempts into a number of services.</li>
<li>From there a bunch of configuration is thrown at you, which will allow you to start making the most out of sshguard’s potential, well worth your read if you are using IPFW, or even PF and want to get the basics down of using sshguard properly.
***</li>
</ul>

<h2>FreeNAS Mini XL Video Unboxing</h2>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://i.imgur.com/NJ7lpso.png" rel="nofollow">Amazon lists FreeBSD as &#39;Other Linux&#39;</a> </p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-April/459667.html" rel="nofollow">sbin/hammer: Make hammer commands print root volume path</a> </p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-April/459674.html" rel="nofollow">sbin/hammer: Print volume list after volume-add|del</a> </p>

<p><a href="https://twitter.com/mwlauthor/status/716328414072872960" rel="nofollow">Front cover reveal for the upcoming &#39;FreeBSD Mastery: Advanced ZFS&quot; book</a> </p>

<p>If you don’t already have one, get your <a href="http://linuxpillow.blogspot.com/2016/03/world-backup-day.html" rel="nofollow">FreeBSD Pillow</a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/raw/JBbMj87t" rel="nofollow"> Daniel - SysVIPC</a></li>
<li><a href="http://pastebin.com/raw/54ngYVEN" rel="nofollow"> Shane - OpenToonz</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now, I’m out of town for the week, but we have a special unboxing video to share with you, that you won’t want to miss. That, plus the latest BSD news, is coming your way right now!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.cochard.me/2016/01/example-of-freebsd-bug-hunting-session.html" rel="nofollow">Example of a FreeBSD bug hunting session by a simple user</a></h3>

<ul>
<li>Don’t be fooled, Olivier Cochard-Labbé is a bit more than just a FreeBSD user</li>
<li>Original founder of the FreeNAS project many years ago, and currently leads the BSD Router Project (designed as a replacement for “Big Iron” routers like Cisco’s etc)</li>
<li>However, he is not actually a committer on any of the BSD projects, and is mostly focused on networking, rather than development, so it is fair to call him a user</li>
<li>He walks us through a bug hunting session that started when he updated his wireless router</li>
<li>“My wireless-router configuration was complex: it involves routing, wireless in hostap mode, ipfw, snort, bridge, openvpn, etc.”</li>
<li>Provides helpful advice on writing problem reports to developers, including trying to reproduce your issue with as minimal a setup as possible. This both reduces the amount of setup a developer has to do to try to recreate your issue, and can often make it more obvious where the problem actually lies</li>
<li>As you might expect, the more he researched the problem, the more questions he had</li>
<li>The journey goes through the kernel debugger, learning dtrace, and reading some source code</li>
<li>In the end it seems the problem is that the bridge interface marks itself as down if none of the interfaces are in an ‘UP’ state. The wireless interface was in the unknown state, and was actually up, but when the wired interface was disconnected, this caused the bridge to mark it self as down.
***</li>
</ul>

<h3><a href="http://ribalinux.blogspot.com/2016/04/how-to-install-openbsd-59-plus-xfce.html" rel="nofollow">How-to Install OpenBSD 5.9 plus XFCE desktop and basic applications</a></h3>

<ul>
<li>Now this is the way to do videos. Over at the RibaLinux blogspot site, we have a great video showing how to setup and install OpenBSD 5.9 with XFCE and basic desktop applications.</li>
<li>Along with the video tutorial, another nicety is the commands-used script, so you can see exactly how the setup was done, without having to pause/rewind the video to keep up. <a href="http://ribalinux.blogspot.com/2016/04/how-to-install-pc-bsd-103.html" rel="nofollow">How to install PC-BSD 10.3</a> </li>
<li>In addition to the OpenBSD 5.9 setup video, they just published a PC-BSD 10.3 installation video as well, check it out!
***</li>
</ul>

<h3><a href="https://gist.github.com/tanb/f8fefa22332edc7a641d" rel="nofollow">FreeBSD on xhyve tutorial</a></h3>

<ul>
<li>Originally only able to boot linux, xhyve, a “sort of” port of bhyve to OS X, can now run FreeBSD</li>
<li>This tutorial makes it much easier, providing a script</li>
<li>There are a few small command line flag differences from bhyve on FreeBSD</li>
<li>The tutorial also covers sharing a directory between the guest and the host, resizing and growing the disk for the guest, and converting a QEMU image to be run under xhyve
***</li>
</ul>

<h3><a href="http://www.unixmen.com/configure-sshguard-ipfw-firewall-freebsd" rel="nofollow">How to Configure SSHguard With IPFW Firewall On FreeBSD</a></h3>

<ul>
<li>It’s been a while, but UNIXMen has dropped on us another FreeBSD tutorial, this time on how to setup IPFW and ‘sshguard’ to protect your system.</li>
<li>In this tutorial they first lay down the rationale for picking IPFW as the firewall, but the reasons mainly boil down to IPFW being developed primarily on FreeBSD, and as such isn’t lagging behind when it comes to features / support.</li>
<li>Interestingly enough, they also go the route of adding their own /usr/local/etc/rc.firewall script which will be used to specify TCP/UDP ports to open through IPFW via the rc.conf file</li>
<li>Once that setup is complete (which you can just copy-n-paste) they then move onto ‘sshguard’ setup.</li>
<li>Specifically you’ll need to be sure to install the correct port/pkg, sshguard-ipfw in order to work in this setup, although sshguard-pf and friends are available also.</li>
<li>The article mentions that the name ‘sshguard’ can also be misleading, since it can be used to detect brute force attempts into a number of services.</li>
<li>From there a bunch of configuration is thrown at you, which will allow you to start making the most out of sshguard’s potential, well worth your read if you are using IPFW, or even PF and want to get the basics down of using sshguard properly.
***</li>
</ul>

<h2>FreeNAS Mini XL Video Unboxing</h2>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://i.imgur.com/NJ7lpso.png" rel="nofollow">Amazon lists FreeBSD as &#39;Other Linux&#39;</a> </p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-April/459667.html" rel="nofollow">sbin/hammer: Make hammer commands print root volume path</a> </p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-April/459674.html" rel="nofollow">sbin/hammer: Print volume list after volume-add|del</a> </p>

<p><a href="https://twitter.com/mwlauthor/status/716328414072872960" rel="nofollow">Front cover reveal for the upcoming &#39;FreeBSD Mastery: Advanced ZFS&quot; book</a> </p>

<p>If you don’t already have one, get your <a href="http://linuxpillow.blogspot.com/2016/03/world-backup-day.html" rel="nofollow">FreeBSD Pillow</a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/raw/JBbMj87t" rel="nofollow"> Daniel - SysVIPC</a></li>
<li><a href="http://pastebin.com/raw/54ngYVEN" rel="nofollow"> Shane - OpenToonz</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>136: This is GNN</title>
  <link>https://www.bsdnow.tv/136</link>
  <guid isPermaLink="false">719cbcc9-9b74-4129-9a35-bef5f499f3b9</guid>
  <pubDate>Wed, 06 Apr 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/719cbcc9-9b74-4129-9a35-bef5f499f3b9.mp3" length="69077236" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we will be interviewing GNN of the FreeBSD project to talk about the new TeachBSD initiative. That plus the latest BSD headlines, all coming your way right now!</itunes:subtitle>
  <itunes:duration>1:35:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we will be interviewing GNN of the FreeBSD project to talk about the new TeachBSD initiative. That plus the latest BSD headlines, all coming your way right now!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/10.3R/announce.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.3-RELEASE Announcement &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD 10.3 has landed, with extended support until April 30, 2018&lt;/li&gt;
&lt;li&gt;This is likely to be the last extended support release, as starting with 11, the new support model will encourage upgrading to the latest minor version by ending support for the previous minor version approximately 2 months after each point release. The Major version / stable branch will still be supported for the same 5 year term. This will allow the FreeBSD project to move forward more quickly, while still providing the same level of long term support&lt;/li&gt;
&lt;li&gt;The UEFI boot loader is much improved, and now supports booting root-on-ZFS, and the beastie menu&lt;/li&gt;
&lt;li&gt;The beastie menu itself has been updated with support for ZFS Boot Environments&lt;/li&gt;
&lt;li&gt;The CAM Target Layer (CTL) now supports High Availability, allowing the construction of much more advanced storage systems&lt;/li&gt;
&lt;li&gt;The 64bit Linux Emulation Layer was backported&lt;/li&gt;
&lt;li&gt;Reroot support was added, allowing the system to boot off of a minimal image, such as a mfsroot and then reload all of userland from a different root file system (such as iSCSI, NFS, etc)&lt;/li&gt;
&lt;li&gt;The version of xz(1) has been updated to support multi-threaded compression&lt;/li&gt;
&lt;li&gt;sesutil(8) has been introduced, making it easier to manage large storage nodes&lt;/li&gt;
&lt;li&gt;Various ZFS updates&lt;/li&gt;
&lt;li&gt;As usual, a huge number of driver updates are also included
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.nongnu.org/archive/html/libreboot/2016-04/msg00010.html" target="_blank" rel="nofollow noopener"&gt;How to use OpenBSD with Libreboot: detailed instructions &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This tutorial covers installing OpenBSD on a Thinkpad X200 using Libreboot, a replacement for the traditional BIOS/firmware that comes from the manufacturer&lt;/li&gt;
&lt;li&gt;“Since 5.9, OpenBSD supports EFI boot mode, which means that it also have had to support framebuffer out of the box, so lack of proprietary VGA BIOS blob is no longer a problem and you can boot it with unmodified Libreboot binary release 20150518.”&lt;/li&gt;
&lt;li&gt;“In order to install OpenBSD on such a machine you will need someadditional preparations, since regular install59.fs won't work because bsd.rd doesn't have a framebuffer console.”&lt;/li&gt;
&lt;li&gt;A few extra steps are required to get it going, but they are outlined in the post&lt;/li&gt;
&lt;li&gt;This may be very interesting to those who prefer not to depend on binary blobs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.llvm.org/pipermail/llvm-dev/2016-March/096449.html" target="_blank" rel="nofollow noopener"&gt;Linking the FreeBSD base system with lld -- status update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD Foundation’s Ed Maste provides an update on the LLVM mailing list about the progress of replacing the GNU linker with the lld in the FreeBSD base system&lt;/li&gt;
&lt;li&gt;“I'm pleased to report that I can now build a runnable FreeBSD system using lld as the linker (for buildworld), with a few workarounds and work-in-progress patches. I have not yet extensively tested the result but it is possible to login to the resulting system, and basic sanity tests I've tried are successful. Note that the kernel is still linked with ld.bfd.”&lt;/li&gt;
&lt;li&gt;Outstanding Issues

&lt;ul&gt;
&lt;li&gt;Symbol version support (PR 23231). FreeBSD uses symbol versioning for backwards compatibility&lt;/li&gt;
&lt;li&gt;Linker script expression support (PR 26731). The FreeBSD kernel linker scripts contain expressions not currently supported by lld&lt;/li&gt;
&lt;li&gt;Library search paths. GNU LD automatically searches /lib, and lld does not&lt;/li&gt;
&lt;li&gt;the -N flag makes the text and data sections RW and does not page-align data.
It is used by boot loader components.&lt;/li&gt;
&lt;li&gt;The -dc flag assigns space to common symbols when producing relocatable output (-r). It is used by the /rescue build, which is a single binary assembled from a collection of individual tools (sh, ls, fsck, ...)&lt;/li&gt;
&lt;li&gt;-Y adds a path to the default library search path. It is used by the lib32 build, which provides i386 builds of the system libraries for compatibility with i386 applications.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;With the ongoing work, it might be possible for FreeBSD 11 to use lld by default, although it might be best to wait to throw that particular switch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/" target="_blank" rel="nofollow noopener"&gt;Your favorite billion user company using BSD just flipped on encryption for all their users -- and it took 15 Engineers to do it&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With the help of Moxie Marlinspike’s Open Whisper Systems, WhatsApp has integrated the ‘Signal’ encryption system for all messages, class, pictures, and videos sent between individuals or groups&lt;/li&gt;
&lt;li&gt;It uses public key cryptography, very similar to GPG, but with automated public key servers&lt;/li&gt;
&lt;li&gt;It also includes a system of QR codes to verify the identity of individuals in person, so you can be sure the person you are talking to is actually the person you met with&lt;/li&gt;
&lt;li&gt;WhatsApp runs their billion user network, using FreeBSD, with only about 50 engineers&lt;/li&gt;
&lt;li&gt;Only 15 of those engineers we needed to work on the project that has now deployed complete end-to-end encryption across the entire network&lt;/li&gt;
&lt;li&gt;The Wired article is very detailed and well worth the read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - George Neville-Neil - &lt;a href="mailto:gnn@freebsd.org" target="_blank" rel="nofollow noopener"&gt;gnn@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/gvnn3" target="_blank" rel="nofollow noopener"&gt;@gvnn3&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Teaching BSD with Tracing&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2016-scott-long/" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD 2016: Scott Long&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It’s been awhile since we’ve had a new entry into the “Faces of FreeBSD” series, but due to popular demand it’s back!&lt;/li&gt;
&lt;li&gt;This installment features developer Scott Long, who currently works at NetFlix, previously at Yahoo and Adaptec.&lt;/li&gt;
&lt;li&gt;Scott got a very early start into BSD, first discovering i386BSD 0.1 on a FTP server at Berkeley, back at 1992. From there on it’s been a journey, following along with FreeBSD since version 1.0 in 1993.&lt;/li&gt;
&lt;li&gt;So what stuff can we blame Scott for? In his own words:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; I’ve been a source committer since 2000. I got my start by taking over maintainership of the Adaptec ‘aac’ RAID driver. From 2002-2006 I was the Release Engineer and was responsible for the 5.x and 6.x releases. Though the early 5.x releases were not great, they were necessary stepping stones to the success of FreeBSD 6.x and beyond. I’m exceptionally proud of my role in helping FreeBSD move forward during that time.&lt;/p&gt;

&lt;p&gt;&amp;gt; I authored and maintained the ‘mfi’ and ‘mps’ storage drivers, the ‘udf’ filesystem driver, and several smaller sound and USB drivers. I’ve maintained, or at least touched, most of the storage device drivers in the system to some extent, and I implemented medium-grained locking on the CAM storage stack. Recently I’ve been working on overall system scalability and performance.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://asciiflow.com/" target="_blank" rel="nofollow noopener"&gt;ASCII Flow&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A website that lets to draw and share ASCII diagrams&lt;/li&gt;
&lt;li&gt;Great for network layout maps, rack diagrams, protocol analysis etc&lt;/li&gt;
&lt;li&gt;Use it in your presentations and slides&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://drive.google.com/open?id=0BynxTTJrNUOKeWxCVm1ERExrNkU" target="_blank" rel="nofollow noopener"&gt;Sample &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lowlevelbits.org/system-under-test-freebsd/" target="_blank" rel="nofollow noopener"&gt;System Under Test: FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Part of a series looking at testing across a number of projects&lt;/li&gt;
&lt;li&gt;Outlines the testing framework of FreeBSD&lt;/li&gt;
&lt;li&gt;Provides a mini-tutorial on how to run the tests&lt;/li&gt;
&lt;li&gt;There are some other tests that are now covered, but this is due to a lack of documentation on the fact that the tests exist, and how to run them&lt;/li&gt;
&lt;li&gt;There is much ongoing work in this area
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.rhyous.com/2016/04/01/microsoft-announces-it-is-acquiring-freebsd-for-300-million/" target="_blank" rel="nofollow noopener"&gt;Worst April Fools Joke EVER!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While a bad April Fool’s joke, it also shows some common misconceptions&lt;/li&gt;
&lt;li&gt;The FreeBSD Foundation does not own the source repository, it is only the care taken of the trademark, and other things that require a single legal entity&lt;/li&gt;
&lt;li&gt;OpenBSD and NetBSD are not ‘sub brands’ of FreeBSD&lt;/li&gt;
&lt;li&gt;Bash was not ported to Windows, but rather Windows gained a system similar to FreeBSD’s linux_compat&lt;/li&gt;
&lt;li&gt;It would be nice to have ZFS on Windows
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://forums.freebsd.org/threads/55642/" target="_blank" rel="nofollow noopener"&gt;Credit where credit's due...&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://stable.mtier.org/" target="_blank" rel="nofollow noopener"&gt;M:Tier's OpenBSD packages and binpatches updated for 5.9&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.nycbug.org/index.cgi" target="_blank" rel="nofollow noopener"&gt;NYC BUG Meeting (2016-04-06) - Debugging with LLVM, John Wolfe&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-March/459651.html" target="_blank" rel="nofollow noopener"&gt;Need to create extremely high traffic loads? kq_sendrecv is worth checking out&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.meetup.com/CharmBUG/events/230048300/" target="_blank" rel="nofollow noopener"&gt;If you're in the Maryland region, CharmBug has a meetup next week&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.dragonflybsd.org/docs/how_to_get_to_the_desktop/" target="_blank" rel="nofollow noopener"&gt;How to get a desktop on DragonFly&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://twitter.com/q5sys/status/717509675630084096" target="_blank" rel="nofollow noopener"&gt;Linux vs BSD Development Models &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Question&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/raw/GrM0jKZK" target="_blank" rel="nofollow noopener"&gt; Paulo - ZFS Setup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/raw/13KCkhMU" target="_blank" rel="nofollow noopener"&gt; Jonathan - Installation &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/wsx90L2m" target="_blank" rel="nofollow noopener"&gt; Andrew - Career / School&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we will be interviewing GNN of the FreeBSD project to talk about the new TeachBSD initiative. That plus the latest BSD headlines, all coming your way right now!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.3R/announce.html" rel="nofollow">FreeBSD 10.3-RELEASE Announcement </a></h3>

<ul>
<li>FreeBSD 10.3 has landed, with extended support until April 30, 2018</li>
<li>This is likely to be the last extended support release, as starting with 11, the new support model will encourage upgrading to the latest minor version by ending support for the previous minor version approximately 2 months after each point release. The Major version / stable branch will still be supported for the same 5 year term. This will allow the FreeBSD project to move forward more quickly, while still providing the same level of long term support</li>
<li>The UEFI boot loader is much improved, and now supports booting root-on-ZFS, and the beastie menu</li>
<li>The beastie menu itself has been updated with support for ZFS Boot Environments</li>
<li>The CAM Target Layer (CTL) now supports High Availability, allowing the construction of much more advanced storage systems</li>
<li>The 64bit Linux Emulation Layer was backported</li>
<li>Reroot support was added, allowing the system to boot off of a minimal image, such as a mfsroot and then reload all of userland from a different root file system (such as iSCSI, NFS, etc)</li>
<li>The version of xz(1) has been updated to support multi-threaded compression</li>
<li>sesutil(8) has been introduced, making it easier to manage large storage nodes</li>
<li>Various ZFS updates</li>
<li>As usual, a huge number of driver updates are also included
***</li>
</ul>

<h3><a href="https://lists.nongnu.org/archive/html/libreboot/2016-04/msg00010.html" rel="nofollow">How to use OpenBSD with Libreboot: detailed instructions </a></h3>

<ul>
<li>This tutorial covers installing OpenBSD on a Thinkpad X200 using Libreboot, a replacement for the traditional BIOS/firmware that comes from the manufacturer</li>
<li>“Since 5.9, OpenBSD supports EFI boot mode, which means that it also have had to support framebuffer out of the box, so lack of proprietary VGA BIOS blob is no longer a problem and you can boot it with unmodified Libreboot binary release 20150518.”</li>
<li>“In order to install OpenBSD on such a machine you will need someadditional preparations, since regular install59.fs won&#39;t work because bsd.rd doesn&#39;t have a framebuffer console.”</li>
<li>A few extra steps are required to get it going, but they are outlined in the post</li>
<li>This may be very interesting to those who prefer not to depend on binary blobs
***</li>
</ul>

<h3><a href="http://lists.llvm.org/pipermail/llvm-dev/2016-March/096449.html" rel="nofollow">Linking the FreeBSD base system with lld -- status update</a></h3>

<ul>
<li>The FreeBSD Foundation’s Ed Maste provides an update on the LLVM mailing list about the progress of replacing the GNU linker with the lld in the FreeBSD base system</li>
<li>“I&#39;m pleased to report that I can now build a runnable FreeBSD system using lld as the linker (for buildworld), with a few workarounds and work-in-progress patches. I have not yet extensively tested the result but it is possible to login to the resulting system, and basic sanity tests I&#39;ve tried are successful. Note that the kernel is still linked with ld.bfd.”</li>
<li>Outstanding Issues

<ul>
<li>Symbol version support (PR 23231). FreeBSD uses symbol versioning for backwards compatibility</li>
<li>Linker script expression support (PR 26731). The FreeBSD kernel linker scripts contain expressions not currently supported by lld</li>
<li>Library search paths. GNU LD automatically searches /lib, and lld does not</li>
<li>the -N flag makes the text and data sections RW and does not page-align data.
It is used by boot loader components.</li>
<li>The -dc flag assigns space to common symbols when producing relocatable output (-r). It is used by the /rescue build, which is a single binary assembled from a collection of individual tools (sh, ls, fsck, ...)</li>
<li>-Y adds a path to the default library search path. It is used by the lib32 build, which provides i386 builds of the system libraries for compatibility with i386 applications.</li>
</ul></li>
<li>With the ongoing work, it might be possible for FreeBSD 11 to use lld by default, although it might be best to wait to throw that particular switch
***</li>
</ul>

<h3><a href="http://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/" rel="nofollow">Your favorite billion user company using BSD just flipped on encryption for all their users -- and it took 15 Engineers to do it</a></h3>

<ul>
<li>With the help of Moxie Marlinspike’s Open Whisper Systems, WhatsApp has integrated the ‘Signal’ encryption system for all messages, class, pictures, and videos sent between individuals or groups</li>
<li>It uses public key cryptography, very similar to GPG, but with automated public key servers</li>
<li>It also includes a system of QR codes to verify the identity of individuals in person, so you can be sure the person you are talking to is actually the person you met with</li>
<li>WhatsApp runs their billion user network, using FreeBSD, with only about 50 engineers</li>
<li>Only 15 of those engineers we needed to work on the project that has now deployed complete end-to-end encryption across the entire network</li>
<li>The Wired article is very detailed and well worth the read
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p>Teaching BSD with Tracing</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2016-scott-long/" rel="nofollow">Faces of FreeBSD 2016: Scott Long</a></h3>

<ul>
<li>It’s been awhile since we’ve had a new entry into the “Faces of FreeBSD” series, but due to popular demand it’s back!</li>
<li>This installment features developer Scott Long, who currently works at NetFlix, previously at Yahoo and Adaptec.</li>
<li>Scott got a very early start into BSD, first discovering i386BSD 0.1 on a FTP server at Berkeley, back at 1992. From there on it’s been a journey, following along with FreeBSD since version 1.0 in 1993.</li>
<li>So what stuff can we blame Scott for? In his own words:</li>
</ul>

<blockquote>
<p>I’ve been a source committer since 2000. I got my start by taking over maintainership of the Adaptec ‘aac’ RAID driver. From 2002-2006 I was the Release Engineer and was responsible for the 5.x and 6.x releases. Though the early 5.x releases were not great, they were necessary stepping stones to the success of FreeBSD 6.x and beyond. I’m exceptionally proud of my role in helping FreeBSD move forward during that time.</p>

<p>I authored and maintained the ‘mfi’ and ‘mps’ storage drivers, the ‘udf’ filesystem driver, and several smaller sound and USB drivers. I’ve maintained, or at least touched, most of the storage device drivers in the system to some extent, and I implemented medium-grained locking on the CAM storage stack. Recently I’ve been working on overall system scalability and performance.</p>
</blockquote>

<hr>

<h3><a href="http://asciiflow.com/" rel="nofollow">ASCII Flow</a></h3>

<ul>
<li>A website that lets to draw and share ASCII diagrams</li>
<li>Great for network layout maps, rack diagrams, protocol analysis etc</li>
<li>Use it in your presentations and slides</li>
<li><a href="https://drive.google.com/open?id=0BynxTTJrNUOKeWxCVm1ERExrNkU" rel="nofollow">Sample </a>
***</li>
</ul>

<h3><a href="http://lowlevelbits.org/system-under-test-freebsd/" rel="nofollow">System Under Test: FreeBSD</a></h3>

<ul>
<li>Part of a series looking at testing across a number of projects</li>
<li>Outlines the testing framework of FreeBSD</li>
<li>Provides a mini-tutorial on how to run the tests</li>
<li>There are some other tests that are now covered, but this is due to a lack of documentation on the fact that the tests exist, and how to run them</li>
<li>There is much ongoing work in this area
***</li>
</ul>

<h3><a href="http://www.rhyous.com/2016/04/01/microsoft-announces-it-is-acquiring-freebsd-for-300-million/" rel="nofollow">Worst April Fools Joke EVER!</a></h3>

<ul>
<li>While a bad April Fool’s joke, it also shows some common misconceptions</li>
<li>The FreeBSD Foundation does not own the source repository, it is only the care taken of the trademark, and other things that require a single legal entity</li>
<li>OpenBSD and NetBSD are not ‘sub brands’ of FreeBSD</li>
<li>Bash was not ported to Windows, but rather Windows gained a system similar to FreeBSD’s linux_compat</li>
<li>It would be nice to have ZFS on Windows
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://forums.freebsd.org/threads/55642/" rel="nofollow">Credit where credit&#39;s due...</a> </p></li>
<li><p><a href="https://stable.mtier.org/" rel="nofollow">M:Tier&#39;s OpenBSD packages and binpatches updated for 5.9</a></p></li>
<li><p><a href="http://www.nycbug.org/index.cgi" rel="nofollow">NYC BUG Meeting (2016-04-06) - Debugging with LLVM, John Wolfe</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-March/459651.html" rel="nofollow">Need to create extremely high traffic loads? kq_sendrecv is worth checking out</a> </p></li>
<li><p><a href="http://www.meetup.com/CharmBUG/events/230048300/" rel="nofollow">If you&#39;re in the Maryland region, CharmBug has a meetup next week</a> </p></li>
<li><p><a href="https://www.dragonflybsd.org/docs/how_to_get_to_the_desktop/" rel="nofollow">How to get a desktop on DragonFly</a> </p></li>
<li><p><a href="https://twitter.com/q5sys/status/717509675630084096" rel="nofollow">Linux vs BSD Development Models </a> </p></li>
</ul>

<h2>Feedback/Question</h2>

<ul>
<li><a href="http://pastebin.com/raw/GrM0jKZK" rel="nofollow"> Paulo - ZFS Setup</a> </li>
<li><a href="http://pastebin.com/raw/13KCkhMU" rel="nofollow"> Jonathan - Installation </a> </li>
<li><a href="http://pastebin.com/wsx90L2m" rel="nofollow"> Andrew - Career / School</a> </li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we will be interviewing GNN of the FreeBSD project to talk about the new TeachBSD initiative. That plus the latest BSD headlines, all coming your way right now!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.3R/announce.html" rel="nofollow">FreeBSD 10.3-RELEASE Announcement </a></h3>

<ul>
<li>FreeBSD 10.3 has landed, with extended support until April 30, 2018</li>
<li>This is likely to be the last extended support release, as starting with 11, the new support model will encourage upgrading to the latest minor version by ending support for the previous minor version approximately 2 months after each point release. The Major version / stable branch will still be supported for the same 5 year term. This will allow the FreeBSD project to move forward more quickly, while still providing the same level of long term support</li>
<li>The UEFI boot loader is much improved, and now supports booting root-on-ZFS, and the beastie menu</li>
<li>The beastie menu itself has been updated with support for ZFS Boot Environments</li>
<li>The CAM Target Layer (CTL) now supports High Availability, allowing the construction of much more advanced storage systems</li>
<li>The 64bit Linux Emulation Layer was backported</li>
<li>Reroot support was added, allowing the system to boot off of a minimal image, such as a mfsroot and then reload all of userland from a different root file system (such as iSCSI, NFS, etc)</li>
<li>The version of xz(1) has been updated to support multi-threaded compression</li>
<li>sesutil(8) has been introduced, making it easier to manage large storage nodes</li>
<li>Various ZFS updates</li>
<li>As usual, a huge number of driver updates are also included
***</li>
</ul>

<h3><a href="https://lists.nongnu.org/archive/html/libreboot/2016-04/msg00010.html" rel="nofollow">How to use OpenBSD with Libreboot: detailed instructions </a></h3>

<ul>
<li>This tutorial covers installing OpenBSD on a Thinkpad X200 using Libreboot, a replacement for the traditional BIOS/firmware that comes from the manufacturer</li>
<li>“Since 5.9, OpenBSD supports EFI boot mode, which means that it also have had to support framebuffer out of the box, so lack of proprietary VGA BIOS blob is no longer a problem and you can boot it with unmodified Libreboot binary release 20150518.”</li>
<li>“In order to install OpenBSD on such a machine you will need someadditional preparations, since regular install59.fs won&#39;t work because bsd.rd doesn&#39;t have a framebuffer console.”</li>
<li>A few extra steps are required to get it going, but they are outlined in the post</li>
<li>This may be very interesting to those who prefer not to depend on binary blobs
***</li>
</ul>

<h3><a href="http://lists.llvm.org/pipermail/llvm-dev/2016-March/096449.html" rel="nofollow">Linking the FreeBSD base system with lld -- status update</a></h3>

<ul>
<li>The FreeBSD Foundation’s Ed Maste provides an update on the LLVM mailing list about the progress of replacing the GNU linker with the lld in the FreeBSD base system</li>
<li>“I&#39;m pleased to report that I can now build a runnable FreeBSD system using lld as the linker (for buildworld), with a few workarounds and work-in-progress patches. I have not yet extensively tested the result but it is possible to login to the resulting system, and basic sanity tests I&#39;ve tried are successful. Note that the kernel is still linked with ld.bfd.”</li>
<li>Outstanding Issues

<ul>
<li>Symbol version support (PR 23231). FreeBSD uses symbol versioning for backwards compatibility</li>
<li>Linker script expression support (PR 26731). The FreeBSD kernel linker scripts contain expressions not currently supported by lld</li>
<li>Library search paths. GNU LD automatically searches /lib, and lld does not</li>
<li>the -N flag makes the text and data sections RW and does not page-align data.
It is used by boot loader components.</li>
<li>The -dc flag assigns space to common symbols when producing relocatable output (-r). It is used by the /rescue build, which is a single binary assembled from a collection of individual tools (sh, ls, fsck, ...)</li>
<li>-Y adds a path to the default library search path. It is used by the lib32 build, which provides i386 builds of the system libraries for compatibility with i386 applications.</li>
</ul></li>
<li>With the ongoing work, it might be possible for FreeBSD 11 to use lld by default, although it might be best to wait to throw that particular switch
***</li>
</ul>

<h3><a href="http://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/" rel="nofollow">Your favorite billion user company using BSD just flipped on encryption for all their users -- and it took 15 Engineers to do it</a></h3>

<ul>
<li>With the help of Moxie Marlinspike’s Open Whisper Systems, WhatsApp has integrated the ‘Signal’ encryption system for all messages, class, pictures, and videos sent between individuals or groups</li>
<li>It uses public key cryptography, very similar to GPG, but with automated public key servers</li>
<li>It also includes a system of QR codes to verify the identity of individuals in person, so you can be sure the person you are talking to is actually the person you met with</li>
<li>WhatsApp runs their billion user network, using FreeBSD, with only about 50 engineers</li>
<li>Only 15 of those engineers we needed to work on the project that has now deployed complete end-to-end encryption across the entire network</li>
<li>The Wired article is very detailed and well worth the read
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p>Teaching BSD with Tracing</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/blog/faces-of-freebsd-2016-scott-long/" rel="nofollow">Faces of FreeBSD 2016: Scott Long</a></h3>

<ul>
<li>It’s been awhile since we’ve had a new entry into the “Faces of FreeBSD” series, but due to popular demand it’s back!</li>
<li>This installment features developer Scott Long, who currently works at NetFlix, previously at Yahoo and Adaptec.</li>
<li>Scott got a very early start into BSD, first discovering i386BSD 0.1 on a FTP server at Berkeley, back at 1992. From there on it’s been a journey, following along with FreeBSD since version 1.0 in 1993.</li>
<li>So what stuff can we blame Scott for? In his own words:</li>
</ul>

<blockquote>
<p>I’ve been a source committer since 2000. I got my start by taking over maintainership of the Adaptec ‘aac’ RAID driver. From 2002-2006 I was the Release Engineer and was responsible for the 5.x and 6.x releases. Though the early 5.x releases were not great, they were necessary stepping stones to the success of FreeBSD 6.x and beyond. I’m exceptionally proud of my role in helping FreeBSD move forward during that time.</p>

<p>I authored and maintained the ‘mfi’ and ‘mps’ storage drivers, the ‘udf’ filesystem driver, and several smaller sound and USB drivers. I’ve maintained, or at least touched, most of the storage device drivers in the system to some extent, and I implemented medium-grained locking on the CAM storage stack. Recently I’ve been working on overall system scalability and performance.</p>
</blockquote>

<hr>

<h3><a href="http://asciiflow.com/" rel="nofollow">ASCII Flow</a></h3>

<ul>
<li>A website that lets to draw and share ASCII diagrams</li>
<li>Great for network layout maps, rack diagrams, protocol analysis etc</li>
<li>Use it in your presentations and slides</li>
<li><a href="https://drive.google.com/open?id=0BynxTTJrNUOKeWxCVm1ERExrNkU" rel="nofollow">Sample </a>
***</li>
</ul>

<h3><a href="http://lowlevelbits.org/system-under-test-freebsd/" rel="nofollow">System Under Test: FreeBSD</a></h3>

<ul>
<li>Part of a series looking at testing across a number of projects</li>
<li>Outlines the testing framework of FreeBSD</li>
<li>Provides a mini-tutorial on how to run the tests</li>
<li>There are some other tests that are now covered, but this is due to a lack of documentation on the fact that the tests exist, and how to run them</li>
<li>There is much ongoing work in this area
***</li>
</ul>

<h3><a href="http://www.rhyous.com/2016/04/01/microsoft-announces-it-is-acquiring-freebsd-for-300-million/" rel="nofollow">Worst April Fools Joke EVER!</a></h3>

<ul>
<li>While a bad April Fool’s joke, it also shows some common misconceptions</li>
<li>The FreeBSD Foundation does not own the source repository, it is only the care taken of the trademark, and other things that require a single legal entity</li>
<li>OpenBSD and NetBSD are not ‘sub brands’ of FreeBSD</li>
<li>Bash was not ported to Windows, but rather Windows gained a system similar to FreeBSD’s linux_compat</li>
<li>It would be nice to have ZFS on Windows
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="https://forums.freebsd.org/threads/55642/" rel="nofollow">Credit where credit&#39;s due...</a> </p></li>
<li><p><a href="https://stable.mtier.org/" rel="nofollow">M:Tier&#39;s OpenBSD packages and binpatches updated for 5.9</a></p></li>
<li><p><a href="http://www.nycbug.org/index.cgi" rel="nofollow">NYC BUG Meeting (2016-04-06) - Debugging with LLVM, John Wolfe</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-March/459651.html" rel="nofollow">Need to create extremely high traffic loads? kq_sendrecv is worth checking out</a> </p></li>
<li><p><a href="http://www.meetup.com/CharmBUG/events/230048300/" rel="nofollow">If you&#39;re in the Maryland region, CharmBug has a meetup next week</a> </p></li>
<li><p><a href="https://www.dragonflybsd.org/docs/how_to_get_to_the_desktop/" rel="nofollow">How to get a desktop on DragonFly</a> </p></li>
<li><p><a href="https://twitter.com/q5sys/status/717509675630084096" rel="nofollow">Linux vs BSD Development Models </a> </p></li>
</ul>

<h2>Feedback/Question</h2>

<ul>
<li><a href="http://pastebin.com/raw/GrM0jKZK" rel="nofollow"> Paulo - ZFS Setup</a> </li>
<li><a href="http://pastebin.com/raw/13KCkhMU" rel="nofollow"> Jonathan - Installation </a> </li>
<li><a href="http://pastebin.com/wsx90L2m" rel="nofollow"> Andrew - Career / School</a> </li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>135: Speciality MWL</title>
  <link>https://www.bsdnow.tv/135</link>
  <guid isPermaLink="false">8a5f5b3a-051c-4322-a49a-e3f61cf57381</guid>
  <pubDate>Wed, 30 Mar 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8a5f5b3a-051c-4322-a49a-e3f61cf57381.mp3" length="72669172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we interview author Michael W Lucas to discuss his new book in the FreeBSD</itunes:subtitle>
  <itunes:duration>1:40:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we interview author Michael W Lucas to discuss his new book in the FreeBSD&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a title="iXsystems" href="http://www.ixsystems.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a title="DigitalOcean" href="http://www.digitalocean.com/" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a title="Tarsnap" href="http://www.tarsnap.com/bsdnow" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160329181346&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.9 Released early&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Finished ahead of schedule! OpenBSD 5.9 has officially landed&lt;/li&gt;
&lt;li&gt;We’ve been covering some of the ongoing changes as they landed in the tree, but with the official release it’s time to bring you the final list of the new hotness which landed.&lt;/li&gt;
&lt;li&gt;First up:

&lt;ul&gt;
&lt;li&gt;Pledge - Over 70%! Of the userland utilities have been converted to use it, and the best part, you probably didn’t even notice&lt;/li&gt;
&lt;li&gt;UEFI - Laptops which are pre-locked down to boot UEFI only can now be installed and used - GPT support has also been greatly improved&lt;/li&gt;
&lt;li&gt;‘Less’ was replaced with a fork from Illumos, and has been further improved&lt;/li&gt;
&lt;li&gt;Xen DomU support - OpenBSD now plays nice in the cloud&lt;/li&gt;
&lt;li&gt;X11 - Broadwell and Bay Trail are now supported&lt;/li&gt;
&lt;li&gt;Initial work on making the network stack better support SMP has been added, this is still ongoing, but things are starting to happen&lt;/li&gt;
&lt;li&gt;802.11N! Specifically for the iwn/iwm drivers&lt;/li&gt;
&lt;li&gt;In addition to support for UTF-8, most other locales have been ripped out, leaving only C and UTF-8 left standing in the wake&lt;/li&gt;
&lt;li&gt;All and all, sounds like a solid new release with plenty of new goodies to play with. Go grab a copy now!
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160324093944" target="_blank" rel="nofollow noopener"&gt;New routing table code (ART) enabled in -current&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While OpenBSD 5.9 just landed, we also have some interesting work landing right now in -CURRENT as well. Specifically the new routing table code (ART) has landed:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “I just enabled ART in -current, it will be the default routing table backend in the next snapshots.&lt;br&gt;
&amp;gt; The plan is to squash the possible regressions with this new routing table backend then when we're confident enough, take its route lookup out of the KERNEL_LOCK(). Yes, this is one of the big steps for our network SMP improvements.&lt;br&gt;
&amp;gt; In order to make progress, we need your help to make sure this new backend works well on your setup. So please, go download the next snapshot and report back.&lt;br&gt;
&amp;gt; If you encounter any routing table regression, please make sure that you cannot reproduce it with your old kernel and include the output of # route -n show&lt;br&gt;
&amp;gt; for the 2 kernels as well as the dmesg in your report.&lt;br&gt;
&amp;gt; I know that simple dhclient(8) based setups work with ART, so please do not flood us too much. It's always great to know that things work, but it's also hard to keep focus ;)&lt;br&gt;
&amp;gt; Thank your very much for your support!”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;There you have it folks! If 5.9 is already too stale for you, time to move over to -CURRENT and give the new routing tables a whirl.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forums.freebsd.org/threads/55561/" target="_blank" rel="nofollow noopener"&gt;fractal cells - FreeBSD-based All-In-One solution for software development startups&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Fractal Cells is a suite that transforms a stock FreeBSD installation into an instant “Startup Software Development Platform”&lt;/li&gt;
&lt;li&gt;It Integrates ZFS, PostgreSQL, OpenSMTPD, NGINX, OpenVPN, Redmine, Jenkins, Zabbix, Gitlab, and Ansible, all under OpenLDAP common authentication&lt;/li&gt;
&lt;li&gt;The suite is available under the 2-clause BSD license&lt;/li&gt;
&lt;li&gt;Provides all of the tools and infrastructure to build your application, including code review, issue tracking, continuous integration, and monitoring&lt;/li&gt;
&lt;li&gt;An interesting way to make it easier for people to start building new applications and startups on top of FreeBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.linuxsecrets.com/blog/51freebsd/2016/02/29/1726-installing" target="_blank" rel="nofollow noopener"&gt;LinuxSecrets publishes guide on installing FreeBSD ezJail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Covers all of the steps of setting up ezjail on FreeBSD&lt;/li&gt;
&lt;li&gt;Includes the instructions for updating the version of the OS in the jail&lt;/li&gt;
&lt;li&gt;In a number of places the tutorial uses:&lt;br&gt;
&amp;gt; cat &amp;lt;&amp;lt; EOF &amp;gt;&amp;gt; /etc/rc.conf &amp;gt; setting=”value”&lt;/li&gt;
&lt;li&gt;Instead, use: sysrc setting=”value”&lt;/li&gt;
&lt;li&gt;It is safer, and easier to type&lt;/li&gt;
&lt;li&gt;When you create the jail, if you specify an IP address, it is expected that this IP address is already setup on the host machine&lt;/li&gt;
&lt;li&gt;If instead you specify: ‘em0|192.168.1.105’ (where em0 is your network interface), the IP address will be added as an alias when the jail starts, and removed from the host when the jail is stopped&lt;/li&gt;
&lt;li&gt;You can also comma separate a list of addresses to have multiple IPs (possibly on different interfaces) in the jail&lt;/li&gt;
&lt;li&gt;Although recently posted, this appears as if it might be an update to a previous tutorial, as there are a few old references that have not been updated (pkg_add, rc.d/ezjail.sh), while the start of the article clearly covers pkg(8)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Michael W. Lucas - &lt;a href="mailto:mwlucas@michaelwlucas.com" target="_blank" rel="nofollow noopener"&gt;mwlucas@michaelwlucas.com&lt;/a&gt; /&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://twitter.com/mwlauthor" target="_blank" rel="nofollow noopener"&gt;@mwlauthor&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;New Book: “FreeBSD Mastery: Specialty Filesystems”&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/fwbug/dreamcast-slides" target="_blank" rel="nofollow noopener"&gt;NetBSD on Dreamcast&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ahh the dreamcast, so much promise. So much potential. If you are still holding onto your beloved dreamcast hoping that someday Sega will re-enter the console market… Then give it up now!&lt;/li&gt;
&lt;li&gt;In the meantime, you can now do something more interesting with that box taking up space in the closet. We have a link to a GitHub repo where a user has uploaded his curses-based slide-show for the upcoming Fort-Wayne, Indiana meetup.&lt;/li&gt;
&lt;li&gt;Aside from the novelty of using a curses-based slide setup, the presenter will also be displaying them from his beloved dreamcast, which “of course” runs NetBSD 7&lt;/li&gt;
&lt;li&gt;The slide source code is available, which you too can view / compile and find out details of getting NetBSD boot-strapped on the DC.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-16-1-7-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.1.7 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;captive portal: add session timeout to status info&lt;/li&gt;
&lt;li&gt;firewall: fix non-report of errors when filter reload errors couldn’t be parsed&lt;/li&gt;
&lt;li&gt;proxy: adjust category visibility as not all of them were shown before&lt;/li&gt;
&lt;li&gt;firmware: fix an overzealous upgrade run when the package tool only changes options&lt;/li&gt;
&lt;li&gt;firmware: fixed the binary upgrade patch from 15.7.x in FreeBSD’s package tool&lt;/li&gt;
&lt;li&gt;system: removed NTP settings from general settings&lt;/li&gt;
&lt;li&gt;access: let only root access status.php as it leaks too much info&lt;/li&gt;
&lt;li&gt;development: remove the automount features&lt;/li&gt;
&lt;li&gt;development: addition of “opnsense-stable” package on our way to nightly builds&lt;/li&gt;
&lt;li&gt;development: opnsense-update can now install locally available base and kernel sets
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2570" target="_blank" rel="nofollow noopener"&gt;“FreeBSD Mastery: Advanced ZFS” in tech review&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Most of the tech review is finished&lt;/li&gt;
&lt;li&gt;It was very interesting to hear from many ZFS experts that they learned something from reading the review copy of the book, I was not expecting this&lt;/li&gt;
&lt;li&gt;Many minor corrections and clarifications have been integrated&lt;/li&gt;
&lt;li&gt;The book is now being copy edited
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.cambus.net/why-openbsd/" target="_blank" rel="nofollow noopener"&gt;Why OpenBSD?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Frederic Cambus gives us a nice perspective piece today on what his particular reasons are for choosing OpenBSD.&lt;/li&gt;
&lt;li&gt;Frederic is no stranger to UNIX-Like systems, having used them for 20 years now. In particular starting on Slackware back in ‘96 and moving to FreeBSD from 2000-2005 (around the 4.x series)&lt;/li&gt;
&lt;li&gt;His adventure into OpenBSD began sometime after 2005 (specific time unknown), but a bunch of things left a very good impression on him throughout the years.&lt;/li&gt;
&lt;li&gt;First, was the ease of installation, with its very minimalistic layout, which was one of the fastest installs he had ever done.&lt;/li&gt;
&lt;li&gt;Second was the extensive documentation, which extends beyond just manpages, but into other forms of documentation, such as presentations and papers as well.&lt;/li&gt;
&lt;li&gt;He makes the point about an “ecosystem of quality” that surrounds OpenBSD:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; OpenBSD is an ecosystem of quality. This is the result of a culture of code auditing, reviewing, and a rigorous development process where each commit hitting the tree must be approved by other developers. It has a slower evolution pace and a more carefully planned development model which leads to better code quality overall. Its well deserved reputation of being an ultra secure operating system is the byproduct of a no compromise attitude valuing simplicity, correctness, and most importantly proactivity. OpenBSD also deletes code, a lot of code. Everyone should know that removing code and keeping the codebase modern is probably as important as adding new one. Quoting Saint-Exupery: "It seems that perfection is attained not when there is nothing more to add, but when there is nothing more to remove".&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The article then covers security mechanisms, as well as the defaults which are turned specifically with an eye towards security.&lt;/li&gt;
&lt;li&gt;All-in-all a good perspective piece about the reasons why OpenBSD is the right choice for Frederic, worth your time to read up on it if you want to learn more about OpenBSD’s differences.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;BeastieBits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://docs.freebsd.org/cgi/getmsg.cgi?fetch=9011+0+current/freebsd-hackers" target="_blank" rel="nofollow noopener"&gt;Call for 2016Q1 quarterly status reports&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2593" target="_blank" rel="nofollow noopener"&gt;FreeBSD Mastery: Advanced ZFS” sponsorships ending soon&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://docs.freebsd.org/cgi/getmsg.cgi?fetch=250105+0+archive/2016/freebsd-arm/20160306.freebsd-arm" target="_blank" rel="nofollow noopener"&gt;Shawn Webb from HardenedBSD talking about giving away RPi3’s at BSDCan and hacking on them to get FreeBSD working&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160308204011" target="_blank" rel="nofollow noopener"&gt;xterm(1) now UTF-8 by default&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://blog.pcbsd.org/2016/03/call-for-artists-new-icon-theme/" target="_blank" rel="nofollow noopener"&gt;Call For Artists: New Icon Theme&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/happy_23rd_birthday_src" target="_blank" rel="nofollow noopener"&gt;Happy 23rd Birthday, src!&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2oqRuXCYW" target="_blank" rel="nofollow noopener"&gt; Alison - Readahead and Wayland&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2sQ8MxNPh" target="_blank" rel="nofollow noopener"&gt; Kenny - Gear&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20SRvXPZA" target="_blank" rel="nofollow noopener"&gt; Ben - IPFW2/3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s207mV2Ph1" target="_blank" rel="nofollow noopener"&gt; Brad - ZFS Writeback&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s202loSWdf" target="_blank" rel="nofollow noopener"&gt; Simon - BSD Toonz&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we interview author Michael W Lucas to discuss his new book in the FreeBSD</p>

<h2>This episode was brought to you by</h2>

<p><a title="iXsystems" href="http://www.ixsystems.com/bsdnow"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a title="DigitalOcean" href="http://www.digitalocean.com/"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a title="Tarsnap" href="http://www.tarsnap.com/bsdnow"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160329181346&mode=expanded" rel="nofollow">OpenBSD 5.9 Released early</a></h3>

<ul>
<li>Finished ahead of schedule! OpenBSD 5.9 has officially landed</li>
<li>We’ve been covering some of the ongoing changes as they landed in the tree, but with the official release it’s time to bring you the final list of the new hotness which landed.</li>
<li>First up:

<ul>
<li>Pledge - Over 70%! Of the userland utilities have been converted to use it, and the best part, you probably didn’t even notice</li>
<li>UEFI - Laptops which are pre-locked down to boot UEFI only can now be installed and used - GPT support has also been greatly improved</li>
<li>‘Less’ was replaced with a fork from Illumos, and has been further improved</li>
<li>Xen DomU support - OpenBSD now plays nice in the cloud</li>
<li>X11 - Broadwell and Bay Trail are now supported</li>
<li>Initial work on making the network stack better support SMP has been added, this is still ongoing, but things are starting to happen</li>
<li>802.11N! Specifically for the iwn/iwm drivers</li>
<li>In addition to support for UTF-8, most other locales have been ripped out, leaving only C and UTF-8 left standing in the wake</li>
<li>All and all, sounds like a solid new release with plenty of new goodies to play with. Go grab a copy now!
***</li>
</ul></li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160324093944" rel="nofollow">New routing table code (ART) enabled in -current</a></h3>

<ul>
<li>While OpenBSD 5.9 just landed, we also have some interesting work landing right now in -CURRENT as well. Specifically the new routing table code (ART) has landed:</li>
</ul>

<blockquote>
<p>“I just enabled ART in -current, it will be the default routing table backend in the next snapshots.<br>
The plan is to squash the possible regressions with this new routing table backend then when we&#39;re confident enough, take its route lookup out of the KERNEL_LOCK(). Yes, this is one of the big steps for our network SMP improvements.<br>
In order to make progress, we need your help to make sure this new backend works well on your setup. So please, go download the next snapshot and report back.<br>
If you encounter any routing table regression, please make sure that you cannot reproduce it with your old kernel and include the output of # route -n show<br>
for the 2 kernels as well as the dmesg in your report.<br>
I know that simple dhclient(8) based setups work with ART, so please do not flood us too much. It&#39;s always great to know that things work, but it&#39;s also hard to keep focus ;)<br>
Thank your very much for your support!”</p>

<ul>
<li>There you have it folks! If 5.9 is already too stale for you, time to move over to -CURRENT and give the new routing tables a whirl.
***</li>
</ul>
</blockquote>

<h3><a href="https://forums.freebsd.org/threads/55561/" rel="nofollow">fractal cells - FreeBSD-based All-In-One solution for software development startups</a></h3>

<ul>
<li>Fractal Cells is a suite that transforms a stock FreeBSD installation into an instant “Startup Software Development Platform”</li>
<li>It Integrates ZFS, PostgreSQL, OpenSMTPD, NGINX, OpenVPN, Redmine, Jenkins, Zabbix, Gitlab, and Ansible, all under OpenLDAP common authentication</li>
<li>The suite is available under the 2-clause BSD license</li>
<li>Provides all of the tools and infrastructure to build your application, including code review, issue tracking, continuous integration, and monitoring</li>
<li>An interesting way to make it easier for people to start building new applications and startups on top of FreeBSD
***</li>
</ul>

<h3><a href="http://www.linuxsecrets.com/blog/51freebsd/2016/02/29/1726-installing" rel="nofollow">LinuxSecrets publishes guide on installing FreeBSD ezJail</a></h3>

<ul>
<li>Covers all of the steps of setting up ezjail on FreeBSD</li>
<li>Includes the instructions for updating the version of the OS in the jail</li>
<li>In a number of places the tutorial uses:<br>
&gt; cat &lt;&lt; EOF &gt;&gt; /etc/rc.conf &gt; setting=”value”</li>
<li>Instead, use: sysrc setting=”value”</li>
<li>It is safer, and easier to type</li>
<li>When you create the jail, if you specify an IP address, it is expected that this IP address is already setup on the host machine</li>
<li>If instead you specify: ‘em0|192.168.1.105’ (where em0 is your network interface), the IP address will be added as an alias when the jail starts, and removed from the host when the jail is stopped</li>
<li>You can also comma separate a list of addresses to have multiple IPs (possibly on different interfaces) in the jail</li>
<li>Although recently posted, this appears as if it might be an update to a previous tutorial, as there are a few old references that have not been updated (pkg_add, rc.d/ezjail.sh), while the start of the article clearly covers pkg(8)
***</li>
</ul>

<h2>Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com" rel="nofollow">mwlucas@michaelwlucas.com</a> /</h2>

<p><a href="https://twitter.com/mwlauthor" rel="nofollow">@mwlauthor</a></p>

<ul>
<li>New Book: “FreeBSD Mastery: Specialty Filesystems”</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/fwbug/dreamcast-slides" rel="nofollow">NetBSD on Dreamcast</a></h3>

<ul>
<li>Ahh the dreamcast, so much promise. So much potential. If you are still holding onto your beloved dreamcast hoping that someday Sega will re-enter the console market… Then give it up now!</li>
<li>In the meantime, you can now do something more interesting with that box taking up space in the closet. We have a link to a GitHub repo where a user has uploaded his curses-based slide-show for the upcoming Fort-Wayne, Indiana meetup.</li>
<li>Aside from the novelty of using a curses-based slide setup, the presenter will also be displaying them from his beloved dreamcast, which “of course” runs NetBSD 7</li>
<li>The slide source code is available, which you too can view / compile and find out details of getting NetBSD boot-strapped on the DC.
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-16-1-7-released/" rel="nofollow">OPNsense 16.1.7 Released</a></h3>

<ul>
<li>captive portal: add session timeout to status info</li>
<li>firewall: fix non-report of errors when filter reload errors couldn’t be parsed</li>
<li>proxy: adjust category visibility as not all of them were shown before</li>
<li>firmware: fix an overzealous upgrade run when the package tool only changes options</li>
<li>firmware: fixed the binary upgrade patch from 15.7.x in FreeBSD’s package tool</li>
<li>system: removed NTP settings from general settings</li>
<li>access: let only root access status.php as it leaks too much info</li>
<li>development: remove the automount features</li>
<li>development: addition of “opnsense-stable” package on our way to nightly builds</li>
<li>development: opnsense-update can now install locally available base and kernel sets
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2570" rel="nofollow">“FreeBSD Mastery: Advanced ZFS” in tech review</a></h3>

<ul>
<li>Most of the tech review is finished</li>
<li>It was very interesting to hear from many ZFS experts that they learned something from reading the review copy of the book, I was not expecting this</li>
<li>Many minor corrections and clarifications have been integrated</li>
<li>The book is now being copy edited
***</li>
</ul>

<h3><a href="http://www.cambus.net/why-openbsd/" rel="nofollow">Why OpenBSD?</a></h3>

<ul>
<li>Frederic Cambus gives us a nice perspective piece today on what his particular reasons are for choosing OpenBSD.</li>
<li>Frederic is no stranger to UNIX-Like systems, having used them for 20 years now. In particular starting on Slackware back in ‘96 and moving to FreeBSD from 2000-2005 (around the 4.x series)</li>
<li>His adventure into OpenBSD began sometime after 2005 (specific time unknown), but a bunch of things left a very good impression on him throughout the years.</li>
<li>First, was the ease of installation, with its very minimalistic layout, which was one of the fastest installs he had ever done.</li>
<li>Second was the extensive documentation, which extends beyond just manpages, but into other forms of documentation, such as presentations and papers as well.</li>
<li>He makes the point about an “ecosystem of quality” that surrounds OpenBSD:</li>
</ul>

<blockquote>
<p>OpenBSD is an ecosystem of quality. This is the result of a culture of code auditing, reviewing, and a rigorous development process where each commit hitting the tree must be approved by other developers. It has a slower evolution pace and a more carefully planned development model which leads to better code quality overall. Its well deserved reputation of being an ultra secure operating system is the byproduct of a no compromise attitude valuing simplicity, correctness, and most importantly proactivity. OpenBSD also deletes code, a lot of code. Everyone should know that removing code and keeping the codebase modern is probably as important as adding new one. Quoting Saint-Exupery: &quot;It seems that perfection is attained not when there is nothing more to add, but when there is nothing more to remove&quot;.</p>
</blockquote>

<ul>
<li>The article then covers security mechanisms, as well as the defaults which are turned specifically with an eye towards security.</li>
<li>All-in-all a good perspective piece about the reasons why OpenBSD is the right choice for Frederic, worth your time to read up on it if you want to learn more about OpenBSD’s differences.
***</li>
</ul>

<h2>BeastieBits</h2>

<ul>
<li><a href="https://docs.freebsd.org/cgi/getmsg.cgi?fetch=9011+0+current/freebsd-hackers" rel="nofollow">Call for 2016Q1 quarterly status reports</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2593" rel="nofollow">FreeBSD Mastery: Advanced ZFS” sponsorships ending soon</a></li>
<li><a href="https://docs.freebsd.org/cgi/getmsg.cgi?fetch=250105+0+archive/2016/freebsd-arm/20160306.freebsd-arm" rel="nofollow">Shawn Webb from HardenedBSD talking about giving away RPi3’s at BSDCan and hacking on them to get FreeBSD working</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160308204011" rel="nofollow">xterm(1) now UTF-8 by default</a></li>
<li><a href="https://blog.pcbsd.org/2016/03/call-for-artists-new-icon-theme/" rel="nofollow">Call For Artists: New Icon Theme</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/happy_23rd_birthday_src" rel="nofollow">Happy 23rd Birthday, src!</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2oqRuXCYW" rel="nofollow"> Alison - Readahead and Wayland</a></li>
<li><a href="http://slexy.org/view/s2sQ8MxNPh" rel="nofollow"> Kenny - Gear</a></li>
<li><a href="http://slexy.org/view/s20SRvXPZA" rel="nofollow"> Ben - IPFW2/3</a></li>
<li><a href="http://slexy.org/view/s207mV2Ph1" rel="nofollow"> Brad - ZFS Writeback</a></li>
<li><a href="http://slexy.org/view/s202loSWdf" rel="nofollow"> Simon - BSD Toonz</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we interview author Michael W Lucas to discuss his new book in the FreeBSD</p>

<h2>This episode was brought to you by</h2>

<p><a title="iXsystems" href="http://www.ixsystems.com/bsdnow"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a title="DigitalOcean" href="http://www.digitalocean.com/"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a title="Tarsnap" href="http://www.tarsnap.com/bsdnow"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160329181346&mode=expanded" rel="nofollow">OpenBSD 5.9 Released early</a></h3>

<ul>
<li>Finished ahead of schedule! OpenBSD 5.9 has officially landed</li>
<li>We’ve been covering some of the ongoing changes as they landed in the tree, but with the official release it’s time to bring you the final list of the new hotness which landed.</li>
<li>First up:

<ul>
<li>Pledge - Over 70%! Of the userland utilities have been converted to use it, and the best part, you probably didn’t even notice</li>
<li>UEFI - Laptops which are pre-locked down to boot UEFI only can now be installed and used - GPT support has also been greatly improved</li>
<li>‘Less’ was replaced with a fork from Illumos, and has been further improved</li>
<li>Xen DomU support - OpenBSD now plays nice in the cloud</li>
<li>X11 - Broadwell and Bay Trail are now supported</li>
<li>Initial work on making the network stack better support SMP has been added, this is still ongoing, but things are starting to happen</li>
<li>802.11N! Specifically for the iwn/iwm drivers</li>
<li>In addition to support for UTF-8, most other locales have been ripped out, leaving only C and UTF-8 left standing in the wake</li>
<li>All and all, sounds like a solid new release with plenty of new goodies to play with. Go grab a copy now!
***</li>
</ul></li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160324093944" rel="nofollow">New routing table code (ART) enabled in -current</a></h3>

<ul>
<li>While OpenBSD 5.9 just landed, we also have some interesting work landing right now in -CURRENT as well. Specifically the new routing table code (ART) has landed:</li>
</ul>

<blockquote>
<p>“I just enabled ART in -current, it will be the default routing table backend in the next snapshots.<br>
The plan is to squash the possible regressions with this new routing table backend then when we&#39;re confident enough, take its route lookup out of the KERNEL_LOCK(). Yes, this is one of the big steps for our network SMP improvements.<br>
In order to make progress, we need your help to make sure this new backend works well on your setup. So please, go download the next snapshot and report back.<br>
If you encounter any routing table regression, please make sure that you cannot reproduce it with your old kernel and include the output of # route -n show<br>
for the 2 kernels as well as the dmesg in your report.<br>
I know that simple dhclient(8) based setups work with ART, so please do not flood us too much. It&#39;s always great to know that things work, but it&#39;s also hard to keep focus ;)<br>
Thank your very much for your support!”</p>

<ul>
<li>There you have it folks! If 5.9 is already too stale for you, time to move over to -CURRENT and give the new routing tables a whirl.
***</li>
</ul>
</blockquote>

<h3><a href="https://forums.freebsd.org/threads/55561/" rel="nofollow">fractal cells - FreeBSD-based All-In-One solution for software development startups</a></h3>

<ul>
<li>Fractal Cells is a suite that transforms a stock FreeBSD installation into an instant “Startup Software Development Platform”</li>
<li>It Integrates ZFS, PostgreSQL, OpenSMTPD, NGINX, OpenVPN, Redmine, Jenkins, Zabbix, Gitlab, and Ansible, all under OpenLDAP common authentication</li>
<li>The suite is available under the 2-clause BSD license</li>
<li>Provides all of the tools and infrastructure to build your application, including code review, issue tracking, continuous integration, and monitoring</li>
<li>An interesting way to make it easier for people to start building new applications and startups on top of FreeBSD
***</li>
</ul>

<h3><a href="http://www.linuxsecrets.com/blog/51freebsd/2016/02/29/1726-installing" rel="nofollow">LinuxSecrets publishes guide on installing FreeBSD ezJail</a></h3>

<ul>
<li>Covers all of the steps of setting up ezjail on FreeBSD</li>
<li>Includes the instructions for updating the version of the OS in the jail</li>
<li>In a number of places the tutorial uses:<br>
&gt; cat &lt;&lt; EOF &gt;&gt; /etc/rc.conf &gt; setting=”value”</li>
<li>Instead, use: sysrc setting=”value”</li>
<li>It is safer, and easier to type</li>
<li>When you create the jail, if you specify an IP address, it is expected that this IP address is already setup on the host machine</li>
<li>If instead you specify: ‘em0|192.168.1.105’ (where em0 is your network interface), the IP address will be added as an alias when the jail starts, and removed from the host when the jail is stopped</li>
<li>You can also comma separate a list of addresses to have multiple IPs (possibly on different interfaces) in the jail</li>
<li>Although recently posted, this appears as if it might be an update to a previous tutorial, as there are a few old references that have not been updated (pkg_add, rc.d/ezjail.sh), while the start of the article clearly covers pkg(8)
***</li>
</ul>

<h2>Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com" rel="nofollow">mwlucas@michaelwlucas.com</a> /</h2>

<p><a href="https://twitter.com/mwlauthor" rel="nofollow">@mwlauthor</a></p>

<ul>
<li>New Book: “FreeBSD Mastery: Specialty Filesystems”</li>
</ul>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/fwbug/dreamcast-slides" rel="nofollow">NetBSD on Dreamcast</a></h3>

<ul>
<li>Ahh the dreamcast, so much promise. So much potential. If you are still holding onto your beloved dreamcast hoping that someday Sega will re-enter the console market… Then give it up now!</li>
<li>In the meantime, you can now do something more interesting with that box taking up space in the closet. We have a link to a GitHub repo where a user has uploaded his curses-based slide-show for the upcoming Fort-Wayne, Indiana meetup.</li>
<li>Aside from the novelty of using a curses-based slide setup, the presenter will also be displaying them from his beloved dreamcast, which “of course” runs NetBSD 7</li>
<li>The slide source code is available, which you too can view / compile and find out details of getting NetBSD boot-strapped on the DC.
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-16-1-7-released/" rel="nofollow">OPNsense 16.1.7 Released</a></h3>

<ul>
<li>captive portal: add session timeout to status info</li>
<li>firewall: fix non-report of errors when filter reload errors couldn’t be parsed</li>
<li>proxy: adjust category visibility as not all of them were shown before</li>
<li>firmware: fix an overzealous upgrade run when the package tool only changes options</li>
<li>firmware: fixed the binary upgrade patch from 15.7.x in FreeBSD’s package tool</li>
<li>system: removed NTP settings from general settings</li>
<li>access: let only root access status.php as it leaks too much info</li>
<li>development: remove the automount features</li>
<li>development: addition of “opnsense-stable” package on our way to nightly builds</li>
<li>development: opnsense-update can now install locally available base and kernel sets
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2570" rel="nofollow">“FreeBSD Mastery: Advanced ZFS” in tech review</a></h3>

<ul>
<li>Most of the tech review is finished</li>
<li>It was very interesting to hear from many ZFS experts that they learned something from reading the review copy of the book, I was not expecting this</li>
<li>Many minor corrections and clarifications have been integrated</li>
<li>The book is now being copy edited
***</li>
</ul>

<h3><a href="http://www.cambus.net/why-openbsd/" rel="nofollow">Why OpenBSD?</a></h3>

<ul>
<li>Frederic Cambus gives us a nice perspective piece today on what his particular reasons are for choosing OpenBSD.</li>
<li>Frederic is no stranger to UNIX-Like systems, having used them for 20 years now. In particular starting on Slackware back in ‘96 and moving to FreeBSD from 2000-2005 (around the 4.x series)</li>
<li>His adventure into OpenBSD began sometime after 2005 (specific time unknown), but a bunch of things left a very good impression on him throughout the years.</li>
<li>First, was the ease of installation, with its very minimalistic layout, which was one of the fastest installs he had ever done.</li>
<li>Second was the extensive documentation, which extends beyond just manpages, but into other forms of documentation, such as presentations and papers as well.</li>
<li>He makes the point about an “ecosystem of quality” that surrounds OpenBSD:</li>
</ul>

<blockquote>
<p>OpenBSD is an ecosystem of quality. This is the result of a culture of code auditing, reviewing, and a rigorous development process where each commit hitting the tree must be approved by other developers. It has a slower evolution pace and a more carefully planned development model which leads to better code quality overall. Its well deserved reputation of being an ultra secure operating system is the byproduct of a no compromise attitude valuing simplicity, correctness, and most importantly proactivity. OpenBSD also deletes code, a lot of code. Everyone should know that removing code and keeping the codebase modern is probably as important as adding new one. Quoting Saint-Exupery: &quot;It seems that perfection is attained not when there is nothing more to add, but when there is nothing more to remove&quot;.</p>
</blockquote>

<ul>
<li>The article then covers security mechanisms, as well as the defaults which are turned specifically with an eye towards security.</li>
<li>All-in-all a good perspective piece about the reasons why OpenBSD is the right choice for Frederic, worth your time to read up on it if you want to learn more about OpenBSD’s differences.
***</li>
</ul>

<h2>BeastieBits</h2>

<ul>
<li><a href="https://docs.freebsd.org/cgi/getmsg.cgi?fetch=9011+0+current/freebsd-hackers" rel="nofollow">Call for 2016Q1 quarterly status reports</a></li>
<li><a href="http://blather.michaelwlucas.com/archives/2593" rel="nofollow">FreeBSD Mastery: Advanced ZFS” sponsorships ending soon</a></li>
<li><a href="https://docs.freebsd.org/cgi/getmsg.cgi?fetch=250105+0+archive/2016/freebsd-arm/20160306.freebsd-arm" rel="nofollow">Shawn Webb from HardenedBSD talking about giving away RPi3’s at BSDCan and hacking on them to get FreeBSD working</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20160308204011" rel="nofollow">xterm(1) now UTF-8 by default</a></li>
<li><a href="https://blog.pcbsd.org/2016/03/call-for-artists-new-icon-theme/" rel="nofollow">Call For Artists: New Icon Theme</a></li>
<li><a href="http://blog.netbsd.org/tnf/entry/happy_23rd_birthday_src" rel="nofollow">Happy 23rd Birthday, src!</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2oqRuXCYW" rel="nofollow"> Alison - Readahead and Wayland</a></li>
<li><a href="http://slexy.org/view/s2sQ8MxNPh" rel="nofollow"> Kenny - Gear</a></li>
<li><a href="http://slexy.org/view/s20SRvXPZA" rel="nofollow"> Ben - IPFW2/3</a></li>
<li><a href="http://slexy.org/view/s207mV2Ph1" rel="nofollow"> Brad - ZFS Writeback</a></li>
<li><a href="http://slexy.org/view/s202loSWdf" rel="nofollow"> Simon - BSD Toonz</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>134: Marking up the Ports tree</title>
  <link>https://www.bsdnow.tv/134</link>
  <guid isPermaLink="false">af2a0241-5911-434f-8fe1-6dd556b074ae</guid>
  <pubDate>Thu, 24 Mar 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/af2a0241-5911-434f-8fe1-6dd556b074ae.mp3" length="90344596" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, Allan and I have gotten a bit more sleep since AsiaBSDCon, which is excellent since there is a LOT of news to cover. That plus our interview with Ports SecTeam member Mark Felder. So keep it</itunes:subtitle>
  <itunes:duration>2:05:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, Allan and I have gotten a bit more sleep since AsiaBSDCon, which is excellent since there is a LOT of news to cover. That plus our interview with Ports SecTeam member Mark Felder. So keep it&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.freenas.org/pipermail/freenas-announce/2016-March/000028.html" target="_blank" rel="nofollow noopener"&gt;FreeNAS 9.10 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OS:

&lt;ul&gt;
&lt;li&gt;The base OS version for FreeNAS 9.10 is now FreeBSD 10.3-RC3, bringing in a huge number of OS-related bug fixes, performance improvements and new features.
+Directory Services:&lt;/li&gt;
&lt;li&gt;You can now connect to large AD domains with cache disabled.
+Reporting:&lt;/li&gt;
&lt;li&gt;Add the ability to send collectd data to a remote graphite server.
+Hardware Support:&lt;/li&gt;
&lt;li&gt;Added Support for Intel I219-V &amp;amp; I219-LM Gigabit Ethernet Chipset&lt;/li&gt;
&lt;li&gt;Added Support for Intel Skylake architecture&lt;/li&gt;
&lt;li&gt;Improved support for USB devices (like network adapters)&lt;/li&gt;
&lt;li&gt;USB 3.0 devices now supported.
+Filesharing:&lt;/li&gt;
&lt;li&gt;Samba (SMB filesharing) updated from version 4.1 to 4.3.4&lt;/li&gt;
&lt;li&gt;Added GUI feature to allow nfsv3-like ownership when using nfsv4&lt;/li&gt;
&lt;li&gt;Various bug fixes related to FreeBSD 10.
+Ports:&lt;/li&gt;
&lt;li&gt;FreeBSD ports updated to follow the FreeBSD 2016Q1 branch.
+Jails:&lt;/li&gt;
&lt;li&gt;FreeBSD Jails now default to a FreeBSD 10.3-RC2 based template.&lt;/li&gt;
&lt;li&gt;Old jails, or systems on which jails have been installed, will still default to the previous FreeBSD 9.3 based template. Only those machinesusing jails for the first time (or deleting and recreating their jails dataset) will use the new template.
+bhyve:
++In the upcoming 10 release, the CLI will offer full support for managing virtual machines and containers. Until then, the iohyve command is bundled as a stop-gap solution to provide basic VM management support -
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://sourceforge.net/projects/ubuntubsd/" target="_blank" rel="nofollow noopener"&gt;Ubuntu BSD's first Beta Release&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Under the category of “Where did this come from?”, we have a first beta release of Ubuntu BSD.&lt;/li&gt;
&lt;li&gt;Specifically it is Ubuntu, respun to use the FreeBSD kernel and ZFS natively.&lt;/li&gt;
&lt;li&gt;From looking at the minimal information up on sourceforge, we gather that is has a nice text-based installer, which supports ZFS configuration and iSCSI volume creation setups.&lt;/li&gt;
&lt;li&gt;Aside from that, it includes the XFCE desktop out of box, but claims to be suitable for both desktops and servers alike right now.&lt;/li&gt;
&lt;li&gt;We will keep an eye on this, if anybody listening has already tested it out, maybe drop us a line on your thoughts of how this mash-up works out.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://vez.mrsk.me/freebsd-defaults.txt" target="_blank" rel="nofollow noopener"&gt;FreeBSD - a lesson in poor defaults&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Former BSD producer, and now OpenBSD developer, TJ, writes a post detailing the defaults he changes in a fresh FreeBSD installation&lt;/li&gt;
&lt;li&gt;Maybe some of these should be the defaults&lt;/li&gt;
&lt;li&gt;While others are definitely a personal preference, or are not as security related as they seem&lt;/li&gt;
&lt;li&gt;A few of these, while valid criticisms, but some are done for a reason&lt;/li&gt;
&lt;li&gt;Specifically, the OpenSSH changes.&lt;/li&gt;
&lt;li&gt;So, you’re a user, you install FreeBSD 10.0, and it comes with OpenSSH version X, which has some specific defaults&lt;/li&gt;
&lt;li&gt;As guaranteed by the FreeBSD Project, you will have a nice smooth upgrade path to any version in the 10.x branch&lt;/li&gt;
&lt;li&gt;Just because OpenSSH has released version Y, doesn’t mean that the upgrade can suddenly remove support for DSA keys, or re-adding support for AES-CBC (which is not really weak, and which can be hardware accelerated, unlikely most of the replacements)&lt;/li&gt;
&lt;li&gt;“FreeBSD is the team trying to increase the risk.” Is incorrect, they are trying to reduce the impact on the end user&lt;/li&gt;
&lt;li&gt;Specifically, a user upgrading from 10.x to 10.3, should not end up locked out of their SSH server, or otherwise confronted by unexpected errors or slowdowns because of upstream changes&lt;/li&gt;
&lt;li&gt;I will note again, (and again), that the NONE cipher can NOT allow a user to “shoot themselves in the foot”, encryption is still used during the login phase, it is just disabled for the file transfer phase. The NONE cipher will refuse to work for an interactive session.&lt;/li&gt;
&lt;li&gt;While the post states that the NONE cipher doesn’t improve performance that much, it infact does&lt;/li&gt;
&lt;li&gt;In my own testing, chacha20-poly1305 1.3 gbps, aes128-gcm (fastest) 5.0 gbps, NONE cipher 6.3 gbps&lt;/li&gt;
&lt;li&gt;That means that the NONE cipher is an hour faster to transfer 10 TB over the LAN.&lt;/li&gt;
&lt;li&gt;The article suggests just removing sendmail with no replacement. Not sure how they expect users to deliver mail, or the daily/weekly reports&lt;/li&gt;
&lt;li&gt;Ports can be compiled as a regular user. Only the install phase requires root&lt;/li&gt;
&lt;li&gt;for ntpd, it is not clear that there is an acceptable replacement yet, but I will not that it is off by default&lt;/li&gt;
&lt;li&gt;In the sysctl section, I am not sure I see how enabling tcp blackhole actually increases security at all&lt;/li&gt;
&lt;li&gt;I am not sure that linking to every security advisory in openssl since 2001 is actually useful&lt;/li&gt;
&lt;li&gt;Encrypted swap is an option in bsdinstall now, but I am not sure it is really that important&lt;/li&gt;
&lt;li&gt;FreeBSD now uses the Fortuna PRNG, upgraded to replace the older Yarrow, not vanilla RC4.&lt;/li&gt;
&lt;li&gt;“The resistance from the security team to phase out legacy options makes mewonder if they should be called a compatibility team instead.”&lt;/li&gt;
&lt;li&gt;I do not think this is the choice of the security team, it is the ABI guarantee that the project makes. The stable/10 branch will always have the same ABI, and a program or driver compiled against it will work with any version on that branch&lt;/li&gt;
&lt;li&gt;The security team doesn’t really have a choice in the matter. Switching the version of OpenSSL used in FreeBSD 9.x would likely break a large number of applications the user has installed&lt;/li&gt;
&lt;li&gt;Something may need to be done differently, since it doesn’t look like any version of OpenSSL, (or OpenSSH), will be supported for 5 years ever again
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://calomel.org/zfs_raid_speed_capacity.html" target="_blank" rel="nofollow noopener"&gt;ZFS Raidz Performance, Capacity and Integrity&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An updated version of an article comparing the performance of various ZFS vdev configurations&lt;/li&gt;
&lt;li&gt;The settings users in the test may not reflect your workload&lt;/li&gt;
&lt;li&gt;If you are benchmarking ZFS, consider using multiple files across different datasets, and not making all of the writes synchronous&lt;/li&gt;
&lt;li&gt;Also, it is advisable to run more than 3 runs of each test&lt;/li&gt;
&lt;li&gt;Comparing the numbers from the 12 and 24 disk tests, it is surprising to see that the 12 mirror sets did not outperform the other configurations. In the 12 drive tests, the 6 mirror sets had about the same read performance as the other configurations, it is not clear why the performance with more disks is worse, or why it is no longer in line with the other configurations&lt;/li&gt;
&lt;li&gt;More investigation of this would be required&lt;/li&gt;
&lt;li&gt;There are obviously so other bottlenecks, as 5x SSDs in RAID-Z1 performed the same as 17x SSDs in RAID-Z1&lt;/li&gt;
&lt;li&gt;Interesting results none the less
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXSystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.nasanda.com/2016/03/ixsystems-freenas-mini-nas-device-reviewed/" target="_blank" rel="nofollow noopener"&gt;FreeNAS Mini Review&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Mark Felder - &lt;a href="mailto:feld@freebsd.org" target="_blank" rel="nofollow noopener"&gt;feld@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/feldpos" target="_blank" rel="nofollow noopener"&gt;@feldpos&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Ports, Ports and more Ports&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;DigitalOcean&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.digitalocean.com/community/tutorials/how-to-configure-and-connect-to-a-private-openvpn-server-on-freebsd-10-1" target="_blank" rel="nofollow noopener"&gt;Digital Ocean's guide to setting up an OpenVPN server&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160316153158&amp;amp;mode=flat&amp;amp;count=0" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon OpenBSD Papers&lt;/a&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Undeadly.org has compiled a handy list of the various OpenBSD talks / papers that were offered a few weeks ago at AsiaBSDCon 2016.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Antoine Jacoutot (ajacoutot@) - OpenBSD rc.d(8) (slides | paper)&lt;br&gt;
Henning Brauer (henning@) - Running an ISP on OpenBSD (slides)&lt;br&gt;
Mike Belopuhov (mikeb@) - Implementation of Xen PVHVM drivers in OpenBSD (slides | paper)&lt;br&gt;
Mike Belopuhov (mikeb@) - OpenBSD project status update (slides)&lt;br&gt;
Mike Larkin (mlarkin@) - OpenBSD vmm Update (slides)&lt;br&gt;
Reyk Floeter (reyk@) - OpenBSD vmd Update (slides) &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Each talk provides slides, and some the papers as well. Also included is the update to ‘vmm’ discussed at bhyveCon, which will be of interest to virtualization enthusiasts.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bitcoinist.net/bitcoin-devs-could-learn-a-lot-from-bsd/" target="_blank" rel="nofollow noopener"&gt;Bitcoin Devs could learn a lot from BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An interesting article this week, comparing two projects that at first glance may not be entirely related, namely BitCoin and BSD.&lt;/li&gt;
&lt;li&gt;The article first details some of the woes currently plaguing the BitCoin development community, such as toxic community feedback to changes and stakeholders with vested financial interests being unable to work towards a common development purpose.&lt;/li&gt;
&lt;li&gt;This leads into the crux or the article, about what BitCoin devs could learn from BSD:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; First and foremost, the way code is developed needs change to stop the current negative trend in Bitcoin. The FreeBSD project has a rigid internal hierarchy of people with write access to their codebase, which the various Bitcoin implementations also have, but BSD does this in a way that is very open to fresh eyes on their code, allowing parallel problem solving without the petty infighting we see in Bitcoin. Anyone can propose a commit publicly to the code, make it publicly available, and democratically decide which change ends up in the codebase. FreeBSD has a tiny number of core developers compared to the size of their codebase, but at any point, they have a huge community advancing their project without hard forks popping up at every small disagreement. Brian Armstrong commented recently on this flaw with Bitcoin development, particularly with the Core Devs:&lt;/p&gt;

&lt;p&gt;&amp;gt; “Being high IQ is not enough for a team to succeed. You need to make reasonable tradeoffs, collaborate, be welcoming, communicate, and be easy to work with. Any team that doesn’t have this will be unable to attract top talent and will struggle long term. In my opinion, perhaps the biggest risk in Bitcoin right now is, ironically, one of the things which has helped it the most in the past: the Bitcoin Core developers.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;A good summary of the culture that could be adopted is summed up as follows:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; The other thing Bitcoin devs could learn from is the BSD community’s adoption of the Unix Design philosophy. Primarily “Worse is Better,” The rule of Diversity, and Do One Thing and Do It Well. “Worse is Better” emphasizes using extant functional solutions rather than making more complex ones, even if they would be more robust. The Rule of Diversity stresses flexibility of the program being developed, allowing for modification and different implementations without breaking. Do one Thing and Do it well is a mantra of the BSD and Unix Communities that stresses modularity and progress over “perfect” solutions. Each of these elements help to make BSD a wildly successful open source project with a healthy development community and lots of inter-cooperation between the different BSD systems. While this is the opposite of what we see with Bitcoin at present, the situation is salvageable provided changes like this are made, especially by Core Developers.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All in all, a well written and interesting take on the FreeBSD/BSD project. We hope the BitCoin devs can take something useful from it down the road.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ben.eficium.net/2016/03/freebsd-cross-compiling-with-gcc.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD cross-compiling with gcc and poudriere&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Cross-Compiling, always a challenge, has gotten easier using poudriere and qemu in recent years.&lt;/li&gt;
&lt;li&gt;However this blog post details some of the particular issues still being face when trying to compile some certain ports for ARM (I.E. rPi) that don’t play nicely with FreeBSD’s default CLANG compiler.&lt;/li&gt;
&lt;li&gt;The writer (Ben Slack) takes us through some of the work-arounds he uses to build some troublesome ports, namely lsof and libatomic_ops. &lt;/li&gt;
&lt;li&gt;Note this is not just an issue with cross compile, the above mentioned ports also don’t build with clang on the Pi directly. &lt;/li&gt;
&lt;li&gt;After doing the initial poudriere/qemu cross-compile setup, he then shows us the minor tweaks to adjust which compiler builds specific ports, and how he triggers the builds using poudriere.&lt;/li&gt;
&lt;li&gt;With the actual Makefile adjustment being so minor, one wonders if this shouldn’t just be committed upstream, with some if (ARM) - USE_GCC=yes type conditional. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://devtalk.nvidia.com/default/topic/925607/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-364-12-beta-/" target="_blank" rel="nofollow noopener"&gt;Nvidia releases new Beta graphics driver for FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Added support for the following GPUs: GeForce 920MX &amp;amp; GeForce 930MX&lt;/li&gt;
&lt;li&gt;Added support for the Vulkan API version 1.0.&lt;/li&gt;
&lt;li&gt;Fixed a bug that could cause incorrect frame rate reporting on Quadro Sync configurations with multiple GPUs.&lt;/li&gt;
&lt;li&gt;Added a new RandR property, CscMatrix, which specifies a 3x4 color-space conversion matrix.&lt;/li&gt;
&lt;li&gt;Improved handling of the X gamma ramp on GF119 and newer GPUs. On these GPUs, the RandR gamma ramp is always 1024 entries and now applies to the cursor and VDPAU or workstation overlays in addition to the X root window.&lt;/li&gt;
&lt;li&gt;Fixes for bugs and added several other EGL extensions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://knoxbug.org/" target="_blank" rel="nofollow noopener"&gt;New TN Bug started&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4a43469a10cef8c17553c342aab9d73611ea7bc8?utm_source=anzwix" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD Network/TCP Performance's gets a bump&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/blog/introducing-a-new-look-for-the-foundation/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation introduces a new website and logo&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Our producer made these based on the new logo:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://q5sys.sh/2016/03/a-new-freebsd-foundation-logo-means-its-time-for-some-new-wallpapers/" target="_blank" rel="nofollow noopener"&gt;http://q5sys.sh/2016/03/a-new-freebsd-foundation-logo-means-its-time-for-some-new-wallpapers/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://q5sys.sh/2016/03/pc-bsd-and-lumina-desktop-wallpapers/" target="_blank" rel="nofollow noopener"&gt;http://q5sys.sh/2016/03/pc-bsd-and-lumina-desktop-wallpapers/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/pcbsd/lumina/commit/60314f46247b7ad6e877af503b3814b0be170da8" target="_blank" rel="nofollow noopener"&gt;https://github.com/pcbsd/lumina/commit/60314f46247b7ad6e877af503b3814b0be170da8&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160316190937&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;IPv6 errata for 5.7/5.8, pledge errata for 5.9&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2577" target="_blank" rel="nofollow noopener"&gt;Sponsoring “PAM Mastery”&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://rocketgraph.com/s/v89jBkKN4e-" target="_blank" rel="nofollow noopener"&gt;A visualization of FreeBSD commits on GitHub for 2015&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160309192510" target="_blank" rel="nofollow noopener"&gt;The VAX platform is no more&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20KPYDOsq" target="_blank" rel="nofollow noopener"&gt; Hunter - Utils for Blind&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2EHdI3z3L" target="_blank" rel="nofollow noopener"&gt; Chris - ZFS Quotas&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Nx1VSiU" target="_blank" rel="nofollow noopener"&gt; Anonymous - Tun, Tap and Me!&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ZKK2DZTL" target="_blank" rel="nofollow noopener"&gt; Andrew - Navigating the BSDs&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20duO29mN" target="_blank" rel="nofollow noopener"&gt; Brent - Wifi on BSD&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, Allan and I have gotten a bit more sleep since AsiaBSDCon, which is excellent since there is a LOT of news to cover. That plus our interview with Ports SecTeam member Mark Felder. So keep it</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://lists.freenas.org/pipermail/freenas-announce/2016-March/000028.html" rel="nofollow">FreeNAS 9.10 Released</a></h3>

<ul>
<li>OS:

<ul>
<li>The base OS version for FreeNAS 9.10 is now FreeBSD 10.3-RC3, bringing in a huge number of OS-related bug fixes, performance improvements and new features.
+Directory Services:</li>
<li>You can now connect to large AD domains with cache disabled.
+Reporting:</li>
<li>Add the ability to send collectd data to a remote graphite server.
+Hardware Support:</li>
<li>Added Support for Intel I219-V &amp; I219-LM Gigabit Ethernet Chipset</li>
<li>Added Support for Intel Skylake architecture</li>
<li>Improved support for USB devices (like network adapters)</li>
<li>USB 3.0 devices now supported.
+Filesharing:</li>
<li>Samba (SMB filesharing) updated from version 4.1 to 4.3.4</li>
<li>Added GUI feature to allow nfsv3-like ownership when using nfsv4</li>
<li>Various bug fixes related to FreeBSD 10.
+Ports:</li>
<li>FreeBSD ports updated to follow the FreeBSD 2016Q1 branch.
+Jails:</li>
<li>FreeBSD Jails now default to a FreeBSD 10.3-RC2 based template.</li>
<li>Old jails, or systems on which jails have been installed, will still default to the previous FreeBSD 9.3 based template. Only those machinesusing jails for the first time (or deleting and recreating their jails dataset) will use the new template.
+bhyve:
++In the upcoming 10 release, the CLI will offer full support for managing virtual machines and containers. Until then, the iohyve command is bundled as a stop-gap solution to provide basic VM management support -
***</li>
</ul></li>
</ul>

<h3><a href="https://sourceforge.net/projects/ubuntubsd/" rel="nofollow">Ubuntu BSD&#39;s first Beta Release</a></h3>

<ul>
<li>Under the category of “Where did this come from?”, we have a first beta release of Ubuntu BSD.</li>
<li>Specifically it is Ubuntu, respun to use the FreeBSD kernel and ZFS natively.</li>
<li>From looking at the minimal information up on sourceforge, we gather that is has a nice text-based installer, which supports ZFS configuration and iSCSI volume creation setups.</li>
<li>Aside from that, it includes the XFCE desktop out of box, but claims to be suitable for both desktops and servers alike right now.</li>
<li>We will keep an eye on this, if anybody listening has already tested it out, maybe drop us a line on your thoughts of how this mash-up works out.
***</li>
</ul>

<h3><a href="http://vez.mrsk.me/freebsd-defaults.txt" rel="nofollow">FreeBSD - a lesson in poor defaults</a></h3>

<ul>
<li>Former BSD producer, and now OpenBSD developer, TJ, writes a post detailing the defaults he changes in a fresh FreeBSD installation</li>
<li>Maybe some of these should be the defaults</li>
<li>While others are definitely a personal preference, or are not as security related as they seem</li>
<li>A few of these, while valid criticisms, but some are done for a reason</li>
<li>Specifically, the OpenSSH changes.</li>
<li>So, you’re a user, you install FreeBSD 10.0, and it comes with OpenSSH version X, which has some specific defaults</li>
<li>As guaranteed by the FreeBSD Project, you will have a nice smooth upgrade path to any version in the 10.x branch</li>
<li>Just because OpenSSH has released version Y, doesn’t mean that the upgrade can suddenly remove support for DSA keys, or re-adding support for AES-CBC (which is not really weak, and which can be hardware accelerated, unlikely most of the replacements)</li>
<li>“FreeBSD is the team trying to increase the risk.” Is incorrect, they are trying to reduce the impact on the end user</li>
<li>Specifically, a user upgrading from 10.x to 10.3, should not end up locked out of their SSH server, or otherwise confronted by unexpected errors or slowdowns because of upstream changes</li>
<li>I will note again, (and again), that the NONE cipher can NOT allow a user to “shoot themselves in the foot”, encryption is still used during the login phase, it is just disabled for the file transfer phase. The NONE cipher will refuse to work for an interactive session.</li>
<li>While the post states that the NONE cipher doesn’t improve performance that much, it infact does</li>
<li>In my own testing, chacha20-poly1305 1.3 gbps, aes128-gcm (fastest) 5.0 gbps, NONE cipher 6.3 gbps</li>
<li>That means that the NONE cipher is an hour faster to transfer 10 TB over the LAN.</li>
<li>The article suggests just removing sendmail with no replacement. Not sure how they expect users to deliver mail, or the daily/weekly reports</li>
<li>Ports can be compiled as a regular user. Only the install phase requires root</li>
<li>for ntpd, it is not clear that there is an acceptable replacement yet, but I will not that it is off by default</li>
<li>In the sysctl section, I am not sure I see how enabling tcp blackhole actually increases security at all</li>
<li>I am not sure that linking to every security advisory in openssl since 2001 is actually useful</li>
<li>Encrypted swap is an option in bsdinstall now, but I am not sure it is really that important</li>
<li>FreeBSD now uses the Fortuna PRNG, upgraded to replace the older Yarrow, not vanilla RC4.</li>
<li>“The resistance from the security team to phase out legacy options makes mewonder if they should be called a compatibility team instead.”</li>
<li>I do not think this is the choice of the security team, it is the ABI guarantee that the project makes. The stable/10 branch will always have the same ABI, and a program or driver compiled against it will work with any version on that branch</li>
<li>The security team doesn’t really have a choice in the matter. Switching the version of OpenSSL used in FreeBSD 9.x would likely break a large number of applications the user has installed</li>
<li>Something may need to be done differently, since it doesn’t look like any version of OpenSSL, (or OpenSSH), will be supported for 5 years ever again
***</li>
</ul>

<h3><a href="https://calomel.org/zfs_raid_speed_capacity.html" rel="nofollow">ZFS Raidz Performance, Capacity and Integrity</a></h3>

<ul>
<li>An updated version of an article comparing the performance of various ZFS vdev configurations</li>
<li>The settings users in the test may not reflect your workload</li>
<li>If you are benchmarking ZFS, consider using multiple files across different datasets, and not making all of the writes synchronous</li>
<li>Also, it is advisable to run more than 3 runs of each test</li>
<li>Comparing the numbers from the 12 and 24 disk tests, it is surprising to see that the 12 mirror sets did not outperform the other configurations. In the 12 drive tests, the 6 mirror sets had about the same read performance as the other configurations, it is not clear why the performance with more disks is worse, or why it is no longer in line with the other configurations</li>
<li>More investigation of this would be required</li>
<li>There are obviously so other bottlenecks, as 5x SSDs in RAID-Z1 performed the same as 17x SSDs in RAID-Z1</li>
<li>Interesting results none the less
***</li>
</ul>

<h2>iXSystems</h2>

<ul>
<li><a href="http://www.nasanda.com/2016/03/ixsystems-freenas-mini-nas-device-reviewed/" rel="nofollow">FreeNAS Mini Review</a> </li>
</ul>

<h2>Interview - Mark Felder - <a href="mailto:feld@freebsd.org" rel="nofollow">feld@freebsd.org</a> / <a href="https://twitter.com/feldpos" rel="nofollow">@feldpos</a></h2>

<ul>
<li>Ports, Ports and more Ports</li>
</ul>

<h2>DigitalOcean</h2>

<ul>
<li><a href="https://www.digitalocean.com/community/tutorials/how-to-configure-and-connect-to-a-private-openvpn-server-on-freebsd-10-1" rel="nofollow">Digital Ocean&#39;s guide to setting up an OpenVPN server</a> </li>
</ul>

<h2>News Roundup</h2>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160316153158&mode=flat&count=0" rel="nofollow">AsiaBSDCon OpenBSD Papers</a> </p>

<ul>
<li>Undeadly.org has compiled a handy list of the various OpenBSD talks / papers that were offered a few weeks ago at AsiaBSDCon 2016.</li>
</ul>

<p>Antoine Jacoutot (ajacoutot@) - OpenBSD rc.d(8) (slides | paper)<br>
Henning Brauer (henning@) - Running an ISP on OpenBSD (slides)<br>
Mike Belopuhov (mikeb@) - Implementation of Xen PVHVM drivers in OpenBSD (slides | paper)<br>
Mike Belopuhov (mikeb@) - OpenBSD project status update (slides)<br>
Mike Larkin (mlarkin@) - OpenBSD vmm Update (slides)<br>
Reyk Floeter (reyk@) - OpenBSD vmd Update (slides) </p>

<ul>
<li>Each talk provides slides, and some the papers as well. Also included is the update to ‘vmm’ discussed at bhyveCon, which will be of interest to virtualization enthusiasts.
***</li>
</ul>

<h3><a href="http://bitcoinist.net/bitcoin-devs-could-learn-a-lot-from-bsd/" rel="nofollow">Bitcoin Devs could learn a lot from BSD</a></h3>

<ul>
<li>An interesting article this week, comparing two projects that at first glance may not be entirely related, namely BitCoin and BSD.</li>
<li>The article first details some of the woes currently plaguing the BitCoin development community, such as toxic community feedback to changes and stakeholders with vested financial interests being unable to work towards a common development purpose.</li>
<li>This leads into the crux or the article, about what BitCoin devs could learn from BSD:</li>
</ul>

<blockquote>
<p>First and foremost, the way code is developed needs change to stop the current negative trend in Bitcoin. The FreeBSD project has a rigid internal hierarchy of people with write access to their codebase, which the various Bitcoin implementations also have, but BSD does this in a way that is very open to fresh eyes on their code, allowing parallel problem solving without the petty infighting we see in Bitcoin. Anyone can propose a commit publicly to the code, make it publicly available, and democratically decide which change ends up in the codebase. FreeBSD has a tiny number of core developers compared to the size of their codebase, but at any point, they have a huge community advancing their project without hard forks popping up at every small disagreement. Brian Armstrong commented recently on this flaw with Bitcoin development, particularly with the Core Devs:</p>

<p>“Being high IQ is not enough for a team to succeed. You need to make reasonable tradeoffs, collaborate, be welcoming, communicate, and be easy to work with. Any team that doesn’t have this will be unable to attract top talent and will struggle long term. In my opinion, perhaps the biggest risk in Bitcoin right now is, ironically, one of the things which has helped it the most in the past: the Bitcoin Core developers.”</p>
</blockquote>

<ul>
<li>A good summary of the culture that could be adopted is summed up as follows:</li>
</ul>

<blockquote>
<p>The other thing Bitcoin devs could learn from is the BSD community’s adoption of the Unix Design philosophy. Primarily “Worse is Better,” The rule of Diversity, and Do One Thing and Do It Well. “Worse is Better” emphasizes using extant functional solutions rather than making more complex ones, even if they would be more robust. The Rule of Diversity stresses flexibility of the program being developed, allowing for modification and different implementations without breaking. Do one Thing and Do it well is a mantra of the BSD and Unix Communities that stresses modularity and progress over “perfect” solutions. Each of these elements help to make BSD a wildly successful open source project with a healthy development community and lots of inter-cooperation between the different BSD systems. While this is the opposite of what we see with Bitcoin at present, the situation is salvageable provided changes like this are made, especially by Core Developers.</p>
</blockquote>

<ul>
<li>All in all, a well written and interesting take on the FreeBSD/BSD project. We hope the BitCoin devs can take something useful from it down the road.
***</li>
</ul>

<h3><a href="http://ben.eficium.net/2016/03/freebsd-cross-compiling-with-gcc.html" rel="nofollow">FreeBSD cross-compiling with gcc and poudriere</a></h3>

<ul>
<li>Cross-Compiling, always a challenge, has gotten easier using poudriere and qemu in recent years.</li>
<li>However this blog post details some of the particular issues still being face when trying to compile some certain ports for ARM (I.E. rPi) that don’t play nicely with FreeBSD’s default CLANG compiler.</li>
<li>The writer (Ben Slack) takes us through some of the work-arounds he uses to build some troublesome ports, namely lsof and libatomic_ops. </li>
<li>Note this is not just an issue with cross compile, the above mentioned ports also don’t build with clang on the Pi directly. </li>
<li>After doing the initial poudriere/qemu cross-compile setup, he then shows us the minor tweaks to adjust which compiler builds specific ports, and how he triggers the builds using poudriere.</li>
<li>With the actual Makefile adjustment being so minor, one wonders if this shouldn’t just be committed upstream, with some if (ARM) - USE_GCC=yes type conditional. 
***</li>
</ul>

<h3><a href="https://devtalk.nvidia.com/default/topic/925607/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-364-12-beta-/" rel="nofollow">Nvidia releases new Beta graphics driver for FreeBSD</a></h3>

<ul>
<li>Added support for the following GPUs: GeForce 920MX &amp; GeForce 930MX</li>
<li>Added support for the Vulkan API version 1.0.</li>
<li>Fixed a bug that could cause incorrect frame rate reporting on Quadro Sync configurations with multiple GPUs.</li>
<li>Added a new RandR property, CscMatrix, which specifies a 3x4 color-space conversion matrix.</li>
<li>Improved handling of the X gamma ramp on GF119 and newer GPUs. On these GPUs, the RandR gamma ramp is always 1024 entries and now applies to the cursor and VDPAU or workstation overlays in addition to the X root window.</li>
<li>Fixes for bugs and added several other EGL extensions
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://knoxbug.org/" rel="nofollow">New TN Bug started</a> </p></li>
<li><p><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4a43469a10cef8c17553c342aab9d73611ea7bc8?utm_source=anzwix" rel="nofollow">DragonFlyBSD Network/TCP Performance&#39;s gets a bump</a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/introducing-a-new-look-for-the-foundation/" rel="nofollow">FreeBSD Foundation introduces a new website and logo</a></p></li>
<li><p>Our producer made these based on the new logo:</p>

<ul>
<li><a href="http://q5sys.sh/2016/03/a-new-freebsd-foundation-logo-means-its-time-for-some-new-wallpapers/" rel="nofollow">http://q5sys.sh/2016/03/a-new-freebsd-foundation-logo-means-its-time-for-some-new-wallpapers/</a></li>
<li><a href="http://q5sys.sh/2016/03/pc-bsd-and-lumina-desktop-wallpapers/" rel="nofollow">http://q5sys.sh/2016/03/pc-bsd-and-lumina-desktop-wallpapers/</a></li>
<li><a href="https://github.com/pcbsd/lumina/commit/60314f46247b7ad6e877af503b3814b0be170da8" rel="nofollow">https://github.com/pcbsd/lumina/commit/60314f46247b7ad6e877af503b3814b0be170da8</a> </li>
</ul></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160316190937&mode=flat" rel="nofollow">IPv6 errata for 5.7/5.8, pledge errata for 5.9</a></p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2577" rel="nofollow">Sponsoring “PAM Mastery”</a></p></li>
<li><p><a href="https://rocketgraph.com/s/v89jBkKN4e-" rel="nofollow">A visualization of FreeBSD commits on GitHub for 2015</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160309192510" rel="nofollow">The VAX platform is no more</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20KPYDOsq" rel="nofollow"> Hunter - Utils for Blind</a> </li>
<li><a href="http://slexy.org/view/s2EHdI3z3L" rel="nofollow"> Chris - ZFS Quotas</a> </li>
<li><a href="http://slexy.org/view/s21Nx1VSiU" rel="nofollow"> Anonymous - Tun, Tap and Me!</a> </li>
<li><a href="http://slexy.org/view/s2ZKK2DZTL" rel="nofollow"> Andrew - Navigating the BSDs</a> </li>
<li><a href="http://slexy.org/view/s20duO29mN" rel="nofollow"> Brent - Wifi on BSD</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, Allan and I have gotten a bit more sleep since AsiaBSDCon, which is excellent since there is a LOT of news to cover. That plus our interview with Ports SecTeam member Mark Felder. So keep it</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://lists.freenas.org/pipermail/freenas-announce/2016-March/000028.html" rel="nofollow">FreeNAS 9.10 Released</a></h3>

<ul>
<li>OS:

<ul>
<li>The base OS version for FreeNAS 9.10 is now FreeBSD 10.3-RC3, bringing in a huge number of OS-related bug fixes, performance improvements and new features.
+Directory Services:</li>
<li>You can now connect to large AD domains with cache disabled.
+Reporting:</li>
<li>Add the ability to send collectd data to a remote graphite server.
+Hardware Support:</li>
<li>Added Support for Intel I219-V &amp; I219-LM Gigabit Ethernet Chipset</li>
<li>Added Support for Intel Skylake architecture</li>
<li>Improved support for USB devices (like network adapters)</li>
<li>USB 3.0 devices now supported.
+Filesharing:</li>
<li>Samba (SMB filesharing) updated from version 4.1 to 4.3.4</li>
<li>Added GUI feature to allow nfsv3-like ownership when using nfsv4</li>
<li>Various bug fixes related to FreeBSD 10.
+Ports:</li>
<li>FreeBSD ports updated to follow the FreeBSD 2016Q1 branch.
+Jails:</li>
<li>FreeBSD Jails now default to a FreeBSD 10.3-RC2 based template.</li>
<li>Old jails, or systems on which jails have been installed, will still default to the previous FreeBSD 9.3 based template. Only those machinesusing jails for the first time (or deleting and recreating their jails dataset) will use the new template.
+bhyve:
++In the upcoming 10 release, the CLI will offer full support for managing virtual machines and containers. Until then, the iohyve command is bundled as a stop-gap solution to provide basic VM management support -
***</li>
</ul></li>
</ul>

<h3><a href="https://sourceforge.net/projects/ubuntubsd/" rel="nofollow">Ubuntu BSD&#39;s first Beta Release</a></h3>

<ul>
<li>Under the category of “Where did this come from?”, we have a first beta release of Ubuntu BSD.</li>
<li>Specifically it is Ubuntu, respun to use the FreeBSD kernel and ZFS natively.</li>
<li>From looking at the minimal information up on sourceforge, we gather that is has a nice text-based installer, which supports ZFS configuration and iSCSI volume creation setups.</li>
<li>Aside from that, it includes the XFCE desktop out of box, but claims to be suitable for both desktops and servers alike right now.</li>
<li>We will keep an eye on this, if anybody listening has already tested it out, maybe drop us a line on your thoughts of how this mash-up works out.
***</li>
</ul>

<h3><a href="http://vez.mrsk.me/freebsd-defaults.txt" rel="nofollow">FreeBSD - a lesson in poor defaults</a></h3>

<ul>
<li>Former BSD producer, and now OpenBSD developer, TJ, writes a post detailing the defaults he changes in a fresh FreeBSD installation</li>
<li>Maybe some of these should be the defaults</li>
<li>While others are definitely a personal preference, or are not as security related as they seem</li>
<li>A few of these, while valid criticisms, but some are done for a reason</li>
<li>Specifically, the OpenSSH changes.</li>
<li>So, you’re a user, you install FreeBSD 10.0, and it comes with OpenSSH version X, which has some specific defaults</li>
<li>As guaranteed by the FreeBSD Project, you will have a nice smooth upgrade path to any version in the 10.x branch</li>
<li>Just because OpenSSH has released version Y, doesn’t mean that the upgrade can suddenly remove support for DSA keys, or re-adding support for AES-CBC (which is not really weak, and which can be hardware accelerated, unlikely most of the replacements)</li>
<li>“FreeBSD is the team trying to increase the risk.” Is incorrect, they are trying to reduce the impact on the end user</li>
<li>Specifically, a user upgrading from 10.x to 10.3, should not end up locked out of their SSH server, or otherwise confronted by unexpected errors or slowdowns because of upstream changes</li>
<li>I will note again, (and again), that the NONE cipher can NOT allow a user to “shoot themselves in the foot”, encryption is still used during the login phase, it is just disabled for the file transfer phase. The NONE cipher will refuse to work for an interactive session.</li>
<li>While the post states that the NONE cipher doesn’t improve performance that much, it infact does</li>
<li>In my own testing, chacha20-poly1305 1.3 gbps, aes128-gcm (fastest) 5.0 gbps, NONE cipher 6.3 gbps</li>
<li>That means that the NONE cipher is an hour faster to transfer 10 TB over the LAN.</li>
<li>The article suggests just removing sendmail with no replacement. Not sure how they expect users to deliver mail, or the daily/weekly reports</li>
<li>Ports can be compiled as a regular user. Only the install phase requires root</li>
<li>for ntpd, it is not clear that there is an acceptable replacement yet, but I will not that it is off by default</li>
<li>In the sysctl section, I am not sure I see how enabling tcp blackhole actually increases security at all</li>
<li>I am not sure that linking to every security advisory in openssl since 2001 is actually useful</li>
<li>Encrypted swap is an option in bsdinstall now, but I am not sure it is really that important</li>
<li>FreeBSD now uses the Fortuna PRNG, upgraded to replace the older Yarrow, not vanilla RC4.</li>
<li>“The resistance from the security team to phase out legacy options makes mewonder if they should be called a compatibility team instead.”</li>
<li>I do not think this is the choice of the security team, it is the ABI guarantee that the project makes. The stable/10 branch will always have the same ABI, and a program or driver compiled against it will work with any version on that branch</li>
<li>The security team doesn’t really have a choice in the matter. Switching the version of OpenSSL used in FreeBSD 9.x would likely break a large number of applications the user has installed</li>
<li>Something may need to be done differently, since it doesn’t look like any version of OpenSSL, (or OpenSSH), will be supported for 5 years ever again
***</li>
</ul>

<h3><a href="https://calomel.org/zfs_raid_speed_capacity.html" rel="nofollow">ZFS Raidz Performance, Capacity and Integrity</a></h3>

<ul>
<li>An updated version of an article comparing the performance of various ZFS vdev configurations</li>
<li>The settings users in the test may not reflect your workload</li>
<li>If you are benchmarking ZFS, consider using multiple files across different datasets, and not making all of the writes synchronous</li>
<li>Also, it is advisable to run more than 3 runs of each test</li>
<li>Comparing the numbers from the 12 and 24 disk tests, it is surprising to see that the 12 mirror sets did not outperform the other configurations. In the 12 drive tests, the 6 mirror sets had about the same read performance as the other configurations, it is not clear why the performance with more disks is worse, or why it is no longer in line with the other configurations</li>
<li>More investigation of this would be required</li>
<li>There are obviously so other bottlenecks, as 5x SSDs in RAID-Z1 performed the same as 17x SSDs in RAID-Z1</li>
<li>Interesting results none the less
***</li>
</ul>

<h2>iXSystems</h2>

<ul>
<li><a href="http://www.nasanda.com/2016/03/ixsystems-freenas-mini-nas-device-reviewed/" rel="nofollow">FreeNAS Mini Review</a> </li>
</ul>

<h2>Interview - Mark Felder - <a href="mailto:feld@freebsd.org" rel="nofollow">feld@freebsd.org</a> / <a href="https://twitter.com/feldpos" rel="nofollow">@feldpos</a></h2>

<ul>
<li>Ports, Ports and more Ports</li>
</ul>

<h2>DigitalOcean</h2>

<ul>
<li><a href="https://www.digitalocean.com/community/tutorials/how-to-configure-and-connect-to-a-private-openvpn-server-on-freebsd-10-1" rel="nofollow">Digital Ocean&#39;s guide to setting up an OpenVPN server</a> </li>
</ul>

<h2>News Roundup</h2>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160316153158&mode=flat&count=0" rel="nofollow">AsiaBSDCon OpenBSD Papers</a> </p>

<ul>
<li>Undeadly.org has compiled a handy list of the various OpenBSD talks / papers that were offered a few weeks ago at AsiaBSDCon 2016.</li>
</ul>

<p>Antoine Jacoutot (ajacoutot@) - OpenBSD rc.d(8) (slides | paper)<br>
Henning Brauer (henning@) - Running an ISP on OpenBSD (slides)<br>
Mike Belopuhov (mikeb@) - Implementation of Xen PVHVM drivers in OpenBSD (slides | paper)<br>
Mike Belopuhov (mikeb@) - OpenBSD project status update (slides)<br>
Mike Larkin (mlarkin@) - OpenBSD vmm Update (slides)<br>
Reyk Floeter (reyk@) - OpenBSD vmd Update (slides) </p>

<ul>
<li>Each talk provides slides, and some the papers as well. Also included is the update to ‘vmm’ discussed at bhyveCon, which will be of interest to virtualization enthusiasts.
***</li>
</ul>

<h3><a href="http://bitcoinist.net/bitcoin-devs-could-learn-a-lot-from-bsd/" rel="nofollow">Bitcoin Devs could learn a lot from BSD</a></h3>

<ul>
<li>An interesting article this week, comparing two projects that at first glance may not be entirely related, namely BitCoin and BSD.</li>
<li>The article first details some of the woes currently plaguing the BitCoin development community, such as toxic community feedback to changes and stakeholders with vested financial interests being unable to work towards a common development purpose.</li>
<li>This leads into the crux or the article, about what BitCoin devs could learn from BSD:</li>
</ul>

<blockquote>
<p>First and foremost, the way code is developed needs change to stop the current negative trend in Bitcoin. The FreeBSD project has a rigid internal hierarchy of people with write access to their codebase, which the various Bitcoin implementations also have, but BSD does this in a way that is very open to fresh eyes on their code, allowing parallel problem solving without the petty infighting we see in Bitcoin. Anyone can propose a commit publicly to the code, make it publicly available, and democratically decide which change ends up in the codebase. FreeBSD has a tiny number of core developers compared to the size of their codebase, but at any point, they have a huge community advancing their project without hard forks popping up at every small disagreement. Brian Armstrong commented recently on this flaw with Bitcoin development, particularly with the Core Devs:</p>

<p>“Being high IQ is not enough for a team to succeed. You need to make reasonable tradeoffs, collaborate, be welcoming, communicate, and be easy to work with. Any team that doesn’t have this will be unable to attract top talent and will struggle long term. In my opinion, perhaps the biggest risk in Bitcoin right now is, ironically, one of the things which has helped it the most in the past: the Bitcoin Core developers.”</p>
</blockquote>

<ul>
<li>A good summary of the culture that could be adopted is summed up as follows:</li>
</ul>

<blockquote>
<p>The other thing Bitcoin devs could learn from is the BSD community’s adoption of the Unix Design philosophy. Primarily “Worse is Better,” The rule of Diversity, and Do One Thing and Do It Well. “Worse is Better” emphasizes using extant functional solutions rather than making more complex ones, even if they would be more robust. The Rule of Diversity stresses flexibility of the program being developed, allowing for modification and different implementations without breaking. Do one Thing and Do it well is a mantra of the BSD and Unix Communities that stresses modularity and progress over “perfect” solutions. Each of these elements help to make BSD a wildly successful open source project with a healthy development community and lots of inter-cooperation between the different BSD systems. While this is the opposite of what we see with Bitcoin at present, the situation is salvageable provided changes like this are made, especially by Core Developers.</p>
</blockquote>

<ul>
<li>All in all, a well written and interesting take on the FreeBSD/BSD project. We hope the BitCoin devs can take something useful from it down the road.
***</li>
</ul>

<h3><a href="http://ben.eficium.net/2016/03/freebsd-cross-compiling-with-gcc.html" rel="nofollow">FreeBSD cross-compiling with gcc and poudriere</a></h3>

<ul>
<li>Cross-Compiling, always a challenge, has gotten easier using poudriere and qemu in recent years.</li>
<li>However this blog post details some of the particular issues still being face when trying to compile some certain ports for ARM (I.E. rPi) that don’t play nicely with FreeBSD’s default CLANG compiler.</li>
<li>The writer (Ben Slack) takes us through some of the work-arounds he uses to build some troublesome ports, namely lsof and libatomic_ops. </li>
<li>Note this is not just an issue with cross compile, the above mentioned ports also don’t build with clang on the Pi directly. </li>
<li>After doing the initial poudriere/qemu cross-compile setup, he then shows us the minor tweaks to adjust which compiler builds specific ports, and how he triggers the builds using poudriere.</li>
<li>With the actual Makefile adjustment being so minor, one wonders if this shouldn’t just be committed upstream, with some if (ARM) - USE_GCC=yes type conditional. 
***</li>
</ul>

<h3><a href="https://devtalk.nvidia.com/default/topic/925607/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-364-12-beta-/" rel="nofollow">Nvidia releases new Beta graphics driver for FreeBSD</a></h3>

<ul>
<li>Added support for the following GPUs: GeForce 920MX &amp; GeForce 930MX</li>
<li>Added support for the Vulkan API version 1.0.</li>
<li>Fixed a bug that could cause incorrect frame rate reporting on Quadro Sync configurations with multiple GPUs.</li>
<li>Added a new RandR property, CscMatrix, which specifies a 3x4 color-space conversion matrix.</li>
<li>Improved handling of the X gamma ramp on GF119 and newer GPUs. On these GPUs, the RandR gamma ramp is always 1024 entries and now applies to the cursor and VDPAU or workstation overlays in addition to the X root window.</li>
<li>Fixes for bugs and added several other EGL extensions
***</li>
</ul>

<h2>Beastie Bits</h2>

<ul>
<li><p><a href="http://knoxbug.org/" rel="nofollow">New TN Bug started</a> </p></li>
<li><p><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/4a43469a10cef8c17553c342aab9d73611ea7bc8?utm_source=anzwix" rel="nofollow">DragonFlyBSD Network/TCP Performance&#39;s gets a bump</a></p></li>
<li><p><a href="https://www.freebsdfoundation.org/blog/introducing-a-new-look-for-the-foundation/" rel="nofollow">FreeBSD Foundation introduces a new website and logo</a></p></li>
<li><p>Our producer made these based on the new logo:</p>

<ul>
<li><a href="http://q5sys.sh/2016/03/a-new-freebsd-foundation-logo-means-its-time-for-some-new-wallpapers/" rel="nofollow">http://q5sys.sh/2016/03/a-new-freebsd-foundation-logo-means-its-time-for-some-new-wallpapers/</a></li>
<li><a href="http://q5sys.sh/2016/03/pc-bsd-and-lumina-desktop-wallpapers/" rel="nofollow">http://q5sys.sh/2016/03/pc-bsd-and-lumina-desktop-wallpapers/</a></li>
<li><a href="https://github.com/pcbsd/lumina/commit/60314f46247b7ad6e877af503b3814b0be170da8" rel="nofollow">https://github.com/pcbsd/lumina/commit/60314f46247b7ad6e877af503b3814b0be170da8</a> </li>
</ul></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160316190937&mode=flat" rel="nofollow">IPv6 errata for 5.7/5.8, pledge errata for 5.9</a></p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2577" rel="nofollow">Sponsoring “PAM Mastery”</a></p></li>
<li><p><a href="https://rocketgraph.com/s/v89jBkKN4e-" rel="nofollow">A visualization of FreeBSD commits on GitHub for 2015</a></p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160309192510" rel="nofollow">The VAX platform is no more</a></p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20KPYDOsq" rel="nofollow"> Hunter - Utils for Blind</a> </li>
<li><a href="http://slexy.org/view/s2EHdI3z3L" rel="nofollow"> Chris - ZFS Quotas</a> </li>
<li><a href="http://slexy.org/view/s21Nx1VSiU" rel="nofollow"> Anonymous - Tun, Tap and Me!</a> </li>
<li><a href="http://slexy.org/view/s2ZKK2DZTL" rel="nofollow"> Andrew - Navigating the BSDs</a> </li>
<li><a href="http://slexy.org/view/s20duO29mN" rel="nofollow"> Brent - Wifi on BSD</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>133: The Tokyo Debrief</title>
  <link>https://www.bsdnow.tv/133</link>
  <guid isPermaLink="false">4673def9-dead-4353-b97b-9b557eef899a</guid>
  <pubDate>Wed, 16 Mar 2016 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4673def9-dead-4353-b97b-9b557eef899a.mp3" length="55224148" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, Allan and I are back from AsiaBSDCon and we have an interview with Brad Davis about the new “Packaging Base” call-for-testing. We’ll be sharing our thoughts and stories on how the week</itunes:subtitle>
  <itunes:duration>1:16:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, Allan and I are back from AsiaBSDCon and we have an interview with Brad Davis about the new “Packaging Base” call-for-testing. We’ll be sharing our thoughts and stories on how the week&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;AsiaBSDCon 2016 - Wrap-up&lt;/h3&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/changeset/base/296548" target="_blank" rel="nofollow noopener"&gt;FreeBSD gets Haswell graphics support in time for 11.0-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The moment that many have been waiting for has finally arrived, support for Haswell graphics has been committed to FreeBSD -CURRENT&lt;/li&gt;
&lt;li&gt;The brings the DRM/i915 code up to date with Linux kernel 3.8.13&lt;/li&gt;
&lt;li&gt;Work has already started on updating to Linux kernel 3.9&lt;/li&gt;
&lt;li&gt;It is hoped that subsequent updates will be much easier, and much faster&lt;/li&gt;
&lt;li&gt;It does not appear to require setting the i915.preliminary_hw_support loader tunable
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bhyvecon.org/bhyvecon2016-Mike.pdf" target="_blank" rel="nofollow noopener"&gt;OpenBSD vmm/vmd Update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For the third year running, bhyvecon was held last week, during the lead up to AsiaBSDCon&lt;/li&gt;
&lt;li&gt;Bhyvecon has expanded, and now covers all virtualization on BSDs&lt;/li&gt;
&lt;li&gt;There were presentations on bhyve, Xen Dom0 on FreeBSD, Xen DomU for OpenBSD, and OpenBSD’s vmm&lt;/li&gt;
&lt;li&gt;OpenBSD vmm started at the Brisbane 2015 hackathon in Australia&lt;/li&gt;
&lt;li&gt;Work continued through the summer and fall thanks to funding by the OpenBSD Foundation&lt;/li&gt;
&lt;li&gt;The presentation answered some outstanding questions, such as, why not just port bhyve?&lt;/li&gt;
&lt;li&gt;Initial focus is OpenBSD on OpenBSD&lt;/li&gt;
&lt;li&gt;Loader currently supports FreeBSD and NetBSD as well&lt;/li&gt;
&lt;li&gt;After the initial commits, other developers joined in to help with the work&lt;/li&gt;
&lt;li&gt;Reyk reworked the vmd and vmctl commands, to provide a better user interface&lt;/li&gt;
&lt;li&gt;Future plans:

&lt;ul&gt;
&lt;li&gt;Nested VMX&lt;/li&gt;
&lt;li&gt;i386 support&lt;/li&gt;
&lt;li&gt;AMD SVM support&lt;/li&gt;
&lt;li&gt;Filesystem passthru&lt;/li&gt;
&lt;li&gt;Live migration (with ZFS like command syntax)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Other developers are working on related projects:

&lt;ul&gt;
&lt;li&gt;qemu interface: Allow qemu to be accelerated by the vmm backend, while providing emulated hardware, for legacy systems&lt;/li&gt;
&lt;li&gt;KVM interface: Make vmm look like KVM, so existing tools like openstack “just work”
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brad Davis - &lt;a href="mailto:brd@freebsd.org" target="_blank" rel="nofollow noopener"&gt;brd@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/so14k" target="_blank" rel="nofollow noopener"&gt;@so14k&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Packaging Base&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-March/000032.html" target="_blank" rel="nofollow noopener"&gt;Packaging the base system with pkg(8)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The official call for testing for FreeBSD’s pkg(8)’d base is out&lt;/li&gt;
&lt;li&gt;Users are requested to checkout the release-pkg branch, and build it as normal (buildworld, buildkernel)&lt;/li&gt;
&lt;li&gt;Instead of installworld, run: make packages&lt;/li&gt;
&lt;li&gt;This will produce a pkg repo in the /usr/obj directory&lt;/li&gt;
&lt;li&gt;The post to the mailing list includes an example pkg repo config file to point to those packages&lt;/li&gt;
&lt;li&gt;Run: pkg update -r FreeBSD-base&lt;/li&gt;
&lt;li&gt;This will read the metadata from the new repository&lt;/li&gt;
&lt;li&gt;Then run: pkg install -g 'FreeBSD-*'&lt;/li&gt;
&lt;li&gt;This will find all packages that start with ‘FreeBSD-’ and install them&lt;/li&gt;
&lt;li&gt;In the future, there will be meta packages, so you can just install FreeBSD-base and it will pull in other packages are dependencies&lt;/li&gt;
&lt;li&gt;Currently, there are a large number of packages (over 700), because each shared library is packaged separately, and almost all optional features are in a separate package&lt;/li&gt;
&lt;li&gt;The number of packages is also increased because there are separate -debug, -profiling, etc versions of each package&lt;/li&gt;
&lt;li&gt;New features are being added to pkg(8) to mark important system components, like libc, as ‘vital’, so they cannot be deleted accidently&lt;/li&gt;
&lt;li&gt;However, in the case of using pkg(8)’d base to create a jail, the administrator should be able to delete the entire base system&lt;/li&gt;
&lt;li&gt;Classic conundrum: “UNIX does not stop you doing something stupid, as that would also stop you doing something clever”&lt;/li&gt;
&lt;li&gt;Work is still ongoing&lt;/li&gt;
&lt;li&gt;At AsiaBSDCon, after the interview was recorded, bapt@ and brd@ had a whiteboarding session and have come up with how they expect to handle the kernel package, to ensure there is a /boot/kernel.old for you to fall back to incase the newly installer kernel does not work correctly.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-March/084384.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.3-RC2 Now Available&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The second release candidate for FreeBSD 10.3 is now available for testing&lt;/li&gt;
&lt;li&gt;Notable changes include:

&lt;ul&gt;
&lt;li&gt;Import an upstream fix for ‘zfs send -i’ to avoid data corruption in specific instances&lt;/li&gt;
&lt;li&gt;Boot loaders and kernel have been taught to handle ELF sections of type SHT_AMD64_UNWIND. This does not really apply to FreeBSD 10.3, but is required for 11.0, so will make upgrades easier&lt;/li&gt;
&lt;li&gt;Various mkdb commands (/etc/services, /etc/login.conf, etc) commands now use fsync() instead of opening the files as O_SYNC, greatly increasing the speed of the database generation&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;From the earlier BETA3, the VFS improvements that were causing ZFS hangs, and the new ‘tryforward’ routing code, have been reverted&lt;/li&gt;
&lt;li&gt;Work is ongoing to fix these issues for FreeBSD 11.0&lt;/li&gt;
&lt;li&gt;There are two open issues:

&lt;ul&gt;
&lt;li&gt;A fix for OpenSSH CVE-2016-3115 has not be included yet&lt;/li&gt;
&lt;li&gt;the re-addition of AES-CBC ciphers to the default server proposal list. AES-CBC was removed as part of the update to OpenSSH version 7.1p2, but the plan is to re-add it, specifically for lightweight clients who rely on hardware crypto offload to have acceptable SSH performance&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Please go out and test
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=2378.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.1.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new point-release of OPNsense has dropped, and apart from the usual security updates, some new features have been included&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; + firmware: bootstrap utility can now directly install e.g. the development version&lt;br&gt;
&amp;gt; + dhcp: all GUI pages have been reworked for a polished look and feel&lt;br&gt;
&amp;gt; + proxy: added category-based remote file support if compressed file contains multiple files&lt;br&gt;
&amp;gt; + proxy: added ICAP support (contributed by Fabian Franz)&lt;br&gt;
&amp;gt; + proxy: hook up the transparent FTP proxy&lt;br&gt;
&amp;gt; + proxy: add intercept on IPv6 for FTP and HTTP proxy options&lt;br&gt;
&amp;gt; + logging: syslog facilities, like services, are now fully pluggable&lt;br&gt;
&amp;gt; + vpn: stripped an invalid PPTP server configuration from the standard configuration&lt;br&gt;
&amp;gt; + vpn: converted to pluggable syslog, menu and ACL&lt;br&gt;
&amp;gt; + dyndns: all GUI pages have been reworked for a polished look and feel&lt;br&gt;
&amp;gt; + dyndns: widget now shows IPv6 entries too&lt;br&gt;
&amp;gt; + dns forwarder: all GUI pages have been reworked for a polished look and feel&lt;br&gt;
&amp;gt; + dns resolver: all GUI pages have been reworked for a polished look and feel&lt;br&gt;
&amp;gt; + dns resolver: rewrote the dhcp lease registration hooks&lt;br&gt;
&amp;gt; + dns resolver: allow parallel operation on non-standard port when dns forwarder is running as well&lt;br&gt;
&amp;gt; + firewall: hide outbound nat rule input for "interface address" option and toggle bitmask correctly&lt;br&gt;
&amp;gt; + interfaces: fix problem when VLAN tags weren't generated properly&lt;br&gt;
&amp;gt; + interfaces: improve interface capability reconfigure&lt;br&gt;
&amp;gt; + ipsec: fix service restart behaviour from GUI&lt;br&gt;
&amp;gt; + captive portal: add missing chain in certificate generation&lt;br&gt;
&amp;gt; + configd: improve recovery and reload behaviour&lt;br&gt;
&amp;gt; + load balancer: reordered menu entries for clarity&lt;br&gt;
&amp;gt; + ntp: reordered menu entries for clarity&lt;br&gt;
&amp;gt; + traffic shaper: fix mismatch for direction + dual interfaces setup&lt;br&gt;
&amp;gt; + languages: updated German and French&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-arch/2016-March/017719.html" target="_blank" rel="nofollow noopener"&gt;Call for testing - ASLR patch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A patch that provides a first pass implementation of basic ASLR (Address Space Layout Randomization) for FreeBSD has been posted to the mailing list&lt;/li&gt;
&lt;li&gt;“Stack gap, W&lt;sup&gt;X,&lt;/sup&gt; shared page randomization, KASLR and other techniques are explicitly out of scope of this work.”&lt;/li&gt;
&lt;li&gt;“ASLR is enabled on per-ABI basis, and currently it is only enabled on native i386 and amd64 (including compat 32bit) ABIs.  I expect to test and enable ASLR for armv6 and arm64 as well, later”&lt;/li&gt;
&lt;li&gt;“Thanks to Oliver Pinter and Shawn Webb of the HardenedBSD project for pursuing ASLR for FreeBSD.  Although this work is not based on theirs, it was inspired by their efforts.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20Z81SPq3" target="_blank" rel="nofollow noopener"&gt; Daniel - OpenZFS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2be4zDkG6" target="_blank" rel="nofollow noopener"&gt; Florian - JBODS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2o0MijCFy" target="_blank" rel="nofollow noopener"&gt; Hunter - SSL on DO&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2fXlOwdU7" target="_blank" rel="nofollow noopener"&gt; Ben - Backups&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2weBPb8sx" target="_blank" rel="nofollow noopener"&gt; Damian - Bug’in Me!&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, Allan and I are back from AsiaBSDCon and we have an interview with Brad Davis about the new “Packaging Base” call-for-testing. We’ll be sharing our thoughts and stories on how the week</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>AsiaBSDCon 2016 - Wrap-up</h3>

<h3><a href="https://svnweb.freebsd.org/changeset/base/296548" rel="nofollow">FreeBSD gets Haswell graphics support in time for 11.0-RELEASE</a></h3>

<ul>
<li>The moment that many have been waiting for has finally arrived, support for Haswell graphics has been committed to FreeBSD -CURRENT</li>
<li>The brings the DRM/i915 code up to date with Linux kernel 3.8.13</li>
<li>Work has already started on updating to Linux kernel 3.9</li>
<li>It is hoped that subsequent updates will be much easier, and much faster</li>
<li>It does not appear to require setting the i915.preliminary_hw_support loader tunable
***</li>
</ul>

<h3><a href="http://bhyvecon.org/bhyvecon2016-Mike.pdf" rel="nofollow">OpenBSD vmm/vmd Update</a></h3>

<ul>
<li>For the third year running, bhyvecon was held last week, during the lead up to AsiaBSDCon</li>
<li>Bhyvecon has expanded, and now covers all virtualization on BSDs</li>
<li>There were presentations on bhyve, Xen Dom0 on FreeBSD, Xen DomU for OpenBSD, and OpenBSD’s vmm</li>
<li>OpenBSD vmm started at the Brisbane 2015 hackathon in Australia</li>
<li>Work continued through the summer and fall thanks to funding by the OpenBSD Foundation</li>
<li>The presentation answered some outstanding questions, such as, why not just port bhyve?</li>
<li>Initial focus is OpenBSD on OpenBSD</li>
<li>Loader currently supports FreeBSD and NetBSD as well</li>
<li>After the initial commits, other developers joined in to help with the work</li>
<li>Reyk reworked the vmd and vmctl commands, to provide a better user interface</li>
<li>Future plans:

<ul>
<li>Nested VMX</li>
<li>i386 support</li>
<li>AMD SVM support</li>
<li>Filesystem passthru</li>
<li>Live migration (with ZFS like command syntax)</li>
</ul></li>
<li>Other developers are working on related projects:

<ul>
<li>qemu interface: Allow qemu to be accelerated by the vmm backend, while providing emulated hardware, for legacy systems</li>
<li>KVM interface: Make vmm look like KVM, so existing tools like openstack “just work”
***</li>
</ul></li>
</ul>

<h2>Interview - Brad Davis - <a href="mailto:brd@freebsd.org" rel="nofollow">brd@freebsd.org</a> / <a href="https://twitter.com/so14k" rel="nofollow">@so14k</a></h2>

<ul>
<li>Packaging Base</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-March/000032.html" rel="nofollow">Packaging the base system with pkg(8)</a></h3>

<ul>
<li>The official call for testing for FreeBSD’s pkg(8)’d base is out</li>
<li>Users are requested to checkout the release-pkg branch, and build it as normal (buildworld, buildkernel)</li>
<li>Instead of installworld, run: make packages</li>
<li>This will produce a pkg repo in the /usr/obj directory</li>
<li>The post to the mailing list includes an example pkg repo config file to point to those packages</li>
<li>Run: pkg update -r FreeBSD-base</li>
<li>This will read the metadata from the new repository</li>
<li>Then run: pkg install -g &#39;FreeBSD-*&#39;</li>
<li>This will find all packages that start with ‘FreeBSD-’ and install them</li>
<li>In the future, there will be meta packages, so you can just install FreeBSD-base and it will pull in other packages are dependencies</li>
<li>Currently, there are a large number of packages (over 700), because each shared library is packaged separately, and almost all optional features are in a separate package</li>
<li>The number of packages is also increased because there are separate -debug, -profiling, etc versions of each package</li>
<li>New features are being added to pkg(8) to mark important system components, like libc, as ‘vital’, so they cannot be deleted accidently</li>
<li>However, in the case of using pkg(8)’d base to create a jail, the administrator should be able to delete the entire base system</li>
<li>Classic conundrum: “UNIX does not stop you doing something stupid, as that would also stop you doing something clever”</li>
<li>Work is still ongoing</li>
<li>At AsiaBSDCon, after the interview was recorded, bapt@ and brd@ had a whiteboarding session and have come up with how they expect to handle the kernel package, to ensure there is a /boot/kernel.old for you to fall back to incase the newly installer kernel does not work correctly.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-March/084384.html" rel="nofollow">FreeBSD 10.3-RC2 Now Available</a></h3>

<ul>
<li>The second release candidate for FreeBSD 10.3 is now available for testing</li>
<li>Notable changes include:

<ul>
<li>Import an upstream fix for ‘zfs send -i’ to avoid data corruption in specific instances</li>
<li>Boot loaders and kernel have been taught to handle ELF sections of type SHT_AMD64_UNWIND. This does not really apply to FreeBSD 10.3, but is required for 11.0, so will make upgrades easier</li>
<li>Various mkdb commands (/etc/services, /etc/login.conf, etc) commands now use fsync() instead of opening the files as O_SYNC, greatly increasing the speed of the database generation</li>
</ul></li>
<li>From the earlier BETA3, the VFS improvements that were causing ZFS hangs, and the new ‘tryforward’ routing code, have been reverted</li>
<li>Work is ongoing to fix these issues for FreeBSD 11.0</li>
<li>There are two open issues:

<ul>
<li>A fix for OpenSSH CVE-2016-3115 has not be included yet</li>
<li>the re-addition of AES-CBC ciphers to the default server proposal list. AES-CBC was removed as part of the update to OpenSSH version 7.1p2, but the plan is to re-add it, specifically for lightweight clients who rely on hardware crypto offload to have acceptable SSH performance</li>
</ul></li>
<li>Please go out and test
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=2378.0" rel="nofollow">OPNsense 16.1.6 released</a></h3>

<ul>
<li>A new point-release of OPNsense has dropped, and apart from the usual security updates, some new features have been included</li>
</ul>

<blockquote>
<ul>
<li>firmware: bootstrap utility can now directly install e.g. the development version</li>
<li>dhcp: all GUI pages have been reworked for a polished look and feel</li>
<li>proxy: added category-based remote file support if compressed file contains multiple files</li>
<li>proxy: added ICAP support (contributed by Fabian Franz)</li>
<li>proxy: hook up the transparent FTP proxy</li>
<li>proxy: add intercept on IPv6 for FTP and HTTP proxy options</li>
<li>logging: syslog facilities, like services, are now fully pluggable</li>
<li>vpn: stripped an invalid PPTP server configuration from the standard configuration</li>
<li>vpn: converted to pluggable syslog, menu and ACL</li>
<li>dyndns: all GUI pages have been reworked for a polished look and feel</li>
<li>dyndns: widget now shows IPv6 entries too</li>
<li>dns forwarder: all GUI pages have been reworked for a polished look and feel</li>
<li>dns resolver: all GUI pages have been reworked for a polished look and feel</li>
<li>dns resolver: rewrote the dhcp lease registration hooks</li>
<li>dns resolver: allow parallel operation on non-standard port when dns forwarder is running as well</li>
<li>firewall: hide outbound nat rule input for &quot;interface address&quot; option and toggle bitmask correctly</li>
<li>interfaces: fix problem when VLAN tags weren&#39;t generated properly</li>
<li>interfaces: improve interface capability reconfigure</li>
<li>ipsec: fix service restart behaviour from GUI</li>
<li>captive portal: add missing chain in certificate generation</li>
<li>configd: improve recovery and reload behaviour</li>
<li>load balancer: reordered menu entries for clarity</li>
<li>ntp: reordered menu entries for clarity</li>
<li>traffic shaper: fix mismatch for direction + dual interfaces setup</li>
<li>languages: updated German and French</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-arch/2016-March/017719.html" rel="nofollow">Call for testing - ASLR patch</a></h3>

<ul>
<li>A patch that provides a first pass implementation of basic ASLR (Address Space Layout Randomization) for FreeBSD has been posted to the mailing list</li>
<li>“Stack gap, W<sup>X,</sup> shared page randomization, KASLR and other techniques are explicitly out of scope of this work.”</li>
<li>“ASLR is enabled on per-ABI basis, and currently it is only enabled on native i386 and amd64 (including compat 32bit) ABIs.  I expect to test and enable ASLR for armv6 and arm64 as well, later”</li>
<li>“Thanks to Oliver Pinter and Shawn Webb of the HardenedBSD project for pursuing ASLR for FreeBSD.  Although this work is not based on theirs, it was inspired by their efforts.”
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20Z81SPq3" rel="nofollow"> Daniel - OpenZFS</a> </li>
<li><a href="http://slexy.org/view/s2be4zDkG6" rel="nofollow"> Florian - JBODS</a> </li>
<li><a href="http://slexy.org/view/s2o0MijCFy" rel="nofollow"> Hunter - SSL on DO</a> </li>
<li><a href="http://slexy.org/view/s2fXlOwdU7" rel="nofollow"> Ben - Backups</a> </li>
<li><a href="http://slexy.org/view/s2weBPb8sx" rel="nofollow"> Damian - Bug’in Me!</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, Allan and I are back from AsiaBSDCon and we have an interview with Brad Davis about the new “Packaging Base” call-for-testing. We’ll be sharing our thoughts and stories on how the week</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>AsiaBSDCon 2016 - Wrap-up</h3>

<h3><a href="https://svnweb.freebsd.org/changeset/base/296548" rel="nofollow">FreeBSD gets Haswell graphics support in time for 11.0-RELEASE</a></h3>

<ul>
<li>The moment that many have been waiting for has finally arrived, support for Haswell graphics has been committed to FreeBSD -CURRENT</li>
<li>The brings the DRM/i915 code up to date with Linux kernel 3.8.13</li>
<li>Work has already started on updating to Linux kernel 3.9</li>
<li>It is hoped that subsequent updates will be much easier, and much faster</li>
<li>It does not appear to require setting the i915.preliminary_hw_support loader tunable
***</li>
</ul>

<h3><a href="http://bhyvecon.org/bhyvecon2016-Mike.pdf" rel="nofollow">OpenBSD vmm/vmd Update</a></h3>

<ul>
<li>For the third year running, bhyvecon was held last week, during the lead up to AsiaBSDCon</li>
<li>Bhyvecon has expanded, and now covers all virtualization on BSDs</li>
<li>There were presentations on bhyve, Xen Dom0 on FreeBSD, Xen DomU for OpenBSD, and OpenBSD’s vmm</li>
<li>OpenBSD vmm started at the Brisbane 2015 hackathon in Australia</li>
<li>Work continued through the summer and fall thanks to funding by the OpenBSD Foundation</li>
<li>The presentation answered some outstanding questions, such as, why not just port bhyve?</li>
<li>Initial focus is OpenBSD on OpenBSD</li>
<li>Loader currently supports FreeBSD and NetBSD as well</li>
<li>After the initial commits, other developers joined in to help with the work</li>
<li>Reyk reworked the vmd and vmctl commands, to provide a better user interface</li>
<li>Future plans:

<ul>
<li>Nested VMX</li>
<li>i386 support</li>
<li>AMD SVM support</li>
<li>Filesystem passthru</li>
<li>Live migration (with ZFS like command syntax)</li>
</ul></li>
<li>Other developers are working on related projects:

<ul>
<li>qemu interface: Allow qemu to be accelerated by the vmm backend, while providing emulated hardware, for legacy systems</li>
<li>KVM interface: Make vmm look like KVM, so existing tools like openstack “just work”
***</li>
</ul></li>
</ul>

<h2>Interview - Brad Davis - <a href="mailto:brd@freebsd.org" rel="nofollow">brd@freebsd.org</a> / <a href="https://twitter.com/so14k" rel="nofollow">@so14k</a></h2>

<ul>
<li>Packaging Base</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-pkgbase/2016-March/000032.html" rel="nofollow">Packaging the base system with pkg(8)</a></h3>

<ul>
<li>The official call for testing for FreeBSD’s pkg(8)’d base is out</li>
<li>Users are requested to checkout the release-pkg branch, and build it as normal (buildworld, buildkernel)</li>
<li>Instead of installworld, run: make packages</li>
<li>This will produce a pkg repo in the /usr/obj directory</li>
<li>The post to the mailing list includes an example pkg repo config file to point to those packages</li>
<li>Run: pkg update -r FreeBSD-base</li>
<li>This will read the metadata from the new repository</li>
<li>Then run: pkg install -g &#39;FreeBSD-*&#39;</li>
<li>This will find all packages that start with ‘FreeBSD-’ and install them</li>
<li>In the future, there will be meta packages, so you can just install FreeBSD-base and it will pull in other packages are dependencies</li>
<li>Currently, there are a large number of packages (over 700), because each shared library is packaged separately, and almost all optional features are in a separate package</li>
<li>The number of packages is also increased because there are separate -debug, -profiling, etc versions of each package</li>
<li>New features are being added to pkg(8) to mark important system components, like libc, as ‘vital’, so they cannot be deleted accidently</li>
<li>However, in the case of using pkg(8)’d base to create a jail, the administrator should be able to delete the entire base system</li>
<li>Classic conundrum: “UNIX does not stop you doing something stupid, as that would also stop you doing something clever”</li>
<li>Work is still ongoing</li>
<li>At AsiaBSDCon, after the interview was recorded, bapt@ and brd@ had a whiteboarding session and have come up with how they expect to handle the kernel package, to ensure there is a /boot/kernel.old for you to fall back to incase the newly installer kernel does not work correctly.
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-March/084384.html" rel="nofollow">FreeBSD 10.3-RC2 Now Available</a></h3>

<ul>
<li>The second release candidate for FreeBSD 10.3 is now available for testing</li>
<li>Notable changes include:

<ul>
<li>Import an upstream fix for ‘zfs send -i’ to avoid data corruption in specific instances</li>
<li>Boot loaders and kernel have been taught to handle ELF sections of type SHT_AMD64_UNWIND. This does not really apply to FreeBSD 10.3, but is required for 11.0, so will make upgrades easier</li>
<li>Various mkdb commands (/etc/services, /etc/login.conf, etc) commands now use fsync() instead of opening the files as O_SYNC, greatly increasing the speed of the database generation</li>
</ul></li>
<li>From the earlier BETA3, the VFS improvements that were causing ZFS hangs, and the new ‘tryforward’ routing code, have been reverted</li>
<li>Work is ongoing to fix these issues for FreeBSD 11.0</li>
<li>There are two open issues:

<ul>
<li>A fix for OpenSSH CVE-2016-3115 has not be included yet</li>
<li>the re-addition of AES-CBC ciphers to the default server proposal list. AES-CBC was removed as part of the update to OpenSSH version 7.1p2, but the plan is to re-add it, specifically for lightweight clients who rely on hardware crypto offload to have acceptable SSH performance</li>
</ul></li>
<li>Please go out and test
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=2378.0" rel="nofollow">OPNsense 16.1.6 released</a></h3>

<ul>
<li>A new point-release of OPNsense has dropped, and apart from the usual security updates, some new features have been included</li>
</ul>

<blockquote>
<ul>
<li>firmware: bootstrap utility can now directly install e.g. the development version</li>
<li>dhcp: all GUI pages have been reworked for a polished look and feel</li>
<li>proxy: added category-based remote file support if compressed file contains multiple files</li>
<li>proxy: added ICAP support (contributed by Fabian Franz)</li>
<li>proxy: hook up the transparent FTP proxy</li>
<li>proxy: add intercept on IPv6 for FTP and HTTP proxy options</li>
<li>logging: syslog facilities, like services, are now fully pluggable</li>
<li>vpn: stripped an invalid PPTP server configuration from the standard configuration</li>
<li>vpn: converted to pluggable syslog, menu and ACL</li>
<li>dyndns: all GUI pages have been reworked for a polished look and feel</li>
<li>dyndns: widget now shows IPv6 entries too</li>
<li>dns forwarder: all GUI pages have been reworked for a polished look and feel</li>
<li>dns resolver: all GUI pages have been reworked for a polished look and feel</li>
<li>dns resolver: rewrote the dhcp lease registration hooks</li>
<li>dns resolver: allow parallel operation on non-standard port when dns forwarder is running as well</li>
<li>firewall: hide outbound nat rule input for &quot;interface address&quot; option and toggle bitmask correctly</li>
<li>interfaces: fix problem when VLAN tags weren&#39;t generated properly</li>
<li>interfaces: improve interface capability reconfigure</li>
<li>ipsec: fix service restart behaviour from GUI</li>
<li>captive portal: add missing chain in certificate generation</li>
<li>configd: improve recovery and reload behaviour</li>
<li>load balancer: reordered menu entries for clarity</li>
<li>ntp: reordered menu entries for clarity</li>
<li>traffic shaper: fix mismatch for direction + dual interfaces setup</li>
<li>languages: updated German and French</li>
</ul>
</blockquote>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-arch/2016-March/017719.html" rel="nofollow">Call for testing - ASLR patch</a></h3>

<ul>
<li>A patch that provides a first pass implementation of basic ASLR (Address Space Layout Randomization) for FreeBSD has been posted to the mailing list</li>
<li>“Stack gap, W<sup>X,</sup> shared page randomization, KASLR and other techniques are explicitly out of scope of this work.”</li>
<li>“ASLR is enabled on per-ABI basis, and currently it is only enabled on native i386 and amd64 (including compat 32bit) ABIs.  I expect to test and enable ASLR for armv6 and arm64 as well, later”</li>
<li>“Thanks to Oliver Pinter and Shawn Webb of the HardenedBSD project for pursuing ASLR for FreeBSD.  Although this work is not based on theirs, it was inspired by their efforts.”
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20Z81SPq3" rel="nofollow"> Daniel - OpenZFS</a> </li>
<li><a href="http://slexy.org/view/s2be4zDkG6" rel="nofollow"> Florian - JBODS</a> </li>
<li><a href="http://slexy.org/view/s2o0MijCFy" rel="nofollow"> Hunter - SSL on DO</a> </li>
<li><a href="http://slexy.org/view/s2fXlOwdU7" rel="nofollow"> Ben - Backups</a> </li>
<li><a href="http://slexy.org/view/s2weBPb8sx" rel="nofollow"> Damian - Bug’in Me!</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>132: Scaling up with BSD</title>
  <link>https://www.bsdnow.tv/132</link>
  <guid isPermaLink="false">f3d59dae-8eeb-40fd-8450-504566ad449e</guid>
  <pubDate>Tue, 08 Mar 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f3d59dae-8eeb-40fd-8450-504566ad449e.mp3" length="46636852" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, Allan and I are away at AsiaBSDCon! (If you aren’t there, you are missing out). We will be back with a live episode next week. However, we’ve been asked for Allan to tell us about ScaleEngine’s</itunes:subtitle>
  <itunes:duration>1:04:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, Allan and I are away at AsiaBSDCon! (If you aren’t there, you are missing out). We will be back with a live episode next week. However, we’ve been asked for Allan to tell us about ScaleEngine’s&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Allan Jude - &lt;a href="mailto:allanjude@freebsd.org" target="_blank" rel="nofollow noopener"&gt;allanjude@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/allanjude" target="_blank" rel="nofollow noopener"&gt;@allanjude&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Spotlight on ScaleEngine
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/ebijun/NetBSD/blob/master/dmesg/earmv6hf/RPI0" target="_blank" rel="nofollow noopener"&gt;NetBSD on an RPi Zero&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-February/228608.html" target="_blank" rel="nofollow noopener"&gt;DragonFly tips for printing with CUPS&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://opnsense.org/fighting-fraudulent-networks-using-secure-connections-ssl-with-opnsense/" target="_blank" rel="nofollow noopener"&gt;Fighting fraudulent networks using secure connections (SSL) blacklisting with OPNsense. Blocks known-bad certificates as listed at abuse.ch &lt;br&gt;
&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://imil.net/blog/2016/01/29/netbsdamd64-7-0-kvm/" target="_blank" rel="nofollow noopener"&gt;Fix for running NetBSD/amd64 7.0 on kvm based virtual machines&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2537" target="_blank" rel="nofollow noopener"&gt;Michael W. Lucas’s new book, FreeBSD Mastery: Specialty Filesystems is now escaping&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2534" target="_blank" rel="nofollow noopener"&gt;The Penguicon Lucas Tech Track&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.unixmen.com/freebsd-nginx-ffmpeg-camera-recording-and-live-streaming/" target="_blank" rel="nofollow noopener"&gt;FreeBSD based nginx/ffmpeg camera recording and live streaming&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/iXsystems/ixbuild/" target="_blank" rel="nofollow noopener"&gt;CFT: New Jenkins Builder for FreeNAS / PC-BSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/pcbsd/sysadm/" target="_blank" rel="nofollow noopener"&gt;Status Update: PC-BSD’s SysAdm Server&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/pcbsd/sysadm-ui-qt" target="_blank" rel="nofollow noopener"&gt;Status Update: PC-BSD’s SysAdm Client UI&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, Allan and I are away at AsiaBSDCon! (If you aren’t there, you are missing out). We will be back with a live episode next week. However, we’ve been asked for Allan to tell us about ScaleEngine’s</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Allan Jude - <a href="mailto:allanjude@freebsd.org" rel="nofollow">allanjude@freebsd.org</a> / <a href="https://twitter.com/allanjude" rel="nofollow">@allanjude</a></h2>

<ul>
<li>Spotlight on ScaleEngine
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://github.com/ebijun/NetBSD/blob/master/dmesg/earmv6hf/RPI0" rel="nofollow">NetBSD on an RPi Zero</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-February/228608.html" rel="nofollow">DragonFly tips for printing with CUPS</a> </p></li>
<li><p><a href="https://opnsense.org/fighting-fraudulent-networks-using-secure-connections-ssl-with-opnsense/" rel="nofollow">Fighting fraudulent networks using secure connections (SSL) blacklisting with OPNsense. Blocks known-bad certificates as listed at abuse.ch <br>
</a> </p></li>
<li><p><a href="https://imil.net/blog/2016/01/29/netbsdamd64-7-0-kvm/" rel="nofollow">Fix for running NetBSD/amd64 7.0 on kvm based virtual machines</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2537" rel="nofollow">Michael W. Lucas’s new book, FreeBSD Mastery: Specialty Filesystems is now escaping</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2534" rel="nofollow">The Penguicon Lucas Tech Track</a> </p></li>
<li><p><a href="http://www.unixmen.com/freebsd-nginx-ffmpeg-camera-recording-and-live-streaming/" rel="nofollow">FreeBSD based nginx/ffmpeg camera recording and live streaming</a> </p></li>
<li><p><a href="https://github.com/iXsystems/ixbuild/" rel="nofollow">CFT: New Jenkins Builder for FreeNAS / PC-BSD</a> </p></li>
<li><p><a href="https://github.com/pcbsd/sysadm/" rel="nofollow">Status Update: PC-BSD’s SysAdm Server</a></p></li>
<li><p><a href="https://github.com/pcbsd/sysadm-ui-qt" rel="nofollow">Status Update: PC-BSD’s SysAdm Client UI</a> </p></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, Allan and I are away at AsiaBSDCon! (If you aren’t there, you are missing out). We will be back with a live episode next week. However, we’ve been asked for Allan to tell us about ScaleEngine’s</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Allan Jude - <a href="mailto:allanjude@freebsd.org" rel="nofollow">allanjude@freebsd.org</a> / <a href="https://twitter.com/allanjude" rel="nofollow">@allanjude</a></h2>

<ul>
<li>Spotlight on ScaleEngine
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://github.com/ebijun/NetBSD/blob/master/dmesg/earmv6hf/RPI0" rel="nofollow">NetBSD on an RPi Zero</a> </p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-February/228608.html" rel="nofollow">DragonFly tips for printing with CUPS</a> </p></li>
<li><p><a href="https://opnsense.org/fighting-fraudulent-networks-using-secure-connections-ssl-with-opnsense/" rel="nofollow">Fighting fraudulent networks using secure connections (SSL) blacklisting with OPNsense. Blocks known-bad certificates as listed at abuse.ch <br>
</a> </p></li>
<li><p><a href="https://imil.net/blog/2016/01/29/netbsdamd64-7-0-kvm/" rel="nofollow">Fix for running NetBSD/amd64 7.0 on kvm based virtual machines</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2537" rel="nofollow">Michael W. Lucas’s new book, FreeBSD Mastery: Specialty Filesystems is now escaping</a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2534" rel="nofollow">The Penguicon Lucas Tech Track</a> </p></li>
<li><p><a href="http://www.unixmen.com/freebsd-nginx-ffmpeg-camera-recording-and-live-streaming/" rel="nofollow">FreeBSD based nginx/ffmpeg camera recording and live streaming</a> </p></li>
<li><p><a href="https://github.com/iXsystems/ixbuild/" rel="nofollow">CFT: New Jenkins Builder for FreeNAS / PC-BSD</a> </p></li>
<li><p><a href="https://github.com/pcbsd/sysadm/" rel="nofollow">Status Update: PC-BSD’s SysAdm Server</a></p></li>
<li><p><a href="https://github.com/pcbsd/sysadm-ui-qt" rel="nofollow">Status Update: PC-BSD’s SysAdm Client UI</a> </p></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>131: BSD behind the chalkboard</title>
  <link>https://www.bsdnow.tv/131</link>
  <guid isPermaLink="false">f302f270-36ec-4244-b701-fb8213e2f134</guid>
  <pubDate>Wed, 02 Mar 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f302f270-36ec-4244-b701-fb8213e2f134.mp3" length="72833908" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we have an interview with Jamie</itunes:subtitle>
  <itunes:duration>1:41:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we have an interview with Jamie&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdcan.org/2016/list-of-talks.txt" target="_blank" rel="nofollow noopener"&gt;BSDCan 2016 List of Talks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We are all looking forward to BSDCan&lt;/li&gt;
&lt;li&gt;Make sure you arrive in time for the Goat BoF, the evening of Tuesday June 7th at the Royal Oak, just up the street from the university residence&lt;/li&gt;
&lt;li&gt;There will also be a ZFS BoF during lunch of one of the conference days, be sure to grab your lunch and bring it to the BoF room&lt;/li&gt;
&lt;li&gt;Also, don’t forget to get signed up for the various DevSummits taking place at BSDCan. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ManyLoadAveragesOfUnix" target="_blank" rel="nofollow noopener"&gt;What does Load Average really mean&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Chris Siebenmann, a sysadmin at the University of Toronto, does some comparison of what “Load Average” means on different unix systems, including Solaris/IllumOS, FreeBSD, NetBSD, OpenBSD, and Linux&lt;/li&gt;
&lt;li&gt;It seems that no two OSes use the same definition, so comparing load averages is impossible&lt;/li&gt;
&lt;li&gt;On FreeBSD, where I/O does not affect load average, you can divide the load average by the number of CPU cores to be able to compare across machines with different core counts
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sfconservancy.org/blog/2016/feb/25/zfs-and-linux/" target="_blank" rel="nofollow noopener"&gt;GPL violations related to combining ZFS and Linux&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As we mentioned in last week’s episode, Ubuntu was preparing to release their next version with native ZFS support. + As expected, the Software Freedom Conservancy has issued a statement detailing the legal argument why they believe this is a violation of the GPL license for the Linux kernel.&lt;/li&gt;
&lt;li&gt;It’s a pretty long and complete article, but we wanted to bring you the summary of the whole, and encourage you to read the rest, since it’s good to be knowledgeable about the various open-source projects and their license conditions.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “We are sympathetic to Canonical's frustration in this desire to easily support more features for their users. However, as set out below, we have concluded that their distribution of zfs.ko violates the GPL. We have written this statement to answer, from the point of view of many key Linux copyright holders, the community questions that we've seen on this matter. Specifically, we provide our detailed analysis of the incompatibility between CDDLv1 and GPLv2 — and its potential impact on the trajectory of free software development — below. &lt;/p&gt;

&lt;p&gt;&amp;gt; However, our conclusion is simple: Conservancy and the Linux copyright holders in the GPL Compliance Project for Linux Developers believe that distribution of ZFS binaries is a GPL violation and infringes Linux's copyright. We are also concerned that it may infringe Oracle's copyrights in ZFS. As such, we again ask Oracle to respect community norms against license proliferation and simply relicense its copyrights in ZFS under a GPLv2-compatible license.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://softwarefreedom.org/resources/2016/linux-kernel-cddl.html" target="_blank" rel="nofollow noopener"&gt;The Software Freedom Law Center’s take on the issue &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.hansenpartnership.com/are-gplv2-and-cddl-incompatible/" target="_blank" rel="nofollow noopener"&gt;Linux SCSI subsystem Maintainer, James Bottomley, asks “where is the harm”&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://freebsdfoundation.blogspot.ca/2016/02/freebsd-and-zfs.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD and ZFS &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.phoronix.com/scan.php?page=news_item&amp;amp;px=DragonFlyBSD-i915-4.2" target="_blank" rel="nofollow noopener"&gt;DragonFly i915 reaches Linux 4.2 &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The port of the Intel i915 DRM/KMS Linux driver to DragonFlyBSD has been updated to match Linux kernel 4.2&lt;/li&gt;
&lt;li&gt;Various improvements and better support for new hardware are included&lt;/li&gt;
&lt;li&gt;One big difference, is that DragonFlyBSD will not require the binary firmware blob that Linux does&lt;/li&gt;
&lt;li&gt;François Tigeot explains: "starting from Linux 4.2, a separate firmware blob is required to save and restore the state of display engines in some low-power modes. These low-power modes have been forcibly disabled in the DragonFly version of this driver in order to keep it blob-free."&lt;/li&gt;
&lt;li&gt;Obviously this will have some disadvantage, but as those modes were never available on DragonFlyBSD before, users are not likely to miss them
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jamie McParland - &lt;a href="mailto:mcparlandj@newberg.k12.or.us" target="_blank" rel="nofollow noopener"&gt;mcparlandj@newberg.k12.or.us&lt;/a&gt; / &lt;a href="https://twitter.com/nsdjamie" target="_blank" rel="nofollow noopener"&gt;@nsdjamie&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD behind the chalkboard
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.reddit.com/r/LinuxActionShow/comments/48c9nt/my_new_ixsystems_mail_server/" target="_blank" rel="nofollow noopener"&gt;My New IXSystems Mail Server&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.gufi.org/2016/02/15/elk-first-part/" target="_blank" rel="nofollow noopener"&gt;Installing ELK on FreeBSD, Tutorial Part 1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Are you an ELK user, or interested in becoming one? If so, Gruppo Utenti has a nice blog post / tutorial on how to get started with it on FreeBSD.&lt;/li&gt;
&lt;li&gt;Maybe you haven’t heard of ELK, but its not the ELK in ports, specifically in this case he is referring to “ElasticSearch/Logstash/Kibana” as a stack.&lt;/li&gt;
&lt;li&gt;Getting started is relatively simply, first we install a few ports/packages:

&lt;ul&gt;
&lt;li&gt;textproc/elasticsearch&lt;/li&gt;
&lt;li&gt;sysutils/logstash&lt;/li&gt;
&lt;li&gt;textproc/kibana43&lt;/li&gt;
&lt;li&gt;www/nginx&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;After enabling the various services for those (hint: sysrc may be easier), he then takes us through the configuration of ElasticSearch and LogStash. For the most part they are fairly straightforward, but you can always copy and paste his example config files as a template.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://blog.gufi.org/2016/02/23/elk-second-part/" target="_blank" rel="nofollow noopener"&gt;Follow up to Installing ELK on FreeBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Jumping directly into the next blog entry, he then takes us through the “K” part of ELK, specifically setting up Kibana, and exposing it via nginx publically. &lt;/li&gt;
&lt;li&gt;At this point most of the CLI work is finished, and we have a great walkthrough of doing the Kibana configuration via their UI. We are still awaiting the final entry to the series, where the setup of ElastAlert will be detailed, and we will bring that to your attention when it lands. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz.pdf" target="_blank" rel="nofollow noopener"&gt;From 1989: An Empirical Study of the Reliablity of Unix Utilities&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A paper from 1989 on the results of fuzz testing various unix utilities across a range of available unix operating systems&lt;/li&gt;
&lt;li&gt;Very interesting results, it is interesting to look back at before the start of the modern BSD projects&lt;/li&gt;
&lt;li&gt;New problems are still being found in utilities using similar testing methodologies, like afl (American Fuzzy lop)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Google Summer of Code&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Both 
&lt;a href="https://summerofcode.withgoogle.com/organizations/4892834293350400/" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;and 
&lt;a href="https://summerofcode.withgoogle.com/organizations/6246531984261120/" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Are running 2016 Google Summer of Code projects.&lt;/li&gt;
&lt;li&gt;Students can start submitting proposals on March 14th.&lt;/li&gt;
&lt;li&gt;In the meantime, if you have any ideas, please post them to the 
&lt;a href="https://wiki.freebsd.org/SummerOfCodeIdeas" target="_blank" rel="nofollow noopener"&gt;Summer Of Code Ideas Page &lt;/a&gt; on the FreeBSD wiki&lt;/li&gt;
&lt;li&gt;Students can start looking at the list now and try to find mentors to get a jump start on their project.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-February/459424.html" target="_blank" rel="nofollow noopener"&gt;High Availablity Sync for ipfw3 in Dragonfly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Similar to pfsync, this new protocol allows firewall dynamic rules (state) to be synchronized between two firewalls that are working together in HA with CARP&lt;/li&gt;
&lt;li&gt;Does not yet sync NAT state, it seems libalias will need some modernization first&lt;/li&gt;
&lt;li&gt;Apparently it will be relatively easy to port to FreeBSD&lt;/li&gt;
&lt;li&gt;This is one of the only features ipfw lacks when compared to pf
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-February/084238.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.3-BETA3 Now Available&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160301141941&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;LibreSSL isnt affected by the OpenSSL DROWN attack&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/02/29/msg000703.html" target="_blank" rel="nofollow noopener"&gt;NetBSD machines at the Open Source Conference 2016 in Toyko&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://marc.info/?l=openbsd-ports-cvs&amp;amp;m=145650279825695&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD removes Linux Emulation&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://queue.acm.org/detail.cfm?id=2878574" target="_blank" rel="nofollow noopener"&gt;Time is an illusion - George Neville-Neil&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.openssh.com/txt/release-7.2" target="_blank" rel="nofollow noopener"&gt;OpenSSH 7.2 Released&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2qCKWWKv0" target="_blank" rel="nofollow noopener"&gt; Shane - IPSEC&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20CP3ty5P" target="_blank" rel="nofollow noopener"&gt; Darrall - 14TB Zpool&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2qp7K9KBG" target="_blank" rel="nofollow noopener"&gt; Pedja - ZFS setup&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we have an interview with Jamie</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.bsdcan.org/2016/list-of-talks.txt" rel="nofollow">BSDCan 2016 List of Talks</a></h3>

<ul>
<li>We are all looking forward to BSDCan</li>
<li>Make sure you arrive in time for the Goat BoF, the evening of Tuesday June 7th at the Royal Oak, just up the street from the university residence</li>
<li>There will also be a ZFS BoF during lunch of one of the conference days, be sure to grab your lunch and bring it to the BoF room</li>
<li>Also, don’t forget to get signed up for the various DevSummits taking place at BSDCan. 
***</li>
</ul>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ManyLoadAveragesOfUnix" rel="nofollow">What does Load Average really mean</a></h3>

<ul>
<li>Chris Siebenmann, a sysadmin at the University of Toronto, does some comparison of what “Load Average” means on different unix systems, including Solaris/IllumOS, FreeBSD, NetBSD, OpenBSD, and Linux</li>
<li>It seems that no two OSes use the same definition, so comparing load averages is impossible</li>
<li>On FreeBSD, where I/O does not affect load average, you can divide the load average by the number of CPU cores to be able to compare across machines with different core counts
***</li>
</ul>

<h3><a href="http://sfconservancy.org/blog/2016/feb/25/zfs-and-linux/" rel="nofollow">GPL violations related to combining ZFS and Linux</a></h3>

<ul>
<li>As we mentioned in last week’s episode, Ubuntu was preparing to release their next version with native ZFS support. + As expected, the Software Freedom Conservancy has issued a statement detailing the legal argument why they believe this is a violation of the GPL license for the Linux kernel.</li>
<li>It’s a pretty long and complete article, but we wanted to bring you the summary of the whole, and encourage you to read the rest, since it’s good to be knowledgeable about the various open-source projects and their license conditions.</li>
</ul>

<blockquote>
<p>“We are sympathetic to Canonical&#39;s frustration in this desire to easily support more features for their users. However, as set out below, we have concluded that their distribution of zfs.ko violates the GPL. We have written this statement to answer, from the point of view of many key Linux copyright holders, the community questions that we&#39;ve seen on this matter. Specifically, we provide our detailed analysis of the incompatibility between CDDLv1 and GPLv2 — and its potential impact on the trajectory of free software development — below. </p>

<p>However, our conclusion is simple: Conservancy and the Linux copyright holders in the GPL Compliance Project for Linux Developers believe that distribution of ZFS binaries is a GPL violation and infringes Linux&#39;s copyright. We are also concerned that it may infringe Oracle&#39;s copyrights in ZFS. As such, we again ask Oracle to respect community norms against license proliferation and simply relicense its copyrights in ZFS under a GPLv2-compatible license.”</p>
</blockquote>

<ul>
<li><a href="https://softwarefreedom.org/resources/2016/linux-kernel-cddl.html" rel="nofollow">The Software Freedom Law Center’s take on the issue </a></li>
<li><a href="http://blog.hansenpartnership.com/are-gplv2-and-cddl-incompatible/" rel="nofollow">Linux SCSI subsystem Maintainer, James Bottomley, asks “where is the harm”</a></li>
<li><a href="http://freebsdfoundation.blogspot.ca/2016/02/freebsd-and-zfs.html" rel="nofollow">FreeBSD and ZFS </a> 
***</li>
</ul>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-i915-4.2" rel="nofollow">DragonFly i915 reaches Linux 4.2 </a></h3>

<ul>
<li>The port of the Intel i915 DRM/KMS Linux driver to DragonFlyBSD has been updated to match Linux kernel 4.2</li>
<li>Various improvements and better support for new hardware are included</li>
<li>One big difference, is that DragonFlyBSD will not require the binary firmware blob that Linux does</li>
<li>François Tigeot explains: &quot;starting from Linux 4.2, a separate firmware blob is required to save and restore the state of display engines in some low-power modes. These low-power modes have been forcibly disabled in the DragonFly version of this driver in order to keep it blob-free.&quot;</li>
<li>Obviously this will have some disadvantage, but as those modes were never available on DragonFlyBSD before, users are not likely to miss them
***</li>
</ul>

<h2>Interview - Jamie McParland - <a href="mailto:mcparlandj@newberg.k12.or.us" rel="nofollow">mcparlandj@newberg.k12.or.us</a> / <a href="https://twitter.com/nsdjamie" rel="nofollow">@nsdjamie</a></h2>

<ul>
<li>FreeBSD behind the chalkboard
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.reddit.com/r/LinuxActionShow/comments/48c9nt/my_new_ixsystems_mail_server/" rel="nofollow">My New IXSystems Mail Server</a></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://blog.gufi.org/2016/02/15/elk-first-part/" rel="nofollow">Installing ELK on FreeBSD, Tutorial Part 1</a></h3>

<ul>
<li>Are you an ELK user, or interested in becoming one? If so, Gruppo Utenti has a nice blog post / tutorial on how to get started with it on FreeBSD.</li>
<li>Maybe you haven’t heard of ELK, but its not the ELK in ports, specifically in this case he is referring to “ElasticSearch/Logstash/Kibana” as a stack.</li>
<li>Getting started is relatively simply, first we install a few ports/packages:

<ul>
<li>textproc/elasticsearch</li>
<li>sysutils/logstash</li>
<li>textproc/kibana43</li>
<li>www/nginx</li>
</ul></li>
<li>After enabling the various services for those (hint: sysrc may be easier), he then takes us through the configuration of ElasticSearch and LogStash. For the most part they are fairly straightforward, but you can always copy and paste his example config files as a template.</li>
<li><a href="https://blog.gufi.org/2016/02/23/elk-second-part/" rel="nofollow">Follow up to Installing ELK on FreeBSD</a> </li>
<li>Jumping directly into the next blog entry, he then takes us through the “K” part of ELK, specifically setting up Kibana, and exposing it via nginx publically. </li>
<li>At this point most of the CLI work is finished, and we have a great walkthrough of doing the Kibana configuration via their UI. We are still awaiting the final entry to the series, where the setup of ElastAlert will be detailed, and we will bring that to your attention when it lands. 
***</li>
</ul>

<h3><a href="http://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz.pdf" rel="nofollow">From 1989: An Empirical Study of the Reliablity of Unix Utilities</a></h3>

<ul>
<li>A paper from 1989 on the results of fuzz testing various unix utilities across a range of available unix operating systems</li>
<li>Very interesting results, it is interesting to look back at before the start of the modern BSD projects</li>
<li>New problems are still being found in utilities using similar testing methodologies, like afl (American Fuzzy lop)
***</li>
</ul>

<h3>Google Summer of Code</h3>

<ul>
<li>Both 
<a href="https://summerofcode.withgoogle.com/organizations/4892834293350400/" rel="nofollow">FreeBSD</a></li>
<li>and 
<a href="https://summerofcode.withgoogle.com/organizations/6246531984261120/" rel="nofollow">NetBSD</a></li>
<li>Are running 2016 Google Summer of Code projects.</li>
<li>Students can start submitting proposals on March 14th.</li>
<li>In the meantime, if you have any ideas, please post them to the 
<a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">Summer Of Code Ideas Page </a> on the FreeBSD wiki</li>
<li>Students can start looking at the list now and try to find mentors to get a jump start on their project.
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-February/459424.html" rel="nofollow">High Availablity Sync for ipfw3 in Dragonfly</a></h3>

<ul>
<li>Similar to pfsync, this new protocol allows firewall dynamic rules (state) to be synchronized between two firewalls that are working together in HA with CARP</li>
<li>Does not yet sync NAT state, it seems libalias will need some modernization first</li>
<li>Apparently it will be relatively easy to port to FreeBSD</li>
<li>This is one of the only features ipfw lacks when compared to pf
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-February/084238.html" rel="nofollow">FreeBSD 10.3-BETA3 Now Available</a> </p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160301141941&mode=expanded" rel="nofollow">LibreSSL isnt affected by the OpenSSL DROWN attack</a> </p></li>
<li><p><a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/02/29/msg000703.html" rel="nofollow">NetBSD machines at the Open Source Conference 2016 in Toyko</a> </p></li>
<li><p><a href="https://marc.info/?l=openbsd-ports-cvs&m=145650279825695&w=2" rel="nofollow">OpenBSD removes Linux Emulation</a></p></li>
<li><p><a href="https://queue.acm.org/detail.cfm?id=2878574" rel="nofollow">Time is an illusion - George Neville-Neil</a></p></li>
<li><p><a href="http://www.openssh.com/txt/release-7.2" rel="nofollow">OpenSSH 7.2 Released</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2qCKWWKv0" rel="nofollow"> Shane - IPSEC</a> </li>
<li><a href="http://slexy.org/view/s20CP3ty5P" rel="nofollow"> Darrall - 14TB Zpool</a> </li>
<li><a href="http://slexy.org/view/s2qp7K9KBG" rel="nofollow"> Pedja - ZFS setup</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we have an interview with Jamie</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.bsdcan.org/2016/list-of-talks.txt" rel="nofollow">BSDCan 2016 List of Talks</a></h3>

<ul>
<li>We are all looking forward to BSDCan</li>
<li>Make sure you arrive in time for the Goat BoF, the evening of Tuesday June 7th at the Royal Oak, just up the street from the university residence</li>
<li>There will also be a ZFS BoF during lunch of one of the conference days, be sure to grab your lunch and bring it to the BoF room</li>
<li>Also, don’t forget to get signed up for the various DevSummits taking place at BSDCan. 
***</li>
</ul>

<h3><a href="https://utcc.utoronto.ca/%7Ecks/space/blog/unix/ManyLoadAveragesOfUnix" rel="nofollow">What does Load Average really mean</a></h3>

<ul>
<li>Chris Siebenmann, a sysadmin at the University of Toronto, does some comparison of what “Load Average” means on different unix systems, including Solaris/IllumOS, FreeBSD, NetBSD, OpenBSD, and Linux</li>
<li>It seems that no two OSes use the same definition, so comparing load averages is impossible</li>
<li>On FreeBSD, where I/O does not affect load average, you can divide the load average by the number of CPU cores to be able to compare across machines with different core counts
***</li>
</ul>

<h3><a href="http://sfconservancy.org/blog/2016/feb/25/zfs-and-linux/" rel="nofollow">GPL violations related to combining ZFS and Linux</a></h3>

<ul>
<li>As we mentioned in last week’s episode, Ubuntu was preparing to release their next version with native ZFS support. + As expected, the Software Freedom Conservancy has issued a statement detailing the legal argument why they believe this is a violation of the GPL license for the Linux kernel.</li>
<li>It’s a pretty long and complete article, but we wanted to bring you the summary of the whole, and encourage you to read the rest, since it’s good to be knowledgeable about the various open-source projects and their license conditions.</li>
</ul>

<blockquote>
<p>“We are sympathetic to Canonical&#39;s frustration in this desire to easily support more features for their users. However, as set out below, we have concluded that their distribution of zfs.ko violates the GPL. We have written this statement to answer, from the point of view of many key Linux copyright holders, the community questions that we&#39;ve seen on this matter. Specifically, we provide our detailed analysis of the incompatibility between CDDLv1 and GPLv2 — and its potential impact on the trajectory of free software development — below. </p>

<p>However, our conclusion is simple: Conservancy and the Linux copyright holders in the GPL Compliance Project for Linux Developers believe that distribution of ZFS binaries is a GPL violation and infringes Linux&#39;s copyright. We are also concerned that it may infringe Oracle&#39;s copyrights in ZFS. As such, we again ask Oracle to respect community norms against license proliferation and simply relicense its copyrights in ZFS under a GPLv2-compatible license.”</p>
</blockquote>

<ul>
<li><a href="https://softwarefreedom.org/resources/2016/linux-kernel-cddl.html" rel="nofollow">The Software Freedom Law Center’s take on the issue </a></li>
<li><a href="http://blog.hansenpartnership.com/are-gplv2-and-cddl-incompatible/" rel="nofollow">Linux SCSI subsystem Maintainer, James Bottomley, asks “where is the harm”</a></li>
<li><a href="http://freebsdfoundation.blogspot.ca/2016/02/freebsd-and-zfs.html" rel="nofollow">FreeBSD and ZFS </a> 
***</li>
</ul>

<h3><a href="https://www.phoronix.com/scan.php?page=news_item&px=DragonFlyBSD-i915-4.2" rel="nofollow">DragonFly i915 reaches Linux 4.2 </a></h3>

<ul>
<li>The port of the Intel i915 DRM/KMS Linux driver to DragonFlyBSD has been updated to match Linux kernel 4.2</li>
<li>Various improvements and better support for new hardware are included</li>
<li>One big difference, is that DragonFlyBSD will not require the binary firmware blob that Linux does</li>
<li>François Tigeot explains: &quot;starting from Linux 4.2, a separate firmware blob is required to save and restore the state of display engines in some low-power modes. These low-power modes have been forcibly disabled in the DragonFly version of this driver in order to keep it blob-free.&quot;</li>
<li>Obviously this will have some disadvantage, but as those modes were never available on DragonFlyBSD before, users are not likely to miss them
***</li>
</ul>

<h2>Interview - Jamie McParland - <a href="mailto:mcparlandj@newberg.k12.or.us" rel="nofollow">mcparlandj@newberg.k12.or.us</a> / <a href="https://twitter.com/nsdjamie" rel="nofollow">@nsdjamie</a></h2>

<ul>
<li>FreeBSD behind the chalkboard
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.reddit.com/r/LinuxActionShow/comments/48c9nt/my_new_ixsystems_mail_server/" rel="nofollow">My New IXSystems Mail Server</a></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://blog.gufi.org/2016/02/15/elk-first-part/" rel="nofollow">Installing ELK on FreeBSD, Tutorial Part 1</a></h3>

<ul>
<li>Are you an ELK user, or interested in becoming one? If so, Gruppo Utenti has a nice blog post / tutorial on how to get started with it on FreeBSD.</li>
<li>Maybe you haven’t heard of ELK, but its not the ELK in ports, specifically in this case he is referring to “ElasticSearch/Logstash/Kibana” as a stack.</li>
<li>Getting started is relatively simply, first we install a few ports/packages:

<ul>
<li>textproc/elasticsearch</li>
<li>sysutils/logstash</li>
<li>textproc/kibana43</li>
<li>www/nginx</li>
</ul></li>
<li>After enabling the various services for those (hint: sysrc may be easier), he then takes us through the configuration of ElasticSearch and LogStash. For the most part they are fairly straightforward, but you can always copy and paste his example config files as a template.</li>
<li><a href="https://blog.gufi.org/2016/02/23/elk-second-part/" rel="nofollow">Follow up to Installing ELK on FreeBSD</a> </li>
<li>Jumping directly into the next blog entry, he then takes us through the “K” part of ELK, specifically setting up Kibana, and exposing it via nginx publically. </li>
<li>At this point most of the CLI work is finished, and we have a great walkthrough of doing the Kibana configuration via their UI. We are still awaiting the final entry to the series, where the setup of ElastAlert will be detailed, and we will bring that to your attention when it lands. 
***</li>
</ul>

<h3><a href="http://ftp.cs.wisc.edu/paradyn/technical_papers/fuzz.pdf" rel="nofollow">From 1989: An Empirical Study of the Reliablity of Unix Utilities</a></h3>

<ul>
<li>A paper from 1989 on the results of fuzz testing various unix utilities across a range of available unix operating systems</li>
<li>Very interesting results, it is interesting to look back at before the start of the modern BSD projects</li>
<li>New problems are still being found in utilities using similar testing methodologies, like afl (American Fuzzy lop)
***</li>
</ul>

<h3>Google Summer of Code</h3>

<ul>
<li>Both 
<a href="https://summerofcode.withgoogle.com/organizations/4892834293350400/" rel="nofollow">FreeBSD</a></li>
<li>and 
<a href="https://summerofcode.withgoogle.com/organizations/6246531984261120/" rel="nofollow">NetBSD</a></li>
<li>Are running 2016 Google Summer of Code projects.</li>
<li>Students can start submitting proposals on March 14th.</li>
<li>In the meantime, if you have any ideas, please post them to the 
<a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">Summer Of Code Ideas Page </a> on the FreeBSD wiki</li>
<li>Students can start looking at the list now and try to find mentors to get a jump start on their project.
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-February/459424.html" rel="nofollow">High Availablity Sync for ipfw3 in Dragonfly</a></h3>

<ul>
<li>Similar to pfsync, this new protocol allows firewall dynamic rules (state) to be synchronized between two firewalls that are working together in HA with CARP</li>
<li>Does not yet sync NAT state, it seems libalias will need some modernization first</li>
<li>Apparently it will be relatively easy to port to FreeBSD</li>
<li>This is one of the only features ipfw lacks when compared to pf
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2016-February/084238.html" rel="nofollow">FreeBSD 10.3-BETA3 Now Available</a> </p></li>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20160301141941&mode=expanded" rel="nofollow">LibreSSL isnt affected by the OpenSSL DROWN attack</a> </p></li>
<li><p><a href="http://mail-index.netbsd.org/netbsd-advocacy/2016/02/29/msg000703.html" rel="nofollow">NetBSD machines at the Open Source Conference 2016 in Toyko</a> </p></li>
<li><p><a href="https://marc.info/?l=openbsd-ports-cvs&m=145650279825695&w=2" rel="nofollow">OpenBSD removes Linux Emulation</a></p></li>
<li><p><a href="https://queue.acm.org/detail.cfm?id=2878574" rel="nofollow">Time is an illusion - George Neville-Neil</a></p></li>
<li><p><a href="http://www.openssh.com/txt/release-7.2" rel="nofollow">OpenSSH 7.2 Released</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2qCKWWKv0" rel="nofollow"> Shane - IPSEC</a> </li>
<li><a href="http://slexy.org/view/s20CP3ty5P" rel="nofollow"> Darrall - 14TB Zpool</a> </li>
<li><a href="http://slexy.org/view/s2qp7K9KBG" rel="nofollow"> Pedja - ZFS setup</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>130: Store all the Things | BSD Now 130</title>
  <link>https://www.bsdnow.tv/130</link>
  <guid isPermaLink="false">361b50a5-0039-4457-a81d-8501d6d3e588</guid>
  <pubDate>Wed, 24 Feb 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/361b50a5-0039-4457-a81d-8501d6d3e588.mp3" length="93656020" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, Allan is back from the Storage Summit in Silicon Valley! We are going to get his thoughts on how the conference went, plus bring you the latest ZFS info discussed. That plus the usual BSD news is</itunes:subtitle>
  <itunes:duration>2:10:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, Allan is back from the Storage Summit in Silicon Valley! We are going to get his thoughts on how the conference went, plus bring you the latest ZFS info discussed. That plus the usual BSD news is&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.theregister.co.uk/2016/02/21/openbsd_website_operator_patch_now_for_the_sake_of_your_sanity/?mt=1456206806399" target="_blank" rel="nofollow noopener"&gt;OpenBSD website operators urged to fix mind-alteringly bad bug&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We start off a bit light-hearted this week, with the important, breaking news that &lt;em&gt;finally&lt;/em&gt; a long-standing OpenBSD bug has been addressed for the HTTP daemon.&lt;/li&gt;
&lt;li&gt;Specifically? It changes the default 404 page fonts away from Comic Sans, to a bit more crowd-pleasing alternative:

&lt;ul&gt;
&lt;li&gt;“For some reason the httpd status pages (e.g. 404) use the Comic Sans typeface. This patch removes comic sans and sets the typeface to the default sans-serif typeface of the client.&lt;/li&gt;
&lt;li&gt;“This lowers the number of people contacting website maintainers with typeface complaints bordering on harassment”.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Operators running HTTPD are highly encouraged to update their systems to the latest code, right now……... No seriously, we are waiting for you. Get it done now and then we’ll continue with the show.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://2016.asiabsdcon.org/registration/?lang=en" target="_blank" rel="nofollow noopener"&gt;Registration for AsiaBSDCon 2016 is now open + Talk Schedule&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After a few delays, the registration for AsiaBSDCon has now opened!&lt;/li&gt;
&lt;li&gt;The conference starts in less than two weeks! now, so be sure to get signed up ASAP.&lt;/li&gt;
&lt;li&gt;In addition the schedule has been posted, and here’s some of the highlights of this year’s conference.&lt;/li&gt;
&lt;li&gt;In addition to FreeBSD and NetBSD dev summits on the first two days, we have some excellent tutorials being given this year by Kirk, Gnn, Dru and more! (&lt;a href="https://2016.asiabsdcon.org/program.html.en" target="_blank" rel="nofollow noopener"&gt;https://2016.asiabsdcon.org/program.html.en&lt;/a&gt;) &lt;/li&gt;
&lt;li&gt;The regular paper talks also have lots of good ones this year, including this crazy encrypted boot loader one given by our very own Allan Jude!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.d2-si.fr/2016/02/15/openbsd-on-aws/?hn" target="_blank" rel="nofollow noopener"&gt;OPENBSD ON AWS : AN UNEXPECTED JOURNEY&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a blog post from Antoine Jacoutot, talking about the process of getting OpenBSD up and running in AWS&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;It starts with his process of creating an AMI from scratch, which ended up not being that bad:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;create and loopback-mount a raw image containing a UFS filesystem extract the OpenBSD base sets (which are just regular tarballs) and kernel enable console output (so that one could “aws ec2 get-console-output”)&lt;/li&gt;
&lt;li&gt;install the boot loader on the image then use the ec2 tools to import the RAW image to S3, convert it into a volume (ec2-import-volume) which we can snapshot (ec2-create-snapshot) and create an AMI from (ec2-register)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The blog post also has a link to a script which automates this process, so don’t be daunted if you didn’t quite follow all of that. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Thanks to the recently landed DomU support, the final pieces of the puzzle fell into place, allowing OpenBSD to function as a proper guest (with networking!)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Next it details the process of injecting a public SSH key into the instances for instant remote access. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;An ec2-init.sh script was created (also on github) which does the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;setting the hostname&lt;/li&gt;
&lt;li&gt;installing the provided SSH public key to /root/.ssh/authorized_keys&lt;/li&gt;
&lt;li&gt;executing user-data (if it starts with a shebang)&lt;/li&gt;
&lt;li&gt;displaying the host SSH fingerprints on the console (to match cloud-init)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;With that done, OpenBSD is pretty much AWS ready! He then gives a brief walkthrough of setting up nginx for new users, but if you’ve already done this before then the instance is ready for you to hacking on.&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/SummerOfCodeIdeas" target="_blank" rel="nofollow noopener"&gt;Start thinking of ideas for things with FreeBSD for Google's 2016 Summer of Code&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Students and Developers, listen up! It’s time to start thinking about GSoC again, and FreeBSD is looking to update its project ideas page.&lt;/li&gt;
&lt;li&gt;There’s some good ones on the list, plus ones that should be pruned (such as GELI boot), but now is the time to start adding new ones before we get too deep into the process.&lt;/li&gt;
&lt;li&gt;This goes for the other BSD’s as well, start thinking about your proposals, or if you are developer, which projects would be a good fit for mentoring.&lt;/li&gt;
&lt;li&gt;(Improving the Linux Compat layer is one I think should be done!)
&lt;a href="https://wiki.freebsd.org/Graphics/Getting%20started%20with%20kernel%20projects" target="_blank" rel="nofollow noopener"&gt;Guide to getting started with kernel hacking&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;One of the things that’s been asked frequently is how to contribute towards the efforts to bring updated DRM / X drivers to the FreeBSD kernel. &lt;/li&gt;
&lt;li&gt;Jean-Sébastien Pédron has started a great guide on the Wiki which details how to get started with the porting effort, and that developers need not be afraid of helping.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Storage Summit Roundup&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Earlier this week a number of developers from FreeBSD, as well as various vendors that use FreeBSD, or provide products used with FreeBSD met for a &lt;a href="https://wiki.freebsd.org/201602StorageSummit" target="_blank" rel="nofollow noopener"&gt;Storage Summit&lt;/a&gt;, to discuss the 
future of these technologies&lt;/li&gt;
&lt;li&gt;The summit was co-located with the USENIX FAST (Filesystems And Storage Technologies) conference&lt;/li&gt;
&lt;li&gt;The summit was sponsored by the FreeBSD Foundation and FlightAware&lt;/li&gt;
&lt;li&gt;After a short introduction, the event opened with a Networking Synergy panel&lt;/li&gt;
&lt;li&gt;The focus of this panel was to see if there were techniques and lessons learned in improving the networking stack over the last 10 years that could be applied to improving the storage stack&lt;/li&gt;
&lt;li&gt;A lot of time was spent discussing issues like multi-queue support, CPU scheduling, and ways to modernize the stack&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://wiki.freebsd.org/201602StorageSummit/CAM" target="_blank" rel="nofollow noopener"&gt;CAM Scheduling &amp;amp; Locking Revamp&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;No notes posted&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://wiki.freebsd.org/201602StorageSummit/UserSpace" target="_blank" rel="nofollow noopener"&gt;User Space Storage Stack&lt;/a&gt;

&lt;ul&gt;
&lt;li&gt;One of the user space storage stacks discussed was Diskmap&lt;/li&gt;
&lt;li&gt;Like netmap, but for disks (diskmap)&lt;/li&gt;
&lt;li&gt;Kernel bypass for accessing disks&lt;/li&gt;
&lt;li&gt;Ilias Marinos, who is working on diskmap at Cambridge University, described diskmap to the group&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;A design discussion then followed in which the memory management was covered as that's an issue for any sort of "IO" map system

&lt;ul&gt;
&lt;li&gt;Action Items:&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Discuss with Luigi the idea of code merges&lt;/li&gt;
&lt;li&gt;Need a reset path API&lt;/li&gt;
&lt;li&gt;Kernel buffer mapping for reliability&lt;/li&gt;
&lt;li&gt;Support for other interfaces (SATA/SCSI)&lt;/li&gt;
&lt;li&gt;GEOM layer adaptation&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://wiki.freebsd.org/201602StorageSummit/NewStorageTechnologies" target="_blank" rel="nofollow noopener"&gt;Adapting to New Storage Technologies&lt;/a&gt; 

&lt;ul&gt;
&lt;li&gt;This working group was led by Adrian Palmer, from Seagate&lt;/li&gt;
&lt;li&gt;SMR&lt;/li&gt;
&lt;li&gt;Persistent Memory&lt;/li&gt;
&lt;li&gt;Session 1: Device Identification and the structural requirements

&lt;ul&gt;
&lt;li&gt;Agenda: We'll look over the Identification nuances and what needs to change to support the structure. Support for IO order guarantees, forward-write only requirements, new commands and topology. Dig into CAM and GEOM layers. Solutions should be fast and have as few code paths as possible&lt;/li&gt;
&lt;li&gt;Results: Small audience. We talked about zoned characteristics, and how it can be used in various workloads, projected to be implemented in years&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Session 2: Information dissemination and consumption

&lt;ul&gt;
&lt;li&gt;Agenda: Where and how will information from the report_zones command be gathered, stored, combined and used. This will include userspace storage and multi-volume management. Will CAM store this data, or will GEOM? How frequently will this need to be queried/updated/verified from the drive?&lt;/li&gt;
&lt;li&gt;Results: Merged with ZFS working group to discuss SMR. Came up with idea that could be implemented as circular buffer zone type. Began to discuss solutions among developers&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://wiki.freebsd.org/201602StorageSummit/ZFS" target="_blank" rel="nofollow noopener"&gt;ZFS&lt;/a&gt; 

&lt;ul&gt;
&lt;li&gt;During the first session we discussed how to improve dedup support
    + A dedup throttle or cap was discussed. When the size of the DDT grows beyond this size, new entries would not be deduped.

&lt;ul&gt;
&lt;li&gt;An alternative to this was also discussed, where when the DDT reached the cap size, it would remove a random entry with only a single reference from the DDT to make room for the new entry. When a block is going to be freed, if it is not found in the DDT, it is assumed to have only 1 reference, and removed.&lt;/li&gt;
&lt;li&gt;There was also discussion of replacing the DDT with an in-memory hash table and a “log” of increment/decrement operations, that is periodically compacted. The hash table is recreated from the log at pool import time. This would reduce the in-memory footprint of the DDT, as well as speed up all write operations as adding an entry to the dedup log will be less expensive than updating the DDT.&lt;/li&gt;
&lt;li&gt;There was also discussion of using dedicated device(s) for the DDT, either using the DDT on SSD work by Nexenta, or the Metadata Classes work by Intel&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The first session also discussed Secure Delete and related things

&lt;ul&gt;
&lt;li&gt;The desire for an implementation of TRIM that uses the “secure erase” functionality provided by some disks was expressed&lt;/li&gt;
&lt;li&gt;Overwriting sectors with patterns of garbage may be insufficient because SSDs may internally remap where a specific LBA physically resides&lt;/li&gt;
&lt;li&gt;The possibility of using something like the “eager zero” feature to periodically write zeros over all free blocks in the pool to erase any lingering data fragments&lt;/li&gt;
&lt;li&gt;Problems with the FreeBSD TRIM implementation were discussed, as well as looking at ways to implement the new ZFS TRIM implementation on FreeBSD&lt;/li&gt;
&lt;li&gt;ABD (ARC Buf Data) was discussed, a new design that lessens the requirement for contiguous memory. Only a small area of contiguous blocks is reserved at boot, and compressed ARC blocks are constructed of scatter-gather lists of individual pages&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The second session combined with the SMR group and talked about SMR support in ZFS

&lt;ul&gt;
&lt;li&gt;Later in the second session ZFS Encryption was also discussed, mostly with a focus on what the use cases are&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The third session combined all of the groups for an overview of upcoming ZFS features including device removal and channel programs&lt;/li&gt;
&lt;li&gt;There was also a request for code review, for mostly finished projects like Persistent L2ARC, Writeback cache, and Large dnode support&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Hallway Track

&lt;ul&gt;
&lt;li&gt;ZFS / VFS Interaction&lt;/li&gt;
&lt;li&gt;Adrian Palmer has been a FreeBSD hobbyist since FreeBSD 7, and I think I managed to convince him to start contributing
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-back-to-unix.html" target="_blank" rel="nofollow noopener"&gt;One Week with NetBSD 7.0: Back to Unix basics&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The author of this blog series is sending a week using NetBSD 7.0, following a previous series on Solaris 10&lt;/li&gt;
&lt;li&gt;“This is actually familiar territory, as I've been using BSD variants almost exclusively since 2006. My recent SunOS explorations were triggered last summer by OpenBSD having choked on my current laptop's NVIDIA card, and from what I could see at the time, FreeBSD had the same problem, although I now know NVIDIA drivers exist for that system. The thing that keeps me from going all-in with FreeBSD 10.x, however, is the fact that Firefox crashes and leaves "core dump" messages in its wake, and I'm just not a Chrome kinda guy.”&lt;/li&gt;
&lt;li&gt;“For those with a catholic taste in Unix, NetBSD is a keg party at the Vatican. If you're an absolute Unix beginner, or have been living on Ubuntu-based Linux distros for too long, then you may feel stranded at first by NetBSD's sparseness. You'll find yourself staring into the abyss and seeing only a blinking cursor staring back. If you have the presence of mind to type startx, you'll be greeted by twm, a window manager offering little more than an xterm window with the same blinking cursor until you learn how to configure the .twmrc file to include whatever applications you want or need in the right-click menu.”&lt;/li&gt;
&lt;li&gt;“As for NetBSD itself, I can't think of any major productivity applications that can't be installed, and most multimedia stuff works fine.”&lt;/li&gt;
&lt;li&gt;Issues the author hopes to sort out in later posts:

&lt;ul&gt;
&lt;li&gt;Audio playback (youtube videos in Firefox)&lt;/li&gt;
&lt;li&gt;Wireless&lt;/li&gt;
&lt;li&gt;Flash&lt;/li&gt;
&lt;li&gt;Digital Camera SD Card readability, video playback&lt;/li&gt;
&lt;li&gt;Audacity&lt;/li&gt;
&lt;li&gt;A “fancy” desktop like Gnome 2, KDE, or xfce&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;In a &lt;a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-libreoffice.html" target="_blank" rel="nofollow noopener"&gt;follow-up post&lt;/a&gt;, the author got LibreOffice installed and sorted out the audio issues they were having&lt;/li&gt;
&lt;li&gt;In a &lt;a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-mixed-review-of.html" target="_blank" rel="nofollow noopener"&gt;later follow-up&lt;/a&gt; XFCE is up and running as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.dustinkirkland.com/2016/02/zfs-is-fs-for-containers-in-ubuntu-1604.html" target="_blank" rel="nofollow noopener"&gt;ZFS is for Containers in Ubuntu 16.04&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As you may have heard, Ubuntu 16.04 will include ZFS -- baked directly into Ubuntu -- supported by Canonical&lt;/li&gt;
&lt;li&gt;“ZFS one of the most beloved features of Solaris, universally coveted by every Linux sysadmin with a Solaris background.  To our delight, we're happy to make to OpenZFS available on every Ubuntu system.”&lt;/li&gt;
&lt;li&gt;What does “supported by Canonical” mean?&lt;/li&gt;
&lt;li&gt;“You'll find zfs.ko automatically built and installed on your Ubuntu systems.  No more DKMS-built modules”&lt;/li&gt;
&lt;li&gt;“The user space zfsutils-linux package will be included in Ubuntu Main, with security updates provided by Canonical”&lt;/li&gt;
&lt;li&gt;The article then provides a quick tutorial for setting up Linux Containers (LXC) backed by ZFS&lt;/li&gt;
&lt;li&gt;In the example, ZFS is backed by a file on the existing disk, not by a real disk, and with no redundancy&lt;/li&gt;
&lt;li&gt;However, the setup script seems to support using real block devices&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://sfconservancy.org/" target="_blank" rel="nofollow noopener"&gt;Software Freedom Conservancy&lt;/a&gt; is expected to issue a statement detailing their opinion on the legalities and licensing issues of bundling ZFS with Linux.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hypatia.software/2016/01/29/polling-is-a-hack-server-sent-events-eventsource-with-gevent-flask-nginx-and-freebsd/" target="_blank" rel="nofollow noopener"&gt;Polling is a Hack: Server Sent Events (EventSource) with gevent, Flask, nginx, and FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A tutorial on setting up ‘Server-Sent Events’, also know as EventSource in javascript, to notify website clients of new data, rather than having the javascript constantly poll for new data.&lt;/li&gt;
&lt;li&gt;The setup uses FreeBSD, nginx, gevent, Python, and the Flask framework&lt;/li&gt;
&lt;li&gt;The tutorial walks through setting a basic Python application using the Flask framework&lt;/li&gt;
&lt;li&gt;Then setting up the client side in Javascript&lt;/li&gt;
&lt;li&gt;Then for the server side setup, it covers installing and configuring nginx, and py-supervisor on FreeBSD&lt;/li&gt;
&lt;li&gt;The tutorial also includes links to additional resources and examples, including how to rate limit the Flash application
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.aikchar.me/blog/why-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Why FreeBSD?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An excellent article written by Hamza Sheikh, discussing why FreeBSD is now his clear choice for learning UNIX.&lt;/li&gt;
&lt;li&gt;The article is pretty well written and lengthy, but has some great parts which we wanted to share with you:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There were many rough edges in the Linux world and some of them exist even today. Choosing the right distribution (distro) for the task at hand is always the first and most difficult decision to make. While this is a strength of the Linux community it is also its weakness. This is exacerbated with the toxic infighting within the community in the last few years.&lt;/p&gt;

&lt;p&gt;A herd of voices believes it is their right to bring down a distro community because it is not like their distro of choice. Forking upstream projects has somehow become taboo. Hurling abuse in mailing lists is acceptable. Helping new users is limited to lambasting their distro of choice. Creating conspiracy theories over software decisions is the way to go. Copyleft zealots roam social media declaring non-copyleft free software heretic abominations. It all boils down to an ecosystem soured by the presence of maniacs who have the loudest voices and they seem to be everywhere you turn.&lt;/p&gt;

&lt;p&gt;Where is the engineering among all this noise? Btrfs - baking for a long time - is still nowhere near ZFS in stability or feature parity. systemd is an insatiable entity that feeds on every idea in sight and just devours indiscriminately. Wayland was promised years ago and its time has yet to arrive. Containers are represented by Docker that neither securely contains applications nor makes them easy to manage in production. Firewalling is dithering between firewalld, nftables, etc. SystemTap cannot match DTrace.&lt;/p&gt;

&lt;p&gt;In the same time span what do various BSDs offer? pf, CARP, ZFS, Hammer, OpenSSH, jails, pkgsrc, (software) ports, DTrace, hardware portability; just to name a few. Few would deny that BSDs have delivered great engineering with free software licenses to the entire world. To me they appear to be better flag bearers of free software with engineering to back it.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He then goes through some of the various BSD’s and the specifics on why FreeBSD was the logical choice for his situation. But at the end has a great summary on the community as a whole:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Finally - and maybe repeating myself here - I have nothing but praise for the community. Be it BSD Now, mailing lists, Reddit, Twitter, LFNW, or SeaGL, people have encouraged me, answered my questions, and filed bugs for me. I have been welcomed and made a part of the community with open arms. These reasons are (good) enough for me to use FreeBSD and contribute to it.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;BeastieBits&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://opnsense.org/opnsense-16-1-3-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 16.1.3 released&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/Savagedlight/status/700001944547491842" target="_blank" rel="nofollow noopener"&gt;Copies of "FreeBSD Mastery: Specialty Filesystems" seen in the wild&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.netgate.com/training/" target="_blank" rel="nofollow noopener"&gt;pfsense training available in Europe&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/ibara/LiteBSD-Ports" target="_blank" rel="nofollow noopener"&gt;LiteBSD now has 50 ports in its ports tree&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://marc.info/?l=openbsd-ports&amp;amp;m=145615281431064&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Ports tree locked for OpenBSD 5.9&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2556" target="_blank" rel="nofollow noopener"&gt;“FreeBSD Filesystem Fun” at March semibug&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://oshug.org/event/46" target="_blank" rel="nofollow noopener"&gt;Event #46 — Embedded Platforms (BSD, OpenWRT, Plan 9 &amp;amp; Inferno)&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;Feedback/Questions&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21lcCKrSB" target="_blank" rel="nofollow noopener"&gt;Frank - ZFS RAM?&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s204lxjvlq" target="_blank" rel="nofollow noopener"&gt;David - ARM Porting&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2xMiSNLYn" target="_blank" rel="nofollow noopener"&gt; Johnny - Lumina Default?&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s214gJbLwD" target="_blank" rel="nofollow noopener"&gt; Adam - PC-BSD Install and Q’s&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20UNyzEeh" target="_blank" rel="nofollow noopener"&gt; Jeremy - Video Card Q&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, storage, summit, ZFS, news, AsiaBSDCon, Podcast ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, Allan is back from the Storage Summit in Silicon Valley! We are going to get his thoughts on how the conference went, plus bring you the latest ZFS info discussed. That plus the usual BSD news is</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.theregister.co.uk/2016/02/21/openbsd_website_operator_patch_now_for_the_sake_of_your_sanity/?mt=1456206806399" rel="nofollow">OpenBSD website operators urged to fix mind-alteringly bad bug</a></h3>

<ul>
<li>We start off a bit light-hearted this week, with the important, breaking news that <em>finally</em> a long-standing OpenBSD bug has been addressed for the HTTP daemon.</li>
<li>Specifically? It changes the default 404 page fonts away from Comic Sans, to a bit more crowd-pleasing alternative:

<ul>
<li>“For some reason the httpd status pages (e.g. 404) use the Comic Sans typeface. This patch removes comic sans and sets the typeface to the default sans-serif typeface of the client.</li>
<li>“This lowers the number of people contacting website maintainers with typeface complaints bordering on harassment”.</li>
</ul></li>
<li>Operators running HTTPD are highly encouraged to update their systems to the latest code, right now……... No seriously, we are waiting for you. Get it done now and then we’ll continue with the show.</li>
</ul>

<hr>

<h3><a href="https://2016.asiabsdcon.org/registration/?lang=en" rel="nofollow">Registration for AsiaBSDCon 2016 is now open + Talk Schedule</a></h3>

<ul>
<li>After a few delays, the registration for AsiaBSDCon has now opened!</li>
<li>The conference starts in less than two weeks! now, so be sure to get signed up ASAP.</li>
<li>In addition the schedule has been posted, and here’s some of the highlights of this year’s conference.</li>
<li>In addition to FreeBSD and NetBSD dev summits on the first two days, we have some excellent tutorials being given this year by Kirk, Gnn, Dru and more! (<a href="https://2016.asiabsdcon.org/program.html.en" rel="nofollow">https://2016.asiabsdcon.org/program.html.en</a>) </li>
<li>The regular paper talks also have lots of good ones this year, including this crazy encrypted boot loader one given by our very own Allan Jude!
***</li>
</ul>

<h3><a href="http://blog.d2-si.fr/2016/02/15/openbsd-on-aws/?hn" rel="nofollow">OPENBSD ON AWS : AN UNEXPECTED JOURNEY</a></h3>

<ul>
<li>We have a blog post from Antoine Jacoutot, talking about the process of getting OpenBSD up and running in AWS</li>
<li><p>It starts with his process of creating an AMI from scratch, which ended up not being that bad:</p>

<ul>
<li>create and loopback-mount a raw image containing a UFS filesystem extract the OpenBSD base sets (which are just regular tarballs) and kernel enable console output (so that one could “aws ec2 get-console-output”)</li>
<li>install the boot loader on the image then use the ec2 tools to import the RAW image to S3, convert it into a volume (ec2-import-volume) which we can snapshot (ec2-create-snapshot) and create an AMI from (ec2-register)</li>
</ul></li>
<li><p>The blog post also has a link to a script which automates this process, so don’t be daunted if you didn’t quite follow all of that. </p></li>
<li><p>Thanks to the recently landed DomU support, the final pieces of the puzzle fell into place, allowing OpenBSD to function as a proper guest (with networking!)</p></li>
<li><p>Next it details the process of injecting a public SSH key into the instances for instant remote access. </p></li>
<li><p>An ec2-init.sh script was created (also on github) which does the following:</p>

<ul>
<li>setting the hostname</li>
<li>installing the provided SSH public key to /root/.ssh/authorized_keys</li>
<li>executing user-data (if it starts with a shebang)</li>
<li>displaying the host SSH fingerprints on the console (to match cloud-init)</li>
</ul></li>
<li><p>With that done, OpenBSD is pretty much AWS ready! He then gives a brief walkthrough of setting up nginx for new users, but if you’ve already done this before then the instance is ready for you to hacking on.</p>

<hr></li>
</ul>

<h3><a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">Start thinking of ideas for things with FreeBSD for Google&#39;s 2016 Summer of Code</a></h3>

<ul>
<li>Students and Developers, listen up! It’s time to start thinking about GSoC again, and FreeBSD is looking to update its project ideas page.</li>
<li>There’s some good ones on the list, plus ones that should be pruned (such as GELI boot), but now is the time to start adding new ones before we get too deep into the process.</li>
<li>This goes for the other BSD’s as well, start thinking about your proposals, or if you are developer, which projects would be a good fit for mentoring.</li>
<li>(Improving the Linux Compat layer is one I think should be done!)
<a href="https://wiki.freebsd.org/Graphics/Getting%20started%20with%20kernel%20projects" rel="nofollow">Guide to getting started with kernel hacking</a> </li>
<li>One of the things that’s been asked frequently is how to contribute towards the efforts to bring updated DRM / X drivers to the FreeBSD kernel. </li>
<li>Jean-Sébastien Pédron has started a great guide on the Wiki which details how to get started with the porting effort, and that developers need not be afraid of helping.
***</li>
</ul>

<h3>Storage Summit Roundup</h3>

<ul>
<li>Earlier this week a number of developers from FreeBSD, as well as various vendors that use FreeBSD, or provide products used with FreeBSD met for a <a href="https://wiki.freebsd.org/201602StorageSummit" rel="nofollow">Storage Summit</a>, to discuss the 
future of these technologies</li>
<li>The summit was co-located with the USENIX FAST (Filesystems And Storage Technologies) conference</li>
<li>The summit was sponsored by the FreeBSD Foundation and FlightAware</li>
<li>After a short introduction, the event opened with a Networking Synergy panel</li>
<li>The focus of this panel was to see if there were techniques and lessons learned in improving the networking stack over the last 10 years that could be applied to improving the storage stack</li>
<li>A lot of time was spent discussing issues like multi-queue support, CPU scheduling, and ways to modernize the stack</li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/CAM" rel="nofollow">CAM Scheduling &amp; Locking Revamp</a>

<ul>
<li>No notes posted</li>
</ul></li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/UserSpace" rel="nofollow">User Space Storage Stack</a>

<ul>
<li>One of the user space storage stacks discussed was Diskmap</li>
<li>Like netmap, but for disks (diskmap)</li>
<li>Kernel bypass for accessing disks</li>
<li>Ilias Marinos, who is working on diskmap at Cambridge University, described diskmap to the group</li>
</ul></li>
<li>A design discussion then followed in which the memory management was covered as that&#39;s an issue for any sort of &quot;IO&quot; map system

<ul>
<li>Action Items:</li>
</ul></li>
<li>Discuss with Luigi the idea of code merges</li>
<li>Need a reset path API</li>
<li>Kernel buffer mapping for reliability</li>
<li>Support for other interfaces (SATA/SCSI)</li>
<li>GEOM layer adaptation</li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/NewStorageTechnologies" rel="nofollow">Adapting to New Storage Technologies</a> 

<ul>
<li>This working group was led by Adrian Palmer, from Seagate</li>
<li>SMR</li>
<li>Persistent Memory</li>
<li>Session 1: Device Identification and the structural requirements

<ul>
<li>Agenda: We&#39;ll look over the Identification nuances and what needs to change to support the structure. Support for IO order guarantees, forward-write only requirements, new commands and topology. Dig into CAM and GEOM layers. Solutions should be fast and have as few code paths as possible</li>
<li>Results: Small audience. We talked about zoned characteristics, and how it can be used in various workloads, projected to be implemented in years</li>
</ul></li>
<li>Session 2: Information dissemination and consumption

<ul>
<li>Agenda: Where and how will information from the report_zones command be gathered, stored, combined and used. This will include userspace storage and multi-volume management. Will CAM store this data, or will GEOM? How frequently will this need to be queried/updated/verified from the drive?</li>
<li>Results: Merged with ZFS working group to discuss SMR. Came up with idea that could be implemented as circular buffer zone type. Began to discuss solutions among developers</li>
</ul></li>
</ul></li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/ZFS" rel="nofollow">ZFS</a> 

<ul>
<li>During the first session we discussed how to improve dedup support
    + A dedup throttle or cap was discussed. When the size of the DDT grows beyond this size, new entries would not be deduped.

<ul>
<li>An alternative to this was also discussed, where when the DDT reached the cap size, it would remove a random entry with only a single reference from the DDT to make room for the new entry. When a block is going to be freed, if it is not found in the DDT, it is assumed to have only 1 reference, and removed.</li>
<li>There was also discussion of replacing the DDT with an in-memory hash table and a “log” of increment/decrement operations, that is periodically compacted. The hash table is recreated from the log at pool import time. This would reduce the in-memory footprint of the DDT, as well as speed up all write operations as adding an entry to the dedup log will be less expensive than updating the DDT.</li>
<li>There was also discussion of using dedicated device(s) for the DDT, either using the DDT on SSD work by Nexenta, or the Metadata Classes work by Intel</li>
</ul></li>
<li>The first session also discussed Secure Delete and related things

<ul>
<li>The desire for an implementation of TRIM that uses the “secure erase” functionality provided by some disks was expressed</li>
<li>Overwriting sectors with patterns of garbage may be insufficient because SSDs may internally remap where a specific LBA physically resides</li>
<li>The possibility of using something like the “eager zero” feature to periodically write zeros over all free blocks in the pool to erase any lingering data fragments</li>
<li>Problems with the FreeBSD TRIM implementation were discussed, as well as looking at ways to implement the new ZFS TRIM implementation on FreeBSD</li>
<li>ABD (ARC Buf Data) was discussed, a new design that lessens the requirement for contiguous memory. Only a small area of contiguous blocks is reserved at boot, and compressed ARC blocks are constructed of scatter-gather lists of individual pages</li>
</ul></li>
<li>The second session combined with the SMR group and talked about SMR support in ZFS

<ul>
<li>Later in the second session ZFS Encryption was also discussed, mostly with a focus on what the use cases are</li>
</ul></li>
<li>The third session combined all of the groups for an overview of upcoming ZFS features including device removal and channel programs</li>
<li>There was also a request for code review, for mostly finished projects like Persistent L2ARC, Writeback cache, and Large dnode support</li>
</ul></li>
<li>Hallway Track

<ul>
<li>ZFS / VFS Interaction</li>
<li>Adrian Palmer has been a FreeBSD hobbyist since FreeBSD 7, and I think I managed to convince him to start contributing
***</li>
</ul></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-back-to-unix.html" rel="nofollow">One Week with NetBSD 7.0: Back to Unix basics</a></h3>

<ul>
<li>The author of this blog series is sending a week using NetBSD 7.0, following a previous series on Solaris 10</li>
<li>“This is actually familiar territory, as I&#39;ve been using BSD variants almost exclusively since 2006. My recent SunOS explorations were triggered last summer by OpenBSD having choked on my current laptop&#39;s NVIDIA card, and from what I could see at the time, FreeBSD had the same problem, although I now know NVIDIA drivers exist for that system. The thing that keeps me from going all-in with FreeBSD 10.x, however, is the fact that Firefox crashes and leaves &quot;core dump&quot; messages in its wake, and I&#39;m just not a Chrome kinda guy.”</li>
<li>“For those with a catholic taste in Unix, NetBSD is a keg party at the Vatican. If you&#39;re an absolute Unix beginner, or have been living on Ubuntu-based Linux distros for too long, then you may feel stranded at first by NetBSD&#39;s sparseness. You&#39;ll find yourself staring into the abyss and seeing only a blinking cursor staring back. If you have the presence of mind to type startx, you&#39;ll be greeted by twm, a window manager offering little more than an xterm window with the same blinking cursor until you learn how to configure the .twmrc file to include whatever applications you want or need in the right-click menu.”</li>
<li>“As for NetBSD itself, I can&#39;t think of any major productivity applications that can&#39;t be installed, and most multimedia stuff works fine.”</li>
<li>Issues the author hopes to sort out in later posts:

<ul>
<li>Audio playback (youtube videos in Firefox)</li>
<li>Wireless</li>
<li>Flash</li>
<li>Digital Camera SD Card readability, video playback</li>
<li>Audacity</li>
<li>A “fancy” desktop like Gnome 2, KDE, or xfce</li>
</ul></li>
<li>In a <a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-libreoffice.html" rel="nofollow">follow-up post</a>, the author got LibreOffice installed and sorted out the audio issues they were having</li>
<li>In a <a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-mixed-review-of.html" rel="nofollow">later follow-up</a> XFCE is up and running as well
***</li>
</ul>

<h3><a href="http://blog.dustinkirkland.com/2016/02/zfs-is-fs-for-containers-in-ubuntu-1604.html" rel="nofollow">ZFS is for Containers in Ubuntu 16.04</a></h3>

<ul>
<li>As you may have heard, Ubuntu 16.04 will include ZFS -- baked directly into Ubuntu -- supported by Canonical</li>
<li>“ZFS one of the most beloved features of Solaris, universally coveted by every Linux sysadmin with a Solaris background.  To our delight, we&#39;re happy to make to OpenZFS available on every Ubuntu system.”</li>
<li>What does “supported by Canonical” mean?</li>
<li>“You&#39;ll find zfs.ko automatically built and installed on your Ubuntu systems.  No more DKMS-built modules”</li>
<li>“The user space zfsutils-linux package will be included in Ubuntu Main, with security updates provided by Canonical”</li>
<li>The article then provides a quick tutorial for setting up Linux Containers (LXC) backed by ZFS</li>
<li>In the example, ZFS is backed by a file on the existing disk, not by a real disk, and with no redundancy</li>
<li>However, the setup script seems to support using real block devices</li>
<li>The <a href="https://sfconservancy.org/" rel="nofollow">Software Freedom Conservancy</a> is expected to issue a statement detailing their opinion on the legalities and licensing issues of bundling ZFS with Linux.
***</li>
</ul>

<h3><a href="http://hypatia.software/2016/01/29/polling-is-a-hack-server-sent-events-eventsource-with-gevent-flask-nginx-and-freebsd/" rel="nofollow">Polling is a Hack: Server Sent Events (EventSource) with gevent, Flask, nginx, and FreeBSD</a></h3>

<ul>
<li>A tutorial on setting up ‘Server-Sent Events’, also know as EventSource in javascript, to notify website clients of new data, rather than having the javascript constantly poll for new data.</li>
<li>The setup uses FreeBSD, nginx, gevent, Python, and the Flask framework</li>
<li>The tutorial walks through setting a basic Python application using the Flask framework</li>
<li>Then setting up the client side in Javascript</li>
<li>Then for the server side setup, it covers installing and configuring nginx, and py-supervisor on FreeBSD</li>
<li>The tutorial also includes links to additional resources and examples, including how to rate limit the Flash application
***</li>
</ul>

<h3><a href="http://www.aikchar.me/blog/why-freebsd.html" rel="nofollow">Why FreeBSD?</a></h3>

<ul>
<li>An excellent article written by Hamza Sheikh, discussing why FreeBSD is now his clear choice for learning UNIX.</li>
<li>The article is pretty well written and lengthy, but has some great parts which we wanted to share with you:</li>
</ul>

<p>There were many rough edges in the Linux world and some of them exist even today. Choosing the right distribution (distro) for the task at hand is always the first and most difficult decision to make. While this is a strength of the Linux community it is also its weakness. This is exacerbated with the toxic infighting within the community in the last few years.</p>

<p>A herd of voices believes it is their right to bring down a distro community because it is not like their distro of choice. Forking upstream projects has somehow become taboo. Hurling abuse in mailing lists is acceptable. Helping new users is limited to lambasting their distro of choice. Creating conspiracy theories over software decisions is the way to go. Copyleft zealots roam social media declaring non-copyleft free software heretic abominations. It all boils down to an ecosystem soured by the presence of maniacs who have the loudest voices and they seem to be everywhere you turn.</p>

<p>Where is the engineering among all this noise? Btrfs - baking for a long time - is still nowhere near ZFS in stability or feature parity. systemd is an insatiable entity that feeds on every idea in sight and just devours indiscriminately. Wayland was promised years ago and its time has yet to arrive. Containers are represented by Docker that neither securely contains applications nor makes them easy to manage in production. Firewalling is dithering between firewalld, nftables, etc. SystemTap cannot match DTrace.</p>

<p>In the same time span what do various BSDs offer? pf, CARP, ZFS, Hammer, OpenSSH, jails, pkgsrc, (software) ports, DTrace, hardware portability; just to name a few. Few would deny that BSDs have delivered great engineering with free software licenses to the entire world. To me they appear to be better flag bearers of free software with engineering to back it.</p>

<ul>
<li>He then goes through some of the various BSD’s and the specifics on why FreeBSD was the logical choice for his situation. But at the end has a great summary on the community as a whole:</li>
</ul>

<p>Finally - and maybe repeating myself here - I have nothing but praise for the community. Be it BSD Now, mailing lists, Reddit, Twitter, LFNW, or SeaGL, people have encouraged me, answered my questions, and filed bugs for me. I have been welcomed and made a part of the community with open arms. These reasons are (good) enough for me to use FreeBSD and contribute to it.</p>

<hr>

<h3>BeastieBits</h3>

<p><a href="https://opnsense.org/opnsense-16-1-3-released/" rel="nofollow">OPNsense 16.1.3 released</a></p>

<p><a href="https://twitter.com/Savagedlight/status/700001944547491842" rel="nofollow">Copies of &quot;FreeBSD Mastery: Specialty Filesystems&quot; seen in the wild</a> </p>

<p><a href="http://www.netgate.com/training/" rel="nofollow">pfsense training available in Europe</a> </p>

<p><a href="https://github.com/ibara/LiteBSD-Ports" rel="nofollow">LiteBSD now has 50 ports in its ports tree</a> </p>

<p><a href="http://marc.info/?l=openbsd-ports&m=145615281431064&w=2" rel="nofollow">Ports tree locked for OpenBSD 5.9</a></p>

<p><a href="http://blather.michaelwlucas.com/archives/2556" rel="nofollow">“FreeBSD Filesystem Fun” at March semibug</a></p>

<p><a href="http://oshug.org/event/46" rel="nofollow">Event #46 — Embedded Platforms (BSD, OpenWRT, Plan 9 &amp; Inferno)</a> </p>

<hr>

<h3>Feedback/Questions</h3>

<ul>
<li><a href="http://slexy.org/view/s21lcCKrSB" rel="nofollow">Frank - ZFS RAM?</a> </li>
<li><a href="http://slexy.org/view/s204lxjvlq" rel="nofollow">David - ARM Porting</a> </li>
<li><a href="http://slexy.org/view/s2xMiSNLYn" rel="nofollow"> Johnny - Lumina Default?</a> </li>
<li><a href="http://slexy.org/view/s214gJbLwD" rel="nofollow"> Adam - PC-BSD Install and Q’s</a> </li>
<li><a href="http://slexy.org/view/s20UNyzEeh" rel="nofollow"> Jeremy - Video Card Q</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, Allan is back from the Storage Summit in Silicon Valley! We are going to get his thoughts on how the conference went, plus bring you the latest ZFS info discussed. That plus the usual BSD news is</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.theregister.co.uk/2016/02/21/openbsd_website_operator_patch_now_for_the_sake_of_your_sanity/?mt=1456206806399" rel="nofollow">OpenBSD website operators urged to fix mind-alteringly bad bug</a></h3>

<ul>
<li>We start off a bit light-hearted this week, with the important, breaking news that <em>finally</em> a long-standing OpenBSD bug has been addressed for the HTTP daemon.</li>
<li>Specifically? It changes the default 404 page fonts away from Comic Sans, to a bit more crowd-pleasing alternative:

<ul>
<li>“For some reason the httpd status pages (e.g. 404) use the Comic Sans typeface. This patch removes comic sans and sets the typeface to the default sans-serif typeface of the client.</li>
<li>“This lowers the number of people contacting website maintainers with typeface complaints bordering on harassment”.</li>
</ul></li>
<li>Operators running HTTPD are highly encouraged to update their systems to the latest code, right now……... No seriously, we are waiting for you. Get it done now and then we’ll continue with the show.</li>
</ul>

<hr>

<h3><a href="https://2016.asiabsdcon.org/registration/?lang=en" rel="nofollow">Registration for AsiaBSDCon 2016 is now open + Talk Schedule</a></h3>

<ul>
<li>After a few delays, the registration for AsiaBSDCon has now opened!</li>
<li>The conference starts in less than two weeks! now, so be sure to get signed up ASAP.</li>
<li>In addition the schedule has been posted, and here’s some of the highlights of this year’s conference.</li>
<li>In addition to FreeBSD and NetBSD dev summits on the first two days, we have some excellent tutorials being given this year by Kirk, Gnn, Dru and more! (<a href="https://2016.asiabsdcon.org/program.html.en" rel="nofollow">https://2016.asiabsdcon.org/program.html.en</a>) </li>
<li>The regular paper talks also have lots of good ones this year, including this crazy encrypted boot loader one given by our very own Allan Jude!
***</li>
</ul>

<h3><a href="http://blog.d2-si.fr/2016/02/15/openbsd-on-aws/?hn" rel="nofollow">OPENBSD ON AWS : AN UNEXPECTED JOURNEY</a></h3>

<ul>
<li>We have a blog post from Antoine Jacoutot, talking about the process of getting OpenBSD up and running in AWS</li>
<li><p>It starts with his process of creating an AMI from scratch, which ended up not being that bad:</p>

<ul>
<li>create and loopback-mount a raw image containing a UFS filesystem extract the OpenBSD base sets (which are just regular tarballs) and kernel enable console output (so that one could “aws ec2 get-console-output”)</li>
<li>install the boot loader on the image then use the ec2 tools to import the RAW image to S3, convert it into a volume (ec2-import-volume) which we can snapshot (ec2-create-snapshot) and create an AMI from (ec2-register)</li>
</ul></li>
<li><p>The blog post also has a link to a script which automates this process, so don’t be daunted if you didn’t quite follow all of that. </p></li>
<li><p>Thanks to the recently landed DomU support, the final pieces of the puzzle fell into place, allowing OpenBSD to function as a proper guest (with networking!)</p></li>
<li><p>Next it details the process of injecting a public SSH key into the instances for instant remote access. </p></li>
<li><p>An ec2-init.sh script was created (also on github) which does the following:</p>

<ul>
<li>setting the hostname</li>
<li>installing the provided SSH public key to /root/.ssh/authorized_keys</li>
<li>executing user-data (if it starts with a shebang)</li>
<li>displaying the host SSH fingerprints on the console (to match cloud-init)</li>
</ul></li>
<li><p>With that done, OpenBSD is pretty much AWS ready! He then gives a brief walkthrough of setting up nginx for new users, but if you’ve already done this before then the instance is ready for you to hacking on.</p>

<hr></li>
</ul>

<h3><a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">Start thinking of ideas for things with FreeBSD for Google&#39;s 2016 Summer of Code</a></h3>

<ul>
<li>Students and Developers, listen up! It’s time to start thinking about GSoC again, and FreeBSD is looking to update its project ideas page.</li>
<li>There’s some good ones on the list, plus ones that should be pruned (such as GELI boot), but now is the time to start adding new ones before we get too deep into the process.</li>
<li>This goes for the other BSD’s as well, start thinking about your proposals, or if you are developer, which projects would be a good fit for mentoring.</li>
<li>(Improving the Linux Compat layer is one I think should be done!)
<a href="https://wiki.freebsd.org/Graphics/Getting%20started%20with%20kernel%20projects" rel="nofollow">Guide to getting started with kernel hacking</a> </li>
<li>One of the things that’s been asked frequently is how to contribute towards the efforts to bring updated DRM / X drivers to the FreeBSD kernel. </li>
<li>Jean-Sébastien Pédron has started a great guide on the Wiki which details how to get started with the porting effort, and that developers need not be afraid of helping.
***</li>
</ul>

<h3>Storage Summit Roundup</h3>

<ul>
<li>Earlier this week a number of developers from FreeBSD, as well as various vendors that use FreeBSD, or provide products used with FreeBSD met for a <a href="https://wiki.freebsd.org/201602StorageSummit" rel="nofollow">Storage Summit</a>, to discuss the 
future of these technologies</li>
<li>The summit was co-located with the USENIX FAST (Filesystems And Storage Technologies) conference</li>
<li>The summit was sponsored by the FreeBSD Foundation and FlightAware</li>
<li>After a short introduction, the event opened with a Networking Synergy panel</li>
<li>The focus of this panel was to see if there were techniques and lessons learned in improving the networking stack over the last 10 years that could be applied to improving the storage stack</li>
<li>A lot of time was spent discussing issues like multi-queue support, CPU scheduling, and ways to modernize the stack</li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/CAM" rel="nofollow">CAM Scheduling &amp; Locking Revamp</a>

<ul>
<li>No notes posted</li>
</ul></li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/UserSpace" rel="nofollow">User Space Storage Stack</a>

<ul>
<li>One of the user space storage stacks discussed was Diskmap</li>
<li>Like netmap, but for disks (diskmap)</li>
<li>Kernel bypass for accessing disks</li>
<li>Ilias Marinos, who is working on diskmap at Cambridge University, described diskmap to the group</li>
</ul></li>
<li>A design discussion then followed in which the memory management was covered as that&#39;s an issue for any sort of &quot;IO&quot; map system

<ul>
<li>Action Items:</li>
</ul></li>
<li>Discuss with Luigi the idea of code merges</li>
<li>Need a reset path API</li>
<li>Kernel buffer mapping for reliability</li>
<li>Support for other interfaces (SATA/SCSI)</li>
<li>GEOM layer adaptation</li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/NewStorageTechnologies" rel="nofollow">Adapting to New Storage Technologies</a> 

<ul>
<li>This working group was led by Adrian Palmer, from Seagate</li>
<li>SMR</li>
<li>Persistent Memory</li>
<li>Session 1: Device Identification and the structural requirements

<ul>
<li>Agenda: We&#39;ll look over the Identification nuances and what needs to change to support the structure. Support for IO order guarantees, forward-write only requirements, new commands and topology. Dig into CAM and GEOM layers. Solutions should be fast and have as few code paths as possible</li>
<li>Results: Small audience. We talked about zoned characteristics, and how it can be used in various workloads, projected to be implemented in years</li>
</ul></li>
<li>Session 2: Information dissemination and consumption

<ul>
<li>Agenda: Where and how will information from the report_zones command be gathered, stored, combined and used. This will include userspace storage and multi-volume management. Will CAM store this data, or will GEOM? How frequently will this need to be queried/updated/verified from the drive?</li>
<li>Results: Merged with ZFS working group to discuss SMR. Came up with idea that could be implemented as circular buffer zone type. Began to discuss solutions among developers</li>
</ul></li>
</ul></li>
<li><a href="https://wiki.freebsd.org/201602StorageSummit/ZFS" rel="nofollow">ZFS</a> 

<ul>
<li>During the first session we discussed how to improve dedup support
    + A dedup throttle or cap was discussed. When the size of the DDT grows beyond this size, new entries would not be deduped.

<ul>
<li>An alternative to this was also discussed, where when the DDT reached the cap size, it would remove a random entry with only a single reference from the DDT to make room for the new entry. When a block is going to be freed, if it is not found in the DDT, it is assumed to have only 1 reference, and removed.</li>
<li>There was also discussion of replacing the DDT with an in-memory hash table and a “log” of increment/decrement operations, that is periodically compacted. The hash table is recreated from the log at pool import time. This would reduce the in-memory footprint of the DDT, as well as speed up all write operations as adding an entry to the dedup log will be less expensive than updating the DDT.</li>
<li>There was also discussion of using dedicated device(s) for the DDT, either using the DDT on SSD work by Nexenta, or the Metadata Classes work by Intel</li>
</ul></li>
<li>The first session also discussed Secure Delete and related things

<ul>
<li>The desire for an implementation of TRIM that uses the “secure erase” functionality provided by some disks was expressed</li>
<li>Overwriting sectors with patterns of garbage may be insufficient because SSDs may internally remap where a specific LBA physically resides</li>
<li>The possibility of using something like the “eager zero” feature to periodically write zeros over all free blocks in the pool to erase any lingering data fragments</li>
<li>Problems with the FreeBSD TRIM implementation were discussed, as well as looking at ways to implement the new ZFS TRIM implementation on FreeBSD</li>
<li>ABD (ARC Buf Data) was discussed, a new design that lessens the requirement for contiguous memory. Only a small area of contiguous blocks is reserved at boot, and compressed ARC blocks are constructed of scatter-gather lists of individual pages</li>
</ul></li>
<li>The second session combined with the SMR group and talked about SMR support in ZFS

<ul>
<li>Later in the second session ZFS Encryption was also discussed, mostly with a focus on what the use cases are</li>
</ul></li>
<li>The third session combined all of the groups for an overview of upcoming ZFS features including device removal and channel programs</li>
<li>There was also a request for code review, for mostly finished projects like Persistent L2ARC, Writeback cache, and Large dnode support</li>
</ul></li>
<li>Hallway Track

<ul>
<li>ZFS / VFS Interaction</li>
<li>Adrian Palmer has been a FreeBSD hobbyist since FreeBSD 7, and I think I managed to convince him to start contributing
***</li>
</ul></li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-back-to-unix.html" rel="nofollow">One Week with NetBSD 7.0: Back to Unix basics</a></h3>

<ul>
<li>The author of this blog series is sending a week using NetBSD 7.0, following a previous series on Solaris 10</li>
<li>“This is actually familiar territory, as I&#39;ve been using BSD variants almost exclusively since 2006. My recent SunOS explorations were triggered last summer by OpenBSD having choked on my current laptop&#39;s NVIDIA card, and from what I could see at the time, FreeBSD had the same problem, although I now know NVIDIA drivers exist for that system. The thing that keeps me from going all-in with FreeBSD 10.x, however, is the fact that Firefox crashes and leaves &quot;core dump&quot; messages in its wake, and I&#39;m just not a Chrome kinda guy.”</li>
<li>“For those with a catholic taste in Unix, NetBSD is a keg party at the Vatican. If you&#39;re an absolute Unix beginner, or have been living on Ubuntu-based Linux distros for too long, then you may feel stranded at first by NetBSD&#39;s sparseness. You&#39;ll find yourself staring into the abyss and seeing only a blinking cursor staring back. If you have the presence of mind to type startx, you&#39;ll be greeted by twm, a window manager offering little more than an xterm window with the same blinking cursor until you learn how to configure the .twmrc file to include whatever applications you want or need in the right-click menu.”</li>
<li>“As for NetBSD itself, I can&#39;t think of any major productivity applications that can&#39;t be installed, and most multimedia stuff works fine.”</li>
<li>Issues the author hopes to sort out in later posts:

<ul>
<li>Audio playback (youtube videos in Firefox)</li>
<li>Wireless</li>
<li>Flash</li>
<li>Digital Camera SD Card readability, video playback</li>
<li>Audacity</li>
<li>A “fancy” desktop like Gnome 2, KDE, or xfce</li>
</ul></li>
<li>In a <a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-libreoffice.html" rel="nofollow">follow-up post</a>, the author got LibreOffice installed and sorted out the audio issues they were having</li>
<li>In a <a href="http://jamesdeagle.blogspot.com/2016/02/one-week-with-netbsd-70-mixed-review-of.html" rel="nofollow">later follow-up</a> XFCE is up and running as well
***</li>
</ul>

<h3><a href="http://blog.dustinkirkland.com/2016/02/zfs-is-fs-for-containers-in-ubuntu-1604.html" rel="nofollow">ZFS is for Containers in Ubuntu 16.04</a></h3>

<ul>
<li>As you may have heard, Ubuntu 16.04 will include ZFS -- baked directly into Ubuntu -- supported by Canonical</li>
<li>“ZFS one of the most beloved features of Solaris, universally coveted by every Linux sysadmin with a Solaris background.  To our delight, we&#39;re happy to make to OpenZFS available on every Ubuntu system.”</li>
<li>What does “supported by Canonical” mean?</li>
<li>“You&#39;ll find zfs.ko automatically built and installed on your Ubuntu systems.  No more DKMS-built modules”</li>
<li>“The user space zfsutils-linux package will be included in Ubuntu Main, with security updates provided by Canonical”</li>
<li>The article then provides a quick tutorial for setting up Linux Containers (LXC) backed by ZFS</li>
<li>In the example, ZFS is backed by a file on the existing disk, not by a real disk, and with no redundancy</li>
<li>However, the setup script seems to support using real block devices</li>
<li>The <a href="https://sfconservancy.org/" rel="nofollow">Software Freedom Conservancy</a> is expected to issue a statement detailing their opinion on the legalities and licensing issues of bundling ZFS with Linux.
***</li>
</ul>

<h3><a href="http://hypatia.software/2016/01/29/polling-is-a-hack-server-sent-events-eventsource-with-gevent-flask-nginx-and-freebsd/" rel="nofollow">Polling is a Hack: Server Sent Events (EventSource) with gevent, Flask, nginx, and FreeBSD</a></h3>

<ul>
<li>A tutorial on setting up ‘Server-Sent Events’, also know as EventSource in javascript, to notify website clients of new data, rather than having the javascript constantly poll for new data.</li>
<li>The setup uses FreeBSD, nginx, gevent, Python, and the Flask framework</li>
<li>The tutorial walks through setting a basic Python application using the Flask framework</li>
<li>Then setting up the client side in Javascript</li>
<li>Then for the server side setup, it covers installing and configuring nginx, and py-supervisor on FreeBSD</li>
<li>The tutorial also includes links to additional resources and examples, including how to rate limit the Flash application
***</li>
</ul>

<h3><a href="http://www.aikchar.me/blog/why-freebsd.html" rel="nofollow">Why FreeBSD?</a></h3>

<ul>
<li>An excellent article written by Hamza Sheikh, discussing why FreeBSD is now his clear choice for learning UNIX.</li>
<li>The article is pretty well written and lengthy, but has some great parts which we wanted to share with you:</li>
</ul>

<p>There were many rough edges in the Linux world and some of them exist even today. Choosing the right distribution (distro) for the task at hand is always the first and most difficult decision to make. While this is a strength of the Linux community it is also its weakness. This is exacerbated with the toxic infighting within the community in the last few years.</p>

<p>A herd of voices believes it is their right to bring down a distro community because it is not like their distro of choice. Forking upstream projects has somehow become taboo. Hurling abuse in mailing lists is acceptable. Helping new users is limited to lambasting their distro of choice. Creating conspiracy theories over software decisions is the way to go. Copyleft zealots roam social media declaring non-copyleft free software heretic abominations. It all boils down to an ecosystem soured by the presence of maniacs who have the loudest voices and they seem to be everywhere you turn.</p>

<p>Where is the engineering among all this noise? Btrfs - baking for a long time - is still nowhere near ZFS in stability or feature parity. systemd is an insatiable entity that feeds on every idea in sight and just devours indiscriminately. Wayland was promised years ago and its time has yet to arrive. Containers are represented by Docker that neither securely contains applications nor makes them easy to manage in production. Firewalling is dithering between firewalld, nftables, etc. SystemTap cannot match DTrace.</p>

<p>In the same time span what do various BSDs offer? pf, CARP, ZFS, Hammer, OpenSSH, jails, pkgsrc, (software) ports, DTrace, hardware portability; just to name a few. Few would deny that BSDs have delivered great engineering with free software licenses to the entire world. To me they appear to be better flag bearers of free software with engineering to back it.</p>

<ul>
<li>He then goes through some of the various BSD’s and the specifics on why FreeBSD was the logical choice for his situation. But at the end has a great summary on the community as a whole:</li>
</ul>

<p>Finally - and maybe repeating myself here - I have nothing but praise for the community. Be it BSD Now, mailing lists, Reddit, Twitter, LFNW, or SeaGL, people have encouraged me, answered my questions, and filed bugs for me. I have been welcomed and made a part of the community with open arms. These reasons are (good) enough for me to use FreeBSD and contribute to it.</p>

<hr>

<h3>BeastieBits</h3>

<p><a href="https://opnsense.org/opnsense-16-1-3-released/" rel="nofollow">OPNsense 16.1.3 released</a></p>

<p><a href="https://twitter.com/Savagedlight/status/700001944547491842" rel="nofollow">Copies of &quot;FreeBSD Mastery: Specialty Filesystems&quot; seen in the wild</a> </p>

<p><a href="http://www.netgate.com/training/" rel="nofollow">pfsense training available in Europe</a> </p>

<p><a href="https://github.com/ibara/LiteBSD-Ports" rel="nofollow">LiteBSD now has 50 ports in its ports tree</a> </p>

<p><a href="http://marc.info/?l=openbsd-ports&m=145615281431064&w=2" rel="nofollow">Ports tree locked for OpenBSD 5.9</a></p>

<p><a href="http://blather.michaelwlucas.com/archives/2556" rel="nofollow">“FreeBSD Filesystem Fun” at March semibug</a></p>

<p><a href="http://oshug.org/event/46" rel="nofollow">Event #46 — Embedded Platforms (BSD, OpenWRT, Plan 9 &amp; Inferno)</a> </p>

<hr>

<h3>Feedback/Questions</h3>

<ul>
<li><a href="http://slexy.org/view/s21lcCKrSB" rel="nofollow">Frank - ZFS RAM?</a> </li>
<li><a href="http://slexy.org/view/s204lxjvlq" rel="nofollow">David - ARM Porting</a> </li>
<li><a href="http://slexy.org/view/s2xMiSNLYn" rel="nofollow"> Johnny - Lumina Default?</a> </li>
<li><a href="http://slexy.org/view/s214gJbLwD" rel="nofollow"> Adam - PC-BSD Install and Q’s</a> </li>
<li><a href="http://slexy.org/view/s20UNyzEeh" rel="nofollow"> Jeremy - Video Card Q</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>129: Synthesize all the Things!</title>
  <link>https://www.bsdnow.tv/129</link>
  <guid isPermaLink="false">22b2e499-6a84-4015-bb28-fa3a78fb831b</guid>
  <pubDate>Wed, 17 Feb 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/22b2e499-6a84-4015-bb28-fa3a78fb831b.mp3" length="74414164" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we will be talking to John Marino about his work on the ports-mgmt utility “Synth” and the cross-pollination between DragonFly and FreeBSD. That plus the latest news and your email here on</itunes:subtitle>
  <itunes:duration>1:43:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we will be talking to John Marino about his work on the ports-mgmt utility “Synth” and the cross-pollination between DragonFly and FreeBSD. That plus the latest news and your email here on&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.des.no/2016/02/freebsd-and-cve-2015-7547/" target="_blank" rel="nofollow noopener"&gt;glibc and the BSDs &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;You have likely already heard about &lt;a href="https://access.redhat.com/security/cve/cve-2015-7547" target="_blank" rel="nofollow noopener"&gt;CVE-2015-7547 &lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;“A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, 
potentially, execute code with the permissions of the user running the library.”&lt;/li&gt;
&lt;li&gt;“Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.”&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://googleonlinesecurity.blogspot.ca/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" target="_blank" rel="nofollow noopener"&gt;More details from Google’s Online Security team blog &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;“Naturally, people have started asking whether FreeBSD is affected. The FreeBSD Security Officer has not yet released an official statement, but in the meantime, here is a brief look at the issue as far as FreeBSD is concerned.”&lt;/li&gt;
&lt;li&gt;“First of all: neither FreeBSD itself nor native FreeBSD applications are affected. While the resolver in FreeBSD’s libc and GNU libc share a common parentage, the bug was introduced when the latter was rewritten to send A and AAAA queries in parallel rather than sequentially when the application requests both.”&lt;/li&gt;
&lt;li&gt;The same most likely applies to the other BSDs&lt;/li&gt;
&lt;li&gt;“However, Linux applications running under emulation on a FreeBSD system use the GNU libc and are therefore vulnerable unless patched.”&lt;/li&gt;
&lt;li&gt;A patch to update emulation/linux_base-c6 has been prepared and should be committed soon&lt;/li&gt;
&lt;li&gt;Running ‘pkg audit’ will list any known vulnerable packages installed on your system&lt;/li&gt;
&lt;li&gt;“The issue can be mitigated by only using resolvers you trust, and configuring them to avoid sending responses which can trigger the bug.”&lt;/li&gt;
&lt;li&gt;“If you already have your own resolvers, you can configure them to avoid sending UDP responses larger than 2048 bytes. If the response does not fit in 2048 bytes, the server will send a truncated response, and the client should retry using TCP. While a similar bug exists in the code path for TCP requests, I believe that it can only be exploited by a malicious resolver, and interposing your own resolver will protect affected Linux systems and applications.”&lt;/li&gt;
&lt;li&gt;Dag-Erling’s blog post also includes instructions and configuration examples for locking down your resolver, or setting up your own resolver if you don’t have one already
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsdfoundation.org/campaign2016.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation - 2016 Fundraising Campaign&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD foundation has announced their 2016 fundraising campaign, and set the goal of raising $250k for the year. &lt;/li&gt;
&lt;li&gt;While they mention that fundraising for 2015 didn’t hit 2014’s blockbuster numbers, it still exceeded the goal set, with an almost equal mix of corporate and community donors. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;‘Our goal for 2016 is to increase the amount of support we offer for development, without compromising our regular support for the projects. We would like to:&lt;br&gt;
 Plan and support more developer events (hackathons), and allow for more developers to attend these events.&lt;br&gt;
 Continue to improve the project infrastructure.&lt;br&gt;
 Fund more dedicated developer time for targeted development of specific projects.‘&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;To give you an idea of how much OpenBSD technology is used around the world, they broke it down this way:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If $10 were given for every installation of OpenBSD in the last year from the master site (ignoring the mirrors) we would be at our goal.&lt;br&gt;
If $2 were given for every download of the OpenSSH source code in the last year from the master site (ignoring the mirrors) we would be at our goal.&lt;br&gt;
If a penny was donated for every pf or OpenSSH installed with a mainstream operating system or phone in the last year we would be at our goal.&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://sgeos.github.io/freebsd/ion/dtn/2016/02/07/getting-started-with-ion-dtn-3-4-0-on-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Getting Started with ION-DTN 3.4.0 on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“The Interplanetary Overlay Network (ION) software distribution is an implementation of Delay-Tolerant Networking (DTN) architecture as described in Internet RFC 4838, suitable for use in spacecraft”&lt;/li&gt;
&lt;li&gt;This tutorial covers setting up ION 3.4.0 on FreeBSD&lt;/li&gt;
&lt;li&gt;The tutorial starts by downloading the ION software, and installing the relevant build tools&lt;/li&gt;
&lt;li&gt;The instructions allow ION to be installed system-wide, or for a specific user&lt;/li&gt;
&lt;li&gt;The each host is configured&lt;/li&gt;
&lt;li&gt;Then pings are traded between the hosts to ensure everything works&lt;/li&gt;
&lt;li&gt;Then a web page is served over the interplanetary network&lt;/li&gt;
&lt;li&gt;Sadly I don’t have any hosts on other planets to test with.&lt;/li&gt;
&lt;li&gt;The tutorial also includes a troubleshooting guide
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://bsdmag.org/download/open_storage/" target="_blank" rel="nofollow noopener"&gt;Open Storage Issue – New BSD Mag is Out!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The next issue of BSDMag (The Open Storage Issue) just landed which features an interview with Matt Olander of iXsystems. &lt;/li&gt;
&lt;li&gt;During the interview, Matt talks about the culture of support for open-source down at iX,  not only FreeNAS and PC-BSD, but the FreeBSD foundation, Slackware and more. &lt;/li&gt;
&lt;li&gt;He also gets to extol the virtues of the open-source development model itself, why it tends to lead to better code overall. &lt;/li&gt;
&lt;li&gt;In addition to the lead interview with Matt, this issue also features some other great interviews with Open Source storage vendors, and even some ZFS howto’s about setting up your ZIL devive
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - John Marino - &lt;a href="mailto:marino@freebsd.org" target="_blank" rel="nofollow noopener"&gt;marino@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;hr&gt;

&lt;p&gt;&lt;a href="https://www.ixsystems.com/whats-new/2016/02/11/january-missioncomplete-best-story/" target="_blank" rel="nofollow noopener"&gt;FreeNAS with FreeBSD as its base helped save taxpayers $36,000 for a small public school district&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://sgeos.github.io/tor/freebsd/nc/curl/2016/02/06/getting-started-with-tor-hidden-services-on-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Getting Started With Tor Hidden Services on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ever wondered how to setup and use a Tor hidden service? We have a walkthrough posted over on github.io which details how to do that on a FreeBSD -CURRENT system.&lt;/li&gt;
&lt;li&gt;The basics are pretty simple, installing security/tor is the first step (although, he is using portmaster, you may wish to just ‘pkg install security/tor’)&lt;/li&gt;
&lt;li&gt;The walkthrough provides an example server hosting just the date/time on port 8080, which you can use as an example and to verify it works, before serving anything real.&lt;/li&gt;
&lt;li&gt;Once a local server is ready to serve something, the Tor setup is pretty quick, basically just two lines of config in torrc:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;HiddenServiceDir /usr/home/tor/hidden_service/&lt;/p&gt;

&lt;p&gt;HiddenServicePort 80 127.0.0.1:8080&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;After starting the service, the walkthrough will show you how to get the new hostname for this hidden service and verify its functionality. &lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://github.com/hughobrien/zfs-remote-mirror" target="_blank" rel="nofollow noopener"&gt;ZFS Remote Mirrors for Home Use&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A recently updated tutorial on remotely mirroring your ZFS files&lt;/li&gt;
&lt;li&gt;Using a spare old computer, or a SBC like a Raspberry Pi, and an (external) hard drive&lt;/li&gt;
&lt;li&gt;It covers installing and configuring FreeBSD for both sides of the remote replication&lt;/li&gt;
&lt;li&gt;The new appendix covers the creation of a Raspberry Pi image, although a prebuilt one is also provided&lt;/li&gt;
&lt;li&gt;The setup uses GELI to ensure the data is encrypted at-rest&lt;/li&gt;
&lt;li&gt;Updating and maintaining both systems is covered in detail&lt;/li&gt;
&lt;li&gt;The article is very detailed, and covers pretty much every aspect of the setup, including suggestions on where to physically locate the remote system, and configuration tips to reduce the chance that local intervention will be required&lt;/li&gt;
&lt;li&gt;Most importantly, it covers the disaster recovery steps. How to get your files back when bad things happen
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lumina-desktop.org/lumina-desktop-0-8-8-released/" target="_blank" rel="nofollow noopener"&gt;Lumina Desktop 0.8.8 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PC-BSD’s very own Lumina desktop has issued a new release, 0.8.8&lt;/li&gt;
&lt;li&gt;Notable in this release is support for NetBSD out of box, improvements to the start menu, and ability to change monitor resolutions in the X configuration tool. (Also the desktop font colors look better!)&lt;/li&gt;
&lt;li&gt;0.8.8 is now available in PC-BSD via pkg, and FreeBSD ports/pkg system as well.&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://fossforce.com/2016/02/lumina-desktop-getting-ready-freebsd-11-0/" target="_blank" rel="nofollow noopener"&gt;Lumina Desktop aims for v1.0 in July 2016&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;We also have a blog post from Larry over at FossForce, highlighting that 1.0 of Lumina is still targeted for July(ish)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20160213_1951.html" target="_blank" rel="nofollow noopener"&gt;NetBSD on Google's Compute Engine&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A NetBSD developer has gotten NetBSD running on Google Compute Engine, a service somewhat similar to Amazon’s EC2, and Microsoft’s Azure&lt;/li&gt;
&lt;li&gt;Support is still being worked on, but I imagine it will land in NetBSD before too long&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://dmesgd.nycbug.org/index.cgi?action=dmesgd&amp;amp;do=view&amp;amp;id=2900" target="_blank" rel="nofollow noopener"&gt;NetBSD on GCE dmesg &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=138610199311393&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD on GCE &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/swills/FreeBSD-gcloud" target="_blank" rel="nofollow noopener"&gt;FreeBSD on GCE &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;BeastieBits&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://hisham.hm/htop/" target="_blank" rel="nofollow noopener"&gt;htop 2.0 released - an interactive process viewer for Unix (including FreeBSD and OpenBSD)&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/port-arm/2016/01/31/msg003648.html" target="_blank" rel="nofollow noopener"&gt;Full set of binary packages for 7.0 released for ARM v6 and v7 (hf)&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.dragonflybsd.org/release44/" target="_blank" rel="nofollow noopener"&gt;DragonFly 4.4.2 released&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://libertybsd.net/" target="_blank" rel="nofollow noopener"&gt;LibertyBSD 5.8 has been released&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-January/459239.html" target="_blank" rel="nofollow noopener"&gt;Broadwell systems may want to take advantage of the patch by Imre Vadasz&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.viva64.com/en/b/0377/" target="_blank" rel="nofollow noopener"&gt;Finding the hard-to-spot bugs in FreeBSD &lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21dwzoXRn" target="_blank" rel="nofollow noopener"&gt;Johnny - The Daily Show&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Hmmu5pUr" target="_blank" rel="nofollow noopener"&gt; Randy - Let it BSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20tOLsHHj" target="_blank" rel="nofollow noopener"&gt; Miguel - NullFS &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2N9wQ1n5X" target="_blank" rel="nofollow noopener"&gt; Jaek - PC-BSD Hardware&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we will be talking to John Marino about his work on the ports-mgmt utility “Synth” and the cross-pollination between DragonFly and FreeBSD. That plus the latest news and your email here on</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.des.no/2016/02/freebsd-and-cve-2015-7547/" rel="nofollow">glibc and the BSDs </a></h3>

<ul>
<li>You have likely already heard about <a href="https://access.redhat.com/security/cve/cve-2015-7547" rel="nofollow">CVE-2015-7547 </a></li>
<li>“A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, 
potentially, execute code with the permissions of the user running the library.”</li>
<li>“Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.”</li>
<li><a href="https://googleonlinesecurity.blogspot.ca/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" rel="nofollow">More details from Google’s Online Security team blog </a> </li>
<li>“Naturally, people have started asking whether FreeBSD is affected. The FreeBSD Security Officer has not yet released an official statement, but in the meantime, here is a brief look at the issue as far as FreeBSD is concerned.”</li>
<li>“First of all: neither FreeBSD itself nor native FreeBSD applications are affected. While the resolver in FreeBSD’s libc and GNU libc share a common parentage, the bug was introduced when the latter was rewritten to send A and AAAA queries in parallel rather than sequentially when the application requests both.”</li>
<li>The same most likely applies to the other BSDs</li>
<li>“However, Linux applications running under emulation on a FreeBSD system use the GNU libc and are therefore vulnerable unless patched.”</li>
<li>A patch to update emulation/linux_base-c6 has been prepared and should be committed soon</li>
<li>Running ‘pkg audit’ will list any known vulnerable packages installed on your system</li>
<li>“The issue can be mitigated by only using resolvers you trust, and configuring them to avoid sending responses which can trigger the bug.”</li>
<li>“If you already have your own resolvers, you can configure them to avoid sending UDP responses larger than 2048 bytes. If the response does not fit in 2048 bytes, the server will send a truncated response, and the client should retry using TCP. While a similar bug exists in the code path for TCP requests, I believe that it can only be exploited by a malicious resolver, and interposing your own resolver will protect affected Linux systems and applications.”</li>
<li>Dag-Erling’s blog post also includes instructions and configuration examples for locking down your resolver, or setting up your own resolver if you don’t have one already
***</li>
</ul>

<h3><a href="http://www.openbsdfoundation.org/campaign2016.html" rel="nofollow">OpenBSD Foundation - 2016 Fundraising Campaign</a></h3>

<ul>
<li>The OpenBSD foundation has announced their 2016 fundraising campaign, and set the goal of raising $250k for the year. </li>
<li>While they mention that fundraising for 2015 didn’t hit 2014’s blockbuster numbers, it still exceeded the goal set, with an almost equal mix of corporate and community donors. </li>
</ul>

<p>‘Our goal for 2016 is to increase the amount of support we offer for development, without compromising our regular support for the projects. We would like to:<br>
 Plan and support more developer events (hackathons), and allow for more developers to attend these events.<br>
 Continue to improve the project infrastructure.<br>
 Fund more dedicated developer time for targeted development of specific projects.‘</p>

<ul>
<li>To give you an idea of how much OpenBSD technology is used around the world, they broke it down this way:</li>
</ul>

<p>If $10 were given for every installation of OpenBSD in the last year from the master site (ignoring the mirrors) we would be at our goal.<br>
If $2 were given for every download of the OpenSSH source code in the last year from the master site (ignoring the mirrors) we would be at our goal.<br>
If a penny was donated for every pf or OpenSSH installed with a mainstream operating system or phone in the last year we would be at our goal.</p>

<hr>

<h3><a href="https://sgeos.github.io/freebsd/ion/dtn/2016/02/07/getting-started-with-ion-dtn-3-4-0-on-freebsd.html" rel="nofollow">Getting Started with ION-DTN 3.4.0 on FreeBSD</a></h3>

<ul>
<li>“The Interplanetary Overlay Network (ION) software distribution is an implementation of Delay-Tolerant Networking (DTN) architecture as described in Internet RFC 4838, suitable for use in spacecraft”</li>
<li>This tutorial covers setting up ION 3.4.0 on FreeBSD</li>
<li>The tutorial starts by downloading the ION software, and installing the relevant build tools</li>
<li>The instructions allow ION to be installed system-wide, or for a specific user</li>
<li>The each host is configured</li>
<li>Then pings are traded between the hosts to ensure everything works</li>
<li>Then a web page is served over the interplanetary network</li>
<li>Sadly I don’t have any hosts on other planets to test with.</li>
<li>The tutorial also includes a troubleshooting guide
***</li>
</ul>

<h3><a href="https://bsdmag.org/download/open_storage/" rel="nofollow">Open Storage Issue – New BSD Mag is Out!</a></h3>

<ul>
<li>The next issue of BSDMag (The Open Storage Issue) just landed which features an interview with Matt Olander of iXsystems. </li>
<li>During the interview, Matt talks about the culture of support for open-source down at iX,  not only FreeNAS and PC-BSD, but the FreeBSD foundation, Slackware and more. </li>
<li>He also gets to extol the virtues of the open-source development model itself, why it tends to lead to better code overall. </li>
<li>In addition to the lead interview with Matt, this issue also features some other great interviews with Open Source storage vendors, and even some ZFS howto’s about setting up your ZIL devive
***</li>
</ul>

<h2>Interview - John Marino - <a href="mailto:marino@freebsd.org" rel="nofollow">marino@freebsd.org</a></h2>

<hr>

<p><a href="https://www.ixsystems.com/whats-new/2016/02/11/january-missioncomplete-best-story/" rel="nofollow">FreeNAS with FreeBSD as its base helped save taxpayers $36,000 for a small public school district</a> </p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://sgeos.github.io/tor/freebsd/nc/curl/2016/02/06/getting-started-with-tor-hidden-services-on-freebsd.html" rel="nofollow">Getting Started With Tor Hidden Services on FreeBSD</a></h3>

<ul>
<li>Ever wondered how to setup and use a Tor hidden service? We have a walkthrough posted over on github.io which details how to do that on a FreeBSD -CURRENT system.</li>
<li>The basics are pretty simple, installing security/tor is the first step (although, he is using portmaster, you may wish to just ‘pkg install security/tor’)</li>
<li>The walkthrough provides an example server hosting just the date/time on port 8080, which you can use as an example and to verify it works, before serving anything real.</li>
<li>Once a local server is ready to serve something, the Tor setup is pretty quick, basically just two lines of config in torrc:</li>
</ul>

<p>HiddenServiceDir /usr/home/tor/hidden_service/</p>

<p>HiddenServicePort 80 127.0.0.1:8080</p>

<ul>
<li>After starting the service, the walkthrough will show you how to get the new hostname for this hidden service and verify its functionality. </li>
</ul>

<hr>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">ZFS Remote Mirrors for Home Use</a></h3>

<ul>
<li>A recently updated tutorial on remotely mirroring your ZFS files</li>
<li>Using a spare old computer, or a SBC like a Raspberry Pi, and an (external) hard drive</li>
<li>It covers installing and configuring FreeBSD for both sides of the remote replication</li>
<li>The new appendix covers the creation of a Raspberry Pi image, although a prebuilt one is also provided</li>
<li>The setup uses GELI to ensure the data is encrypted at-rest</li>
<li>Updating and maintaining both systems is covered in detail</li>
<li>The article is very detailed, and covers pretty much every aspect of the setup, including suggestions on where to physically locate the remote system, and configuration tips to reduce the chance that local intervention will be required</li>
<li>Most importantly, it covers the disaster recovery steps. How to get your files back when bad things happen
***</li>
</ul>

<h3><a href="http://lumina-desktop.org/lumina-desktop-0-8-8-released/" rel="nofollow">Lumina Desktop 0.8.8 Released</a></h3>

<ul>
<li>PC-BSD’s very own Lumina desktop has issued a new release, 0.8.8</li>
<li>Notable in this release is support for NetBSD out of box, improvements to the start menu, and ability to change monitor resolutions in the X configuration tool. (Also the desktop font colors look better!)</li>
<li>0.8.8 is now available in PC-BSD via pkg, and FreeBSD ports/pkg system as well.</li>
<li><a href="http://fossforce.com/2016/02/lumina-desktop-getting-ready-freebsd-11-0/" rel="nofollow">Lumina Desktop aims for v1.0 in July 2016</a> </li>
<li>We also have a blog post from Larry over at FossForce, highlighting that 1.0 of Lumina is still targeted for July(ish)
***</li>
</ul>

<h3><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20160213_1951.html" rel="nofollow">NetBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>A NetBSD developer has gotten NetBSD running on Google Compute Engine, a service somewhat similar to Amazon’s EC2, and Microsoft’s Azure</li>
<li>Support is still being worked on, but I imagine it will land in NetBSD before too long</li>
<li><a href="http://dmesgd.nycbug.org/index.cgi?action=dmesgd&do=view&id=2900" rel="nofollow">NetBSD on GCE dmesg </a> </li>
<li><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on GCE </a> </li>
<li><a href="https://github.com/swills/FreeBSD-gcloud" rel="nofollow">FreeBSD on GCE </a> 
***</li>
</ul>

<h3>BeastieBits</h3>

<p><a href="http://hisham.hm/htop/" rel="nofollow">htop 2.0 released - an interactive process viewer for Unix (including FreeBSD and OpenBSD)</a> </p>

<p><a href="http://mail-index.netbsd.org/port-arm/2016/01/31/msg003648.html" rel="nofollow">Full set of binary packages for 7.0 released for ARM v6 and v7 (hf)</a> </p>

<p><a href="https://www.dragonflybsd.org/release44/" rel="nofollow">DragonFly 4.4.2 released</a> </p>

<p><a href="http://libertybsd.net/" rel="nofollow">LibertyBSD 5.8 has been released</a> </p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-January/459239.html" rel="nofollow">Broadwell systems may want to take advantage of the patch by Imre Vadasz</a> </p>

<p><a href="http://www.viva64.com/en/b/0377/" rel="nofollow">Finding the hard-to-spot bugs in FreeBSD </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21dwzoXRn" rel="nofollow">Johnny - The Daily Show</a> </li>
<li><a href="http://slexy.org/view/s2Hmmu5pUr" rel="nofollow"> Randy - Let it BSD</a> </li>
<li><a href="http://slexy.org/view/s20tOLsHHj" rel="nofollow"> Miguel - NullFS </a> </li>
<li><a href="http://slexy.org/view/s2N9wQ1n5X" rel="nofollow"> Jaek - PC-BSD Hardware</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we will be talking to John Marino about his work on the ports-mgmt utility “Synth” and the cross-pollination between DragonFly and FreeBSD. That plus the latest news and your email here on</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.des.no/2016/02/freebsd-and-cve-2015-7547/" rel="nofollow">glibc and the BSDs </a></h3>

<ul>
<li>You have likely already heard about <a href="https://access.redhat.com/security/cve/cve-2015-7547" rel="nofollow">CVE-2015-7547 </a></li>
<li>“A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, 
potentially, execute code with the permissions of the user running the library.”</li>
<li>“Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module.”</li>
<li><a href="https://googleonlinesecurity.blogspot.ca/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html" rel="nofollow">More details from Google’s Online Security team blog </a> </li>
<li>“Naturally, people have started asking whether FreeBSD is affected. The FreeBSD Security Officer has not yet released an official statement, but in the meantime, here is a brief look at the issue as far as FreeBSD is concerned.”</li>
<li>“First of all: neither FreeBSD itself nor native FreeBSD applications are affected. While the resolver in FreeBSD’s libc and GNU libc share a common parentage, the bug was introduced when the latter was rewritten to send A and AAAA queries in parallel rather than sequentially when the application requests both.”</li>
<li>The same most likely applies to the other BSDs</li>
<li>“However, Linux applications running under emulation on a FreeBSD system use the GNU libc and are therefore vulnerable unless patched.”</li>
<li>A patch to update emulation/linux_base-c6 has been prepared and should be committed soon</li>
<li>Running ‘pkg audit’ will list any known vulnerable packages installed on your system</li>
<li>“The issue can be mitigated by only using resolvers you trust, and configuring them to avoid sending responses which can trigger the bug.”</li>
<li>“If you already have your own resolvers, you can configure them to avoid sending UDP responses larger than 2048 bytes. If the response does not fit in 2048 bytes, the server will send a truncated response, and the client should retry using TCP. While a similar bug exists in the code path for TCP requests, I believe that it can only be exploited by a malicious resolver, and interposing your own resolver will protect affected Linux systems and applications.”</li>
<li>Dag-Erling’s blog post also includes instructions and configuration examples for locking down your resolver, or setting up your own resolver if you don’t have one already
***</li>
</ul>

<h3><a href="http://www.openbsdfoundation.org/campaign2016.html" rel="nofollow">OpenBSD Foundation - 2016 Fundraising Campaign</a></h3>

<ul>
<li>The OpenBSD foundation has announced their 2016 fundraising campaign, and set the goal of raising $250k for the year. </li>
<li>While they mention that fundraising for 2015 didn’t hit 2014’s blockbuster numbers, it still exceeded the goal set, with an almost equal mix of corporate and community donors. </li>
</ul>

<p>‘Our goal for 2016 is to increase the amount of support we offer for development, without compromising our regular support for the projects. We would like to:<br>
 Plan and support more developer events (hackathons), and allow for more developers to attend these events.<br>
 Continue to improve the project infrastructure.<br>
 Fund more dedicated developer time for targeted development of specific projects.‘</p>

<ul>
<li>To give you an idea of how much OpenBSD technology is used around the world, they broke it down this way:</li>
</ul>

<p>If $10 were given for every installation of OpenBSD in the last year from the master site (ignoring the mirrors) we would be at our goal.<br>
If $2 were given for every download of the OpenSSH source code in the last year from the master site (ignoring the mirrors) we would be at our goal.<br>
If a penny was donated for every pf or OpenSSH installed with a mainstream operating system or phone in the last year we would be at our goal.</p>

<hr>

<h3><a href="https://sgeos.github.io/freebsd/ion/dtn/2016/02/07/getting-started-with-ion-dtn-3-4-0-on-freebsd.html" rel="nofollow">Getting Started with ION-DTN 3.4.0 on FreeBSD</a></h3>

<ul>
<li>“The Interplanetary Overlay Network (ION) software distribution is an implementation of Delay-Tolerant Networking (DTN) architecture as described in Internet RFC 4838, suitable for use in spacecraft”</li>
<li>This tutorial covers setting up ION 3.4.0 on FreeBSD</li>
<li>The tutorial starts by downloading the ION software, and installing the relevant build tools</li>
<li>The instructions allow ION to be installed system-wide, or for a specific user</li>
<li>The each host is configured</li>
<li>Then pings are traded between the hosts to ensure everything works</li>
<li>Then a web page is served over the interplanetary network</li>
<li>Sadly I don’t have any hosts on other planets to test with.</li>
<li>The tutorial also includes a troubleshooting guide
***</li>
</ul>

<h3><a href="https://bsdmag.org/download/open_storage/" rel="nofollow">Open Storage Issue – New BSD Mag is Out!</a></h3>

<ul>
<li>The next issue of BSDMag (The Open Storage Issue) just landed which features an interview with Matt Olander of iXsystems. </li>
<li>During the interview, Matt talks about the culture of support for open-source down at iX,  not only FreeNAS and PC-BSD, but the FreeBSD foundation, Slackware and more. </li>
<li>He also gets to extol the virtues of the open-source development model itself, why it tends to lead to better code overall. </li>
<li>In addition to the lead interview with Matt, this issue also features some other great interviews with Open Source storage vendors, and even some ZFS howto’s about setting up your ZIL devive
***</li>
</ul>

<h2>Interview - John Marino - <a href="mailto:marino@freebsd.org" rel="nofollow">marino@freebsd.org</a></h2>

<hr>

<p><a href="https://www.ixsystems.com/whats-new/2016/02/11/january-missioncomplete-best-story/" rel="nofollow">FreeNAS with FreeBSD as its base helped save taxpayers $36,000 for a small public school district</a> </p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://sgeos.github.io/tor/freebsd/nc/curl/2016/02/06/getting-started-with-tor-hidden-services-on-freebsd.html" rel="nofollow">Getting Started With Tor Hidden Services on FreeBSD</a></h3>

<ul>
<li>Ever wondered how to setup and use a Tor hidden service? We have a walkthrough posted over on github.io which details how to do that on a FreeBSD -CURRENT system.</li>
<li>The basics are pretty simple, installing security/tor is the first step (although, he is using portmaster, you may wish to just ‘pkg install security/tor’)</li>
<li>The walkthrough provides an example server hosting just the date/time on port 8080, which you can use as an example and to verify it works, before serving anything real.</li>
<li>Once a local server is ready to serve something, the Tor setup is pretty quick, basically just two lines of config in torrc:</li>
</ul>

<p>HiddenServiceDir /usr/home/tor/hidden_service/</p>

<p>HiddenServicePort 80 127.0.0.1:8080</p>

<ul>
<li>After starting the service, the walkthrough will show you how to get the new hostname for this hidden service and verify its functionality. </li>
</ul>

<hr>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">ZFS Remote Mirrors for Home Use</a></h3>

<ul>
<li>A recently updated tutorial on remotely mirroring your ZFS files</li>
<li>Using a spare old computer, or a SBC like a Raspberry Pi, and an (external) hard drive</li>
<li>It covers installing and configuring FreeBSD for both sides of the remote replication</li>
<li>The new appendix covers the creation of a Raspberry Pi image, although a prebuilt one is also provided</li>
<li>The setup uses GELI to ensure the data is encrypted at-rest</li>
<li>Updating and maintaining both systems is covered in detail</li>
<li>The article is very detailed, and covers pretty much every aspect of the setup, including suggestions on where to physically locate the remote system, and configuration tips to reduce the chance that local intervention will be required</li>
<li>Most importantly, it covers the disaster recovery steps. How to get your files back when bad things happen
***</li>
</ul>

<h3><a href="http://lumina-desktop.org/lumina-desktop-0-8-8-released/" rel="nofollow">Lumina Desktop 0.8.8 Released</a></h3>

<ul>
<li>PC-BSD’s very own Lumina desktop has issued a new release, 0.8.8</li>
<li>Notable in this release is support for NetBSD out of box, improvements to the start menu, and ability to change monitor resolutions in the X configuration tool. (Also the desktop font colors look better!)</li>
<li>0.8.8 is now available in PC-BSD via pkg, and FreeBSD ports/pkg system as well.</li>
<li><a href="http://fossforce.com/2016/02/lumina-desktop-getting-ready-freebsd-11-0/" rel="nofollow">Lumina Desktop aims for v1.0 in July 2016</a> </li>
<li>We also have a blog post from Larry over at FossForce, highlighting that 1.0 of Lumina is still targeted for July(ish)
***</li>
</ul>

<h3><a href="http://www.feyrer.de/NetBSD/bx/blosxom.cgi/nb_20160213_1951.html" rel="nofollow">NetBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>A NetBSD developer has gotten NetBSD running on Google Compute Engine, a service somewhat similar to Amazon’s EC2, and Microsoft’s Azure</li>
<li>Support is still being worked on, but I imagine it will land in NetBSD before too long</li>
<li><a href="http://dmesgd.nycbug.org/index.cgi?action=dmesgd&do=view&id=2900" rel="nofollow">NetBSD on GCE dmesg </a> </li>
<li><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on GCE </a> </li>
<li><a href="https://github.com/swills/FreeBSD-gcloud" rel="nofollow">FreeBSD on GCE </a> 
***</li>
</ul>

<h3>BeastieBits</h3>

<p><a href="http://hisham.hm/htop/" rel="nofollow">htop 2.0 released - an interactive process viewer for Unix (including FreeBSD and OpenBSD)</a> </p>

<p><a href="http://mail-index.netbsd.org/port-arm/2016/01/31/msg003648.html" rel="nofollow">Full set of binary packages for 7.0 released for ARM v6 and v7 (hf)</a> </p>

<p><a href="https://www.dragonflybsd.org/release44/" rel="nofollow">DragonFly 4.4.2 released</a> </p>

<p><a href="http://libertybsd.net/" rel="nofollow">LibertyBSD 5.8 has been released</a> </p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-January/459239.html" rel="nofollow">Broadwell systems may want to take advantage of the patch by Imre Vadasz</a> </p>

<p><a href="http://www.viva64.com/en/b/0377/" rel="nofollow">Finding the hard-to-spot bugs in FreeBSD </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21dwzoXRn" rel="nofollow">Johnny - The Daily Show</a> </li>
<li><a href="http://slexy.org/view/s2Hmmu5pUr" rel="nofollow"> Randy - Let it BSD</a> </li>
<li><a href="http://slexy.org/view/s20tOLsHHj" rel="nofollow"> Miguel - NullFS </a> </li>
<li><a href="http://slexy.org/view/s2N9wQ1n5X" rel="nofollow"> Jaek - PC-BSD Hardware</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>128: The State of BSD</title>
  <link>https://www.bsdnow.tv/128</link>
  <guid isPermaLink="false">562ad286-1548-407d-b0d4-4c26b3d1a69f</guid>
  <pubDate>Wed, 10 Feb 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/562ad286-1548-407d-b0d4-4c26b3d1a69f.mp3" length="64978420" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we interview Nick Wolff about how FreeBSD is used across the State of Ohio and some of the specific technology used. That, plus the latest news is coming your way right now on BSDNow, the place to</itunes:subtitle>
  <itunes:duration>1:30:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we interview Nick Wolff about how FreeBSD is used across the State of Ohio and some of the specific technology used. That, plus the latest news is coming your way right now on BSDNow, the place to&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://opensource.com/business/16/1/scale-14x-interview-dru-lavigne" target="_blank" rel="nofollow noopener"&gt;Doc like an Egyptian: Managing project documentation with Sphinx&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In case you didn’t make it out to SCALE a few weeks back, we have a great interview with Dru Lavigne over at OpenSource.com which goes over her talk on “Doc like an Egyptian”. &lt;/li&gt;
&lt;li&gt;In particular she discusses the challenges of running a wiki for documentation for PC-BSD and FreeNAS which prompted the shift to using Sphinx instead.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “While the main purpose of a wiki is to invite user contributions and to provide a low barrier to entry, very few people come to write documentation (however, every spambot on the planet will quickly find your wiki, which creates its own set of maintenance issues).&lt;/p&gt;

&lt;p&gt;&amp;gt; Wikis are designed for separate, one-ish page infobytes, such as how-tos. They really aren't designed to provide navigation in a Table of Contents or to provide a flow of Chapters, though you can hack your pages to provide navigational elements to match the document's flow. This gets more difficult as the document increases in size—our guides tend to be 300+ pages. It becomes a nightmare as you try to provide versioned copies of each of those pages so that the user is finding and reading the right page for their version of software.&lt;/p&gt;

&lt;p&gt;&amp;gt; While wiki translation extensions are available, how to configure them is not well documented, their use is slow and clunky, and translated pages only increase the number of available pages, getting you back to the problems in the previous bullet. This is a big deal for projects that have a global audience.&lt;/p&gt;

&lt;p&gt;&amp;gt; While output-generation wiki extensions are available (for example, to convert your wiki pages to HTML or PDF), how to configure them is not well documented, and they provide very little control for the layout of the generated format. This is a big deal for projects that need to make their documentation available in multiple formats.“&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;She then discusses some of the hurdles of migration from the Wiki to Sphinx, and follows up with some of the differences using Sphinx you should be aware of for any documentation project.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&amp;gt; “While Sphinx is easy to learn, it does have its quirks. For example, it does not support stacked tags. This means, for example, you can not bold italic a phrase using tags—to achieve that requires a CSS workaround. And, while Sphinx does have extensive documentation, a lot of it assumes you already know what you are doing. When you don't, it can be difficult to find an example that does what you are trying to achieve.&lt;/p&gt;

&lt;p&gt;&amp;gt; Sphinx is well suited for projects with an existing repository—say, on github—a build infrastructure, and contributors who are comfortable with using text editors and committing to the repo (or creating, say, git pull requests).“&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2016/02/initial-freebsd-risc-v-architecture.html" target="_blank" rel="nofollow noopener"&gt;Initial FreeBSD RISC-V Architecture Port Committed.&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Touching on a story we mentioned a few weeks back, we have a blog post from from Annie over at the FreeBSD foundation talking about the details behind the initial support for RISC-V.&lt;/li&gt;
&lt;li&gt;To start us off, you may be wondering what is RISC-V and what makes it special?RISC-V is an exciting new open-source Instruction-Set Architecture (ISA) developed at the University of California at Berkeley, which is seeing increasing interest in the embedded systems and hardware-software research communities.&lt;/li&gt;
&lt;li&gt;Currently the improvements allows booting FreeBSD in the Spike simulator, from the university of Berkeley, with enough reliability to do various things, such as SSH, shell, mail, etc.&lt;/li&gt;
&lt;li&gt;The next steps include getting multi-core support working, and getting  it working in simulations of Cambridge’s open-source LowRISC System-on-Chip functioning, and ready for early hardware.&lt;/li&gt;
&lt;li&gt;Both ports and packages are expected to land in the coming days, so if you love hacking on branch new architectures, this may be your time to jump in.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=295124" target="_blank" rel="nofollow noopener"&gt;FreeBSD Bhyve hypervisor supporting Windows UEFI guests &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you have not been following bhyve lately, you’re in for a treat when FreeBSD 10.3 ships in the coming weeks&lt;/li&gt;
&lt;li&gt;bhyve now supports UEFI and CSM booting, in addition to its existing FreeBSD userboot loader, and grub-bhyve port&lt;/li&gt;
&lt;li&gt;The EFI support allows Windows guests to be run on FreeBSD&lt;/li&gt;
&lt;li&gt;Due to the lack of graphics, this requires making a custom .iso to do an ‘Unattended Install’ of Windows, but this is easily done just editing and including a .xml file&lt;/li&gt;
&lt;li&gt;The bootrom can now allocate memory&lt;/li&gt;
&lt;li&gt;Added some SATA command emulations (no-op)&lt;/li&gt;
&lt;li&gt;Increased the number of virtio-blk indirect descriptors&lt;/li&gt;
&lt;li&gt;Added a Firmware guest query interface&lt;/li&gt;
&lt;li&gt;Add -l option to specify userboot path
&lt;a href="https://jameslodge.com/freebsd-bhyve-hypervisor-running-windows-server-2012-r2-standard/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Bhyve Hypervisor Running Windows Server 2012 R2 Standard&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;In related news, &lt;a href="http://www.prnewswire.com/news-releases/tidalscale-releases-its-system-scaling-hyperkernel-300216105.html" target="_blank" rel="nofollow noopener"&gt;TidalScale officially released their product today &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;TidalScale is a commercial product based on bhyve that allows multiple physical machines to be combined into a single massive virtual machine, with the combined processor power, memory, disk I/O, and network capacity of all of the machines
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.unixmen.com/freebsd-tacacs-gns3-and-cisco-3700-router/" target="_blank" rel="nofollow noopener"&gt;FreeBSD TACACS+ GNS3 and Cisco 3700 Router&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“TACACS+ – (Terminal Access Controller Access Control System plus) — is a session protocol developed by Cisco.”&lt;/li&gt;
&lt;li&gt;This tutorial covers configuring FreeBSD and the tac_plus4 port to act as an authentication, authorization, and accounting server for Cisco routers&lt;/li&gt;
&lt;li&gt;The configuration of FreeBSD, the software, and the router are covered&lt;/li&gt;
&lt;li&gt;It also includes how to set the FreeBSD server up as a VM on windows, and bridge it to the network&lt;/li&gt;
&lt;li&gt;I am sure there are some network administrators out there that would appreciate this
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Nick Wolff - &lt;a href="mailto:darkfiberiru@gmail.com" target="_blank" rel="nofollow noopener"&gt;darkfiberiru@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/darkfiberiru" target="_blank" rel="nofollow noopener"&gt;@darkfiberiru&lt;/a&gt;
&lt;/h2&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2016-February/016495.html" target="_blank" rel="nofollow noopener"&gt;Papers We Love Presents : Bryan Cantrill on Jails &amp;amp; Solaris Zones&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The folks over at NYCBug point us to “Papers We Love”, a New York based meetup group where past papers are presented. They have a talk scheduled for tomorrow (Feb 11th) with Bryan Cantrill discussing Jails and Solaris Zones&lt;/li&gt;
&lt;li&gt;The talk starts at 7PM at the Tumblr building, located between 5th and Park Ave South on 21st street&lt;/li&gt;
&lt;li&gt;“We're &lt;strong&gt;crazy&lt;/strong&gt; excited to have Bryan Cantrill, CTO of Joyent, formerly of Sun Microsystems, presenting on &lt;a href="https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf" target="_blank" rel="nofollow noopener"&gt;Jails: Confining the omnipotent root&lt;/a&gt;. 
by Poul-Henning Kamp and Robert Watson and &lt;a href="https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf" target="_blank" rel="nofollow noopener"&gt;Solaris Zones: Operating System Support for Consolidating Commercial Workloads&lt;/a&gt; by Dan Price and Andy Tucker!”&lt;/li&gt;
&lt;li&gt;The abstract posted gives us a sneak peak of what to expect, first covering jails as a method to “partition” the operating system environment, but maintaining the UNIX “root” model.&lt;/li&gt;
&lt;li&gt;Next it looks like he will compare and contrast with the Solaris Zones functionality, which creates virtualized application execution environments, within the single OS instance.&lt;/li&gt;
&lt;li&gt;Sounds like a fantastic talk, hopefully somebody remembers to record and post it for us to enjoy later!&lt;/li&gt;
&lt;li&gt;There will not be a live stream, but a video of the event should appear online after it has been edited
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/201602StorageSummit" target="_blank" rel="nofollow noopener"&gt;FreeBSD Storage Summit&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD Foundation will be hosting a Storage Summit, co-located at the USENIX FAST (Filesystems And Storage Technology) conference&lt;/li&gt;
&lt;li&gt;Developers and Vendors are invited to work on storage related issues&lt;/li&gt;
&lt;li&gt;This summit will be a hackathon focused event, rather than a discussion focused devsummit&lt;/li&gt;
&lt;li&gt;After setup and introductions, the summit will start with a “Networking Synergies Panel”, to discuss networking as it relates to storage&lt;/li&gt;
&lt;li&gt;After a short break, the attendees will break up into a number of working groups focused on solving actual problems&lt;/li&gt;
&lt;li&gt;The current working groups include:&lt;/li&gt;
&lt;li&gt;CAM Scheduling &amp;amp; Locking, led by Justin Gibbs: “Updating CAM queuing/scheduling and locking models to minimize cross-cpu contention and support multi-queue controllers”&lt;/li&gt;
&lt;li&gt;ZFS, led by Matt Ahrens: topics will include enabling the new cryptographic hashes supported by OpenZFS on FreeBSD, Interaction with the kernel memory subsystem, and other upcoming features.&lt;/li&gt;
&lt;li&gt;User Space Storage Stack, led by George Neville-Neil&lt;/li&gt;
&lt;li&gt;This event offers a unique opportunity for developers and vendors from the storage industry to meet at an event they will likely already be attending
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2016-February/016514.html" target="_blank" rel="nofollow noopener"&gt;Tor Browser 5.5 for OpenBSD/amd64 -current is completed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“The Tor BSD Diversity Project (TDP) is proud to announce the release of Tor Browser (TB) version 5.5 for OpenBSD. Please note that this version of TB remains in development mode, and is not meant to ensure strong privacy, anonymity or security.”&lt;/li&gt;
&lt;li&gt;“TDP (&lt;a href="https://torbsd.github.io" target="_blank" rel="nofollow noopener"&gt;https://torbsd.github.io&lt;/a&gt;) is an effort to extend the use of the BSD Unixes into the Tor ecosystem, from the desktop to the network. TDP is focused on diversifying the Tor network, with TB being the flagship project. 
Additional efforts are made to increase the number of *BSD relays on the Tor network among other sub-projects”&lt;/li&gt;
&lt;li&gt;Help test the new browser bundle, or help diversify the Tor network
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2548" target="_blank" rel="nofollow noopener"&gt;“FreeBSD Mastery: Advanced ZFS” Table of Contents&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;We brought you the news about sponsoring the Advanced ZFS book that MWL is working on, now Michael has given us the tentative chapter layout of the (sure to be a classic) tome coming from him and Allan.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;0: Introduction&lt;/li&gt;
&lt;li&gt;1: Boot Environments&lt;/li&gt;
&lt;li&gt;2: Delegation and Jails&lt;/li&gt;
&lt;li&gt;3: Sharing&lt;/li&gt;
&lt;li&gt;4: Replication&lt;/li&gt;
&lt;li&gt;5: zvols&lt;/li&gt;
&lt;li&gt;6: Advanced Hardware&lt;/li&gt;
&lt;li&gt;7: Caches&lt;/li&gt;
&lt;li&gt;8: Performance&lt;/li&gt;
&lt;li&gt;9: Tuning&lt;/li&gt;
&lt;li&gt;10: ZFS Potpourri&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In addition to the tease about the upcoming book, michael has asked the community for assistance in coming up with the cover art for it as well. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;In particular it should probably be in-line with his previous works, with a parody of some other classic art-work. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;If you have something, go tweet out to him at @mwlauthor&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://2016.asiabsdcon.org/index.html.en" target="_blank" rel="nofollow noopener"&gt;Online registration for AsiaBSDCon 2016 now open &lt;em&gt;SOON&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://bhyvecon.org/" target="_blank" rel="nofollow noopener"&gt;BhyveCon 2016&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.nycbug.org/index.cgi?action=view&amp;amp;id=10640" target="_blank" rel="nofollow noopener"&gt;NYC*BUG shell-fu talk slides&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-February/228597.html" target="_blank" rel="nofollow noopener"&gt;Possible regression in DragonFly i915 graphics on older Core2Duos &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://video.fosdem.org/2016/" target="_blank" rel="nofollow noopener"&gt;Videos from FOSDEM 2016. BSD dev room was k4601&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2F39XEu9w" target="_blank" rel="nofollow noopener"&gt; Andrew - SMART Tests&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20kk6lzc9" target="_blank" rel="nofollow noopener"&gt; JT - Secure File Delete&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21zjZ0ci8" target="_blank" rel="nofollow noopener"&gt; Jordan - Migrate&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Hqbt0Uq8" target="_blank" rel="nofollow noopener"&gt; Lars - Pros and Cons of VM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2HnO1hxSO" target="_blank" rel="nofollow noopener"&gt; Alex - IPSEC&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we interview Nick Wolff about how FreeBSD is used across the State of Ohio and some of the specific technology used. That, plus the latest news is coming your way right now on BSDNow, the place to</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" <br>
title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://opensource.com/business/16/1/scale-14x-interview-dru-lavigne" rel="nofollow">Doc like an Egyptian: Managing project documentation with Sphinx</a></h3>

<ul>
<li>In case you didn’t make it out to SCALE a few weeks back, we have a great interview with Dru Lavigne over at OpenSource.com which goes over her talk on “Doc like an Egyptian”. </li>
<li>In particular she discusses the challenges of running a wiki for documentation for PC-BSD and FreeNAS which prompted the shift to using Sphinx instead.</li>
</ul>

<blockquote>
<p>“While the main purpose of a wiki is to invite user contributions and to provide a low barrier to entry, very few people come to write documentation (however, every spambot on the planet will quickly find your wiki, which creates its own set of maintenance issues).</p>

<p>Wikis are designed for separate, one-ish page infobytes, such as how-tos. They really aren&#39;t designed to provide navigation in a Table of Contents or to provide a flow of Chapters, though you can hack your pages to provide navigational elements to match the document&#39;s flow. This gets more difficult as the document increases in size—our guides tend to be 300+ pages. It becomes a nightmare as you try to provide versioned copies of each of those pages so that the user is finding and reading the right page for their version of software.</p>

<p>While wiki translation extensions are available, how to configure them is not well documented, their use is slow and clunky, and translated pages only increase the number of available pages, getting you back to the problems in the previous bullet. This is a big deal for projects that have a global audience.</p>

<p>While output-generation wiki extensions are available (for example, to convert your wiki pages to HTML or PDF), how to configure them is not well documented, and they provide very little control for the layout of the generated format. This is a big deal for projects that need to make their documentation available in multiple formats.“</p>
</blockquote>

<ul>
<li>She then discusses some of the hurdles of migration from the Wiki to Sphinx, and follows up with some of the differences using Sphinx you should be aware of for any documentation project.</li>
</ul>

<blockquote>
<p>“While Sphinx is easy to learn, it does have its quirks. For example, it does not support stacked tags. This means, for example, you can not bold italic a phrase using tags—to achieve that requires a CSS workaround. And, while Sphinx does have extensive documentation, a lot of it assumes you already know what you are doing. When you don&#39;t, it can be difficult to find an example that does what you are trying to achieve.</p>

<p>Sphinx is well suited for projects with an existing repository—say, on github—a build infrastructure, and contributors who are comfortable with using text editors and committing to the repo (or creating, say, git pull requests).“</p>
</blockquote>

<hr>

<h3><a href="http://freebsdfoundation.blogspot.com/2016/02/initial-freebsd-risc-v-architecture.html" rel="nofollow">Initial FreeBSD RISC-V Architecture Port Committed.</a></h3>

<ul>
<li>Touching on a story we mentioned a few weeks back, we have a blog post from from Annie over at the FreeBSD foundation talking about the details behind the initial support for RISC-V.</li>
<li>To start us off, you may be wondering what is RISC-V and what makes it special?RISC-V is an exciting new open-source Instruction-Set Architecture (ISA) developed at the University of California at Berkeley, which is seeing increasing interest in the embedded systems and hardware-software research communities.</li>
<li>Currently the improvements allows booting FreeBSD in the Spike simulator, from the university of Berkeley, with enough reliability to do various things, such as SSH, shell, mail, etc.</li>
<li>The next steps include getting multi-core support working, and getting  it working in simulations of Cambridge’s open-source LowRISC System-on-Chip functioning, and ready for early hardware.</li>
<li>Both ports and packages are expected to land in the coming days, so if you love hacking on branch new architectures, this may be your time to jump in.
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=295124" rel="nofollow">FreeBSD Bhyve hypervisor supporting Windows UEFI guests </a></h3>

<ul>
<li>If you have not been following bhyve lately, you’re in for a treat when FreeBSD 10.3 ships in the coming weeks</li>
<li>bhyve now supports UEFI and CSM booting, in addition to its existing FreeBSD userboot loader, and grub-bhyve port</li>
<li>The EFI support allows Windows guests to be run on FreeBSD</li>
<li>Due to the lack of graphics, this requires making a custom .iso to do an ‘Unattended Install’ of Windows, but this is easily done just editing and including a .xml file</li>
<li>The bootrom can now allocate memory</li>
<li>Added some SATA command emulations (no-op)</li>
<li>Increased the number of virtio-blk indirect descriptors</li>
<li>Added a Firmware guest query interface</li>
<li>Add -l option to specify userboot path
<a href="https://jameslodge.com/freebsd-bhyve-hypervisor-running-windows-server-2012-r2-standard/" rel="nofollow">FreeBSD Bhyve Hypervisor Running Windows Server 2012 R2 Standard</a> </li>
<li>In related news, <a href="http://www.prnewswire.com/news-releases/tidalscale-releases-its-system-scaling-hyperkernel-300216105.html" rel="nofollow">TidalScale officially released their product today </a> </li>
<li>TidalScale is a commercial product based on bhyve that allows multiple physical machines to be combined into a single massive virtual machine, with the combined processor power, memory, disk I/O, and network capacity of all of the machines
***</li>
</ul>

<h3><a href="http://www.unixmen.com/freebsd-tacacs-gns3-and-cisco-3700-router/" rel="nofollow">FreeBSD TACACS+ GNS3 and Cisco 3700 Router</a></h3>

<ul>
<li>“TACACS+ – (Terminal Access Controller Access Control System plus) — is a session protocol developed by Cisco.”</li>
<li>This tutorial covers configuring FreeBSD and the tac_plus4 port to act as an authentication, authorization, and accounting server for Cisco routers</li>
<li>The configuration of FreeBSD, the software, and the router are covered</li>
<li>It also includes how to set the FreeBSD server up as a VM on windows, and bridge it to the network</li>
<li>I am sure there are some network administrators out there that would appreciate this
***</li>
</ul>

<h2>Interview - Nick Wolff - <a href="mailto:darkfiberiru@gmail.com" rel="nofollow">darkfiberiru@gmail.com</a> / <a href="https://twitter.com/darkfiberiru" rel="nofollow">@darkfiberiru</a></h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2016-February/016495.html" rel="nofollow">Papers We Love Presents : Bryan Cantrill on Jails &amp; Solaris Zones</a></h3>

<ul>
<li>The folks over at NYCBug point us to “Papers We Love”, a New York based meetup group where past papers are presented. They have a talk scheduled for tomorrow (Feb 11th) with Bryan Cantrill discussing Jails and Solaris Zones</li>
<li>The talk starts at 7PM at the Tumblr building, located between 5th and Park Ave South on 21st street</li>
<li>“We&#39;re <strong>crazy</strong> excited to have Bryan Cantrill, CTO of Joyent, formerly of Sun Microsystems, presenting on <a href="https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf" rel="nofollow">Jails: Confining the omnipotent root</a>. 
by Poul-Henning Kamp and Robert Watson and <a href="https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf" rel="nofollow">Solaris Zones: Operating System Support for Consolidating Commercial Workloads</a> by Dan Price and Andy Tucker!”</li>
<li>The abstract posted gives us a sneak peak of what to expect, first covering jails as a method to “partition” the operating system environment, but maintaining the UNIX “root” model.</li>
<li>Next it looks like he will compare and contrast with the Solaris Zones functionality, which creates virtualized application execution environments, within the single OS instance.</li>
<li>Sounds like a fantastic talk, hopefully somebody remembers to record and post it for us to enjoy later!</li>
<li>There will not be a live stream, but a video of the event should appear online after it has been edited
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/201602StorageSummit" rel="nofollow">FreeBSD Storage Summit</a></h3>

<ul>
<li>The FreeBSD Foundation will be hosting a Storage Summit, co-located at the USENIX FAST (Filesystems And Storage Technology) conference</li>
<li>Developers and Vendors are invited to work on storage related issues</li>
<li>This summit will be a hackathon focused event, rather than a discussion focused devsummit</li>
<li>After setup and introductions, the summit will start with a “Networking Synergies Panel”, to discuss networking as it relates to storage</li>
<li>After a short break, the attendees will break up into a number of working groups focused on solving actual problems</li>
<li>The current working groups include:</li>
<li>CAM Scheduling &amp; Locking, led by Justin Gibbs: “Updating CAM queuing/scheduling and locking models to minimize cross-cpu contention and support multi-queue controllers”</li>
<li>ZFS, led by Matt Ahrens: topics will include enabling the new cryptographic hashes supported by OpenZFS on FreeBSD, Interaction with the kernel memory subsystem, and other upcoming features.</li>
<li>User Space Storage Stack, led by George Neville-Neil</li>
<li>This event offers a unique opportunity for developers and vendors from the storage industry to meet at an event they will likely already be attending
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2016-February/016514.html" rel="nofollow">Tor Browser 5.5 for OpenBSD/amd64 -current is completed</a></h3>

<ul>
<li>“The Tor BSD Diversity Project (TDP) is proud to announce the release of Tor Browser (TB) version 5.5 for OpenBSD. Please note that this version of TB remains in development mode, and is not meant to ensure strong privacy, anonymity or security.”</li>
<li>“TDP (<a href="https://torbsd.github.io" rel="nofollow">https://torbsd.github.io</a>) is an effort to extend the use of the BSD Unixes into the Tor ecosystem, from the desktop to the network. TDP is focused on diversifying the Tor network, with TB being the flagship project. 
Additional efforts are made to increase the number of *BSD relays on the Tor network among other sub-projects”</li>
<li>Help test the new browser bundle, or help diversify the Tor network
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2548" rel="nofollow">“FreeBSD Mastery: Advanced ZFS” Table of Contents</a></h3>

<ul>
<li><p>We brought you the news about sponsoring the Advanced ZFS book that MWL is working on, now Michael has given us the tentative chapter layout of the (sure to be a classic) tome coming from him and Allan.</p>

<ul>
<li>0: Introduction</li>
<li>1: Boot Environments</li>
<li>2: Delegation and Jails</li>
<li>3: Sharing</li>
<li>4: Replication</li>
<li>5: zvols</li>
<li>6: Advanced Hardware</li>
<li>7: Caches</li>
<li>8: Performance</li>
<li>9: Tuning</li>
<li>10: ZFS Potpourri</li>
</ul></li>
<li><p>In addition to the tease about the upcoming book, michael has asked the community for assistance in coming up with the cover art for it as well. </p></li>
<li><p>In particular it should probably be in-line with his previous works, with a parody of some other classic art-work. </p></li>
<li><p>If you have something, go tweet out to him at @mwlauthor</p>

<hr></li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://2016.asiabsdcon.org/index.html.en" rel="nofollow">Online registration for AsiaBSDCon 2016 now open <em>SOON</em></a></p></li>
<li><p><a href="http://bhyvecon.org/" rel="nofollow">BhyveCon 2016</a> </p></li>
<li><p><a href="http://www.nycbug.org/index.cgi?action=view&id=10640" rel="nofollow">NYC*BUG shell-fu talk slides</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-February/228597.html" rel="nofollow">Possible regression in DragonFly i915 graphics on older Core2Duos </a> </p></li>
<li><p><a href="http://video.fosdem.org/2016/" rel="nofollow">Videos from FOSDEM 2016. BSD dev room was k4601</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2F39XEu9w" rel="nofollow"> Andrew - SMART Tests</a> </li>
<li><a href="http://slexy.org/view/s20kk6lzc9" rel="nofollow"> JT - Secure File Delete</a> </li>
<li><a href="http://slexy.org/view/s21zjZ0ci8" rel="nofollow"> Jordan - Migrate</a> </li>
<li><a href="http://slexy.org/view/s2Hqbt0Uq8" rel="nofollow"> Lars - Pros and Cons of VM</a> </li>
<li><a href="http://slexy.org/view/s2HnO1hxSO" rel="nofollow"> Alex - IPSEC</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we interview Nick Wolff about how FreeBSD is used across the State of Ohio and some of the specific technology used. That, plus the latest news is coming your way right now on BSDNow, the place to</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" <br>
title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://opensource.com/business/16/1/scale-14x-interview-dru-lavigne" rel="nofollow">Doc like an Egyptian: Managing project documentation with Sphinx</a></h3>

<ul>
<li>In case you didn’t make it out to SCALE a few weeks back, we have a great interview with Dru Lavigne over at OpenSource.com which goes over her talk on “Doc like an Egyptian”. </li>
<li>In particular she discusses the challenges of running a wiki for documentation for PC-BSD and FreeNAS which prompted the shift to using Sphinx instead.</li>
</ul>

<blockquote>
<p>“While the main purpose of a wiki is to invite user contributions and to provide a low barrier to entry, very few people come to write documentation (however, every spambot on the planet will quickly find your wiki, which creates its own set of maintenance issues).</p>

<p>Wikis are designed for separate, one-ish page infobytes, such as how-tos. They really aren&#39;t designed to provide navigation in a Table of Contents or to provide a flow of Chapters, though you can hack your pages to provide navigational elements to match the document&#39;s flow. This gets more difficult as the document increases in size—our guides tend to be 300+ pages. It becomes a nightmare as you try to provide versioned copies of each of those pages so that the user is finding and reading the right page for their version of software.</p>

<p>While wiki translation extensions are available, how to configure them is not well documented, their use is slow and clunky, and translated pages only increase the number of available pages, getting you back to the problems in the previous bullet. This is a big deal for projects that have a global audience.</p>

<p>While output-generation wiki extensions are available (for example, to convert your wiki pages to HTML or PDF), how to configure them is not well documented, and they provide very little control for the layout of the generated format. This is a big deal for projects that need to make their documentation available in multiple formats.“</p>
</blockquote>

<ul>
<li>She then discusses some of the hurdles of migration from the Wiki to Sphinx, and follows up with some of the differences using Sphinx you should be aware of for any documentation project.</li>
</ul>

<blockquote>
<p>“While Sphinx is easy to learn, it does have its quirks. For example, it does not support stacked tags. This means, for example, you can not bold italic a phrase using tags—to achieve that requires a CSS workaround. And, while Sphinx does have extensive documentation, a lot of it assumes you already know what you are doing. When you don&#39;t, it can be difficult to find an example that does what you are trying to achieve.</p>

<p>Sphinx is well suited for projects with an existing repository—say, on github—a build infrastructure, and contributors who are comfortable with using text editors and committing to the repo (or creating, say, git pull requests).“</p>
</blockquote>

<hr>

<h3><a href="http://freebsdfoundation.blogspot.com/2016/02/initial-freebsd-risc-v-architecture.html" rel="nofollow">Initial FreeBSD RISC-V Architecture Port Committed.</a></h3>

<ul>
<li>Touching on a story we mentioned a few weeks back, we have a blog post from from Annie over at the FreeBSD foundation talking about the details behind the initial support for RISC-V.</li>
<li>To start us off, you may be wondering what is RISC-V and what makes it special?RISC-V is an exciting new open-source Instruction-Set Architecture (ISA) developed at the University of California at Berkeley, which is seeing increasing interest in the embedded systems and hardware-software research communities.</li>
<li>Currently the improvements allows booting FreeBSD in the Spike simulator, from the university of Berkeley, with enough reliability to do various things, such as SSH, shell, mail, etc.</li>
<li>The next steps include getting multi-core support working, and getting  it working in simulations of Cambridge’s open-source LowRISC System-on-Chip functioning, and ready for early hardware.</li>
<li>Both ports and packages are expected to land in the coming days, so if you love hacking on branch new architectures, this may be your time to jump in.
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=295124" rel="nofollow">FreeBSD Bhyve hypervisor supporting Windows UEFI guests </a></h3>

<ul>
<li>If you have not been following bhyve lately, you’re in for a treat when FreeBSD 10.3 ships in the coming weeks</li>
<li>bhyve now supports UEFI and CSM booting, in addition to its existing FreeBSD userboot loader, and grub-bhyve port</li>
<li>The EFI support allows Windows guests to be run on FreeBSD</li>
<li>Due to the lack of graphics, this requires making a custom .iso to do an ‘Unattended Install’ of Windows, but this is easily done just editing and including a .xml file</li>
<li>The bootrom can now allocate memory</li>
<li>Added some SATA command emulations (no-op)</li>
<li>Increased the number of virtio-blk indirect descriptors</li>
<li>Added a Firmware guest query interface</li>
<li>Add -l option to specify userboot path
<a href="https://jameslodge.com/freebsd-bhyve-hypervisor-running-windows-server-2012-r2-standard/" rel="nofollow">FreeBSD Bhyve Hypervisor Running Windows Server 2012 R2 Standard</a> </li>
<li>In related news, <a href="http://www.prnewswire.com/news-releases/tidalscale-releases-its-system-scaling-hyperkernel-300216105.html" rel="nofollow">TidalScale officially released their product today </a> </li>
<li>TidalScale is a commercial product based on bhyve that allows multiple physical machines to be combined into a single massive virtual machine, with the combined processor power, memory, disk I/O, and network capacity of all of the machines
***</li>
</ul>

<h3><a href="http://www.unixmen.com/freebsd-tacacs-gns3-and-cisco-3700-router/" rel="nofollow">FreeBSD TACACS+ GNS3 and Cisco 3700 Router</a></h3>

<ul>
<li>“TACACS+ – (Terminal Access Controller Access Control System plus) — is a session protocol developed by Cisco.”</li>
<li>This tutorial covers configuring FreeBSD and the tac_plus4 port to act as an authentication, authorization, and accounting server for Cisco routers</li>
<li>The configuration of FreeBSD, the software, and the router are covered</li>
<li>It also includes how to set the FreeBSD server up as a VM on windows, and bridge it to the network</li>
<li>I am sure there are some network administrators out there that would appreciate this
***</li>
</ul>

<h2>Interview - Nick Wolff - <a href="mailto:darkfiberiru@gmail.com" rel="nofollow">darkfiberiru@gmail.com</a> / <a href="https://twitter.com/darkfiberiru" rel="nofollow">@darkfiberiru</a></h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2016-February/016495.html" rel="nofollow">Papers We Love Presents : Bryan Cantrill on Jails &amp; Solaris Zones</a></h3>

<ul>
<li>The folks over at NYCBug point us to “Papers We Love”, a New York based meetup group where past papers are presented. They have a talk scheduled for tomorrow (Feb 11th) with Bryan Cantrill discussing Jails and Solaris Zones</li>
<li>The talk starts at 7PM at the Tumblr building, located between 5th and Park Ave South on 21st street</li>
<li>“We&#39;re <strong>crazy</strong> excited to have Bryan Cantrill, CTO of Joyent, formerly of Sun Microsystems, presenting on <a href="https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf" rel="nofollow">Jails: Confining the omnipotent root</a>. 
by Poul-Henning Kamp and Robert Watson and <a href="https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf" rel="nofollow">Solaris Zones: Operating System Support for Consolidating Commercial Workloads</a> by Dan Price and Andy Tucker!”</li>
<li>The abstract posted gives us a sneak peak of what to expect, first covering jails as a method to “partition” the operating system environment, but maintaining the UNIX “root” model.</li>
<li>Next it looks like he will compare and contrast with the Solaris Zones functionality, which creates virtualized application execution environments, within the single OS instance.</li>
<li>Sounds like a fantastic talk, hopefully somebody remembers to record and post it for us to enjoy later!</li>
<li>There will not be a live stream, but a video of the event should appear online after it has been edited
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/201602StorageSummit" rel="nofollow">FreeBSD Storage Summit</a></h3>

<ul>
<li>The FreeBSD Foundation will be hosting a Storage Summit, co-located at the USENIX FAST (Filesystems And Storage Technology) conference</li>
<li>Developers and Vendors are invited to work on storage related issues</li>
<li>This summit will be a hackathon focused event, rather than a discussion focused devsummit</li>
<li>After setup and introductions, the summit will start with a “Networking Synergies Panel”, to discuss networking as it relates to storage</li>
<li>After a short break, the attendees will break up into a number of working groups focused on solving actual problems</li>
<li>The current working groups include:</li>
<li>CAM Scheduling &amp; Locking, led by Justin Gibbs: “Updating CAM queuing/scheduling and locking models to minimize cross-cpu contention and support multi-queue controllers”</li>
<li>ZFS, led by Matt Ahrens: topics will include enabling the new cryptographic hashes supported by OpenZFS on FreeBSD, Interaction with the kernel memory subsystem, and other upcoming features.</li>
<li>User Space Storage Stack, led by George Neville-Neil</li>
<li>This event offers a unique opportunity for developers and vendors from the storage industry to meet at an event they will likely already be attending
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2016-February/016514.html" rel="nofollow">Tor Browser 5.5 for OpenBSD/amd64 -current is completed</a></h3>

<ul>
<li>“The Tor BSD Diversity Project (TDP) is proud to announce the release of Tor Browser (TB) version 5.5 for OpenBSD. Please note that this version of TB remains in development mode, and is not meant to ensure strong privacy, anonymity or security.”</li>
<li>“TDP (<a href="https://torbsd.github.io" rel="nofollow">https://torbsd.github.io</a>) is an effort to extend the use of the BSD Unixes into the Tor ecosystem, from the desktop to the network. TDP is focused on diversifying the Tor network, with TB being the flagship project. 
Additional efforts are made to increase the number of *BSD relays on the Tor network among other sub-projects”</li>
<li>Help test the new browser bundle, or help diversify the Tor network
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2548" rel="nofollow">“FreeBSD Mastery: Advanced ZFS” Table of Contents</a></h3>

<ul>
<li><p>We brought you the news about sponsoring the Advanced ZFS book that MWL is working on, now Michael has given us the tentative chapter layout of the (sure to be a classic) tome coming from him and Allan.</p>

<ul>
<li>0: Introduction</li>
<li>1: Boot Environments</li>
<li>2: Delegation and Jails</li>
<li>3: Sharing</li>
<li>4: Replication</li>
<li>5: zvols</li>
<li>6: Advanced Hardware</li>
<li>7: Caches</li>
<li>8: Performance</li>
<li>9: Tuning</li>
<li>10: ZFS Potpourri</li>
</ul></li>
<li><p>In addition to the tease about the upcoming book, michael has asked the community for assistance in coming up with the cover art for it as well. </p></li>
<li><p>In particular it should probably be in-line with his previous works, with a parody of some other classic art-work. </p></li>
<li><p>If you have something, go tweet out to him at @mwlauthor</p>

<hr></li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="https://2016.asiabsdcon.org/index.html.en" rel="nofollow">Online registration for AsiaBSDCon 2016 now open <em>SOON</em></a></p></li>
<li><p><a href="http://bhyvecon.org/" rel="nofollow">BhyveCon 2016</a> </p></li>
<li><p><a href="http://www.nycbug.org/index.cgi?action=view&id=10640" rel="nofollow">NYC*BUG shell-fu talk slides</a></p></li>
<li><p><a href="http://lists.dragonflybsd.org/pipermail/users/2016-February/228597.html" rel="nofollow">Possible regression in DragonFly i915 graphics on older Core2Duos </a> </p></li>
<li><p><a href="http://video.fosdem.org/2016/" rel="nofollow">Videos from FOSDEM 2016. BSD dev room was k4601</a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2F39XEu9w" rel="nofollow"> Andrew - SMART Tests</a> </li>
<li><a href="http://slexy.org/view/s20kk6lzc9" rel="nofollow"> JT - Secure File Delete</a> </li>
<li><a href="http://slexy.org/view/s21zjZ0ci8" rel="nofollow"> Jordan - Migrate</a> </li>
<li><a href="http://slexy.org/view/s2Hqbt0Uq8" rel="nofollow"> Lars - Pros and Cons of VM</a> </li>
<li><a href="http://slexy.org/view/s2HnO1hxSO" rel="nofollow"> Alex - IPSEC</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>127: DNS, Black Holes &amp; Willem</title>
  <link>https://www.bsdnow.tv/127</link>
  <guid isPermaLink="false">f7ba1724-995a-465c-8528-7b593b402bfe</guid>
  <pubDate>Wed, 03 Feb 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f7ba1724-995a-465c-8528-7b593b402bfe.mp3" length="93318196" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Today on the show, we welcome Allan back from FOSSDEM, and enjoy an interview with Willem about DNS and MTU Black Holes. That plus all the weeks news, keep it turned here to BSD</itunes:subtitle>
  <itunes:duration>2:09:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Today on the show, we welcome Allan back from FOSSDEM, and enjoy an interview with Willem about DNS and MTU Black Holes. That plus all the weeks news, keep it turned here to BSD&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2015-10-2015-12.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Quarterly Status Report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It is that time of year again, reviewing the progress of the FreeBSD project over the last quarter of 2015&lt;/li&gt;
&lt;li&gt;There are a huge number of projects that have recently been completed or that are planned to finish in time for FreeBSD 10.3 or 11.0&lt;/li&gt;
&lt;li&gt;This is just a sample of the of the items that stood out most to us:&lt;/li&gt;
&lt;li&gt;A number of new teams have been created, and existing teams report in. The Issue Triage, bugmeister, jenkins, IPv6 advocacy, and wiki-admin teams are all mentioned in the status report&lt;/li&gt;
&lt;li&gt;Progress is reported on the i915 project to update the Intel graphics drivers&lt;/li&gt;
&lt;li&gt;In the storage subsystem: RCTL I/O rate limiting, Warner Losh’s CAM I/O Scheduler is progressing, Mellanox iSCSI Extensions for RDMA (iSER) was added, Chelsio iSCSI offload drivers, Mellanox 100 gbit/s drivers&lt;/li&gt;
&lt;li&gt;In Security: Encrypted crash dumps, OpenBSM updates, and a status report on HardenedBSD&lt;/li&gt;
&lt;li&gt;For embedded: Support for Ralink/Mediatek MIPS devices, Raspberry Pi Video Code packages, touch screen support for RPI and BBB, new port to the Marvell Armada38x, and the work on arm64 and RISC-V&lt;/li&gt;
&lt;li&gt;kib@ rewrote the out-of-memory handler, specifically to perform better in situations where a system does not have swap. Was tested on systems ranging from 32 MB of memory, to 512 GB&lt;/li&gt;
&lt;li&gt;Various improvements to the tool chain, build system, and nanobsd&lt;/li&gt;
&lt;li&gt;It was nice to see a bunch of reports from ports committers&lt;/li&gt;
&lt;li&gt;An overview of the different proposed init replacements, with a report on each
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sarah.thesharps.us/2016/02/02/first-timers-guide-to-foss-conferences/" target="_blank" rel="nofollow noopener"&gt;First timer’s guide to FOSS conferences &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This post provides a lot of good information for those considering going to their first conference&lt;/li&gt;
&lt;li&gt;The very first item says the most: “Conference talks are great because they teach you new skills or give you ideas. However, what conference talks are really for is giving you additional topics of conversation to chat with your fellow conference goers with. Hanging out after a talk ends to chat with the speaker is a great way to connect with speakers or fellow attendees that are passionate about a particular subject.”&lt;/li&gt;
&lt;li&gt;The hallway track is the best part of the conference. I’ve ended up missing as much as 2/3rds of a conference, and still found it to be a very valuable conference, sometimes more so than if I attend a talk in every slot&lt;/li&gt;
&lt;li&gt;It is important to remember that missing a talk is not the end of the world, that discussion in the hallway may be much more valuable. Most of the talks end up on youtube anyway. The point of the conference is being in the same place as the other people at the conference, the talks are just a means to get us all there.&lt;/li&gt;
&lt;li&gt;There is even a lot of good advice for people with social anxiety, and those like Allan who do not partake in alcohol&lt;/li&gt;
&lt;li&gt;Know the conference perks and the resources available to you. The author of the post commented on twitter about originally being unaware of the resources that some conferences provide for speakers, but also of discounts for students, and travel grants from Google and others like the FreeBSD Foundation&lt;/li&gt;
&lt;li&gt;There are also tips about swag, including watching out for booth wranglers (not common at BSD events, but many larger conferences have booths where your personal information can be exchanged for swag), as well as advice for following up with the people you meet at conferences.&lt;/li&gt;
&lt;li&gt;Lastly, it provides thoughts on avoiding “Project Passion Explosion“, or what I call “overcharging your BSD battery”, where after hearing about the interesting stuff other people are doing, or about the things other need, you try to do everything at once, and burn yourself out&lt;/li&gt;
&lt;li&gt;I know for myself, there are at least 10 projects I would love to work on, but I need to balance my free time, my work schedule, the FreeBSD release schedule, and which items might be better for someone else to work on.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.unixmen.com/freebsd-10-1-x64-wifi-captive-portal/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.1 based WiFi Captive Portal&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Captive portals, the bane of many a traveler’s existence, however a necessary evil in the era of war-driving and other potentially nefarious uses of “free-wifi”. &lt;/li&gt;
&lt;li&gt;This week we have an article from the folks at “unixmen”, showing (in great detail) how they setup a FreeBSD 10.1 based captive portal, and yes those are manual MySQL commands.&lt;/li&gt;
&lt;li&gt;First up is a diagram showing the layout of their new portal system, using multiple APs for different floors of the apartment / hotel?&lt;/li&gt;
&lt;li&gt;The walkthrough assumes you have Apache/MySQL and PHP already installed, so you’ll need to prep those bits beforehand.&lt;/li&gt;
&lt;li&gt;Some Apache configuration is up next, which re-directs all port 80 requests over to 443/SSL and the captive portal web-login&lt;/li&gt;
&lt;li&gt;At this point we have to install “pear” from ports or packages and begin to do the database setup which is fairly typical if you done any SQL before, such as create user / database / table, etc.&lt;/li&gt;
&lt;li&gt;With the database finished, the article provides a nice and clean rc.conf which enables all the necessary services.&lt;/li&gt;
&lt;li&gt;Next up is the firewall configuration, which is using IPFW, specifically DUMMYNET/IPALIAS/IPDIVERT and friends. The article does mention to compile a new minimal kernel with these features, if you plan on doing so they I would recommend starting off with that. &lt;/li&gt;
&lt;li&gt;The article then continues, with setting up DHCP server, SUDO and the PHP file creation that will act as the interface between the client and mysql/firewall rules. &lt;/li&gt;
&lt;li&gt;When it’s all said and done, you end up with a nice web-interface for clients, plus a bonus Admin interface to manage creating and removing users. &lt;/li&gt;
&lt;li&gt;For convenience at the very end is a link to all the files / configurations used, so grab that and avoid some of the copy-n-paste
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/NetBSDfr/sailor" target="_blank" rel="nofollow noopener"&gt;Sailor, a 'wannabe' portable container system {their own words!}&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In the world of docker / jails / VMs, containers are all the rage right now, and now we can introduce “Sailor” to this mix&lt;/li&gt;
&lt;li&gt;A unique thing about this new solution, is that its based upon chroot/pkgin, and available on NetBSD / OSX and CentOS&lt;/li&gt;
&lt;li&gt;Since it is not using “jail” or other security mechanism, they to give us this cavet “Note that sailor's goal is not to provide bullet-proof security, chroot is definitely not a trustable isolator; instead, sailor is a really convenient way of trying / testing an environment without compromising your workstation filesystem.”&lt;/li&gt;
&lt;li&gt;Creating a new “ship” is relatively straight-forward, a simple shell define file can supply most of the relevant information. Nginx for example is only a few lines: &lt;a href="https://github.com/NetBSDfr/sailor/blob/master/examples/nginx.conf" target="_blank" rel="nofollow noopener"&gt;https://github.com/NetBSDfr/sailor/blob/master/examples/nginx.conf&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;In addition to the basic pkg configuration, it also provides methods to do rw/ro mounts into the chroot, as well as IP aliases and copying of specific host binaries into the container
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Willem Toorop - &lt;a href="mailto:willem@nlnetlabs.nl" target="_blank" rel="nofollow noopener"&gt;willem@nlnetlabs.nl&lt;/a&gt; / &lt;a href="https://twitter.com/WillemToorop" target="_blank" rel="nofollow noopener"&gt;@WillemToorop&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;GetDNS&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=73M7h56Dsas" target="_blank" rel="nofollow noopener"&gt;vBSDCon 2015 Talk&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://wiki.tuhs.org/doku.php?id=publications:quarter_century_of_unix" target="_blank" rel="nofollow noopener"&gt;A Quarter Century of Unix&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An oldie, but goodie, the book “A Quarter Century of UNIX” is now available for free download via PDF format. &lt;/li&gt;
&lt;li&gt;This provides an invaluable look into the history of UNIX, which of course we wouldn’t have BSD without. &lt;/li&gt;
&lt;li&gt;There is also a print version still available via Amazon (link at the above URL also). If you find the book useful, consider buying a copy, since a % still goes to the original author
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2016janupdate.pdf" target="_blank" rel="nofollow noopener"&gt;Bjoern Zeeb has been awarded grant to finalize VIMAGE fixes &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“Bjoern Zeeb has been awarded a project grant to finalize and integrate the work done to make the VIMAGE network stack virtualization infrastructure production ready.”&lt;/li&gt;
&lt;li&gt;VIMAGE is the network virtualization kernel component that can be used to give jails their own network interfaces, so they can have their own firewalls, be assign addresses via DHCP, etc.&lt;/li&gt;
&lt;li&gt;Currently, a number of bugs prevent this feature from being enabled by default, or used in production&lt;/li&gt;
&lt;li&gt;The main areas of focus for the work are: network stack teardown, interface ordering, locking, and addressing the remaining memory leaks at teardown&lt;/li&gt;
&lt;li&gt;The work is expected to be completed by the end of March and to be included in FreeBSD 11.0
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/opensmtpd/faq/example1.html" target="_blank" rel="nofollow noopener"&gt;Building a smtpd Mail Server on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenSMTPd FAQ has been updated with a new walkthrough of a complete installation&lt;/li&gt;
&lt;li&gt;Following this guide, the resulting installation will:&lt;/li&gt;
&lt;li&gt;Accepting mails for multiple domains and virtual users&lt;/li&gt;
&lt;li&gt;Allowing virtual users to authenticate and send mails&lt;/li&gt;
&lt;li&gt;Applying anti-spam and anti-virus filters on mails&lt;/li&gt;
&lt;li&gt;Providing IMAP access for the virtual users&lt;/li&gt;
&lt;li&gt;Providing log statistics&lt;/li&gt;
&lt;li&gt;It covers setting up the new filter system, configuring TLS, creating the domain and user tables, configuring spamassassin and clamav, and setting up dovecot&lt;/li&gt;
&lt;li&gt;There is even a crontab to send you weekly stats on what your email server is doing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.informit.com/store/introduction-to-the-freebsd-open-source-operating-system-9780134305868" target="_blank" rel="nofollow noopener"&gt;Introduction to the FreeBSD Open Source Operating System LiveLessons&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Dr. Kirk McKusick has been one of the foremost authorities on FreeBSD for some time now, as co-author of the D&amp;amp;I of FreeBSD (along with George Neville-Neil and Robert Watson) and teaching numerous classes on the same. (Another good reason to come to a *BSD conference)&lt;/li&gt;
&lt;li&gt;As part of the Addison-Wesley Professional / LiveLessons series, he has made a 10+ hour video lecture you can now purchase to take his class from the comfort of your own home/couch/office/etc&lt;/li&gt;
&lt;li&gt;Aspiring FreeBSD developers, kernel developers, Application Developers and other interested individuals should really consider this invaluable resource in their learning.

&lt;ul&gt;
&lt;li&gt;The video starts with an introduction to the FreeBSD community and explains how it differs from the Linux ecosystem. The video then goes on to provide a firm background in the FreeBSD kernel. The POSIX kernel interfaces are used as examples where they are defined. Where they are not defined, the FreeBSD interfaces are described.&lt;/li&gt;
&lt;li&gt;The video covers basic kernel services, locking, process structure, scheduling, signal handling, jails, and virtual and physical memory management.&lt;/li&gt;
&lt;li&gt;The kernel I/O structure is described showing how I/O is multiplexed and the virtual filesystem interface is used to support multiple filesystems.&lt;/li&gt;
&lt;li&gt;Devices are described showing disk management and their auto-configuration.&lt;/li&gt;
&lt;li&gt;The organization and implementation of the fast filesystem is described concluding with a discussion of how to maintain consistency in the face of hardware or software failures.&lt;/li&gt;
&lt;li&gt;The video includes an overview of the ZFS filesystem and covers the socket-based network architecture, layering and routing issues.&lt;/li&gt;
&lt;li&gt;The presentations emphasize code organization, data structure navigation, and algorithms.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Normally the video will set you back $299, but right now you can pick it up for $239 (USD). We can’t recommend this enough, but also don’t forget to try and make it out to BSDCan or MeetBSD, where you can usually talk to Dr. McKusick in person.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;BeastieBits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://freebsdfoundation.blogspot.ca/2016/01/faces-of-freebsd-2016-sean-bruno.html" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD: Sean Bruno &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2539" target="_blank" rel="nofollow noopener"&gt;Support Michael W. Lucas writing BSD books, and get your name in the credits &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=295124" target="_blank" rel="nofollow noopener"&gt;bhyve windows support merged to stable/10 branch, will be included in FreeBSD 10.3 &lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://arstechnica.com/gaming/2016/01/ea-lets-slip-lifetime-xbox-one-and-ps4-consoles-sales/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Outsells Windows by almost 2-1&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://fanf.livejournal.com/140505.html" target="_blank" rel="nofollow noopener"&gt;A rant about the whois protocol&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://bsdtalk.blogspot.com/2016/01/bsdtalk261-jails-and-system-management.html" target="_blank" rel="nofollow noopener"&gt;Kris Moore talks about Jails and system management on BSDTalk&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://fosdem.org/2016/schedule/event/illumos_overview/attachments/audio/873/export/events/attachments/illumos_overview/audio/873/FOSDEM_2016.pdf" target="_blank" rel="nofollow noopener"&gt;FOSDEM 2016: Slides from the 5 years of IllumOS talk &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://twitter.com/pvaneynd/status/693813132649697281" target="_blank" rel="nofollow noopener"&gt;A tweet from the first day of FOSDEM showed only 1 FreeBSD machine. Many of the FreeBSD developers were at a devsummit offsite that day, and more users arrived for the BSD dev room which was on the Sunday &lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/ZWNHgqHQ" target="_blank" rel="nofollow noopener"&gt; Antonio - ZFS Book Formatting&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/XW97YSQK" target="_blank" rel="nofollow noopener"&gt; Simon - ZFS Corruption?&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/W7TwWwtE" target="_blank" rel="nofollow noopener"&gt; Christian - rm -r&lt;sup&gt;&lt;sup&gt;&lt;sup&gt;OOOPSSS&lt;/sup&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/zA2ewPuF" target="_blank" rel="nofollow noopener"&gt; Phillipp - ZFS Send/Recv&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today on the show, we welcome Allan back from FOSSDEM, and enjoy an interview with Willem about DNS and MTU Black Holes. That plus all the weeks news, keep it turned here to BSD</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-10-2015-12.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>It is that time of year again, reviewing the progress of the FreeBSD project over the last quarter of 2015</li>
<li>There are a huge number of projects that have recently been completed or that are planned to finish in time for FreeBSD 10.3 or 11.0</li>
<li>This is just a sample of the of the items that stood out most to us:</li>
<li>A number of new teams have been created, and existing teams report in. The Issue Triage, bugmeister, jenkins, IPv6 advocacy, and wiki-admin teams are all mentioned in the status report</li>
<li>Progress is reported on the i915 project to update the Intel graphics drivers</li>
<li>In the storage subsystem: RCTL I/O rate limiting, Warner Losh’s CAM I/O Scheduler is progressing, Mellanox iSCSI Extensions for RDMA (iSER) was added, Chelsio iSCSI offload drivers, Mellanox 100 gbit/s drivers</li>
<li>In Security: Encrypted crash dumps, OpenBSM updates, and a status report on HardenedBSD</li>
<li>For embedded: Support for Ralink/Mediatek MIPS devices, Raspberry Pi Video Code packages, touch screen support for RPI and BBB, new port to the Marvell Armada38x, and the work on arm64 and RISC-V</li>
<li>kib@ rewrote the out-of-memory handler, specifically to perform better in situations where a system does not have swap. Was tested on systems ranging from 32 MB of memory, to 512 GB</li>
<li>Various improvements to the tool chain, build system, and nanobsd</li>
<li>It was nice to see a bunch of reports from ports committers</li>
<li>An overview of the different proposed init replacements, with a report on each
***</li>
</ul>

<h3><a href="http://sarah.thesharps.us/2016/02/02/first-timers-guide-to-foss-conferences/" rel="nofollow">First timer’s guide to FOSS conferences </a></h3>

<ul>
<li>This post provides a lot of good information for those considering going to their first conference</li>
<li>The very first item says the most: “Conference talks are great because they teach you new skills or give you ideas. However, what conference talks are really for is giving you additional topics of conversation to chat with your fellow conference goers with. Hanging out after a talk ends to chat with the speaker is a great way to connect with speakers or fellow attendees that are passionate about a particular subject.”</li>
<li>The hallway track is the best part of the conference. I’ve ended up missing as much as 2/3rds of a conference, and still found it to be a very valuable conference, sometimes more so than if I attend a talk in every slot</li>
<li>It is important to remember that missing a talk is not the end of the world, that discussion in the hallway may be much more valuable. Most of the talks end up on youtube anyway. The point of the conference is being in the same place as the other people at the conference, the talks are just a means to get us all there.</li>
<li>There is even a lot of good advice for people with social anxiety, and those like Allan who do not partake in alcohol</li>
<li>Know the conference perks and the resources available to you. The author of the post commented on twitter about originally being unaware of the resources that some conferences provide for speakers, but also of discounts for students, and travel grants from Google and others like the FreeBSD Foundation</li>
<li>There are also tips about swag, including watching out for booth wranglers (not common at BSD events, but many larger conferences have booths where your personal information can be exchanged for swag), as well as advice for following up with the people you meet at conferences.</li>
<li>Lastly, it provides thoughts on avoiding “Project Passion Explosion“, or what I call “overcharging your BSD battery”, where after hearing about the interesting stuff other people are doing, or about the things other need, you try to do everything at once, and burn yourself out</li>
<li>I know for myself, there are at least 10 projects I would love to work on, but I need to balance my free time, my work schedule, the FreeBSD release schedule, and which items might be better for someone else to work on.
***</li>
</ul>

<h3><a href="http://www.unixmen.com/freebsd-10-1-x64-wifi-captive-portal/" rel="nofollow">FreeBSD 10.1 based WiFi Captive Portal</a></h3>

<ul>
<li>Captive portals, the bane of many a traveler’s existence, however a necessary evil in the era of war-driving and other potentially nefarious uses of “free-wifi”. </li>
<li>This week we have an article from the folks at “unixmen”, showing (in great detail) how they setup a FreeBSD 10.1 based captive portal, and yes those are manual MySQL commands.</li>
<li>First up is a diagram showing the layout of their new portal system, using multiple APs for different floors of the apartment / hotel?</li>
<li>The walkthrough assumes you have Apache/MySQL and PHP already installed, so you’ll need to prep those bits beforehand.</li>
<li>Some Apache configuration is up next, which re-directs all port 80 requests over to 443/SSL and the captive portal web-login</li>
<li>At this point we have to install “pear” from ports or packages and begin to do the database setup which is fairly typical if you done any SQL before, such as create user / database / table, etc.</li>
<li>With the database finished, the article provides a nice and clean rc.conf which enables all the necessary services.</li>
<li>Next up is the firewall configuration, which is using IPFW, specifically DUMMYNET/IPALIAS/IPDIVERT and friends. The article does mention to compile a new minimal kernel with these features, if you plan on doing so they I would recommend starting off with that. </li>
<li>The article then continues, with setting up DHCP server, SUDO and the PHP file creation that will act as the interface between the client and mysql/firewall rules. </li>
<li>When it’s all said and done, you end up with a nice web-interface for clients, plus a bonus Admin interface to manage creating and removing users. </li>
<li>For convenience at the very end is a link to all the files / configurations used, so grab that and avoid some of the copy-n-paste
***</li>
</ul>

<h3><a href="https://github.com/NetBSDfr/sailor" rel="nofollow">Sailor, a &#39;wannabe&#39; portable container system {their own words!}</a></h3>

<ul>
<li>In the world of docker / jails / VMs, containers are all the rage right now, and now we can introduce “Sailor” to this mix</li>
<li>A unique thing about this new solution, is that its based upon chroot/pkgin, and available on NetBSD / OSX and CentOS</li>
<li>Since it is not using “jail” or other security mechanism, they to give us this cavet “Note that sailor&#39;s goal is not to provide bullet-proof security, chroot is definitely not a trustable isolator; instead, sailor is a really convenient way of trying / testing an environment without compromising your workstation filesystem.”</li>
<li>Creating a new “ship” is relatively straight-forward, a simple shell define file can supply most of the relevant information. Nginx for example is only a few lines: <a href="https://github.com/NetBSDfr/sailor/blob/master/examples/nginx.conf" rel="nofollow">https://github.com/NetBSDfr/sailor/blob/master/examples/nginx.conf</a> </li>
<li>In addition to the basic pkg configuration, it also provides methods to do rw/ro mounts into the chroot, as well as IP aliases and copying of specific host binaries into the container
***</li>
</ul>

<h2>Interview - Willem Toorop - <a href="mailto:willem@nlnetlabs.nl" rel="nofollow">willem@nlnetlabs.nl</a> / <a href="https://twitter.com/WillemToorop" rel="nofollow">@WillemToorop</a></h2>

<ul>
<li>GetDNS</li>
<li><a href="https://www.youtube.com/watch?v=73M7h56Dsas" rel="nofollow">vBSDCon 2015 Talk</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://wiki.tuhs.org/doku.php?id=publications:quarter_century_of_unix" rel="nofollow">A Quarter Century of Unix</a></h3>

<ul>
<li>An oldie, but goodie, the book “A Quarter Century of UNIX” is now available for free download via PDF format. </li>
<li>This provides an invaluable look into the history of UNIX, which of course we wouldn’t have BSD without. </li>
<li>There is also a print version still available via Amazon (link at the above URL also). If you find the book useful, consider buying a copy, since a % still goes to the original author
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2016janupdate.pdf" rel="nofollow">Bjoern Zeeb has been awarded grant to finalize VIMAGE fixes </a></h3>

<ul>
<li>“Bjoern Zeeb has been awarded a project grant to finalize and integrate the work done to make the VIMAGE network stack virtualization infrastructure production ready.”</li>
<li>VIMAGE is the network virtualization kernel component that can be used to give jails their own network interfaces, so they can have their own firewalls, be assign addresses via DHCP, etc.</li>
<li>Currently, a number of bugs prevent this feature from being enabled by default, or used in production</li>
<li>The main areas of focus for the work are: network stack teardown, interface ordering, locking, and addressing the remaining memory leaks at teardown</li>
<li>The work is expected to be completed by the end of March and to be included in FreeBSD 11.0
***</li>
</ul>

<h3><a href="http://www.openbsd.org/opensmtpd/faq/example1.html" rel="nofollow">Building a smtpd Mail Server on OpenBSD</a></h3>

<ul>
<li>The OpenSMTPd FAQ has been updated with a new walkthrough of a complete installation</li>
<li>Following this guide, the resulting installation will:</li>
<li>Accepting mails for multiple domains and virtual users</li>
<li>Allowing virtual users to authenticate and send mails</li>
<li>Applying anti-spam and anti-virus filters on mails</li>
<li>Providing IMAP access for the virtual users</li>
<li>Providing log statistics</li>
<li>It covers setting up the new filter system, configuring TLS, creating the domain and user tables, configuring spamassassin and clamav, and setting up dovecot</li>
<li>There is even a crontab to send you weekly stats on what your email server is doing
***</li>
</ul>

<h3><a href="http://www.informit.com/store/introduction-to-the-freebsd-open-source-operating-system-9780134305868" rel="nofollow">Introduction to the FreeBSD Open Source Operating System LiveLessons</a></h3>

<ul>
<li>Dr. Kirk McKusick has been one of the foremost authorities on FreeBSD for some time now, as co-author of the D&amp;I of FreeBSD (along with George Neville-Neil and Robert Watson) and teaching numerous classes on the same. (Another good reason to come to a *BSD conference)</li>
<li>As part of the Addison-Wesley Professional / LiveLessons series, he has made a 10+ hour video lecture you can now purchase to take his class from the comfort of your own home/couch/office/etc</li>
<li>Aspiring FreeBSD developers, kernel developers, Application Developers and other interested individuals should really consider this invaluable resource in their learning.

<ul>
<li>The video starts with an introduction to the FreeBSD community and explains how it differs from the Linux ecosystem. The video then goes on to provide a firm background in the FreeBSD kernel. The POSIX kernel interfaces are used as examples where they are defined. Where they are not defined, the FreeBSD interfaces are described.</li>
<li>The video covers basic kernel services, locking, process structure, scheduling, signal handling, jails, and virtual and physical memory management.</li>
<li>The kernel I/O structure is described showing how I/O is multiplexed and the virtual filesystem interface is used to support multiple filesystems.</li>
<li>Devices are described showing disk management and their auto-configuration.</li>
<li>The organization and implementation of the fast filesystem is described concluding with a discussion of how to maintain consistency in the face of hardware or software failures.</li>
<li>The video includes an overview of the ZFS filesystem and covers the socket-based network architecture, layering and routing issues.</li>
<li>The presentations emphasize code organization, data structure navigation, and algorithms.</li>
</ul></li>
<li>Normally the video will set you back $299, but right now you can pick it up for $239 (USD). We can’t recommend this enough, but also don’t forget to try and make it out to BSDCan or MeetBSD, where you can usually talk to Dr. McKusick in person.
***</li>
</ul>

<h3>BeastieBits</h3>

<ul>
<li><p><a href="http://freebsdfoundation.blogspot.ca/2016/01/faces-of-freebsd-2016-sean-bruno.html" rel="nofollow">Faces of FreeBSD: Sean Bruno </a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2539" rel="nofollow">Support Michael W. Lucas writing BSD books, and get your name in the credits </a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=295124" rel="nofollow">bhyve windows support merged to stable/10 branch, will be included in FreeBSD 10.3 </a></p></li>
<li><p><a href="http://arstechnica.com/gaming/2016/01/ea-lets-slip-lifetime-xbox-one-and-ps4-consoles-sales/" rel="nofollow">FreeBSD Outsells Windows by almost 2-1</a> </p></li>
<li><p><a href="http://fanf.livejournal.com/140505.html" rel="nofollow">A rant about the whois protocol</a> </p></li>
<li><p><a href="http://bsdtalk.blogspot.com/2016/01/bsdtalk261-jails-and-system-management.html" rel="nofollow">Kris Moore talks about Jails and system management on BSDTalk</a> </p></li>
<li><p><a href="https://fosdem.org/2016/schedule/event/illumos_overview/attachments/audio/873/export/events/attachments/illumos_overview/audio/873/FOSDEM_2016.pdf" rel="nofollow">FOSDEM 2016: Slides from the 5 years of IllumOS talk </a> </p></li>
<li><p><a href="https://twitter.com/pvaneynd/status/693813132649697281" rel="nofollow">A tweet from the first day of FOSDEM showed only 1 FreeBSD machine. Many of the FreeBSD developers were at a devsummit offsite that day, and more users arrived for the BSD dev room which was on the Sunday </a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ZWNHgqHQ" rel="nofollow"> Antonio - ZFS Book Formatting</a> </li>
<li><a href="http://pastebin.com/XW97YSQK" rel="nofollow"> Simon - ZFS Corruption?</a> </li>
<li><a href="http://pastebin.com/W7TwWwtE" rel="nofollow"> Christian - rm -r<sup><sup><sup>OOOPSSS</sup></sup></sup></a> </li>
<li><a href="http://pastebin.com/zA2ewPuF" rel="nofollow"> Phillipp - ZFS Send/Recv</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today on the show, we welcome Allan back from FOSSDEM, and enjoy an interview with Willem about DNS and MTU Black Holes. That plus all the weeks news, keep it turned here to BSD</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-10-2015-12.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>It is that time of year again, reviewing the progress of the FreeBSD project over the last quarter of 2015</li>
<li>There are a huge number of projects that have recently been completed or that are planned to finish in time for FreeBSD 10.3 or 11.0</li>
<li>This is just a sample of the of the items that stood out most to us:</li>
<li>A number of new teams have been created, and existing teams report in. The Issue Triage, bugmeister, jenkins, IPv6 advocacy, and wiki-admin teams are all mentioned in the status report</li>
<li>Progress is reported on the i915 project to update the Intel graphics drivers</li>
<li>In the storage subsystem: RCTL I/O rate limiting, Warner Losh’s CAM I/O Scheduler is progressing, Mellanox iSCSI Extensions for RDMA (iSER) was added, Chelsio iSCSI offload drivers, Mellanox 100 gbit/s drivers</li>
<li>In Security: Encrypted crash dumps, OpenBSM updates, and a status report on HardenedBSD</li>
<li>For embedded: Support for Ralink/Mediatek MIPS devices, Raspberry Pi Video Code packages, touch screen support for RPI and BBB, new port to the Marvell Armada38x, and the work on arm64 and RISC-V</li>
<li>kib@ rewrote the out-of-memory handler, specifically to perform better in situations where a system does not have swap. Was tested on systems ranging from 32 MB of memory, to 512 GB</li>
<li>Various improvements to the tool chain, build system, and nanobsd</li>
<li>It was nice to see a bunch of reports from ports committers</li>
<li>An overview of the different proposed init replacements, with a report on each
***</li>
</ul>

<h3><a href="http://sarah.thesharps.us/2016/02/02/first-timers-guide-to-foss-conferences/" rel="nofollow">First timer’s guide to FOSS conferences </a></h3>

<ul>
<li>This post provides a lot of good information for those considering going to their first conference</li>
<li>The very first item says the most: “Conference talks are great because they teach you new skills or give you ideas. However, what conference talks are really for is giving you additional topics of conversation to chat with your fellow conference goers with. Hanging out after a talk ends to chat with the speaker is a great way to connect with speakers or fellow attendees that are passionate about a particular subject.”</li>
<li>The hallway track is the best part of the conference. I’ve ended up missing as much as 2/3rds of a conference, and still found it to be a very valuable conference, sometimes more so than if I attend a talk in every slot</li>
<li>It is important to remember that missing a talk is not the end of the world, that discussion in the hallway may be much more valuable. Most of the talks end up on youtube anyway. The point of the conference is being in the same place as the other people at the conference, the talks are just a means to get us all there.</li>
<li>There is even a lot of good advice for people with social anxiety, and those like Allan who do not partake in alcohol</li>
<li>Know the conference perks and the resources available to you. The author of the post commented on twitter about originally being unaware of the resources that some conferences provide for speakers, but also of discounts for students, and travel grants from Google and others like the FreeBSD Foundation</li>
<li>There are also tips about swag, including watching out for booth wranglers (not common at BSD events, but many larger conferences have booths where your personal information can be exchanged for swag), as well as advice for following up with the people you meet at conferences.</li>
<li>Lastly, it provides thoughts on avoiding “Project Passion Explosion“, or what I call “overcharging your BSD battery”, where after hearing about the interesting stuff other people are doing, or about the things other need, you try to do everything at once, and burn yourself out</li>
<li>I know for myself, there are at least 10 projects I would love to work on, but I need to balance my free time, my work schedule, the FreeBSD release schedule, and which items might be better for someone else to work on.
***</li>
</ul>

<h3><a href="http://www.unixmen.com/freebsd-10-1-x64-wifi-captive-portal/" rel="nofollow">FreeBSD 10.1 based WiFi Captive Portal</a></h3>

<ul>
<li>Captive portals, the bane of many a traveler’s existence, however a necessary evil in the era of war-driving and other potentially nefarious uses of “free-wifi”. </li>
<li>This week we have an article from the folks at “unixmen”, showing (in great detail) how they setup a FreeBSD 10.1 based captive portal, and yes those are manual MySQL commands.</li>
<li>First up is a diagram showing the layout of their new portal system, using multiple APs for different floors of the apartment / hotel?</li>
<li>The walkthrough assumes you have Apache/MySQL and PHP already installed, so you’ll need to prep those bits beforehand.</li>
<li>Some Apache configuration is up next, which re-directs all port 80 requests over to 443/SSL and the captive portal web-login</li>
<li>At this point we have to install “pear” from ports or packages and begin to do the database setup which is fairly typical if you done any SQL before, such as create user / database / table, etc.</li>
<li>With the database finished, the article provides a nice and clean rc.conf which enables all the necessary services.</li>
<li>Next up is the firewall configuration, which is using IPFW, specifically DUMMYNET/IPALIAS/IPDIVERT and friends. The article does mention to compile a new minimal kernel with these features, if you plan on doing so they I would recommend starting off with that. </li>
<li>The article then continues, with setting up DHCP server, SUDO and the PHP file creation that will act as the interface between the client and mysql/firewall rules. </li>
<li>When it’s all said and done, you end up with a nice web-interface for clients, plus a bonus Admin interface to manage creating and removing users. </li>
<li>For convenience at the very end is a link to all the files / configurations used, so grab that and avoid some of the copy-n-paste
***</li>
</ul>

<h3><a href="https://github.com/NetBSDfr/sailor" rel="nofollow">Sailor, a &#39;wannabe&#39; portable container system {their own words!}</a></h3>

<ul>
<li>In the world of docker / jails / VMs, containers are all the rage right now, and now we can introduce “Sailor” to this mix</li>
<li>A unique thing about this new solution, is that its based upon chroot/pkgin, and available on NetBSD / OSX and CentOS</li>
<li>Since it is not using “jail” or other security mechanism, they to give us this cavet “Note that sailor&#39;s goal is not to provide bullet-proof security, chroot is definitely not a trustable isolator; instead, sailor is a really convenient way of trying / testing an environment without compromising your workstation filesystem.”</li>
<li>Creating a new “ship” is relatively straight-forward, a simple shell define file can supply most of the relevant information. Nginx for example is only a few lines: <a href="https://github.com/NetBSDfr/sailor/blob/master/examples/nginx.conf" rel="nofollow">https://github.com/NetBSDfr/sailor/blob/master/examples/nginx.conf</a> </li>
<li>In addition to the basic pkg configuration, it also provides methods to do rw/ro mounts into the chroot, as well as IP aliases and copying of specific host binaries into the container
***</li>
</ul>

<h2>Interview - Willem Toorop - <a href="mailto:willem@nlnetlabs.nl" rel="nofollow">willem@nlnetlabs.nl</a> / <a href="https://twitter.com/WillemToorop" rel="nofollow">@WillemToorop</a></h2>

<ul>
<li>GetDNS</li>
<li><a href="https://www.youtube.com/watch?v=73M7h56Dsas" rel="nofollow">vBSDCon 2015 Talk</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://wiki.tuhs.org/doku.php?id=publications:quarter_century_of_unix" rel="nofollow">A Quarter Century of Unix</a></h3>

<ul>
<li>An oldie, but goodie, the book “A Quarter Century of UNIX” is now available for free download via PDF format. </li>
<li>This provides an invaluable look into the history of UNIX, which of course we wouldn’t have BSD without. </li>
<li>There is also a print version still available via Amazon (link at the above URL also). If you find the book useful, consider buying a copy, since a % still goes to the original author
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2016janupdate.pdf" rel="nofollow">Bjoern Zeeb has been awarded grant to finalize VIMAGE fixes </a></h3>

<ul>
<li>“Bjoern Zeeb has been awarded a project grant to finalize and integrate the work done to make the VIMAGE network stack virtualization infrastructure production ready.”</li>
<li>VIMAGE is the network virtualization kernel component that can be used to give jails their own network interfaces, so they can have their own firewalls, be assign addresses via DHCP, etc.</li>
<li>Currently, a number of bugs prevent this feature from being enabled by default, or used in production</li>
<li>The main areas of focus for the work are: network stack teardown, interface ordering, locking, and addressing the remaining memory leaks at teardown</li>
<li>The work is expected to be completed by the end of March and to be included in FreeBSD 11.0
***</li>
</ul>

<h3><a href="http://www.openbsd.org/opensmtpd/faq/example1.html" rel="nofollow">Building a smtpd Mail Server on OpenBSD</a></h3>

<ul>
<li>The OpenSMTPd FAQ has been updated with a new walkthrough of a complete installation</li>
<li>Following this guide, the resulting installation will:</li>
<li>Accepting mails for multiple domains and virtual users</li>
<li>Allowing virtual users to authenticate and send mails</li>
<li>Applying anti-spam and anti-virus filters on mails</li>
<li>Providing IMAP access for the virtual users</li>
<li>Providing log statistics</li>
<li>It covers setting up the new filter system, configuring TLS, creating the domain and user tables, configuring spamassassin and clamav, and setting up dovecot</li>
<li>There is even a crontab to send you weekly stats on what your email server is doing
***</li>
</ul>

<h3><a href="http://www.informit.com/store/introduction-to-the-freebsd-open-source-operating-system-9780134305868" rel="nofollow">Introduction to the FreeBSD Open Source Operating System LiveLessons</a></h3>

<ul>
<li>Dr. Kirk McKusick has been one of the foremost authorities on FreeBSD for some time now, as co-author of the D&amp;I of FreeBSD (along with George Neville-Neil and Robert Watson) and teaching numerous classes on the same. (Another good reason to come to a *BSD conference)</li>
<li>As part of the Addison-Wesley Professional / LiveLessons series, he has made a 10+ hour video lecture you can now purchase to take his class from the comfort of your own home/couch/office/etc</li>
<li>Aspiring FreeBSD developers, kernel developers, Application Developers and other interested individuals should really consider this invaluable resource in their learning.

<ul>
<li>The video starts with an introduction to the FreeBSD community and explains how it differs from the Linux ecosystem. The video then goes on to provide a firm background in the FreeBSD kernel. The POSIX kernel interfaces are used as examples where they are defined. Where they are not defined, the FreeBSD interfaces are described.</li>
<li>The video covers basic kernel services, locking, process structure, scheduling, signal handling, jails, and virtual and physical memory management.</li>
<li>The kernel I/O structure is described showing how I/O is multiplexed and the virtual filesystem interface is used to support multiple filesystems.</li>
<li>Devices are described showing disk management and their auto-configuration.</li>
<li>The organization and implementation of the fast filesystem is described concluding with a discussion of how to maintain consistency in the face of hardware or software failures.</li>
<li>The video includes an overview of the ZFS filesystem and covers the socket-based network architecture, layering and routing issues.</li>
<li>The presentations emphasize code organization, data structure navigation, and algorithms.</li>
</ul></li>
<li>Normally the video will set you back $299, but right now you can pick it up for $239 (USD). We can’t recommend this enough, but also don’t forget to try and make it out to BSDCan or MeetBSD, where you can usually talk to Dr. McKusick in person.
***</li>
</ul>

<h3>BeastieBits</h3>

<ul>
<li><p><a href="http://freebsdfoundation.blogspot.ca/2016/01/faces-of-freebsd-2016-sean-bruno.html" rel="nofollow">Faces of FreeBSD: Sean Bruno </a> </p></li>
<li><p><a href="http://blather.michaelwlucas.com/archives/2539" rel="nofollow">Support Michael W. Lucas writing BSD books, and get your name in the credits </a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=295124" rel="nofollow">bhyve windows support merged to stable/10 branch, will be included in FreeBSD 10.3 </a></p></li>
<li><p><a href="http://arstechnica.com/gaming/2016/01/ea-lets-slip-lifetime-xbox-one-and-ps4-consoles-sales/" rel="nofollow">FreeBSD Outsells Windows by almost 2-1</a> </p></li>
<li><p><a href="http://fanf.livejournal.com/140505.html" rel="nofollow">A rant about the whois protocol</a> </p></li>
<li><p><a href="http://bsdtalk.blogspot.com/2016/01/bsdtalk261-jails-and-system-management.html" rel="nofollow">Kris Moore talks about Jails and system management on BSDTalk</a> </p></li>
<li><p><a href="https://fosdem.org/2016/schedule/event/illumos_overview/attachments/audio/873/export/events/attachments/illumos_overview/audio/873/FOSDEM_2016.pdf" rel="nofollow">FOSDEM 2016: Slides from the 5 years of IllumOS talk </a> </p></li>
<li><p><a href="https://twitter.com/pvaneynd/status/693813132649697281" rel="nofollow">A tweet from the first day of FOSDEM showed only 1 FreeBSD machine. Many of the FreeBSD developers were at a devsummit offsite that day, and more users arrived for the BSD dev room which was on the Sunday </a> </p>

<hr></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/ZWNHgqHQ" rel="nofollow"> Antonio - ZFS Book Formatting</a> </li>
<li><a href="http://pastebin.com/XW97YSQK" rel="nofollow"> Simon - ZFS Corruption?</a> </li>
<li><a href="http://pastebin.com/W7TwWwtE" rel="nofollow"> Christian - rm -r<sup><sup><sup>OOOPSSS</sup></sup></sup></a> </li>
<li><a href="http://pastebin.com/zA2ewPuF" rel="nofollow"> Phillipp - ZFS Send/Recv</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>126: Illuminating the future on PC-BSD</title>
  <link>https://www.bsdnow.tv/126</link>
  <guid isPermaLink="false">38a81f5a-d2f7-40c2-a625-0c36792766d7</guid>
  <pubDate>Wed, 27 Jan 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/38a81f5a-d2f7-40c2-a625-0c36792766d7.mp3" length="78139732" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we are going to be talking to Ken Moore about the Lumina desktop environment, where it stands now &amp; looking ahead. Then Allan turns the tables &amp; interviews both Kris &amp; Ken about new ongoings in PC-BSD land. Stay tuned, lots of exciting show is coming your way right now on BSDNow, the place to B...SD!</itunes:subtitle>
  <itunes:duration>1:48:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we are going to be talking to Ken Moore about the Lumina desktop environment, where it stands now &amp;amp; looking ahead. Then Allan turns the tables &amp;amp; interviews both Kris &amp;amp; Ken about new ongoings in PC-BSD land. Stay tuned, lots of exciting show is coming your way right now on BSDNow, the place to B...SD!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.linuxvoice.com/group-test-nas-distros/" target="_blank" rel="nofollow noopener"&gt;Linuxvoice reviews six NAS designed OSes and states that FreeNAS has the largest amount of features&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The review compares the features of: FreeNAS, NAS4Free, Open Media Vault, Openfiler Community Edition, EasyNAS, and Turnkey Linux File Server&lt;/li&gt;
&lt;li&gt;“Many NAS solutions can do a lot more than just back up and restore files – you can extend them with plugins to do a variety of tasks. Some enable you to stream media to computers and others devices. Others can hook up with apps and services and allow them to use the NAS for storing and retrieving data”&lt;/li&gt;
&lt;li&gt;Open Media Vault: 4/5, “A feature-rich NAS distro that’s easy to deploy and manage”. Many plugins, good UI&lt;/li&gt;
&lt;li&gt;Turnkey Linux File Server: 2/5, “A no-fuss distro that’ll set up a fully functional file sharing server in no time”. No RAID, LVM must be down manually&lt;/li&gt;
&lt;li&gt;Openfiler Community Edition: 1/5, “There is a target segment for Openfiler, but we can’t spot it”. In the middle of rebasing on CentOS, lacking documentation, confusing UI&lt;/li&gt;
&lt;li&gt;EasyNAS: 3/5, “A simple NAS distro that balances the availability of features with reasonable assumptions”. Major updates require reinstall, lacks advanced features and advanced protocols&lt;/li&gt;
&lt;li&gt;FreeNAS: 3/5, “FreeNAS The most feature-rich NAS distribution requires some getting used to”. Best documentation, best snapshot management, most plugins, jailed plugins, most enterprise features&lt;/li&gt;
&lt;li&gt;NAS4Free: 3/5, “NAS4Free An advanced NAS distro that’s designed for advanced users”, additional flexibility with disk layout (partition the first disk to install the OS there, use remaining space for data storage)&lt;/li&gt;
&lt;li&gt;“If we had to award this group test to the distro with the biggest number of features then the top two challengers would have been FreeNAS and its protegée NAS4Free. While both of these solutions pitch themselves to users outside the corporate environment, they’d simply be overkill for most home users. Furthermore, their FreeBSD base and the ZFS filesystem, while a boon to enterprise users, virtually makes them alien technology to the average Linux household.”&lt;/li&gt;
&lt;li&gt;It is not clear why they gave NAS4Free and FreeNAS the same score when they wrote a list of reasons why FreeNAS was better.&lt;/li&gt;
&lt;li&gt;It seems the goal of their rundown was to find the best Linux NAS, not the best NAS.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.unixmen.com/freebsd-snort-ips/" target="_blank" rel="nofollow noopener"&gt;FreeBSD based Snort IPS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;UnixMen.com provides a new tutorial on setting up Snort, the IPS (Intrusion Prevention system) on FreeBSD&lt;/li&gt;
&lt;li&gt;Install Apache, PHP, and MySQL, then Snort&lt;/li&gt;
&lt;li&gt;Download the latest Snort rules from the official website&lt;/li&gt;
&lt;li&gt;Disable the Packet Filter on the USB interfaces to avoid issues with Snort&lt;/li&gt;
&lt;li&gt;Install oinkmaster and barnyard2, and configure them&lt;/li&gt;
&lt;li&gt;Then install the Snorby WEB interface, which will give you a nice overview of the data generated by the IPS&lt;/li&gt;
&lt;li&gt;Then install SnortSAM, and connect it to ipfw&lt;/li&gt;
&lt;li&gt;Now when Snort detects a potential intrusion, it will be displayed in Snorby, and automatically blocked with IPFW
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opensource.com/life/16/1/3-new-open-source-contributors-share-their-experiences" target="_blank" rel="nofollow noopener"&gt;Opensource.com features two BSD developers as examples of how open source can help your career&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“When contributing to open source projects and communities, one of the many benefits is that you can improve your tech skills. In this article, hear from three contributors on how their open source helped them get a job or improved their career.”&lt;/li&gt;
&lt;li&gt;Alexander Yurchenko, an OpenBSD developer who now works at Yandex says: “Participating in such a project yields colossal experience. A good, large open source project has everything that is typically required from a developer at job interviews: good planning, good coding, use of versioning systems and bug trackers, peer reviews, teamwork, and such. So, after stewing in such an environment for a year or two, you have a good opportunity to grow to a senior developer level.”&lt;/li&gt;
&lt;li&gt;“That is, in fact, what happened to me. I was hired as a senior developer without having any formal work experience on my service record. After the first week, my probation period was reduced from three months to zero.”&lt;/li&gt;
&lt;li&gt;While you may not have “formal work experience”, you do have a body of work, a (code/documentation/etc) portfolio, you can point to&lt;/li&gt;
&lt;li&gt;Having spent a year working somewhere may say something about you, but showing some code you wrote that other people use every day, is usually more valuable&lt;/li&gt;
&lt;li&gt;Alexander Polyakov, a DragonFly contributor, worked on updating support for other languages and on ACPI.&lt;/li&gt;
&lt;li&gt;“I even made some money in the process—a customer found me via git log. He wanted to use DragonFlyBSD in production and needed better ACPI support and some RAID driver or something.”&lt;/li&gt;
&lt;li&gt;“In a nutshell, contributing to various open source projects is how you gain great experience. Don't be afraid to send in bad code (happens to the best of us), keep calm (while being scolded for sending in that bad code), and choose projects you are really interested in. Then you'll both gain experience and have fun while you doing it.”&lt;/li&gt;
&lt;li&gt;Kirill Gorkunov talks about his experience with turning open source into a career: “For a few years, I've been fixing the code, sending patches, getting scolded for bad code and complimented for good code. That experience was priceless. And you can be sure that as soon as you get good at it, job offers will follow. This is, in fact, how I met the kernel developers working on OpenVZ. Together, we decided to continue working on the OpenVZ kernel and related stuff as well”&lt;/li&gt;
&lt;li&gt;When you contribute to open source, you end up being the person who wrote “Foo”, and this can often turn into work, when someone wants to build something with “Foo”, or like “Foo”&lt;/li&gt;
&lt;li&gt;This same point was focus of a panel the FreeBSD Foundation organized at the womENcourage conference in Sweden last year: &lt;a href="https://www.youtube.com/watch?v=p7PW1E3IJvY" target="_blank" rel="nofollow noopener"&gt;Open Source as a Career Path
&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/BernardSpil/LetsEncrypt" target="_blank" rel="nofollow noopener"&gt;FreeBSD, LibreSSL and LetsEncrypt oh my!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over on the FreeBSD Wiki, Bernard Spil (whom we’ve interviewed before) has started a walkthrough talking about how he uses LibreSSL and LetsEncrypt, without using the heavy python client&lt;/li&gt;
&lt;li&gt;The article provides detailed instructions on prepping the system and automating the process of updating the SSL certificates&lt;/li&gt;
&lt;li&gt;If you’ve used the “official” letsencrypt client in the past, you’ll note some differences in his method, which keeps all the ‘acme-challenge’ files in a single-directory, which is aliased into domains. &lt;/li&gt;
&lt;li&gt;Using this method also drops the requirement to run the letsencrypt auth as root, and allows you to run it as the unprivileged “letsencrypt” user instead. &lt;/li&gt;
&lt;li&gt;He mentions that the bash/zsh scripts used may be added to ports at some point as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ken Moore &amp;amp; Kris Moore - &lt;a href="mailto:ken@pcbsd.org" target="_blank" rel="nofollow noopener"&gt;ken@pcbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/pcbsdkris" target="_blank" rel="nofollow noopener"&gt;@pcbsdkris&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;PC-BSD’s new SysAdm Project and Lumina Update
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2016-January/459241.html" target="_blank" rel="nofollow noopener"&gt;DragonFly Intel i915 support to match what’s in the Linux 4.1 kernel&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In DragonFly’s ongoing quest for DRM awesomeness, they have now merged changes to bring them up to Linux 4.1 kernel features. &lt;/li&gt;
&lt;li&gt;Some of the notables include that “Valleyview” support is greatly improved, and not considered preliminary anymore&lt;/li&gt;
&lt;li&gt;Skylake got some support improvements as well, including runtime power management, and that turbo and sleep states should be functional. &lt;/li&gt;
&lt;li&gt;Some great improvements to power usage have been added, such as setting GPU frequencies to hardware minimum and enabling of DRRS (Dynamic Refresh Rate Switching) being enabled by default&lt;/li&gt;
&lt;li&gt;They’ve even begun importing some of the prelim work for Broxton, the upcoming Atom SOC
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://ramsdenj.github.io/server/2016/01/01/FreeNAS-Server-Build.html" target="_blank" rel="nofollow noopener"&gt;FreeNAS Home Server Build&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a nice article to share with you this week by John Ramsden, which walks us through his home-brew FreeNAS server setup.&lt;/li&gt;
&lt;li&gt;As is typical with most home users, he will be using the system to both serve media, and as a backup target for other systems.&lt;/li&gt;
&lt;li&gt;His hardware setup is pretty impressive for a home-brew, made up of the following:

&lt;ul&gt;
&lt;li&gt;Fractal Design Node 804 Chassis&lt;/li&gt;
&lt;li&gt;Supermicro X10SL7-F Motherboard&lt;/li&gt;
&lt;li&gt;Xeon E3-1231 v3 CPU&lt;/li&gt;
&lt;li&gt;4x Samsung DDR3 1.35v-1600 M391B1G73QH0 RAM&lt;/li&gt;
&lt;li&gt;2x 32GB SATA III SMC DOM Boot Drive&lt;/li&gt;
&lt;li&gt;SeaSonic G-550 Power Supply&lt;/li&gt;
&lt;li&gt;Cyberpower CP1500PFCLCD 1500VA 900W PFC UPS&lt;/li&gt;
&lt;li&gt;6x Western Digital 6TB Red HDD&lt;/li&gt;
&lt;li&gt;2 x ENERMAX T.B. Silence UCTB12P Case Fan&lt;/li&gt;
&lt;li&gt;3x Noctua NF-P14s redux-1200 Case Fan&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The SATA DOM was neat to see in use, in his case in a mirror&lt;/li&gt;
&lt;li&gt;He then walks us through his burn-in process, which involved memory testing for 46 hours, and then disk testing with the smartctl long tests. &lt;/li&gt;
&lt;li&gt;&lt;p&gt;There is even details on how the fan thresholds were set up, which may be of use to other DiY’ers out there. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The SATA DOM was neat to see in use, in his case in a mirror&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;He then walks us through his burn-in process, which involved memory testing for 46 hours, and then disk testing with the smartctl long tests. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;There is even details on how the fan thresholds were set up, which may be of use to other DiY’ers out there. &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/bwesterb/claviger" target="_blank" rel="nofollow noopener"&gt;claviger manages your SSH authorized_keys files for you&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An application to manage your SSH authorized_keys files for you&lt;/li&gt;
&lt;li&gt;Make a list of your keys (laptop, desktop, work)&lt;/li&gt;
&lt;li&gt;Then a list of your ssh accounts&lt;/li&gt;
&lt;li&gt;List which keys should be present, and which should be absent&lt;/li&gt;
&lt;li&gt;Optional setting to keep all “other” keys, such as those added by other users&lt;/li&gt;
&lt;li&gt;Optional list of specific “other” keys to allow (does not add them, but does not remove them if they are present)&lt;/li&gt;
&lt;li&gt;You say say ‘server2 like server1’, and it will inherit all of the settings from that server&lt;/li&gt;
&lt;li&gt;There is a “default” server, that all others inherit
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.unixmen.com/openvpn-ad-authentication-with-crypt/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.2 x64 OpenVPN AD authentication with crypt&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few days back unixmen.com posted a nice tutorial walkthrough of a OpenVPN setup on FreeBSD 9.2 using Active Directory for auth&lt;/li&gt;
&lt;li&gt;In this particular setup, FreeBSD is running the gateway / OpenVPN server, the client desktops are running Windows 7 and domain controller on Windows 2008&lt;/li&gt;
&lt;li&gt;The setup on FreeBSD pretty straightforward, thanks to the openvpn-auth-ldap port. (Unknown why they didn’t use the package)&lt;/li&gt;
&lt;li&gt;In addition to showing the details on how configuration was done on BSD, what makes this walkthrough nice is the addition of so many screenshots of how the windows configuration was done. &lt;/li&gt;
&lt;li&gt;Part of the walkthrough will also detail how they created their .ovpn files for importing on the OpenVPN clients. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/share/mk/bsd.own.mk.diff?r1=1.883&amp;amp;r2=1.884&amp;amp;only_with_tag=MAIN&amp;amp;f=h" target="_blank" rel="nofollow noopener"&gt;dtrace included by default in NetBSD&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://fosdem.org/2016/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;FOSDEM16 is approaching, get ready to follow the BSD devroom&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160123165549" target="_blank" rel="nofollow noopener"&gt;Call for testing: Concurrent: malloc(3) calls (to speed up Firefox)&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://daemonforums.org/showthread.php?p=57767" target="_blank" rel="nofollow noopener"&gt;"With the PV drivers in -CURRENT, it is now possible to run OpenBSD within AWS."&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.pcbsd.org/doc-archive/10.2/html-es/pcbsd.html" target="_blank" rel="nofollow noopener"&gt;PC-BSD Handbook in Spanish&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/WLpHzz3F" target="_blank" rel="nofollow noopener"&gt; Clint - ZIL on Partition&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/1QFZU2Bz" target="_blank" rel="nofollow noopener"&gt; Federico - LibreSSL and DMA&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/aesVaKG4" target="_blank" rel="nofollow noopener"&gt; Ghislain - FreeBSD vs Linux vs Illumos&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/x4DRHP0i" target="_blank" rel="nofollow noopener"&gt; Cary - ZFS - Caching - Replication&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we are going to be talking to Ken Moore about the Lumina desktop environment, where it stands now &amp; looking ahead. Then Allan turns the tables &amp; interviews both Kris &amp; Ken about new ongoings in PC-BSD land. Stay tuned, lots of exciting show is coming your way right now on BSDNow, the place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.linuxvoice.com/group-test-nas-distros/" rel="nofollow">Linuxvoice reviews six NAS designed OSes and states that FreeNAS has the largest amount of features</a></h3>

<ul>
<li>The review compares the features of: FreeNAS, NAS4Free, Open Media Vault, Openfiler Community Edition, EasyNAS, and Turnkey Linux File Server</li>
<li>“Many NAS solutions can do a lot more than just back up and restore files – you can extend them with plugins to do a variety of tasks. Some enable you to stream media to computers and others devices. Others can hook up with apps and services and allow them to use the NAS for storing and retrieving data”</li>
<li>Open Media Vault: 4/5, “A feature-rich NAS distro that’s easy to deploy and manage”. Many plugins, good UI</li>
<li>Turnkey Linux File Server: 2/5, “A no-fuss distro that’ll set up a fully functional file sharing server in no time”. No RAID, LVM must be down manually</li>
<li>Openfiler Community Edition: 1/5, “There is a target segment for Openfiler, but we can’t spot it”. In the middle of rebasing on CentOS, lacking documentation, confusing UI</li>
<li>EasyNAS: 3/5, “A simple NAS distro that balances the availability of features with reasonable assumptions”. Major updates require reinstall, lacks advanced features and advanced protocols</li>
<li>FreeNAS: 3/5, “FreeNAS The most feature-rich NAS distribution requires some getting used to”. Best documentation, best snapshot management, most plugins, jailed plugins, most enterprise features</li>
<li>NAS4Free: 3/5, “NAS4Free An advanced NAS distro that’s designed for advanced users”, additional flexibility with disk layout (partition the first disk to install the OS there, use remaining space for data storage)</li>
<li>“If we had to award this group test to the distro with the biggest number of features then the top two challengers would have been FreeNAS and its protegée NAS4Free. While both of these solutions pitch themselves to users outside the corporate environment, they’d simply be overkill for most home users. Furthermore, their FreeBSD base and the ZFS filesystem, while a boon to enterprise users, virtually makes them alien technology to the average Linux household.”</li>
<li>It is not clear why they gave NAS4Free and FreeNAS the same score when they wrote a list of reasons why FreeNAS was better.</li>
<li>It seems the goal of their rundown was to find the best Linux NAS, not the best NAS.
***</li>
</ul>

<h3><a href="http://www.unixmen.com/freebsd-snort-ips/" rel="nofollow">FreeBSD based Snort IPS</a></h3>

<ul>
<li>UnixMen.com provides a new tutorial on setting up Snort, the IPS (Intrusion Prevention system) on FreeBSD</li>
<li>Install Apache, PHP, and MySQL, then Snort</li>
<li>Download the latest Snort rules from the official website</li>
<li>Disable the Packet Filter on the USB interfaces to avoid issues with Snort</li>
<li>Install oinkmaster and barnyard2, and configure them</li>
<li>Then install the Snorby WEB interface, which will give you a nice overview of the data generated by the IPS</li>
<li>Then install SnortSAM, and connect it to ipfw</li>
<li>Now when Snort detects a potential intrusion, it will be displayed in Snorby, and automatically blocked with IPFW
***</li>
</ul>

<h3><a href="https://opensource.com/life/16/1/3-new-open-source-contributors-share-their-experiences" rel="nofollow">Opensource.com features two BSD developers as examples of how open source can help your career</a></h3>

<ul>
<li>“When contributing to open source projects and communities, one of the many benefits is that you can improve your tech skills. In this article, hear from three contributors on how their open source helped them get a job or improved their career.”</li>
<li>Alexander Yurchenko, an OpenBSD developer who now works at Yandex says: “Participating in such a project yields colossal experience. A good, large open source project has everything that is typically required from a developer at job interviews: good planning, good coding, use of versioning systems and bug trackers, peer reviews, teamwork, and such. So, after stewing in such an environment for a year or two, you have a good opportunity to grow to a senior developer level.”</li>
<li>“That is, in fact, what happened to me. I was hired as a senior developer without having any formal work experience on my service record. After the first week, my probation period was reduced from three months to zero.”</li>
<li>While you may not have “formal work experience”, you do have a body of work, a (code/documentation/etc) portfolio, you can point to</li>
<li>Having spent a year working somewhere may say something about you, but showing some code you wrote that other people use every day, is usually more valuable</li>
<li>Alexander Polyakov, a DragonFly contributor, worked on updating support for other languages and on ACPI.</li>
<li>“I even made some money in the process—a customer found me via git log. He wanted to use DragonFlyBSD in production and needed better ACPI support and some RAID driver or something.”</li>
<li>“In a nutshell, contributing to various open source projects is how you gain great experience. Don&#39;t be afraid to send in bad code (happens to the best of us), keep calm (while being scolded for sending in that bad code), and choose projects you are really interested in. Then you&#39;ll both gain experience and have fun while you doing it.”</li>
<li>Kirill Gorkunov talks about his experience with turning open source into a career: “For a few years, I&#39;ve been fixing the code, sending patches, getting scolded for bad code and complimented for good code. That experience was priceless. And you can be sure that as soon as you get good at it, job offers will follow. This is, in fact, how I met the kernel developers working on OpenVZ. Together, we decided to continue working on the OpenVZ kernel and related stuff as well”</li>
<li>When you contribute to open source, you end up being the person who wrote “Foo”, and this can often turn into work, when someone wants to build something with “Foo”, or like “Foo”</li>
<li>This same point was focus of a panel the FreeBSD Foundation organized at the womENcourage conference in Sweden last year: <a href="https://www.youtube.com/watch?v=p7PW1E3IJvY" rel="nofollow">Open Source as a Career Path
</a>
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/BernardSpil/LetsEncrypt" rel="nofollow">FreeBSD, LibreSSL and LetsEncrypt oh my!</a></h3>

<ul>
<li>Over on the FreeBSD Wiki, Bernard Spil (whom we’ve interviewed before) has started a walkthrough talking about how he uses LibreSSL and LetsEncrypt, without using the heavy python client</li>
<li>The article provides detailed instructions on prepping the system and automating the process of updating the SSL certificates</li>
<li>If you’ve used the “official” letsencrypt client in the past, you’ll note some differences in his method, which keeps all the ‘acme-challenge’ files in a single-directory, which is aliased into domains. </li>
<li>Using this method also drops the requirement to run the letsencrypt auth as root, and allows you to run it as the unprivileged “letsencrypt” user instead. </li>
<li>He mentions that the bash/zsh scripts used may be added to ports at some point as well
***</li>
</ul>

<h2>Interview - Ken Moore &amp; Kris Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a> / <a href="https://twitter.com/pcbsdkris" rel="nofollow">@pcbsdkris</a></h2>

<ul>
<li>PC-BSD’s new SysAdm Project and Lumina Update
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-January/459241.html" rel="nofollow">DragonFly Intel i915 support to match what’s in the Linux 4.1 kernel</a></h3>

<ul>
<li>In DragonFly’s ongoing quest for DRM awesomeness, they have now merged changes to bring them up to Linux 4.1 kernel features. </li>
<li>Some of the notables include that “Valleyview” support is greatly improved, and not considered preliminary anymore</li>
<li>Skylake got some support improvements as well, including runtime power management, and that turbo and sleep states should be functional. </li>
<li>Some great improvements to power usage have been added, such as setting GPU frequencies to hardware minimum and enabling of DRRS (Dynamic Refresh Rate Switching) being enabled by default</li>
<li>They’ve even begun importing some of the prelim work for Broxton, the upcoming Atom SOC
***</li>
</ul>

<h3><a href="https://ramsdenj.github.io/server/2016/01/01/FreeNAS-Server-Build.html" rel="nofollow">FreeNAS Home Server Build</a></h3>

<ul>
<li>We have a nice article to share with you this week by John Ramsden, which walks us through his home-brew FreeNAS server setup.</li>
<li>As is typical with most home users, he will be using the system to both serve media, and as a backup target for other systems.</li>
<li>His hardware setup is pretty impressive for a home-brew, made up of the following:

<ul>
<li>Fractal Design Node 804 Chassis</li>
<li>Supermicro X10SL7-F Motherboard</li>
<li>Xeon E3-1231 v3 CPU</li>
<li>4x Samsung DDR3 1.35v-1600 M391B1G73QH0 RAM</li>
<li>2x 32GB SATA III SMC DOM Boot Drive</li>
<li>SeaSonic G-550 Power Supply</li>
<li>Cyberpower CP1500PFCLCD 1500VA 900W PFC UPS</li>
<li>6x Western Digital 6TB Red HDD</li>
<li>2 x ENERMAX T.B. Silence UCTB12P Case Fan</li>
<li>3x Noctua NF-P14s redux-1200 Case Fan</li>
</ul></li>
<li>The SATA DOM was neat to see in use, in his case in a mirror</li>
<li>He then walks us through his burn-in process, which involved memory testing for 46 hours, and then disk testing with the smartctl long tests. </li>
<li><p>There is even details on how the fan thresholds were set up, which may be of use to other DiY’ers out there. </p></li>
<li><p>The SATA DOM was neat to see in use, in his case in a mirror</p></li>
<li><p>He then walks us through his burn-in process, which involved memory testing for 46 hours, and then disk testing with the smartctl long tests. </p></li>
<li><p>There is even details on how the fan thresholds were set up, which may be of use to other DiY’ers out there. </p>

<hr></li>
</ul>

<h3><a href="https://github.com/bwesterb/claviger" rel="nofollow">claviger manages your SSH authorized_keys files for you</a></h3>

<ul>
<li>An application to manage your SSH authorized_keys files for you</li>
<li>Make a list of your keys (laptop, desktop, work)</li>
<li>Then a list of your ssh accounts</li>
<li>List which keys should be present, and which should be absent</li>
<li>Optional setting to keep all “other” keys, such as those added by other users</li>
<li>Optional list of specific “other” keys to allow (does not add them, but does not remove them if they are present)</li>
<li>You say say ‘server2 like server1’, and it will inherit all of the settings from that server</li>
<li>There is a “default” server, that all others inherit
***</li>
</ul>

<h3><a href="http://www.unixmen.com/openvpn-ad-authentication-with-crypt/" rel="nofollow">FreeBSD 9.2 x64 OpenVPN AD authentication with crypt</a></h3>

<ul>
<li>A few days back unixmen.com posted a nice tutorial walkthrough of a OpenVPN setup on FreeBSD 9.2 using Active Directory for auth</li>
<li>In this particular setup, FreeBSD is running the gateway / OpenVPN server, the client desktops are running Windows 7 and domain controller on Windows 2008</li>
<li>The setup on FreeBSD pretty straightforward, thanks to the openvpn-auth-ldap port. (Unknown why they didn’t use the package)</li>
<li>In addition to showing the details on how configuration was done on BSD, what makes this walkthrough nice is the addition of so many screenshots of how the windows configuration was done. </li>
<li>Part of the walkthrough will also detail how they created their .ovpn files for importing on the OpenVPN clients. 
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/share/mk/bsd.own.mk.diff?r1=1.883&r2=1.884&only_with_tag=MAIN&f=h" rel="nofollow">dtrace included by default in NetBSD</a> </p>

<p><a href="https://fosdem.org/2016/schedule/track/bsd/" rel="nofollow">FOSDEM16 is approaching, get ready to follow the BSD devroom</a> </p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160123165549" rel="nofollow">Call for testing: Concurrent: malloc(3) calls (to speed up Firefox)</a></p>

<p><a href="http://daemonforums.org/showthread.php?p=57767" rel="nofollow">&quot;With the PV drivers in -CURRENT, it is now possible to run OpenBSD within AWS.&quot;</a> </p>

<p><a href="http://www.pcbsd.org/doc-archive/10.2/html-es/pcbsd.html" rel="nofollow">PC-BSD Handbook in Spanish</a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/WLpHzz3F" rel="nofollow"> Clint - ZIL on Partition</a> </li>
<li><a href="http://pastebin.com/1QFZU2Bz" rel="nofollow"> Federico - LibreSSL and DMA</a> </li>
<li><a href="http://pastebin.com/aesVaKG4" rel="nofollow"> Ghislain - FreeBSD vs Linux vs Illumos</a> </li>
<li><a href="http://pastebin.com/x4DRHP0i" rel="nofollow"> Cary - ZFS - Caching - Replication</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we are going to be talking to Ken Moore about the Lumina desktop environment, where it stands now &amp; looking ahead. Then Allan turns the tables &amp; interviews both Kris &amp; Ken about new ongoings in PC-BSD land. Stay tuned, lots of exciting show is coming your way right now on BSDNow, the place to B...SD!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.linuxvoice.com/group-test-nas-distros/" rel="nofollow">Linuxvoice reviews six NAS designed OSes and states that FreeNAS has the largest amount of features</a></h3>

<ul>
<li>The review compares the features of: FreeNAS, NAS4Free, Open Media Vault, Openfiler Community Edition, EasyNAS, and Turnkey Linux File Server</li>
<li>“Many NAS solutions can do a lot more than just back up and restore files – you can extend them with plugins to do a variety of tasks. Some enable you to stream media to computers and others devices. Others can hook up with apps and services and allow them to use the NAS for storing and retrieving data”</li>
<li>Open Media Vault: 4/5, “A feature-rich NAS distro that’s easy to deploy and manage”. Many plugins, good UI</li>
<li>Turnkey Linux File Server: 2/5, “A no-fuss distro that’ll set up a fully functional file sharing server in no time”. No RAID, LVM must be down manually</li>
<li>Openfiler Community Edition: 1/5, “There is a target segment for Openfiler, but we can’t spot it”. In the middle of rebasing on CentOS, lacking documentation, confusing UI</li>
<li>EasyNAS: 3/5, “A simple NAS distro that balances the availability of features with reasonable assumptions”. Major updates require reinstall, lacks advanced features and advanced protocols</li>
<li>FreeNAS: 3/5, “FreeNAS The most feature-rich NAS distribution requires some getting used to”. Best documentation, best snapshot management, most plugins, jailed plugins, most enterprise features</li>
<li>NAS4Free: 3/5, “NAS4Free An advanced NAS distro that’s designed for advanced users”, additional flexibility with disk layout (partition the first disk to install the OS there, use remaining space for data storage)</li>
<li>“If we had to award this group test to the distro with the biggest number of features then the top two challengers would have been FreeNAS and its protegée NAS4Free. While both of these solutions pitch themselves to users outside the corporate environment, they’d simply be overkill for most home users. Furthermore, their FreeBSD base and the ZFS filesystem, while a boon to enterprise users, virtually makes them alien technology to the average Linux household.”</li>
<li>It is not clear why they gave NAS4Free and FreeNAS the same score when they wrote a list of reasons why FreeNAS was better.</li>
<li>It seems the goal of their rundown was to find the best Linux NAS, not the best NAS.
***</li>
</ul>

<h3><a href="http://www.unixmen.com/freebsd-snort-ips/" rel="nofollow">FreeBSD based Snort IPS</a></h3>

<ul>
<li>UnixMen.com provides a new tutorial on setting up Snort, the IPS (Intrusion Prevention system) on FreeBSD</li>
<li>Install Apache, PHP, and MySQL, then Snort</li>
<li>Download the latest Snort rules from the official website</li>
<li>Disable the Packet Filter on the USB interfaces to avoid issues with Snort</li>
<li>Install oinkmaster and barnyard2, and configure them</li>
<li>Then install the Snorby WEB interface, which will give you a nice overview of the data generated by the IPS</li>
<li>Then install SnortSAM, and connect it to ipfw</li>
<li>Now when Snort detects a potential intrusion, it will be displayed in Snorby, and automatically blocked with IPFW
***</li>
</ul>

<h3><a href="https://opensource.com/life/16/1/3-new-open-source-contributors-share-their-experiences" rel="nofollow">Opensource.com features two BSD developers as examples of how open source can help your career</a></h3>

<ul>
<li>“When contributing to open source projects and communities, one of the many benefits is that you can improve your tech skills. In this article, hear from three contributors on how their open source helped them get a job or improved their career.”</li>
<li>Alexander Yurchenko, an OpenBSD developer who now works at Yandex says: “Participating in such a project yields colossal experience. A good, large open source project has everything that is typically required from a developer at job interviews: good planning, good coding, use of versioning systems and bug trackers, peer reviews, teamwork, and such. So, after stewing in such an environment for a year or two, you have a good opportunity to grow to a senior developer level.”</li>
<li>“That is, in fact, what happened to me. I was hired as a senior developer without having any formal work experience on my service record. After the first week, my probation period was reduced from three months to zero.”</li>
<li>While you may not have “formal work experience”, you do have a body of work, a (code/documentation/etc) portfolio, you can point to</li>
<li>Having spent a year working somewhere may say something about you, but showing some code you wrote that other people use every day, is usually more valuable</li>
<li>Alexander Polyakov, a DragonFly contributor, worked on updating support for other languages and on ACPI.</li>
<li>“I even made some money in the process—a customer found me via git log. He wanted to use DragonFlyBSD in production and needed better ACPI support and some RAID driver or something.”</li>
<li>“In a nutshell, contributing to various open source projects is how you gain great experience. Don&#39;t be afraid to send in bad code (happens to the best of us), keep calm (while being scolded for sending in that bad code), and choose projects you are really interested in. Then you&#39;ll both gain experience and have fun while you doing it.”</li>
<li>Kirill Gorkunov talks about his experience with turning open source into a career: “For a few years, I&#39;ve been fixing the code, sending patches, getting scolded for bad code and complimented for good code. That experience was priceless. And you can be sure that as soon as you get good at it, job offers will follow. This is, in fact, how I met the kernel developers working on OpenVZ. Together, we decided to continue working on the OpenVZ kernel and related stuff as well”</li>
<li>When you contribute to open source, you end up being the person who wrote “Foo”, and this can often turn into work, when someone wants to build something with “Foo”, or like “Foo”</li>
<li>This same point was focus of a panel the FreeBSD Foundation organized at the womENcourage conference in Sweden last year: <a href="https://www.youtube.com/watch?v=p7PW1E3IJvY" rel="nofollow">Open Source as a Career Path
</a>
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/BernardSpil/LetsEncrypt" rel="nofollow">FreeBSD, LibreSSL and LetsEncrypt oh my!</a></h3>

<ul>
<li>Over on the FreeBSD Wiki, Bernard Spil (whom we’ve interviewed before) has started a walkthrough talking about how he uses LibreSSL and LetsEncrypt, without using the heavy python client</li>
<li>The article provides detailed instructions on prepping the system and automating the process of updating the SSL certificates</li>
<li>If you’ve used the “official” letsencrypt client in the past, you’ll note some differences in his method, which keeps all the ‘acme-challenge’ files in a single-directory, which is aliased into domains. </li>
<li>Using this method also drops the requirement to run the letsencrypt auth as root, and allows you to run it as the unprivileged “letsencrypt” user instead. </li>
<li>He mentions that the bash/zsh scripts used may be added to ports at some point as well
***</li>
</ul>

<h2>Interview - Ken Moore &amp; Kris Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a> / <a href="https://twitter.com/pcbsdkris" rel="nofollow">@pcbsdkris</a></h2>

<ul>
<li>PC-BSD’s new SysAdm Project and Lumina Update
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2016-January/459241.html" rel="nofollow">DragonFly Intel i915 support to match what’s in the Linux 4.1 kernel</a></h3>

<ul>
<li>In DragonFly’s ongoing quest for DRM awesomeness, they have now merged changes to bring them up to Linux 4.1 kernel features. </li>
<li>Some of the notables include that “Valleyview” support is greatly improved, and not considered preliminary anymore</li>
<li>Skylake got some support improvements as well, including runtime power management, and that turbo and sleep states should be functional. </li>
<li>Some great improvements to power usage have been added, such as setting GPU frequencies to hardware minimum and enabling of DRRS (Dynamic Refresh Rate Switching) being enabled by default</li>
<li>They’ve even begun importing some of the prelim work for Broxton, the upcoming Atom SOC
***</li>
</ul>

<h3><a href="https://ramsdenj.github.io/server/2016/01/01/FreeNAS-Server-Build.html" rel="nofollow">FreeNAS Home Server Build</a></h3>

<ul>
<li>We have a nice article to share with you this week by John Ramsden, which walks us through his home-brew FreeNAS server setup.</li>
<li>As is typical with most home users, he will be using the system to both serve media, and as a backup target for other systems.</li>
<li>His hardware setup is pretty impressive for a home-brew, made up of the following:

<ul>
<li>Fractal Design Node 804 Chassis</li>
<li>Supermicro X10SL7-F Motherboard</li>
<li>Xeon E3-1231 v3 CPU</li>
<li>4x Samsung DDR3 1.35v-1600 M391B1G73QH0 RAM</li>
<li>2x 32GB SATA III SMC DOM Boot Drive</li>
<li>SeaSonic G-550 Power Supply</li>
<li>Cyberpower CP1500PFCLCD 1500VA 900W PFC UPS</li>
<li>6x Western Digital 6TB Red HDD</li>
<li>2 x ENERMAX T.B. Silence UCTB12P Case Fan</li>
<li>3x Noctua NF-P14s redux-1200 Case Fan</li>
</ul></li>
<li>The SATA DOM was neat to see in use, in his case in a mirror</li>
<li>He then walks us through his burn-in process, which involved memory testing for 46 hours, and then disk testing with the smartctl long tests. </li>
<li><p>There is even details on how the fan thresholds were set up, which may be of use to other DiY’ers out there. </p></li>
<li><p>The SATA DOM was neat to see in use, in his case in a mirror</p></li>
<li><p>He then walks us through his burn-in process, which involved memory testing for 46 hours, and then disk testing with the smartctl long tests. </p></li>
<li><p>There is even details on how the fan thresholds were set up, which may be of use to other DiY’ers out there. </p>

<hr></li>
</ul>

<h3><a href="https://github.com/bwesterb/claviger" rel="nofollow">claviger manages your SSH authorized_keys files for you</a></h3>

<ul>
<li>An application to manage your SSH authorized_keys files for you</li>
<li>Make a list of your keys (laptop, desktop, work)</li>
<li>Then a list of your ssh accounts</li>
<li>List which keys should be present, and which should be absent</li>
<li>Optional setting to keep all “other” keys, such as those added by other users</li>
<li>Optional list of specific “other” keys to allow (does not add them, but does not remove them if they are present)</li>
<li>You say say ‘server2 like server1’, and it will inherit all of the settings from that server</li>
<li>There is a “default” server, that all others inherit
***</li>
</ul>

<h3><a href="http://www.unixmen.com/openvpn-ad-authentication-with-crypt/" rel="nofollow">FreeBSD 9.2 x64 OpenVPN AD authentication with crypt</a></h3>

<ul>
<li>A few days back unixmen.com posted a nice tutorial walkthrough of a OpenVPN setup on FreeBSD 9.2 using Active Directory for auth</li>
<li>In this particular setup, FreeBSD is running the gateway / OpenVPN server, the client desktops are running Windows 7 and domain controller on Windows 2008</li>
<li>The setup on FreeBSD pretty straightforward, thanks to the openvpn-auth-ldap port. (Unknown why they didn’t use the package)</li>
<li>In addition to showing the details on how configuration was done on BSD, what makes this walkthrough nice is the addition of so many screenshots of how the windows configuration was done. </li>
<li>Part of the walkthrough will also detail how they created their .ovpn files for importing on the OpenVPN clients. 
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/share/mk/bsd.own.mk.diff?r1=1.883&r2=1.884&only_with_tag=MAIN&f=h" rel="nofollow">dtrace included by default in NetBSD</a> </p>

<p><a href="https://fosdem.org/2016/schedule/track/bsd/" rel="nofollow">FOSDEM16 is approaching, get ready to follow the BSD devroom</a> </p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160123165549" rel="nofollow">Call for testing: Concurrent: malloc(3) calls (to speed up Firefox)</a></p>

<p><a href="http://daemonforums.org/showthread.php?p=57767" rel="nofollow">&quot;With the PV drivers in -CURRENT, it is now possible to run OpenBSD within AWS.&quot;</a> </p>

<p><a href="http://www.pcbsd.org/doc-archive/10.2/html-es/pcbsd.html" rel="nofollow">PC-BSD Handbook in Spanish</a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://pastebin.com/WLpHzz3F" rel="nofollow"> Clint - ZIL on Partition</a> </li>
<li><a href="http://pastebin.com/1QFZU2Bz" rel="nofollow"> Federico - LibreSSL and DMA</a> </li>
<li><a href="http://pastebin.com/aesVaKG4" rel="nofollow"> Ghislain - FreeBSD vs Linux vs Illumos</a> </li>
<li><a href="http://pastebin.com/x4DRHP0i" rel="nofollow"> Cary - ZFS - Caching - Replication</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>125: DevSummits, Core and the Baldwin</title>
  <link>https://www.bsdnow.tv/125</link>
  <guid isPermaLink="false">089fc2b7-be76-41de-bbf3-016592d78ef5</guid>
  <pubDate>Wed, 20 Jan 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/089fc2b7-be76-41de-bbf3-016592d78ef5.mp3" length="96359764" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we will be talking to FreeBSD developer and former core-team member John Baldwin about a variety of topics, including running a DevSummit, everything you needed or wanted to know. Coming up right now on BSDNow, the place to B...SD.</itunes:subtitle>
  <itunes:duration>2:13:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we will be talking to FreeBSD developer and former core-team member John Baldwin about a variety of topics, including running a DevSummit, everything you needed or wanted to know. Coming up right now on BSDNow, the place to B...SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.theregister.co.uk/2016/01/14/server_retired_after_18_years_and_ten_months_beat_that_readers/" target="_blank" rel="nofollow noopener"&gt;FreeBSD server retired after almost 19 years&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We’ve heard stories about this kind of thing before, that box that often sits under-appreciated, but refuses to die. Well the UK register has picked up on a story of a FreeBSD server finally being retired after almost 19 years of dedicated service.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;“In its day, it was a reasonable machine - 200MHz Pentium, 32MB RAM, 4GB SCSI-2 drive,” Ross writes. “And up until recently, it was doing its job fine.” Of late, however the “hard drive finally started throwing errors, it was time to retire it before it gave up the ghost!” The drive's a Seagate, for those of you looking to avoid drives that can't deliver more than 19 years of error-free operations.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This system in particular had been running FreeBSD 2.2.1 over the years. Why not upgrade you ask? Ross has an answer for that:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;“It was heavily firewalled and only very specific services were visible to anyone, and most only visible to our directly connected customers,” Ross told Vulture South. “By the time it was probably due for a review, things had moved so far that all the original code was so tightly bound to the operating system itself, that later versions of the OS would have (and ultimately, did) require substantial rework. While it was running and not showing any signs of stress, it was simply expedient to leave sleeping dogs lie.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;All in all, an amazing story of the longevity of a system and its operating system. Do you have a server with a similar or even greater uptime? Let us know so we can try and top this story.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.linuxvoice.com/group-test-bsd-distros/" target="_blank" rel="nofollow noopener"&gt;Roundup of all the BSDs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The magazine LinuxVoice recently did a group test of a variety of “BSD Distros”.&lt;/li&gt;
&lt;li&gt;Included in their review were Free/Open/Net/Dragon/Ghost/PC&lt;/li&gt;
&lt;li&gt;It starts with a pretty good overview of BSD in general, its starts and the various projects / forks that spawned from it, such as FreeNAS / Junos / Playstation / PFSense / etc&lt;/li&gt;
&lt;li&gt;The review starts with a look at OpenBSD, and the consensus reached is that it is good, but does require a bit more manual work to run as a desktop. (Most of the review focuses on desktop usage). It ends up with a solid ⅘ stars though. &lt;/li&gt;
&lt;li&gt;Next it moves into GhostBSD, discusses it being a “Live” distro, which can optionally be installed to disk. It loses a few points for lacking a graphical package management utility, and some bugs during the installation, but still earns a respectable ⅗ stars.&lt;/li&gt;
&lt;li&gt;Dragonfly gets the next spin and gets praise for its very-up to date video driver support and availability of the HAMMER filesystem. It also lands at ⅗ stars, partly due to the reviewer having to use the command-line for management. (Notice a trend here?)&lt;/li&gt;
&lt;li&gt;NetBSD is up next, and gets special mention for being one of the only “distros” that doesn’t do frequent releases. However that doesn’t mean you can’t have updated packages, since the review mentions pkgsrc and pkg as both available to customize your desktop. The reviewer was slightly haunted by having to edit files in /etc by hand to do wireless, but still gives NetBSD a ⅗ overall. &lt;/li&gt;
&lt;li&gt;Last up are FreeBSD and PC-BSD, which get a different sort of head-to-head review. FreeBSD goes first, with mention that the text-install is fairly straight-forward and most configuration will require being done by hand. However the reviewer must be getting use to the command-line at this point, because he mentions:&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;“This might sound cumbersome, but is actually pretty straightforward and at the end produces a finely tuned aerodynamic system that does exactly what you want it to do and nothing else.”&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;He does mention that FreeBSD is the ultimate DIY system, even to the point of not having the package management tools provided out of box. &lt;/li&gt;
&lt;li&gt;PC-BSD ultimately gets a lot of love in this review, again with it being focused on desktop usage this follows. Particularly popular are all the various tools written to make PC-BSD easier to use, such as Life-Preserver, Warden, the graphical installer and more. (slight mistake though, Life-Preserver does not use rsync to backup to FreeNAS, it does ZFS replication)&lt;/li&gt;
&lt;li&gt;In the end he rates FreeBSD ⅘ and PC-BSD a whopping 5/5 for this roundup. &lt;/li&gt;
&lt;li&gt;While reviews may be subjective to the particular use-case being evaluated for, it is still nice to see BSD getting some press and more interest from the Linux community in general. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/openbsd-laptops" target="_blank" rel="nofollow noopener"&gt;OpenBSD Laptops&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy Ted Unangst has posted a nice “planning ahead” guide for those thinking of new laptops for 2016 and the upcoming OpenBSD 5.9&lt;/li&gt;
&lt;li&gt;He starts by giving us a status update on several of the key driver components that will be in 5.9 release“5.9 will be the first release to support the graphics on Broadwell CPUs. This is anything that looks like i5-5xxx. There are a few minor quirks, but generally it works well. There’s no support for the new Skylake models, however. They’ll probably work with the VESA driver but minus suspend/resume/acceleration (just as 5.8 did with Broadwell).”&lt;/li&gt;
&lt;li&gt;He then goes on to mention that the IWM driver works well with most of the revisions (7260, 7265, and 3160) that ship with broadwell based laptops, however the newer skylake series ships with the 8260, which is NOT yet supported.&lt;/li&gt;
&lt;li&gt;He then goes on to list some of the more common makes and models to look for, starting with the broadwell based X1 carbons which work really well (Kris gives +++), but make sure its not the newer skylake model just yet.&lt;/li&gt;
&lt;li&gt;The macbook gets a mention, but probably should be avoided due to broadcom wifi&lt;/li&gt;
&lt;li&gt;The Dell XPS he mentions as a good choice for a powerful (portable) desktops
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.netbsd.org/changes/changes-8.0.html" target="_blank" rel="nofollow noopener"&gt;Significant changes from NetBSD 7.0 to 8.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Updated to GCC 4.8.5&lt;/li&gt;
&lt;li&gt;Imported dhcpcd and replaced rtsol and rtsold&lt;/li&gt;
&lt;li&gt;gpt(8) utility gained the ability to resize partitions and disks, as well as change the type of a partition&lt;/li&gt;
&lt;li&gt;OpenSSH 7.1 and OpenSSL 1.0.1q&lt;/li&gt;
&lt;li&gt;FTP client got support for SNI for https&lt;/li&gt;
&lt;li&gt;Imported dtrace from FreeBSD&lt;/li&gt;
&lt;li&gt;Add syscall support&lt;/li&gt;
&lt;li&gt;Add lockstat support
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - John Baldwin - &lt;a href="mailto:jhb@freebsd.org" target="_blank" rel="nofollow noopener"&gt;jhb@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/BSDHokie" target="_blank" rel="nofollow noopener"&gt;@BSDHokie&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD Kernel Debugging&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2016/01/18/17508.html" target="_blank" rel="nofollow noopener"&gt;Dragonfly Mail Agent spreads to FreeBSD and NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DMA, the Dragonfly Mail Agent is now available not only in Dragonfly’s dports, but also FreeBSD ports, and NetBSD pkgsrc&lt;/li&gt;
&lt;li&gt;“dma is a small Mail Transport Agent (MTA), designed for home and office use.  It accepts mails from locally installed Mail User Agents (MUA) and delivers the mails either locally or to a remote destination.  Remote delivery includes several features like TLS/SSL support and SMTP authentication. dma is not intended as a replacement for real, big MTAs like sendmail(8) or postfix(1).  Consequently, dma does not listen on port 25 for incoming connections.”&lt;/li&gt;
&lt;li&gt;There was a project looking at importing DMA into the FreeBSD base system to replace sendmail, I wonder of the port signals that some of the blockers have been fixed
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=294068" target="_blank" rel="nofollow noopener"&gt;ZFS UEFI Support has landed!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Originally started by Eric McCorkle&lt;/li&gt;
&lt;li&gt;Picked up by Steven Hartland&lt;/li&gt;
&lt;li&gt;Including modularizing the existing UFS boot code, and adding ZFS boot code&lt;/li&gt;
&lt;li&gt;General improvements to the EFI loader including using more of libstand instead of containing its own implementations of many common functions&lt;/li&gt;
&lt;li&gt;Thanks to work by Toomas Soome, there is now a Beastie Menu as part of the EFI loader, similar to the regular loader&lt;/li&gt;
&lt;li&gt;As soon as this was committed, I added a few lines to it to connect the ZFS BE Menu to it, thanks to all of the above, without whom my work wouldn’t be usable&lt;/li&gt;
&lt;li&gt;It should be relatively easy to hook my GELI boot stuff in as a module, and possibly just stack the UFS and ZFS modules on top of it&lt;/li&gt;
&lt;li&gt;I might try to redesign the non-EFI boot code to use a similar design instead of what I have now
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.phoronix.com/scan.php?page=article&amp;amp;item=3bsd-10linux" target="_blank" rel="nofollow noopener"&gt;How three BSD OSes compare to ten Linux Distros&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After benchmarking 10 of the latest Linux distros, Phoronix took to benchmarking 3 of the big BSDs&lt;/li&gt;
&lt;li&gt;DragonFlyBSD 4.4.1 - The latest DragonFly release with GCC 5.2.1 and the HAMMER file-system.&lt;/li&gt;
&lt;li&gt;OpenBSD 5.8 - OpenBSD 5.8 with GCC 4.2.1 as the default compiler and FFS file-system.&lt;/li&gt;
&lt;li&gt;PC-BSD 10.2 - Derived off FreeBSD 10.2, the defaults were the Clang 3.4.1 compiler and ZFS file-system.&lt;/li&gt;
&lt;li&gt;In the SQLite test, PCBSD+ZFS won out over all of the Linux distros, including those that were also using ZFS&lt;/li&gt;
&lt;li&gt;In the first compile benchmark, PCBSD came second only to Intel’s Linux distro, Clear Linux. OpenBSD can last, although it is not clear if the benchmark was just comparing the system compiler, which would be unfair to OpenBSD&lt;/li&gt;
&lt;li&gt;In Disk transaction performance, against ZFS won the day, with PCBSD edging out the Linux distros. OpenBSD’s older ffs was hurt by the lack of soft updates, and DragonFly’s Hammer did not perform well. Although in an fsync() heavy test, safety is more important that speed&lt;/li&gt;
&lt;li&gt;As with all benchmarks, these obviously need to be taken with a grain of salt&lt;/li&gt;
&lt;li&gt;In some of them you can clearly see that the ‘winner’ has a much higher standard error, suggesting that the numbers are quite variable
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-15-7-24-released/" target="_blank" rel="nofollow noopener"&gt;OPNSense 15.7.24 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We are just barely into the new year and OPNSense has dropped a new release on us to play with. &lt;/li&gt;
&lt;li&gt;This new version, 15.7.24 brings a bunch of notable changes, which includes improvements to the firewall UI and a plugin management section of the firmware page. Additionally better signature verification using PKG’s internal verification mechanisms was added for kernel and world updates.&lt;/li&gt;
&lt;li&gt;The announcement contains the full rundown of changes, including the suricata, openvpn and ntp got package bumps as well. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://cooltrainer.org/a-freebsd-desktop-howto/" target="_blank" rel="nofollow noopener"&gt;A FreeBSD 10 Desktop How-to&lt;/a&gt; (A bit old, but still one of the most complete walkthroughs of a desktop FreeBSD setup from scratch)&lt;/p&gt;

&lt;p&gt;&lt;a href="http://fossforce.com/2016/01/bsd-ready-scale-14x/" target="_blank" rel="nofollow noopener"&gt;BSD and Scale 14&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160114113445&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;Xen support enabled in OpenBSD -current&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20a0mLaAv" target="_blank" rel="nofollow noopener"&gt; Matt - Zil Sizes&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21qpiTF8h" target="_blank" rel="nofollow noopener"&gt; Drin - IPSEC&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2HCq0r0aD" target="_blank" rel="nofollow noopener"&gt; John - ZFS + UEFI&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2VORfyqlS" target="_blank" rel="nofollow noopener"&gt; Jake - ZFS Cluster SAN&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20ycRhUkM" target="_blank" rel="nofollow noopener"&gt; Phillip - Media Server&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we will be talking to FreeBSD developer and former core-team member John Baldwin about a variety of topics, including running a DevSummit, everything you needed or wanted to know. Coming up right now on BSDNow, the place to B...SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.theregister.co.uk/2016/01/14/server_retired_after_18_years_and_ten_months_beat_that_readers/" rel="nofollow">FreeBSD server retired after almost 19 years</a></h3>

<ul>
<li>We’ve heard stories about this kind of thing before, that box that often sits under-appreciated, but refuses to die. Well the UK register has picked up on a story of a FreeBSD server finally being retired after almost 19 years of dedicated service.</li>
</ul>

<p>“In its day, it was a reasonable machine - 200MHz Pentium, 32MB RAM, 4GB SCSI-2 drive,” Ross writes. “And up until recently, it was doing its job fine.” Of late, however the “hard drive finally started throwing errors, it was time to retire it before it gave up the ghost!” The drive&#39;s a Seagate, for those of you looking to avoid drives that can&#39;t deliver more than 19 years of error-free operations.</p>

<ul>
<li>This system in particular had been running FreeBSD 2.2.1 over the years. Why not upgrade you ask? Ross has an answer for that:</li>
</ul>

<p>“It was heavily firewalled and only very specific services were visible to anyone, and most only visible to our directly connected customers,” Ross told Vulture South. “By the time it was probably due for a review, things had moved so far that all the original code was so tightly bound to the operating system itself, that later versions of the OS would have (and ultimately, did) require substantial rework. While it was running and not showing any signs of stress, it was simply expedient to leave sleeping dogs lie.”</p>

<ul>
<li>All in all, an amazing story of the longevity of a system and its operating system. Do you have a server with a similar or even greater uptime? Let us know so we can try and top this story.
***</li>
</ul>

<h3><a href="https://www.linuxvoice.com/group-test-bsd-distros/" rel="nofollow">Roundup of all the BSDs</a></h3>

<ul>
<li>The magazine LinuxVoice recently did a group test of a variety of “BSD Distros”.</li>
<li>Included in their review were Free/Open/Net/Dragon/Ghost/PC</li>
<li>It starts with a pretty good overview of BSD in general, its starts and the various projects / forks that spawned from it, such as FreeNAS / Junos / Playstation / PFSense / etc</li>
<li>The review starts with a look at OpenBSD, and the consensus reached is that it is good, but does require a bit more manual work to run as a desktop. (Most of the review focuses on desktop usage). It ends up with a solid ⅘ stars though. </li>
<li>Next it moves into GhostBSD, discusses it being a “Live” distro, which can optionally be installed to disk. It loses a few points for lacking a graphical package management utility, and some bugs during the installation, but still earns a respectable ⅗ stars.</li>
<li>Dragonfly gets the next spin and gets praise for its very-up to date video driver support and availability of the HAMMER filesystem. It also lands at ⅗ stars, partly due to the reviewer having to use the command-line for management. (Notice a trend here?)</li>
<li>NetBSD is up next, and gets special mention for being one of the only “distros” that doesn’t do frequent releases. However that doesn’t mean you can’t have updated packages, since the review mentions pkgsrc and pkg as both available to customize your desktop. The reviewer was slightly haunted by having to edit files in /etc by hand to do wireless, but still gives NetBSD a ⅗ overall. </li>
<li>Last up are FreeBSD and PC-BSD, which get a different sort of head-to-head review. FreeBSD goes first, with mention that the text-install is fairly straight-forward and most configuration will require being done by hand. However the reviewer must be getting use to the command-line at this point, because he mentions:</li>
</ul>

<p>“This might sound cumbersome, but is actually pretty straightforward and at the end produces a finely tuned aerodynamic system that does exactly what you want it to do and nothing else.”</p>

<ul>
<li>He does mention that FreeBSD is the ultimate DIY system, even to the point of not having the package management tools provided out of box. </li>
<li>PC-BSD ultimately gets a lot of love in this review, again with it being focused on desktop usage this follows. Particularly popular are all the various tools written to make PC-BSD easier to use, such as Life-Preserver, Warden, the graphical installer and more. (slight mistake though, Life-Preserver does not use rsync to backup to FreeNAS, it does ZFS replication)</li>
<li>In the end he rates FreeBSD ⅘ and PC-BSD a whopping 5/5 for this roundup. </li>
<li>While reviews may be subjective to the particular use-case being evaluated for, it is still nice to see BSD getting some press and more interest from the Linux community in general. 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/openbsd-laptops" rel="nofollow">OpenBSD Laptops</a></h3>

<ul>
<li>Our buddy Ted Unangst has posted a nice “planning ahead” guide for those thinking of new laptops for 2016 and the upcoming OpenBSD 5.9</li>
<li>He starts by giving us a status update on several of the key driver components that will be in 5.9 release“5.9 will be the first release to support the graphics on Broadwell CPUs. This is anything that looks like i5-5xxx. There are a few minor quirks, but generally it works well. There’s no support for the new Skylake models, however. They’ll probably work with the VESA driver but minus suspend/resume/acceleration (just as 5.8 did with Broadwell).”</li>
<li>He then goes on to mention that the IWM driver works well with most of the revisions (7260, 7265, and 3160) that ship with broadwell based laptops, however the newer skylake series ships with the 8260, which is NOT yet supported.</li>
<li>He then goes on to list some of the more common makes and models to look for, starting with the broadwell based X1 carbons which work really well (Kris gives +++), but make sure its not the newer skylake model just yet.</li>
<li>The macbook gets a mention, but probably should be avoided due to broadcom wifi</li>
<li>The Dell XPS he mentions as a good choice for a powerful (portable) desktops
***</li>
</ul>

<h3><a href="https://www.netbsd.org/changes/changes-8.0.html" rel="nofollow">Significant changes from NetBSD 7.0 to 8.0</a></h3>

<ul>
<li>Updated to GCC 4.8.5</li>
<li>Imported dhcpcd and replaced rtsol and rtsold</li>
<li>gpt(8) utility gained the ability to resize partitions and disks, as well as change the type of a partition</li>
<li>OpenSSH 7.1 and OpenSSL 1.0.1q</li>
<li>FTP client got support for SNI for https</li>
<li>Imported dtrace from FreeBSD</li>
<li>Add syscall support</li>
<li>Add lockstat support
***</li>
</ul>

<h2>Interview - John Baldwin - <a href="mailto:jhb@freebsd.org" rel="nofollow">jhb@freebsd.org</a> / <a href="https://twitter.com/BSDHokie" rel="nofollow">@BSDHokie</a></h2>

<p>FreeBSD Kernel Debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2016/01/18/17508.html" rel="nofollow">Dragonfly Mail Agent spreads to FreeBSD and NetBSD</a></h3>

<ul>
<li>DMA, the Dragonfly Mail Agent is now available not only in Dragonfly’s dports, but also FreeBSD ports, and NetBSD pkgsrc</li>
<li>“dma is a small Mail Transport Agent (MTA), designed for home and office use.  It accepts mails from locally installed Mail User Agents (MUA) and delivers the mails either locally or to a remote destination.  Remote delivery includes several features like TLS/SSL support and SMTP authentication. dma is not intended as a replacement for real, big MTAs like sendmail(8) or postfix(1).  Consequently, dma does not listen on port 25 for incoming connections.”</li>
<li>There was a project looking at importing DMA into the FreeBSD base system to replace sendmail, I wonder of the port signals that some of the blockers have been fixed
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=294068" rel="nofollow">ZFS UEFI Support has landed!</a></h3>

<ul>
<li>Originally started by Eric McCorkle</li>
<li>Picked up by Steven Hartland</li>
<li>Including modularizing the existing UFS boot code, and adding ZFS boot code</li>
<li>General improvements to the EFI loader including using more of libstand instead of containing its own implementations of many common functions</li>
<li>Thanks to work by Toomas Soome, there is now a Beastie Menu as part of the EFI loader, similar to the regular loader</li>
<li>As soon as this was committed, I added a few lines to it to connect the ZFS BE Menu to it, thanks to all of the above, without whom my work wouldn’t be usable</li>
<li>It should be relatively easy to hook my GELI boot stuff in as a module, and possibly just stack the UFS and ZFS modules on top of it</li>
<li>I might try to redesign the non-EFI boot code to use a similar design instead of what I have now
***</li>
</ul>

<h3><a href="http://www.phoronix.com/scan.php?page=article&item=3bsd-10linux" rel="nofollow">How three BSD OSes compare to ten Linux Distros</a></h3>

<ul>
<li>After benchmarking 10 of the latest Linux distros, Phoronix took to benchmarking 3 of the big BSDs</li>
<li>DragonFlyBSD 4.4.1 - The latest DragonFly release with GCC 5.2.1 and the HAMMER file-system.</li>
<li>OpenBSD 5.8 - OpenBSD 5.8 with GCC 4.2.1 as the default compiler and FFS file-system.</li>
<li>PC-BSD 10.2 - Derived off FreeBSD 10.2, the defaults were the Clang 3.4.1 compiler and ZFS file-system.</li>
<li>In the SQLite test, PCBSD+ZFS won out over all of the Linux distros, including those that were also using ZFS</li>
<li>In the first compile benchmark, PCBSD came second only to Intel’s Linux distro, Clear Linux. OpenBSD can last, although it is not clear if the benchmark was just comparing the system compiler, which would be unfair to OpenBSD</li>
<li>In Disk transaction performance, against ZFS won the day, with PCBSD edging out the Linux distros. OpenBSD’s older ffs was hurt by the lack of soft updates, and DragonFly’s Hammer did not perform well. Although in an fsync() heavy test, safety is more important that speed</li>
<li>As with all benchmarks, these obviously need to be taken with a grain of salt</li>
<li>In some of them you can clearly see that the ‘winner’ has a much higher standard error, suggesting that the numbers are quite variable
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-15-7-24-released/" rel="nofollow">OPNSense 15.7.24 Released</a></h3>

<ul>
<li>We are just barely into the new year and OPNSense has dropped a new release on us to play with. </li>
<li>This new version, 15.7.24 brings a bunch of notable changes, which includes improvements to the firewall UI and a plugin management section of the firmware page. Additionally better signature verification using PKG’s internal verification mechanisms was added for kernel and world updates.</li>
<li>The announcement contains the full rundown of changes, including the suricata, openvpn and ntp got package bumps as well. 
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="https://cooltrainer.org/a-freebsd-desktop-howto/" rel="nofollow">A FreeBSD 10 Desktop How-to</a> (A bit old, but still one of the most complete walkthroughs of a desktop FreeBSD setup from scratch)</p>

<p><a href="http://fossforce.com/2016/01/bsd-ready-scale-14x/" rel="nofollow">BSD and Scale 14</a></p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160114113445&mode=expanded" rel="nofollow">Xen support enabled in OpenBSD -current</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20a0mLaAv" rel="nofollow"> Matt - Zil Sizes</a> </li>
<li><a href="http://slexy.org/view/s21qpiTF8h" rel="nofollow"> Drin - IPSEC</a> </li>
<li><a href="http://slexy.org/view/s2HCq0r0aD" rel="nofollow"> John - ZFS + UEFI</a> </li>
<li><a href="http://slexy.org/view/s2VORfyqlS" rel="nofollow"> Jake - ZFS Cluster SAN</a> </li>
<li><a href="http://slexy.org/view/s20ycRhUkM" rel="nofollow"> Phillip - Media Server</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we will be talking to FreeBSD developer and former core-team member John Baldwin about a variety of topics, including running a DevSummit, everything you needed or wanted to know. Coming up right now on BSDNow, the place to B...SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.theregister.co.uk/2016/01/14/server_retired_after_18_years_and_ten_months_beat_that_readers/" rel="nofollow">FreeBSD server retired after almost 19 years</a></h3>

<ul>
<li>We’ve heard stories about this kind of thing before, that box that often sits under-appreciated, but refuses to die. Well the UK register has picked up on a story of a FreeBSD server finally being retired after almost 19 years of dedicated service.</li>
</ul>

<p>“In its day, it was a reasonable machine - 200MHz Pentium, 32MB RAM, 4GB SCSI-2 drive,” Ross writes. “And up until recently, it was doing its job fine.” Of late, however the “hard drive finally started throwing errors, it was time to retire it before it gave up the ghost!” The drive&#39;s a Seagate, for those of you looking to avoid drives that can&#39;t deliver more than 19 years of error-free operations.</p>

<ul>
<li>This system in particular had been running FreeBSD 2.2.1 over the years. Why not upgrade you ask? Ross has an answer for that:</li>
</ul>

<p>“It was heavily firewalled and only very specific services were visible to anyone, and most only visible to our directly connected customers,” Ross told Vulture South. “By the time it was probably due for a review, things had moved so far that all the original code was so tightly bound to the operating system itself, that later versions of the OS would have (and ultimately, did) require substantial rework. While it was running and not showing any signs of stress, it was simply expedient to leave sleeping dogs lie.”</p>

<ul>
<li>All in all, an amazing story of the longevity of a system and its operating system. Do you have a server with a similar or even greater uptime? Let us know so we can try and top this story.
***</li>
</ul>

<h3><a href="https://www.linuxvoice.com/group-test-bsd-distros/" rel="nofollow">Roundup of all the BSDs</a></h3>

<ul>
<li>The magazine LinuxVoice recently did a group test of a variety of “BSD Distros”.</li>
<li>Included in their review were Free/Open/Net/Dragon/Ghost/PC</li>
<li>It starts with a pretty good overview of BSD in general, its starts and the various projects / forks that spawned from it, such as FreeNAS / Junos / Playstation / PFSense / etc</li>
<li>The review starts with a look at OpenBSD, and the consensus reached is that it is good, but does require a bit more manual work to run as a desktop. (Most of the review focuses on desktop usage). It ends up with a solid ⅘ stars though. </li>
<li>Next it moves into GhostBSD, discusses it being a “Live” distro, which can optionally be installed to disk. It loses a few points for lacking a graphical package management utility, and some bugs during the installation, but still earns a respectable ⅗ stars.</li>
<li>Dragonfly gets the next spin and gets praise for its very-up to date video driver support and availability of the HAMMER filesystem. It also lands at ⅗ stars, partly due to the reviewer having to use the command-line for management. (Notice a trend here?)</li>
<li>NetBSD is up next, and gets special mention for being one of the only “distros” that doesn’t do frequent releases. However that doesn’t mean you can’t have updated packages, since the review mentions pkgsrc and pkg as both available to customize your desktop. The reviewer was slightly haunted by having to edit files in /etc by hand to do wireless, but still gives NetBSD a ⅗ overall. </li>
<li>Last up are FreeBSD and PC-BSD, which get a different sort of head-to-head review. FreeBSD goes first, with mention that the text-install is fairly straight-forward and most configuration will require being done by hand. However the reviewer must be getting use to the command-line at this point, because he mentions:</li>
</ul>

<p>“This might sound cumbersome, but is actually pretty straightforward and at the end produces a finely tuned aerodynamic system that does exactly what you want it to do and nothing else.”</p>

<ul>
<li>He does mention that FreeBSD is the ultimate DIY system, even to the point of not having the package management tools provided out of box. </li>
<li>PC-BSD ultimately gets a lot of love in this review, again with it being focused on desktop usage this follows. Particularly popular are all the various tools written to make PC-BSD easier to use, such as Life-Preserver, Warden, the graphical installer and more. (slight mistake though, Life-Preserver does not use rsync to backup to FreeNAS, it does ZFS replication)</li>
<li>In the end he rates FreeBSD ⅘ and PC-BSD a whopping 5/5 for this roundup. </li>
<li>While reviews may be subjective to the particular use-case being evaluated for, it is still nice to see BSD getting some press and more interest from the Linux community in general. 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/openbsd-laptops" rel="nofollow">OpenBSD Laptops</a></h3>

<ul>
<li>Our buddy Ted Unangst has posted a nice “planning ahead” guide for those thinking of new laptops for 2016 and the upcoming OpenBSD 5.9</li>
<li>He starts by giving us a status update on several of the key driver components that will be in 5.9 release“5.9 will be the first release to support the graphics on Broadwell CPUs. This is anything that looks like i5-5xxx. There are a few minor quirks, but generally it works well. There’s no support for the new Skylake models, however. They’ll probably work with the VESA driver but minus suspend/resume/acceleration (just as 5.8 did with Broadwell).”</li>
<li>He then goes on to mention that the IWM driver works well with most of the revisions (7260, 7265, and 3160) that ship with broadwell based laptops, however the newer skylake series ships with the 8260, which is NOT yet supported.</li>
<li>He then goes on to list some of the more common makes and models to look for, starting with the broadwell based X1 carbons which work really well (Kris gives +++), but make sure its not the newer skylake model just yet.</li>
<li>The macbook gets a mention, but probably should be avoided due to broadcom wifi</li>
<li>The Dell XPS he mentions as a good choice for a powerful (portable) desktops
***</li>
</ul>

<h3><a href="https://www.netbsd.org/changes/changes-8.0.html" rel="nofollow">Significant changes from NetBSD 7.0 to 8.0</a></h3>

<ul>
<li>Updated to GCC 4.8.5</li>
<li>Imported dhcpcd and replaced rtsol and rtsold</li>
<li>gpt(8) utility gained the ability to resize partitions and disks, as well as change the type of a partition</li>
<li>OpenSSH 7.1 and OpenSSL 1.0.1q</li>
<li>FTP client got support for SNI for https</li>
<li>Imported dtrace from FreeBSD</li>
<li>Add syscall support</li>
<li>Add lockstat support
***</li>
</ul>

<h2>Interview - John Baldwin - <a href="mailto:jhb@freebsd.org" rel="nofollow">jhb@freebsd.org</a> / <a href="https://twitter.com/BSDHokie" rel="nofollow">@BSDHokie</a></h2>

<p>FreeBSD Kernel Debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2016/01/18/17508.html" rel="nofollow">Dragonfly Mail Agent spreads to FreeBSD and NetBSD</a></h3>

<ul>
<li>DMA, the Dragonfly Mail Agent is now available not only in Dragonfly’s dports, but also FreeBSD ports, and NetBSD pkgsrc</li>
<li>“dma is a small Mail Transport Agent (MTA), designed for home and office use.  It accepts mails from locally installed Mail User Agents (MUA) and delivers the mails either locally or to a remote destination.  Remote delivery includes several features like TLS/SSL support and SMTP authentication. dma is not intended as a replacement for real, big MTAs like sendmail(8) or postfix(1).  Consequently, dma does not listen on port 25 for incoming connections.”</li>
<li>There was a project looking at importing DMA into the FreeBSD base system to replace sendmail, I wonder of the port signals that some of the blockers have been fixed
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=294068" rel="nofollow">ZFS UEFI Support has landed!</a></h3>

<ul>
<li>Originally started by Eric McCorkle</li>
<li>Picked up by Steven Hartland</li>
<li>Including modularizing the existing UFS boot code, and adding ZFS boot code</li>
<li>General improvements to the EFI loader including using more of libstand instead of containing its own implementations of many common functions</li>
<li>Thanks to work by Toomas Soome, there is now a Beastie Menu as part of the EFI loader, similar to the regular loader</li>
<li>As soon as this was committed, I added a few lines to it to connect the ZFS BE Menu to it, thanks to all of the above, without whom my work wouldn’t be usable</li>
<li>It should be relatively easy to hook my GELI boot stuff in as a module, and possibly just stack the UFS and ZFS modules on top of it</li>
<li>I might try to redesign the non-EFI boot code to use a similar design instead of what I have now
***</li>
</ul>

<h3><a href="http://www.phoronix.com/scan.php?page=article&item=3bsd-10linux" rel="nofollow">How three BSD OSes compare to ten Linux Distros</a></h3>

<ul>
<li>After benchmarking 10 of the latest Linux distros, Phoronix took to benchmarking 3 of the big BSDs</li>
<li>DragonFlyBSD 4.4.1 - The latest DragonFly release with GCC 5.2.1 and the HAMMER file-system.</li>
<li>OpenBSD 5.8 - OpenBSD 5.8 with GCC 4.2.1 as the default compiler and FFS file-system.</li>
<li>PC-BSD 10.2 - Derived off FreeBSD 10.2, the defaults were the Clang 3.4.1 compiler and ZFS file-system.</li>
<li>In the SQLite test, PCBSD+ZFS won out over all of the Linux distros, including those that were also using ZFS</li>
<li>In the first compile benchmark, PCBSD came second only to Intel’s Linux distro, Clear Linux. OpenBSD can last, although it is not clear if the benchmark was just comparing the system compiler, which would be unfair to OpenBSD</li>
<li>In Disk transaction performance, against ZFS won the day, with PCBSD edging out the Linux distros. OpenBSD’s older ffs was hurt by the lack of soft updates, and DragonFly’s Hammer did not perform well. Although in an fsync() heavy test, safety is more important that speed</li>
<li>As with all benchmarks, these obviously need to be taken with a grain of salt</li>
<li>In some of them you can clearly see that the ‘winner’ has a much higher standard error, suggesting that the numbers are quite variable
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-15-7-24-released/" rel="nofollow">OPNSense 15.7.24 Released</a></h3>

<ul>
<li>We are just barely into the new year and OPNSense has dropped a new release on us to play with. </li>
<li>This new version, 15.7.24 brings a bunch of notable changes, which includes improvements to the firewall UI and a plugin management section of the firmware page. Additionally better signature verification using PKG’s internal verification mechanisms was added for kernel and world updates.</li>
<li>The announcement contains the full rundown of changes, including the suricata, openvpn and ntp got package bumps as well. 
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="https://cooltrainer.org/a-freebsd-desktop-howto/" rel="nofollow">A FreeBSD 10 Desktop How-to</a> (A bit old, but still one of the most complete walkthroughs of a desktop FreeBSD setup from scratch)</p>

<p><a href="http://fossforce.com/2016/01/bsd-ready-scale-14x/" rel="nofollow">BSD and Scale 14</a></p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160114113445&mode=expanded" rel="nofollow">Xen support enabled in OpenBSD -current</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20a0mLaAv" rel="nofollow"> Matt - Zil Sizes</a> </li>
<li><a href="http://slexy.org/view/s21qpiTF8h" rel="nofollow"> Drin - IPSEC</a> </li>
<li><a href="http://slexy.org/view/s2HCq0r0aD" rel="nofollow"> John - ZFS + UEFI</a> </li>
<li><a href="http://slexy.org/view/s2VORfyqlS" rel="nofollow"> Jake - ZFS Cluster SAN</a> </li>
<li><a href="http://slexy.org/view/s20ycRhUkM" rel="nofollow"> Phillip - Media Server</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>124: Get your engine(x) started!</title>
  <link>https://www.bsdnow.tv/124</link>
  <guid isPermaLink="false">91c6faea-62a9-4334-b732-cab3cb55ba35</guid>
  <pubDate>Wed, 13 Jan 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/91c6faea-62a9-4334-b732-cab3cb55ba35.mp3" length="54317524" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we have a very full news roster to rundown, plus an oldie, but goodie with Igor of the nginx project. That plus all your questions and feedback,</itunes:subtitle>
  <itunes:duration>1:15:26</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we have a very full news roster to rundown, plus an oldie, but goodie with Igor of the nginx project. That plus all your questions and feedback,&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSDJournal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/freenas-logo-contest/" target="_blank" rel="nofollow noopener"&gt;FreeNAS Logo Design Contest&lt;/a&gt;&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" target="_blank" rel="nofollow noopener"&gt;Rules and Requirements&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h4&gt;For those of you curious about Kris' new lighting here are the links to what he is using.&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&amp;amp;redirect=true&amp;amp;ref_=oh_aui_detailpage_o01_s00&amp;amp;pldnSite=1" target="_blank" rel="nofollow noopener"&gt;Softbox Light Diffuser&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&amp;amp;redirect=true&amp;amp;ref_=oh_aui_detailpage_o06_s00" target="_blank" rel="nofollow noopener"&gt;Full Spectrum 5500K CFL Bulb&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.randi.io/2015/12/31/the-developer-formerly-known-as-freebsdgirl/" target="_blank" rel="nofollow noopener"&gt;Clearing the air &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A number of you have written in the past few weeks asking why Allan and I didn’t talk about one of the biggest stories to make headlines last week. &lt;/li&gt;
&lt;li&gt;Both of us are quite aware of the details surrounding the incidents between former FreeBSD developers “freebsdgirl” and “xmj”, however the news was still ongoing and we didn’t feel it right to discuss until some of the facts had time to shake out and a more clear (and calm) discussion could be had. &lt;/li&gt;
&lt;li&gt;However, without getting into all the gory details here’s some of the key points that we want to highlight for our listeners. We each have our own thoughts on this.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Kris:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD that I know has been VERY open and inclusive to all who want to contribute. The saying “Shut up and code” is there for a reason. We’ve seen developers of all types, different race / gender / creed, and the one thing we all have in common is the love for BSD.&lt;/li&gt;
&lt;li&gt;This particular incident has been linked to FreeBSD, which isn’t exactly a fair association, since the project and other members of community were not directly involved. What started out as a disagreement (over something non-BSD related) turned into an ugly slugfest all across social media and (briefly) on a BSD chatroom.&lt;/li&gt;
&lt;li&gt;In this case after reviewing lots of the facts, I think both sides were WAY out of line, and hope they recognize that. &lt;/li&gt;
&lt;li&gt;There has been slamming of the core team and foundation in social media, as somehow the delay / silence is an admission of wrong-doing. Nothing could be further from the truth. These are serious people doing a serious job, and much like BSD they would rather take the time to do it right instead of just going off on social media and making things worse. (Plus they all are volunteers who are spread across many different time-zones)&lt;/li&gt;
&lt;li&gt;Also, if you hear rumors of incidents of harassment, remember that without details all those will ever be is rumors. Obviously those in the project would take any incident like that seriously, but without coming forward and sharing the details it’s impossible to take any action or make changes for the better.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Allan:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD community is the best group of people I have ever worked with, but that doesn’t mean that it is immune to the same problems that every other group of people faces. As much as all of us wish it didn’t, harassment and other ill-behavior does happen, and must be dealt with&lt;/li&gt;
&lt;li&gt;The FreeBSD Core team has previously sanctioned committers and revoked commit bits for things that happened entirely offline and outside of the FreeBSD community. Part of being a committer is representing the project in everything that you do, so anything you do that reflects badly upon the project is grounds for your removal&lt;/li&gt;
&lt;li&gt;There was something written about this in the project documentation somewhere (that I can not find for the live of me), specifically about the prestige that comes with (or used to) an @freebsd.org account, and how new members of the community need to keep that in mind as they work to earn, and keep, a commit bit&lt;/li&gt;
&lt;li&gt;In this specific situation, I am not sure what core did exactly, we’ll have to wait for their report to find out, but I am not sure what more they could have done.&lt;/li&gt;
&lt;li&gt;“Individual members of core have the power to temporarily suspend commit privileges until core as a whole has the chance to review the issue. Only a 2/3 majority of core has the authority to suspend commit privileges for longer than a week or to remove them permanently. Core's “special powers” only kick in when it acts as a group, not on an individual basis. As individuals, the core team members are all committers first and core second”&lt;/li&gt;
&lt;li&gt;So, an individual member of core can revoke the commit bit of someone who is reported to have acted in a manner not conducive with the rules, but I don’t know how that would have made a difference in this case.&lt;/li&gt;
&lt;li&gt;The only point from Randi’s list of 10 things the project should change that I do not think is possible is #6. As stated in the “Committers' Big List of Rules” that I quoted earlier, the core team can only take action after they have had time for everyone to review and discuss a matter, and then vote on it.&lt;/li&gt;
&lt;li&gt;The core team is made up of 9 people with other responsibilities and commitments. Further, they are currently spread across 6 different countries, and 6 different times zones (even the countries and time zones do not line up).&lt;/li&gt;
&lt;li&gt;We eagerly await Cores report on this matter, and more importantly, Core and the Foundation's work to come up with a better framework and response policy to deal with such situations in the future.&lt;/li&gt;
&lt;li&gt;The important thing is to ensure that incident reports are properly handled, so that those reporting issues feel safe in doing so&lt;/li&gt;
&lt;li&gt;While we hope there is never another incident of harassment in the FreeBSD community, the realities of the world we live in mean we need to be ready to deal with it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/homelab/comments/3zv64t/the_home_lab_9_servers_about_98tb_working_url/" target="_blank" rel="nofollow noopener"&gt;Dan Langille discussing his rig&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://imgur.com/gallery/nuBBD" target="_blank" rel="nofollow noopener"&gt;Pictures of Dan Langille's Home Lab&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Ever read FreeBSD Diary? How about used FreshPorts or FreshSource? Gone to BSDCan? If so you may be interested in seeing exactly where those sites are served from.&lt;/li&gt;
&lt;li&gt;Dan Langille posts to reddit with information about his home lab, with the obligatory pictures to back it up&lt;/li&gt;
&lt;li&gt;As most good home racks do, this one starts at Home Depot and ends up with a variety of systems and hardware living on it. &lt;/li&gt;
&lt;li&gt;All in all an impressive rig and nice job wiring&lt;/li&gt;
&lt;li&gt;(I wonder what that ASUS RT‑N66U is doing, if it’s running FreeBSD or just an access point??)&lt;/li&gt;
&lt;li&gt;Reminder: Get your BSDCan talk proposal submitted before the deadline, January 19th
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160107174436" target="_blank" rel="nofollow noopener"&gt;Pre-5.9 pledge(2) update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Theo gives us a status update on pledge() for pre OpenBSD 5.9“For the next upcoming release, we will disable the 'paths' argument.Reasoning: We have been very busy making as much of the tree set thepromises right in applications, and building a few new promises aswell.  We simply don't have enough time to review the kernel code andmake sure it is bug-free.  We'll use the next 6 months developmentcycle to decide on paths, and then re-audit the tree to use theinterface where it is suitable.
The base tree (/bin /sbin /usr/bin /usr/sbin /usr/libexec /usr/games)contains 652 ELF binaries. 451 use pledge.  201 do not. Approximately47 do not need or cannot use pledge.  Leaving 154 we could potentiallypledge in the future.  Most of those are not very important.  Thereare a few hot spots, but most of what people use has been handled wellby the team.“&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20160107075227" target="_blank" rel="nofollow noopener"&gt;Chromium: now with OpenBSD pledge(2)&lt;/a&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In addition to the pledge news, we also have a story about the Chromium browser being converted to use pledge on OpenBSD.“The renderer, gpu, plugin and utility processes are now using pledge(2)Unfortunately the GPU process only requires an rpath pledge because ofMesa trying to parse two configuration files, /etc/drirc and ${HOME}/.drircSo currently the GPU process will use an rpath pledge in the nextweek or so so that people can test, but this situation has to beresolved because it is not acceptable that a mostly unused configurationfile is being parsed from a library and that stops us from using lesspledges and thus disallowing the GPU process to have read accessto the filesystem ... like your ssh keys.”
UPDATE: the rpath pledge has been removed.&lt;br&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" target="_blank" rel="nofollow noopener"&gt;https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Igor Sysoev - &lt;a href="mailto:igor@sysoev.ru" target="_blank" rel="nofollow noopener"&gt;igor@sysoev.ru&lt;/a&gt; / &lt;a href="https://twitter.com/isysoev" target="_blank" rel="nofollow noopener"&gt;@isysoev&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;NGINX and FreeBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2016-01-10-FreeBSD-EdgeRouter-Lite.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD on EdgeRouter Lite - no serial port required&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few years back there was a neat story on how to setup FreeBSD on the EdgeRouter-Lite&lt;/li&gt;
&lt;li&gt;This last week we get to revisit this, as Colin Percival posts a script, and a very detailed walkthrough of using it to generate your own custom image which does NOT require hooking up a serial cable.&lt;/li&gt;
&lt;li&gt;Currently the script only works on -CURRENT, but may work later for 10.3&lt;/li&gt;
&lt;li&gt;The script is pretty complete, does the buildworld and creation of a USB image for you. It also does a basic firewall configuration and even growfs for expanding to the full-size of your USB media.&lt;/li&gt;
&lt;li&gt;Using the ‘firstboot’ keyword, an rc.d script does all the initial configuration allowing you access to the system&lt;/li&gt;
&lt;li&gt;If you have one, or are looking at switching to a FreeBSD based router, do yourself a favor and take a look at this article. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2016-January/228540.html" target="_blank" rel="nofollow noopener"&gt;John Marino reaches out to the community for testing of Synth, a new custom package repo builder&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A hybrid of poudriere and portmaster/portupgrade&lt;/li&gt;
&lt;li&gt;Uses your regular ports tree and your running system, but built builds packages faster, the poudriere way&lt;/li&gt;
&lt;li&gt;Requires no setup, no downloading or building reference versions of the OS, no checking out yet another copy of the ports tree&lt;/li&gt;
&lt;li&gt;In the future may have support for using binary packages for dependencies, build only the apps you actually want to customize&lt;/li&gt;
&lt;li&gt;Looks very promising
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://android-review.googlesource.com/#/c/196090/" target="_blank" rel="nofollow noopener"&gt;OpenBSD malloc finds use-after-free in Android OS &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Score one for OpenBSD’s rigorous security and attention to detail. We have an interesting commit / comment from Android&lt;/li&gt;
&lt;li&gt;It looks like this particular mistake was found in the uncrypt routines, in particular the using of a variable memory which had already gone out of scope. &lt;/li&gt;
&lt;li&gt;Through the usage of OpenBSD’s malloc junk filling feature, the developers were able to identify and correct the issue.&lt;/li&gt;
&lt;li&gt;Maybe there is a case to be made that this be used more widely, especially during testing?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.slideshare.net/facepalmtarbz2/new-sendfile-in-english" target="_blank" rel="nofollow noopener"&gt;Netflix's async sendfile now in FreeBSD-current&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have some slides presented by Gleb Smirnoff at last years FreeBSD storage summit, talking about changes to sendfile made by Netflix. &lt;/li&gt;
&lt;li&gt;It starts off with a bit of history, showing the misery of life without sendfile(2) back in FreeBSD 1.0, specifically the ftpd daemon.&lt;/li&gt;
&lt;li&gt;Then in 1997 that all changed, HP-UX 11.00 grew the sendfile function, and FreeBSD 3.0 / Linux 2.2 added it in ‘98&lt;/li&gt;
&lt;li&gt;The slides then go into other details, on how the first implementations would map the userland cycle into the kernel. Then in 2004 the SF_NODISKIO flag was added, followed by changes in 2006 and 2013 to using sbspace() bytes and sending shared memory descriptor data respectively. &lt;/li&gt;
&lt;li&gt;The idea is that instead of the web server waiting for the send to complete, it calls sendfile then goes about its other work, then it gets a notification when the work is done, and finishes up any of the request handling, like logging how many bytes were sent&lt;/li&gt;
&lt;li&gt;The new sendfile implementation took the maximum load of an older netflix box from 25 gigabits/sec to 35 gigabits/sec&lt;/li&gt;
&lt;li&gt;Separately, Netflix has also done work on implementing a TLS version of sendfile(), to streamline the process of sending encrypted data&lt;/li&gt;
&lt;li&gt;There is still a todo list, including making sendfile() play nice with ZFS. Currently files sent via sendfile from ZFS are stored in memory twice, once in the ARC, and once in the buffer cache that sendfile uses
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.levenez.com/unix/" target="_blank" rel="nofollow noopener"&gt;Unix Timeline of how Unix versions have evolved&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=293459" target="_blank" rel="nofollow noopener"&gt;netmap support now in bhyve in FreeBSD -Current&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.dragonflydigest.com/2016/01/12/17478.html" target="_blank" rel="nofollow noopener"&gt;McCabe complexity and Dragonfly BSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://gist.github.com/cander/2785819" target="_blank" rel="nofollow noopener"&gt;Bourne Basic - a BASIC interpreter implemented (painfully) in pure Bourne shell&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://github.com/NixOS/nixpkgs/pull/10816#issuecomment-169298385" target="_blank" rel="nofollow noopener"&gt;NixOS on FreeBSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.openbsd.org/faq/pf/example1.html" target="_blank" rel="nofollow noopener"&gt;Turning an ordinary OpenBSD system into a router&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://devtalk.nvidia.com/default/topic/908423/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-361-16-beta-/" target="_blank" rel="nofollow noopener"&gt;nvidia releases beta 361.16 driver for FreeBSD&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2BLZeBrSK" target="_blank" rel="nofollow noopener"&gt; Bryson - SmartOS / KVM / ZFS&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2OQIxkZst" target="_blank" rel="nofollow noopener"&gt; Samba 1969&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s206j2ekTZ" target="_blank" rel="nofollow noopener"&gt; DO / VPN / PF&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://slexy.org/view/s20kyrKSH9" target="_blank" rel="nofollow noopener"&gt; Unstable VM  / Update&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we have a very full news roster to rundown, plus an oldie, but goodie with Igor of the nginx project. That plus all your questions and feedback,</p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSDJournal!
***</li>
</ul>

<h4><a href="https://www.ixsystems.com/freenas-logo-contest/" rel="nofollow">FreeNAS Logo Design Contest</a></h4>

<p><a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" rel="nofollow">Rules and Requirements</a></p>

<hr>

<h4>For those of you curious about Kris&#39; new lighting here are the links to what he is using.</h4>

<ul>
<li><a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&redirect=true&ref_=oh_aui_detailpage_o01_s00&pldnSite=1" rel="nofollow">Softbox Light Diffuser</a></li>
<li><a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00" rel="nofollow">Full Spectrum 5500K CFL Bulb</a>
***</li>
</ul>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.randi.io/2015/12/31/the-developer-formerly-known-as-freebsdgirl/" rel="nofollow">Clearing the air </a></h3>

<ul>
<li>A number of you have written in the past few weeks asking why Allan and I didn’t talk about one of the biggest stories to make headlines last week. </li>
<li>Both of us are quite aware of the details surrounding the incidents between former FreeBSD developers “freebsdgirl” and “xmj”, however the news was still ongoing and we didn’t feel it right to discuss until some of the facts had time to shake out and a more clear (and calm) discussion could be had. </li>
<li>However, without getting into all the gory details here’s some of the key points that we want to highlight for our listeners. We each have our own thoughts on this.</li>
</ul>

<p>Kris:</p>

<ul>
<li>The FreeBSD that I know has been VERY open and inclusive to all who want to contribute. The saying “Shut up and code” is there for a reason. We’ve seen developers of all types, different race / gender / creed, and the one thing we all have in common is the love for BSD.</li>
<li>This particular incident has been linked to FreeBSD, which isn’t exactly a fair association, since the project and other members of community were not directly involved. What started out as a disagreement (over something non-BSD related) turned into an ugly slugfest all across social media and (briefly) on a BSD chatroom.</li>
<li>In this case after reviewing lots of the facts, I think both sides were WAY out of line, and hope they recognize that. </li>
<li>There has been slamming of the core team and foundation in social media, as somehow the delay / silence is an admission of wrong-doing. Nothing could be further from the truth. These are serious people doing a serious job, and much like BSD they would rather take the time to do it right instead of just going off on social media and making things worse. (Plus they all are volunteers who are spread across many different time-zones)</li>
<li>Also, if you hear rumors of incidents of harassment, remember that without details all those will ever be is rumors. Obviously those in the project would take any incident like that seriously, but without coming forward and sharing the details it’s impossible to take any action or make changes for the better.</li>
</ul>

<p>Allan:</p>

<ul>
<li>The FreeBSD community is the best group of people I have ever worked with, but that doesn’t mean that it is immune to the same problems that every other group of people faces. As much as all of us wish it didn’t, harassment and other ill-behavior does happen, and must be dealt with</li>
<li>The FreeBSD Core team has previously sanctioned committers and revoked commit bits for things that happened entirely offline and outside of the FreeBSD community. Part of being a committer is representing the project in everything that you do, so anything you do that reflects badly upon the project is grounds for your removal</li>
<li>There was something written about this in the project documentation somewhere (that I can not find for the live of me), specifically about the prestige that comes with (or used to) an @freebsd.org account, and how new members of the community need to keep that in mind as they work to earn, and keep, a commit bit</li>
<li>In this specific situation, I am not sure what core did exactly, we’ll have to wait for their report to find out, but I am not sure what more they could have done.</li>
<li>“Individual members of core have the power to temporarily suspend commit privileges until core as a whole has the chance to review the issue. Only a 2/3 majority of core has the authority to suspend commit privileges for longer than a week or to remove them permanently. Core&#39;s “special powers” only kick in when it acts as a group, not on an individual basis. As individuals, the core team members are all committers first and core second”</li>
<li>So, an individual member of core can revoke the commit bit of someone who is reported to have acted in a manner not conducive with the rules, but I don’t know how that would have made a difference in this case.</li>
<li>The only point from Randi’s list of 10 things the project should change that I do not think is possible is #6. As stated in the “Committers&#39; Big List of Rules” that I quoted earlier, the core team can only take action after they have had time for everyone to review and discuss a matter, and then vote on it.</li>
<li>The core team is made up of 9 people with other responsibilities and commitments. Further, they are currently spread across 6 different countries, and 6 different times zones (even the countries and time zones do not line up).</li>
<li>We eagerly await Cores report on this matter, and more importantly, Core and the Foundation&#39;s work to come up with a better framework and response policy to deal with such situations in the future.</li>
<li>The important thing is to ensure that incident reports are properly handled, so that those reporting issues feel safe in doing so</li>
<li>While we hope there is never another incident of harassment in the FreeBSD community, the realities of the world we live in mean we need to be ready to deal with it
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/homelab/comments/3zv64t/the_home_lab_9_servers_about_98tb_working_url/" rel="nofollow">Dan Langille discussing his rig</a></h3>

<ul>
<li><a href="http://imgur.com/gallery/nuBBD" rel="nofollow">Pictures of Dan Langille&#39;s Home Lab</a> </li>
<li>Ever read FreeBSD Diary? How about used FreshPorts or FreshSource? Gone to BSDCan? If so you may be interested in seeing exactly where those sites are served from.</li>
<li>Dan Langille posts to reddit with information about his home lab, with the obligatory pictures to back it up</li>
<li>As most good home racks do, this one starts at Home Depot and ends up with a variety of systems and hardware living on it. </li>
<li>All in all an impressive rig and nice job wiring</li>
<li>(I wonder what that ASUS RT‑N66U is doing, if it’s running FreeBSD or just an access point??)</li>
<li>Reminder: Get your BSDCan talk proposal submitted before the deadline, January 19th
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160107174436" rel="nofollow">Pre-5.9 pledge(2) update</a></h3>

<ul>
<li>Theo gives us a status update on pledge() for pre OpenBSD 5.9“For the next upcoming release, we will disable the &#39;paths&#39; argument.Reasoning: We have been very busy making as much of the tree set thepromises right in applications, and building a few new promises aswell.  We simply don&#39;t have enough time to review the kernel code andmake sure it is bug-free.  We&#39;ll use the next 6 months developmentcycle to decide on paths, and then re-audit the tree to use theinterface where it is suitable.
The base tree (/bin /sbin /usr/bin /usr/sbin /usr/libexec /usr/games)contains 652 ELF binaries. 451 use pledge.  201 do not. Approximately47 do not need or cannot use pledge.  Leaving 154 we could potentiallypledge in the future.  Most of those are not very important.  Thereare a few hot spots, but most of what people use has been handled wellby the team.“</li>
</ul>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160107075227" rel="nofollow">Chromium: now with OpenBSD pledge(2)</a> </p>

<ul>
<li>In addition to the pledge news, we also have a story about the Chromium browser being converted to use pledge on OpenBSD.“The renderer, gpu, plugin and utility processes are now using pledge(2)Unfortunately the GPU process only requires an rpath pledge because ofMesa trying to parse two configuration files, /etc/drirc and ${HOME}/.drircSo currently the GPU process will use an rpath pledge in the nextweek or so so that people can test, but this situation has to beresolved because it is not acceptable that a mostly unused configurationfile is being parsed from a library and that stops us from using lesspledges and thus disallowing the GPU process to have read accessto the filesystem ... like your ssh keys.”
UPDATE: the rpath pledge has been removed.<br>
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" rel="nofollow">https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/</a></li>
</ul>

<hr>

<h2>Interview - Igor Sysoev - <a href="mailto:igor@sysoev.ru" rel="nofollow">igor@sysoev.ru</a> / <a href="https://twitter.com/isysoev" rel="nofollow">@isysoev</a></h2>

<p>NGINX and FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2016-01-10-FreeBSD-EdgeRouter-Lite.html" rel="nofollow">FreeBSD on EdgeRouter Lite - no serial port required</a></h3>

<ul>
<li>A few years back there was a neat story on how to setup FreeBSD on the EdgeRouter-Lite</li>
<li>This last week we get to revisit this, as Colin Percival posts a script, and a very detailed walkthrough of using it to generate your own custom image which does NOT require hooking up a serial cable.</li>
<li>Currently the script only works on -CURRENT, but may work later for 10.3</li>
<li>The script is pretty complete, does the buildworld and creation of a USB image for you. It also does a basic firewall configuration and even growfs for expanding to the full-size of your USB media.</li>
<li>Using the ‘firstboot’ keyword, an rc.d script does all the initial configuration allowing you access to the system</li>
<li>If you have one, or are looking at switching to a FreeBSD based router, do yourself a favor and take a look at this article. 
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-January/228540.html" rel="nofollow">John Marino reaches out to the community for testing of Synth, a new custom package repo builder</a></h3>

<ul>
<li>A hybrid of poudriere and portmaster/portupgrade</li>
<li>Uses your regular ports tree and your running system, but built builds packages faster, the poudriere way</li>
<li>Requires no setup, no downloading or building reference versions of the OS, no checking out yet another copy of the ports tree</li>
<li>In the future may have support for using binary packages for dependencies, build only the apps you actually want to customize</li>
<li>Looks very promising
***</li>
</ul>

<h3><a href="https://android-review.googlesource.com/#/c/196090/" rel="nofollow">OpenBSD malloc finds use-after-free in Android OS </a></h3>

<ul>
<li>Score one for OpenBSD’s rigorous security and attention to detail. We have an interesting commit / comment from Android</li>
<li>It looks like this particular mistake was found in the uncrypt routines, in particular the using of a variable memory which had already gone out of scope. </li>
<li>Through the usage of OpenBSD’s malloc junk filling feature, the developers were able to identify and correct the issue.</li>
<li>Maybe there is a case to be made that this be used more widely, especially during testing?
***</li>
</ul>

<h3><a href="http://www.slideshare.net/facepalmtarbz2/new-sendfile-in-english" rel="nofollow">Netflix&#39;s async sendfile now in FreeBSD-current</a></h3>

<ul>
<li>We have some slides presented by Gleb Smirnoff at last years FreeBSD storage summit, talking about changes to sendfile made by Netflix. </li>
<li>It starts off with a bit of history, showing the misery of life without sendfile(2) back in FreeBSD 1.0, specifically the ftpd daemon.</li>
<li>Then in 1997 that all changed, HP-UX 11.00 grew the sendfile function, and FreeBSD 3.0 / Linux 2.2 added it in ‘98</li>
<li>The slides then go into other details, on how the first implementations would map the userland cycle into the kernel. Then in 2004 the SF_NODISKIO flag was added, followed by changes in 2006 and 2013 to using sbspace() bytes and sending shared memory descriptor data respectively. </li>
<li>The idea is that instead of the web server waiting for the send to complete, it calls sendfile then goes about its other work, then it gets a notification when the work is done, and finishes up any of the request handling, like logging how many bytes were sent</li>
<li>The new sendfile implementation took the maximum load of an older netflix box from 25 gigabits/sec to 35 gigabits/sec</li>
<li>Separately, Netflix has also done work on implementing a TLS version of sendfile(), to streamline the process of sending encrypted data</li>
<li>There is still a todo list, including making sendfile() play nice with ZFS. Currently files sent via sendfile from ZFS are stored in memory twice, once in the ARC, and once in the buffer cache that sendfile uses
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="http://www.levenez.com/unix/" rel="nofollow">Unix Timeline of how Unix versions have evolved</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=293459" rel="nofollow">netmap support now in bhyve in FreeBSD -Current</a></p></li>
<li><p><a href="https://www.dragonflydigest.com/2016/01/12/17478.html" rel="nofollow">McCabe complexity and Dragonfly BSD</a> </p></li>
<li><p><a href="https://gist.github.com/cander/2785819" rel="nofollow">Bourne Basic - a BASIC interpreter implemented (painfully) in pure Bourne shell</a> </p></li>
<li><p><a href="https://github.com/NixOS/nixpkgs/pull/10816#issuecomment-169298385" rel="nofollow">NixOS on FreeBSD</a> </p></li>
<li><p><a href="http://www.openbsd.org/faq/pf/example1.html" rel="nofollow">Turning an ordinary OpenBSD system into a router</a></p></li>
<li><p><a href="https://devtalk.nvidia.com/default/topic/908423/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-361-16-beta-/" rel="nofollow">nvidia releases beta 361.16 driver for FreeBSD</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2BLZeBrSK" rel="nofollow"> Bryson - SmartOS / KVM / ZFS</a> </li>
<li><a href="http://slexy.org/view/s2OQIxkZst" rel="nofollow"> Samba 1969</a> </li>
<li><a href="http://slexy.org/view/s206j2ekTZ" rel="nofollow"> DO / VPN / PF</a> </li>
<li><p><a href="http://slexy.org/view/s20kyrKSH9" rel="nofollow"> Unstable VM  / Update</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we have a very full news roster to rundown, plus an oldie, but goodie with Igor of the nginx project. That plus all your questions and feedback,</p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSDJournal!
***</li>
</ul>

<h4><a href="https://www.ixsystems.com/freenas-logo-contest/" rel="nofollow">FreeNAS Logo Design Contest</a></h4>

<p><a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" rel="nofollow">Rules and Requirements</a></p>

<hr>

<h4>For those of you curious about Kris&#39; new lighting here are the links to what he is using.</h4>

<ul>
<li><a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&redirect=true&ref_=oh_aui_detailpage_o01_s00&pldnSite=1" rel="nofollow">Softbox Light Diffuser</a></li>
<li><a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00" rel="nofollow">Full Spectrum 5500K CFL Bulb</a>
***</li>
</ul>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.randi.io/2015/12/31/the-developer-formerly-known-as-freebsdgirl/" rel="nofollow">Clearing the air </a></h3>

<ul>
<li>A number of you have written in the past few weeks asking why Allan and I didn’t talk about one of the biggest stories to make headlines last week. </li>
<li>Both of us are quite aware of the details surrounding the incidents between former FreeBSD developers “freebsdgirl” and “xmj”, however the news was still ongoing and we didn’t feel it right to discuss until some of the facts had time to shake out and a more clear (and calm) discussion could be had. </li>
<li>However, without getting into all the gory details here’s some of the key points that we want to highlight for our listeners. We each have our own thoughts on this.</li>
</ul>

<p>Kris:</p>

<ul>
<li>The FreeBSD that I know has been VERY open and inclusive to all who want to contribute. The saying “Shut up and code” is there for a reason. We’ve seen developers of all types, different race / gender / creed, and the one thing we all have in common is the love for BSD.</li>
<li>This particular incident has been linked to FreeBSD, which isn’t exactly a fair association, since the project and other members of community were not directly involved. What started out as a disagreement (over something non-BSD related) turned into an ugly slugfest all across social media and (briefly) on a BSD chatroom.</li>
<li>In this case after reviewing lots of the facts, I think both sides were WAY out of line, and hope they recognize that. </li>
<li>There has been slamming of the core team and foundation in social media, as somehow the delay / silence is an admission of wrong-doing. Nothing could be further from the truth. These are serious people doing a serious job, and much like BSD they would rather take the time to do it right instead of just going off on social media and making things worse. (Plus they all are volunteers who are spread across many different time-zones)</li>
<li>Also, if you hear rumors of incidents of harassment, remember that without details all those will ever be is rumors. Obviously those in the project would take any incident like that seriously, but without coming forward and sharing the details it’s impossible to take any action or make changes for the better.</li>
</ul>

<p>Allan:</p>

<ul>
<li>The FreeBSD community is the best group of people I have ever worked with, but that doesn’t mean that it is immune to the same problems that every other group of people faces. As much as all of us wish it didn’t, harassment and other ill-behavior does happen, and must be dealt with</li>
<li>The FreeBSD Core team has previously sanctioned committers and revoked commit bits for things that happened entirely offline and outside of the FreeBSD community. Part of being a committer is representing the project in everything that you do, so anything you do that reflects badly upon the project is grounds for your removal</li>
<li>There was something written about this in the project documentation somewhere (that I can not find for the live of me), specifically about the prestige that comes with (or used to) an @freebsd.org account, and how new members of the community need to keep that in mind as they work to earn, and keep, a commit bit</li>
<li>In this specific situation, I am not sure what core did exactly, we’ll have to wait for their report to find out, but I am not sure what more they could have done.</li>
<li>“Individual members of core have the power to temporarily suspend commit privileges until core as a whole has the chance to review the issue. Only a 2/3 majority of core has the authority to suspend commit privileges for longer than a week or to remove them permanently. Core&#39;s “special powers” only kick in when it acts as a group, not on an individual basis. As individuals, the core team members are all committers first and core second”</li>
<li>So, an individual member of core can revoke the commit bit of someone who is reported to have acted in a manner not conducive with the rules, but I don’t know how that would have made a difference in this case.</li>
<li>The only point from Randi’s list of 10 things the project should change that I do not think is possible is #6. As stated in the “Committers&#39; Big List of Rules” that I quoted earlier, the core team can only take action after they have had time for everyone to review and discuss a matter, and then vote on it.</li>
<li>The core team is made up of 9 people with other responsibilities and commitments. Further, they are currently spread across 6 different countries, and 6 different times zones (even the countries and time zones do not line up).</li>
<li>We eagerly await Cores report on this matter, and more importantly, Core and the Foundation&#39;s work to come up with a better framework and response policy to deal with such situations in the future.</li>
<li>The important thing is to ensure that incident reports are properly handled, so that those reporting issues feel safe in doing so</li>
<li>While we hope there is never another incident of harassment in the FreeBSD community, the realities of the world we live in mean we need to be ready to deal with it
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/homelab/comments/3zv64t/the_home_lab_9_servers_about_98tb_working_url/" rel="nofollow">Dan Langille discussing his rig</a></h3>

<ul>
<li><a href="http://imgur.com/gallery/nuBBD" rel="nofollow">Pictures of Dan Langille&#39;s Home Lab</a> </li>
<li>Ever read FreeBSD Diary? How about used FreshPorts or FreshSource? Gone to BSDCan? If so you may be interested in seeing exactly where those sites are served from.</li>
<li>Dan Langille posts to reddit with information about his home lab, with the obligatory pictures to back it up</li>
<li>As most good home racks do, this one starts at Home Depot and ends up with a variety of systems and hardware living on it. </li>
<li>All in all an impressive rig and nice job wiring</li>
<li>(I wonder what that ASUS RT‑N66U is doing, if it’s running FreeBSD or just an access point??)</li>
<li>Reminder: Get your BSDCan talk proposal submitted before the deadline, January 19th
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20160107174436" rel="nofollow">Pre-5.9 pledge(2) update</a></h3>

<ul>
<li>Theo gives us a status update on pledge() for pre OpenBSD 5.9“For the next upcoming release, we will disable the &#39;paths&#39; argument.Reasoning: We have been very busy making as much of the tree set thepromises right in applications, and building a few new promises aswell.  We simply don&#39;t have enough time to review the kernel code andmake sure it is bug-free.  We&#39;ll use the next 6 months developmentcycle to decide on paths, and then re-audit the tree to use theinterface where it is suitable.
The base tree (/bin /sbin /usr/bin /usr/sbin /usr/libexec /usr/games)contains 652 ELF binaries. 451 use pledge.  201 do not. Approximately47 do not need or cannot use pledge.  Leaving 154 we could potentiallypledge in the future.  Most of those are not very important.  Thereare a few hot spots, but most of what people use has been handled wellby the team.“</li>
</ul>

<p><a href="http://undeadly.org/cgi?action=article&sid=20160107075227" rel="nofollow">Chromium: now with OpenBSD pledge(2)</a> </p>

<ul>
<li>In addition to the pledge news, we also have a story about the Chromium browser being converted to use pledge on OpenBSD.“The renderer, gpu, plugin and utility processes are now using pledge(2)Unfortunately the GPU process only requires an rpath pledge because ofMesa trying to parse two configuration files, /etc/drirc and ${HOME}/.drircSo currently the GPU process will use an rpath pledge in the nextweek or so so that people can test, but this situation has to beresolved because it is not acceptable that a mostly unused configurationfile is being parsed from a library and that stops us from using lesspledges and thus disallowing the GPU process to have read accessto the filesystem ... like your ssh keys.”
UPDATE: the rpath pledge has been removed.<br>
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" rel="nofollow">https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/</a></li>
</ul>

<hr>

<h2>Interview - Igor Sysoev - <a href="mailto:igor@sysoev.ru" rel="nofollow">igor@sysoev.ru</a> / <a href="https://twitter.com/isysoev" rel="nofollow">@isysoev</a></h2>

<p>NGINX and FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2016-01-10-FreeBSD-EdgeRouter-Lite.html" rel="nofollow">FreeBSD on EdgeRouter Lite - no serial port required</a></h3>

<ul>
<li>A few years back there was a neat story on how to setup FreeBSD on the EdgeRouter-Lite</li>
<li>This last week we get to revisit this, as Colin Percival posts a script, and a very detailed walkthrough of using it to generate your own custom image which does NOT require hooking up a serial cable.</li>
<li>Currently the script only works on -CURRENT, but may work later for 10.3</li>
<li>The script is pretty complete, does the buildworld and creation of a USB image for you. It also does a basic firewall configuration and even growfs for expanding to the full-size of your USB media.</li>
<li>Using the ‘firstboot’ keyword, an rc.d script does all the initial configuration allowing you access to the system</li>
<li>If you have one, or are looking at switching to a FreeBSD based router, do yourself a favor and take a look at this article. 
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2016-January/228540.html" rel="nofollow">John Marino reaches out to the community for testing of Synth, a new custom package repo builder</a></h3>

<ul>
<li>A hybrid of poudriere and portmaster/portupgrade</li>
<li>Uses your regular ports tree and your running system, but built builds packages faster, the poudriere way</li>
<li>Requires no setup, no downloading or building reference versions of the OS, no checking out yet another copy of the ports tree</li>
<li>In the future may have support for using binary packages for dependencies, build only the apps you actually want to customize</li>
<li>Looks very promising
***</li>
</ul>

<h3><a href="https://android-review.googlesource.com/#/c/196090/" rel="nofollow">OpenBSD malloc finds use-after-free in Android OS </a></h3>

<ul>
<li>Score one for OpenBSD’s rigorous security and attention to detail. We have an interesting commit / comment from Android</li>
<li>It looks like this particular mistake was found in the uncrypt routines, in particular the using of a variable memory which had already gone out of scope. </li>
<li>Through the usage of OpenBSD’s malloc junk filling feature, the developers were able to identify and correct the issue.</li>
<li>Maybe there is a case to be made that this be used more widely, especially during testing?
***</li>
</ul>

<h3><a href="http://www.slideshare.net/facepalmtarbz2/new-sendfile-in-english" rel="nofollow">Netflix&#39;s async sendfile now in FreeBSD-current</a></h3>

<ul>
<li>We have some slides presented by Gleb Smirnoff at last years FreeBSD storage summit, talking about changes to sendfile made by Netflix. </li>
<li>It starts off with a bit of history, showing the misery of life without sendfile(2) back in FreeBSD 1.0, specifically the ftpd daemon.</li>
<li>Then in 1997 that all changed, HP-UX 11.00 grew the sendfile function, and FreeBSD 3.0 / Linux 2.2 added it in ‘98</li>
<li>The slides then go into other details, on how the first implementations would map the userland cycle into the kernel. Then in 2004 the SF_NODISKIO flag was added, followed by changes in 2006 and 2013 to using sbspace() bytes and sending shared memory descriptor data respectively. </li>
<li>The idea is that instead of the web server waiting for the send to complete, it calls sendfile then goes about its other work, then it gets a notification when the work is done, and finishes up any of the request handling, like logging how many bytes were sent</li>
<li>The new sendfile implementation took the maximum load of an older netflix box from 25 gigabits/sec to 35 gigabits/sec</li>
<li>Separately, Netflix has also done work on implementing a TLS version of sendfile(), to streamline the process of sending encrypted data</li>
<li>There is still a todo list, including making sendfile() play nice with ZFS. Currently files sent via sendfile from ZFS are stored in memory twice, once in the ARC, and once in the buffer cache that sendfile uses
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="http://www.levenez.com/unix/" rel="nofollow">Unix Timeline of how Unix versions have evolved</a> </p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=293459" rel="nofollow">netmap support now in bhyve in FreeBSD -Current</a></p></li>
<li><p><a href="https://www.dragonflydigest.com/2016/01/12/17478.html" rel="nofollow">McCabe complexity and Dragonfly BSD</a> </p></li>
<li><p><a href="https://gist.github.com/cander/2785819" rel="nofollow">Bourne Basic - a BASIC interpreter implemented (painfully) in pure Bourne shell</a> </p></li>
<li><p><a href="https://github.com/NixOS/nixpkgs/pull/10816#issuecomment-169298385" rel="nofollow">NixOS on FreeBSD</a> </p></li>
<li><p><a href="http://www.openbsd.org/faq/pf/example1.html" rel="nofollow">Turning an ordinary OpenBSD system into a router</a></p></li>
<li><p><a href="https://devtalk.nvidia.com/default/topic/908423/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-361-16-beta-/" rel="nofollow">nvidia releases beta 361.16 driver for FreeBSD</a> </p></li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2BLZeBrSK" rel="nofollow"> Bryson - SmartOS / KVM / ZFS</a> </li>
<li><a href="http://slexy.org/view/s2OQIxkZst" rel="nofollow"> Samba 1969</a> </li>
<li><a href="http://slexy.org/view/s206j2ekTZ" rel="nofollow"> DO / VPN / PF</a> </li>
<li><p><a href="http://slexy.org/view/s20kyrKSH9" rel="nofollow"> Unstable VM  / Update</a></p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p>

<hr></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>123: ZFS in the trenches</title>
  <link>https://www.bsdnow.tv/123</link>
  <guid isPermaLink="false">f2ccc8f8-3740-4e85-995f-cdf83d7f795f</guid>
  <pubDate>Wed, 06 Jan 2016 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f2ccc8f8-3740-4e85-995f-cdf83d7f795f.mp3" length="87151828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we will be talking shop with Josh Paetzel of FreeNAS fame, hearing about his best do’s and do-nots of using ZFS in production. Also, a quick</itunes:subtitle>
  <itunes:duration>2:01:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we will be talking shop with Josh Paetzel of FreeNAS fame, hearing about his best do’s and do-nots of using ZFS in production. Also, a quick&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD 
Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/freenas-logo-contest/" target="_blank" rel="nofollow noopener"&gt;FreeNAS Logo Design Contest&lt;/a&gt;&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" target="_blank" rel="nofollow noopener"&gt;Rules and Requirements&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h4&gt;For those of you curious about Kris' new lighting here are the links to what he is using.&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&amp;amp;redirect=true&amp;amp;ref_=oh_aui_detailpage_o01_s00&amp;amp;pldnSite=1" target="_blank" rel="nofollow noopener"&gt;Softbox Light Diffuser&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&amp;amp;redirect=true&amp;amp;ref_=oh_aui_detailpage_o06_s00" target="_blank" rel="nofollow noopener"&gt;Full Spectrum 5500K CFL Bulb&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://fossforce.com/2015/12/bsd-brief-look-back-2015/" target="_blank" rel="nofollow noopener"&gt;A Brief look back at 2015&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As we start the show this week, we begin with a brief look back at BSD in 2015, brought to us by Larry at FOSS force.&lt;/li&gt;
&lt;li&gt;Aside from his issue with tap-to-click on the touchpad, his PC-BSD experience has been pretty good. (Larry, if you hear this, jump on #pcbsd on FreeNode and we will lend a hand)&lt;/li&gt;
&lt;li&gt;He mentions that this &lt;em&gt;really&lt;/em&gt; isn’t his first time running BSD, apparently back in ye-olden days he got NetBSD up and running on a PowerBook G3, until an update brought that experience to abrupt ending. &lt;/li&gt;
&lt;li&gt;He gives a shout-out to the FreeBSD Foundation as being a great go-to source for wrapup on the previous year in FreeBSD land, while also mentioning the great 4.4 release of DragonFly, and some of the variants, such as RetroBSD and LiteBSD&lt;/li&gt;
&lt;li&gt;He leaves us with a tease for 2016 that work is ongoing on Twitter to port over Mopidy, a python based extensible music server
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.bsdevents.org/scheduler/" target="_blank" rel="nofollow noopener"&gt;A look forward at BSD events throughout 2016&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After a quick look back at 2015, now its time to start planning your 2016 schedule. The BSDEvents site has a calendar of all the upcoming conferences / shows where BSD will have a presence this year. &lt;/li&gt;
&lt;li&gt;There are quite a few items on the agenda, including non BSD specific conferences, such as SCALE / Fosdem and more.&lt;/li&gt;
&lt;li&gt;Take a look and see, you may be able to find something close your location where you can come hang out with other BSD developers.&lt;/li&gt;
&lt;li&gt;(or better yet), if a linux conference is coming to your town, think about submitting a BSD talk!&lt;/li&gt;
&lt;li&gt;Additionally, if getting BSD Certification is something on your 2016 resolutions, you can often take the test at one of these shows, avoiding the need to travel to a testing center. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://louwrentius.com/the-hidden-cost-of-using-zfs-for-your-home-nas.html" target="_blank" rel="nofollow noopener"&gt;The 'Hidden' Cost of Using ZFS for Your Home NAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An article was recently posted that seems to be trying to dissuade people from using ZFS for their home NAS&lt;/li&gt;
&lt;li&gt;It points out what experienced users already know, but many newcomers are not strictly aware of: Expanding a ZFS pool is not always as straightforward as you think it should be&lt;/li&gt;
&lt;li&gt;ZFS was designed to be expanded, and it handled this very well&lt;/li&gt;
&lt;li&gt;However, a ZFS pool is made up of VDEVs, and it is these VDEVs that provide the redundancy. RAID-Z VDEVs cannot be changed once they are created. You can replace each disk individually, and the VDEV will grow to its new larger size, but you cannot add additional disks to a RAID-Z VDEV&lt;/li&gt;
&lt;li&gt;At this point, your option is to add an additional VDEV, although best practises dictate that the new VDEV should use an equal number of disks, to avoid uneven performance&lt;/li&gt;
&lt;li&gt;So, if you started with a 6 disk RAID-Z2, having to add 6 more disks to grow the pool does seem excessive&lt;/li&gt;
&lt;li&gt;For the best flexibility, use mirrors. If you had used 6 disks as 3 mirrors of 2 disks each, you could then just add 2 more disks at a time. The downside is that using 2TB disks, you’d only have 6TB of usable space, versus the 8TB you would get from those disks in a RAID-Z2&lt;/li&gt;
&lt;li&gt;This is the trade-off, mirrors give you better performance and flexibility, but less space efficiency&lt;/li&gt;
&lt;li&gt;It is important to note that the diagrams in this article make it appear as if all parity information is stored on specific drives. In ZFS parity is spread across all drives. Often times, the data written to the drive is not of a size that can evenly be split across all drives, so the data actually ends up &lt;a href="http://blog.delphix.com/matt/files/2014/06/RAIDZ.png" target="_blank" rel="nofollow noopener"&gt;looking like this&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The errors as I see it in the original article are:

&lt;ul&gt;
&lt;li&gt;It notes that the hidden cost of ZFS is that if you add a second RAID-Z VDEV, you will have a whole second set of parity drives. While this is a cost, it is the cost of making sure your data is safe. If you had an array with more than 12 drives, it is likely that you would to be able to withstand the failure of the larger number of drives&lt;/li&gt;
&lt;li&gt;The article does not consider the resilver time. If you did create a configuration with a very wide RAID-Z stripe, the failure of a disk would leave the pool degraded for a much longer time, leaving your pool at risk for that longer period.&lt;/li&gt;
&lt;li&gt;The article does not consider performance. Two RAID-Z2 VDEVs of 6 disks each will give much better performance than a single VDEV of 10 or 12 disks, especially when it comes to IOPS.
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=293001" target="_blank" rel="nofollow noopener"&gt;ZFS Boot Enviroments now availble in the FreeBSD bootloader&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It’s been in phabricator for a while (and PC-BSD), but the support for Boot-Environments has now landed upstream in -CURRENT&lt;/li&gt;
&lt;li&gt;This work was helped by cross-project collaboration when an IllumOS Developer, Toomas Soome, started porting the FreeBSD loader to IllumOS to replace GRUB there&lt;/li&gt;
&lt;li&gt;This gives Beastie menu the ability to look at the ZFS disk, and dynamically list boot-environments that it finds. (Much nicer than GRUB, which required a pre-written configuration file)&lt;/li&gt;
&lt;li&gt;This work was extended further, when Toomas Soome also ported the &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=293233" target="_blank" rel="nofollow noopener"&gt;Beastie Menu to the UEFI loader&lt;/a&gt; which is now &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=293234" target="_blank" rel="nofollow noopener"&gt;enabled by default for UEFI&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;All of these changes are scheduled to be merged back in time for FreeBSD 10.3 as well.&lt;/li&gt;
&lt;li&gt;There is also a patch being worked on to &lt;a href="https://reviews.freebsd.org/D4515" target="_blank" rel="nofollow noopener"&gt;support booting from ZFS in UEFI&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;This is exciting times for doing neat things with ZFS on root, these plus Allans forthcoming &lt;a href="https://reviews.freebsd.org/D4593" target="_blank" rel="nofollow noopener"&gt;GELI support&lt;/a&gt; will negate the necessity for GRUB on PC-BSD for example (Kris is very happy)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Josh Paetzel - &lt;a href="mailto:email@email" target="_blank" rel="nofollow noopener"&gt;email@email&lt;/a&gt; / &lt;a href="https://twitter.com/bsdunix4ever" target="_blank" rel="nofollow noopener"&gt;@bsdunix4ever&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;ZFS Support
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://retrobsd.org/viewtopic.php?f=1&amp;amp;t=37470" target="_blank" rel="nofollow noopener"&gt;RetroBSD being tested on ESP32&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More hardware news for RetroBSD and LiteBSD&lt;/li&gt;
&lt;li&gt;I don’t know much about this hardware, but there is a lot of discussion in the forum threads about it&lt;/li&gt;
&lt;li&gt;Not sure what you are supposed to accomplish with only 400kb of ram&lt;/li&gt;
&lt;li&gt;&lt;a href="https://hackaday.com/2016/01/04/litebsd-brings-4-4bsd-to-pic32/" target="_blank" rel="nofollow noopener"&gt;LITEBSD Brings 4.4BSD to PIC32&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;It is interesting to see these super-small boards with only 512kb of memory, but will crypto offload support&lt;/li&gt;
&lt;li&gt;It is also interesting to see talk of 140mbps WiFi, can the processor actually handle that much traffic?
&lt;a href="http://thevarguy.com/open-source-application-software-companies/bsd-unix-os-resurrected-embedded-iot-market" target="_blank" rel="nofollow noopener"&gt;BSD Unix-like OS is Resurrected for Embedded IoT Market&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Related to the above stories, we also have an article about BSD making a resurgence on various Internet of things devices, which mentions both RetroBSD and LiteBSD&lt;/li&gt;
&lt;li&gt;The article mentions that this is an exciting development for embedded vars who now have an alternative licensed open-source OS to potentially use
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2015-12-31/introducing-hardenedbsds-new-binary-updater" target="_blank" rel="nofollow noopener"&gt;HardenedBSD’s new Binary Updater&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It looks like there is now another way to update your FreeBSD(hardened) system&lt;/li&gt;
&lt;li&gt;The post by Shawn Web, details how the new updater will work in future releases of HBSD&lt;/li&gt;
&lt;li&gt; Right now it looks fairly straight-forward, creating both the base.txz and kernel.txz, along with some data for etcupdate&lt;/li&gt;
&lt;li&gt;It includes a nice option for the kernel name in the update, allowing different kernels to be installed / updated at will&lt;/li&gt;
&lt;li&gt;Everything is cryptographically signed and verified using the base system openssl&lt;/li&gt;
&lt;li&gt;The build system is fairly simple, only requiring “sh/git/openssl” to create the binary updates&lt;/li&gt;
&lt;li&gt;Planned features also include updating of jails, and ZFS boot-environments
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://functionallyparanoid.com/2016/01/02/sometimes-processors-need-love-too/" target="_blank" rel="nofollow noopener"&gt;Sometimes, processors need (BSD) love too&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a blog post from Brian Everly, talking about his long journey into legacy processors and the plans for the future to work on better supporting them on OpenBSD ports&lt;/li&gt;
&lt;li&gt;He begins with the story of his UNIX journey to today, and why this fostered his love for many of these old (and not so old) architectures, such as Sparc64, PPC32, i386.&lt;/li&gt;
&lt;li&gt;This journey ended up with the purchase of some legacy hardware (ebay is your friend), and the creation of a database listing the major port blockers on each platform&lt;/li&gt;
&lt;li&gt;This is the great kind of thing folks can do to step up and help a project, even as a weekend hobby it’s great to run some hardware and help test / fix up issues that other developers maybe don’t interact with as much anymore. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2510" target="_blank" rel="nofollow noopener"&gt;The standard MWL disclaimer&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://lists.pcbsd.org/pipermail/testing/2016-January/010350.html" target="_blank" rel="nofollow noopener"&gt;PC-BSD 11.0-CURRENTJAN2016 Available&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/tech-pkg/2015/12/28/msg016193.html" target="_blank" rel="nofollow noopener"&gt;NetBSD pkgsrc-2015Q3 statistics&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/tech-pkg/2016/01/01/msg016213.html" target="_blank" rel="nofollow noopener"&gt;NetBSD pkgsrc-2015Q4 released&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/reproducible_builds_conference_in_athens" target="_blank" rel="nofollow noopener"&gt;First Reproducible builds conference in Athens&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.theregister.co.uk/2016/01/06/thinkpad_designer_obituary" target="_blank" rel="nofollow noopener"&gt;The creator of the original ThinkPad design passes away &lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s213iCKLwn" target="_blank" rel="nofollow noopener"&gt; Andrew - High Contrast&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21ClGePLP" target="_blank" rel="nofollow noopener"&gt; John - FreeNAS followup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21527pkO1" target="_blank" rel="nofollow noopener"&gt; Giorgio - Custom Install&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2jOlCsjkU" target="_blank" rel="nofollow noopener"&gt; Don - ZFS Slowdowns&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21uaB0FDU" target="_blank" rel="nofollow noopener"&gt; Fred - Dual Boot PC-BSD/Linux&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we will be talking shop with Josh Paetzel of FreeNAS fame, hearing about his best do’s and do-nots of using ZFS in production. Also, a quick</p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD 
Journal!
***</li>
</ul>

<h4><a href="https://www.ixsystems.com/freenas-logo-contest/" rel="nofollow">FreeNAS Logo Design Contest</a></h4>

<p><a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" rel="nofollow">Rules and Requirements</a></p>

<hr>

<h4>For those of you curious about Kris&#39; new lighting here are the links to what he is using.</h4>

<ul>
<li><a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&redirect=true&ref_=oh_aui_detailpage_o01_s00&pldnSite=1" rel="nofollow">Softbox Light Diffuser</a></li>
<li><a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00" rel="nofollow">Full Spectrum 5500K CFL Bulb</a>
***</li>
</ul>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://fossforce.com/2015/12/bsd-brief-look-back-2015/" rel="nofollow">A Brief look back at 2015</a></h3>

<ul>
<li>As we start the show this week, we begin with a brief look back at BSD in 2015, brought to us by Larry at FOSS force.</li>
<li>Aside from his issue with tap-to-click on the touchpad, his PC-BSD experience has been pretty good. (Larry, if you hear this, jump on #pcbsd on FreeNode and we will lend a hand)</li>
<li>He mentions that this <em>really</em> isn’t his first time running BSD, apparently back in ye-olden days he got NetBSD up and running on a PowerBook G3, until an update brought that experience to abrupt ending. </li>
<li>He gives a shout-out to the FreeBSD Foundation as being a great go-to source for wrapup on the previous year in FreeBSD land, while also mentioning the great 4.4 release of DragonFly, and some of the variants, such as RetroBSD and LiteBSD</li>
<li>He leaves us with a tease for 2016 that work is ongoing on Twitter to port over Mopidy, a python based extensible music server
***</li>
</ul>

<h3><a href="http://www.bsdevents.org/scheduler/" rel="nofollow">A look forward at BSD events throughout 2016</a></h3>

<ul>
<li>After a quick look back at 2015, now its time to start planning your 2016 schedule. The BSDEvents site has a calendar of all the upcoming conferences / shows where BSD will have a presence this year. </li>
<li>There are quite a few items on the agenda, including non BSD specific conferences, such as SCALE / Fosdem and more.</li>
<li>Take a look and see, you may be able to find something close your location where you can come hang out with other BSD developers.</li>
<li>(or better yet), if a linux conference is coming to your town, think about submitting a BSD talk!</li>
<li>Additionally, if getting BSD Certification is something on your 2016 resolutions, you can often take the test at one of these shows, avoiding the need to travel to a testing center. 
***</li>
</ul>

<h3><a href="http://louwrentius.com/the-hidden-cost-of-using-zfs-for-your-home-nas.html" rel="nofollow">The &#39;Hidden&#39; Cost of Using ZFS for Your Home NAS</a></h3>

<ul>
<li>An article was recently posted that seems to be trying to dissuade people from using ZFS for their home NAS</li>
<li>It points out what experienced users already know, but many newcomers are not strictly aware of: Expanding a ZFS pool is not always as straightforward as you think it should be</li>
<li>ZFS was designed to be expanded, and it handled this very well</li>
<li>However, a ZFS pool is made up of VDEVs, and it is these VDEVs that provide the redundancy. RAID-Z VDEVs cannot be changed once they are created. You can replace each disk individually, and the VDEV will grow to its new larger size, but you cannot add additional disks to a RAID-Z VDEV</li>
<li>At this point, your option is to add an additional VDEV, although best practises dictate that the new VDEV should use an equal number of disks, to avoid uneven performance</li>
<li>So, if you started with a 6 disk RAID-Z2, having to add 6 more disks to grow the pool does seem excessive</li>
<li>For the best flexibility, use mirrors. If you had used 6 disks as 3 mirrors of 2 disks each, you could then just add 2 more disks at a time. The downside is that using 2TB disks, you’d only have 6TB of usable space, versus the 8TB you would get from those disks in a RAID-Z2</li>
<li>This is the trade-off, mirrors give you better performance and flexibility, but less space efficiency</li>
<li>It is important to note that the diagrams in this article make it appear as if all parity information is stored on specific drives. In ZFS parity is spread across all drives. Often times, the data written to the drive is not of a size that can evenly be split across all drives, so the data actually ends up <a href="http://blog.delphix.com/matt/files/2014/06/RAIDZ.png" rel="nofollow">looking like this</a></li>
<li>The errors as I see it in the original article are:

<ul>
<li>It notes that the hidden cost of ZFS is that if you add a second RAID-Z VDEV, you will have a whole second set of parity drives. While this is a cost, it is the cost of making sure your data is safe. If you had an array with more than 12 drives, it is likely that you would to be able to withstand the failure of the larger number of drives</li>
<li>The article does not consider the resilver time. If you did create a configuration with a very wide RAID-Z stripe, the failure of a disk would leave the pool degraded for a much longer time, leaving your pool at risk for that longer period.</li>
<li>The article does not consider performance. Two RAID-Z2 VDEVs of 6 disks each will give much better performance than a single VDEV of 10 or 12 disks, especially when it comes to IOPS.
***</li>
</ul></li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=293001" rel="nofollow">ZFS Boot Enviroments now availble in the FreeBSD bootloader</a></h3>

<ul>
<li>It’s been in phabricator for a while (and PC-BSD), but the support for Boot-Environments has now landed upstream in -CURRENT</li>
<li>This work was helped by cross-project collaboration when an IllumOS Developer, Toomas Soome, started porting the FreeBSD loader to IllumOS to replace GRUB there</li>
<li>This gives Beastie menu the ability to look at the ZFS disk, and dynamically list boot-environments that it finds. (Much nicer than GRUB, which required a pre-written configuration file)</li>
<li>This work was extended further, when Toomas Soome also ported the <a href="https://svnweb.freebsd.org/base?view=revision&revision=293233" rel="nofollow">Beastie Menu to the UEFI loader</a> which is now <a href="https://svnweb.freebsd.org/base?view=revision&revision=293234" rel="nofollow">enabled by default for UEFI</a></li>
<li>All of these changes are scheduled to be merged back in time for FreeBSD 10.3 as well.</li>
<li>There is also a patch being worked on to <a href="https://reviews.freebsd.org/D4515" rel="nofollow">support booting from ZFS in UEFI</a> </li>
<li>This is exciting times for doing neat things with ZFS on root, these plus Allans forthcoming <a href="https://reviews.freebsd.org/D4593" rel="nofollow">GELI support</a> will negate the necessity for GRUB on PC-BSD for example (Kris is very happy)
***</li>
</ul>

<h2>Interview - Josh Paetzel - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<ul>
<li>ZFS Support
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://retrobsd.org/viewtopic.php?f=1&t=37470" rel="nofollow">RetroBSD being tested on ESP32</a></h3>

<ul>
<li>More hardware news for RetroBSD and LiteBSD</li>
<li>I don’t know much about this hardware, but there is a lot of discussion in the forum threads about it</li>
<li>Not sure what you are supposed to accomplish with only 400kb of ram</li>
<li><a href="https://hackaday.com/2016/01/04/litebsd-brings-4-4bsd-to-pic32/" rel="nofollow">LITEBSD Brings 4.4BSD to PIC32</a></li>
<li>It is interesting to see these super-small boards with only 512kb of memory, but will crypto offload support</li>
<li>It is also interesting to see talk of 140mbps WiFi, can the processor actually handle that much traffic?
<a href="http://thevarguy.com/open-source-application-software-companies/bsd-unix-os-resurrected-embedded-iot-market" rel="nofollow">BSD Unix-like OS is Resurrected for Embedded IoT Market</a></li>
<li>Related to the above stories, we also have an article about BSD making a resurgence on various Internet of things devices, which mentions both RetroBSD and LiteBSD</li>
<li>The article mentions that this is an exciting development for embedded vars who now have an alternative licensed open-source OS to potentially use
***</li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2015-12-31/introducing-hardenedbsds-new-binary-updater" rel="nofollow">HardenedBSD’s new Binary Updater</a></h3>

<ul>
<li>It looks like there is now another way to update your FreeBSD(hardened) system</li>
<li>The post by Shawn Web, details how the new updater will work in future releases of HBSD</li>
<li> Right now it looks fairly straight-forward, creating both the base.txz and kernel.txz, along with some data for etcupdate</li>
<li>It includes a nice option for the kernel name in the update, allowing different kernels to be installed / updated at will</li>
<li>Everything is cryptographically signed and verified using the base system openssl</li>
<li>The build system is fairly simple, only requiring “sh/git/openssl” to create the binary updates</li>
<li>Planned features also include updating of jails, and ZFS boot-environments
***</li>
</ul>

<h3><a href="http://functionallyparanoid.com/2016/01/02/sometimes-processors-need-love-too/" rel="nofollow">Sometimes, processors need (BSD) love too</a></h3>

<ul>
<li>We have a blog post from Brian Everly, talking about his long journey into legacy processors and the plans for the future to work on better supporting them on OpenBSD ports</li>
<li>He begins with the story of his UNIX journey to today, and why this fostered his love for many of these old (and not so old) architectures, such as Sparc64, PPC32, i386.</li>
<li>This journey ended up with the purchase of some legacy hardware (ebay is your friend), and the creation of a database listing the major port blockers on each platform</li>
<li>This is the great kind of thing folks can do to step up and help a project, even as a weekend hobby it’s great to run some hardware and help test / fix up issues that other developers maybe don’t interact with as much anymore. 
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="http://blather.michaelwlucas.com/archives/2510" rel="nofollow">The standard MWL disclaimer</a></p>

<p><a href="http://lists.pcbsd.org/pipermail/testing/2016-January/010350.html" rel="nofollow">PC-BSD 11.0-CURRENTJAN2016 Available</a> </p>

<p><a href="http://mail-index.netbsd.org/tech-pkg/2015/12/28/msg016193.html" rel="nofollow">NetBSD pkgsrc-2015Q3 statistics</a></p>

<p><a href="http://mail-index.netbsd.org/tech-pkg/2016/01/01/msg016213.html" rel="nofollow">NetBSD pkgsrc-2015Q4 released</a></p>

<p><a href="http://blog.netbsd.org/tnf/entry/reproducible_builds_conference_in_athens" rel="nofollow">First Reproducible builds conference in Athens</a></p>

<p><a href="http://www.theregister.co.uk/2016/01/06/thinkpad_designer_obituary" rel="nofollow">The creator of the original ThinkPad design passes away </a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213iCKLwn" rel="nofollow"> Andrew - High Contrast</a> </li>
<li><a href="http://slexy.org/view/s21ClGePLP" rel="nofollow"> John - FreeNAS followup</a> </li>
<li><a href="http://slexy.org/view/s21527pkO1" rel="nofollow"> Giorgio - Custom Install</a> </li>
<li><a href="http://slexy.org/view/s2jOlCsjkU" rel="nofollow"> Don - ZFS Slowdowns</a> </li>
<li><a href="http://slexy.org/view/s21uaB0FDU" rel="nofollow"> Fred - Dual Boot PC-BSD/Linux</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we will be talking shop with Josh Paetzel of FreeNAS fame, hearing about his best do’s and do-nots of using ZFS in production. Also, a quick</p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD 
Journal!
***</li>
</ul>

<h4><a href="https://www.ixsystems.com/freenas-logo-contest/" rel="nofollow">FreeNAS Logo Design Contest</a></h4>

<p><a href="https://forums.freenas.org/index.php?threads/freenas-logo-design-contest.39968/" rel="nofollow">Rules and Requirements</a></p>

<hr>

<h4>For those of you curious about Kris&#39; new lighting here are the links to what he is using.</h4>

<ul>
<li><a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&redirect=true&ref_=oh_aui_detailpage_o01_s00&pldnSite=1" rel="nofollow">Softbox Light Diffuser</a></li>
<li><a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00" rel="nofollow">Full Spectrum 5500K CFL Bulb</a>
***</li>
</ul>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://fossforce.com/2015/12/bsd-brief-look-back-2015/" rel="nofollow">A Brief look back at 2015</a></h3>

<ul>
<li>As we start the show this week, we begin with a brief look back at BSD in 2015, brought to us by Larry at FOSS force.</li>
<li>Aside from his issue with tap-to-click on the touchpad, his PC-BSD experience has been pretty good. (Larry, if you hear this, jump on #pcbsd on FreeNode and we will lend a hand)</li>
<li>He mentions that this <em>really</em> isn’t his first time running BSD, apparently back in ye-olden days he got NetBSD up and running on a PowerBook G3, until an update brought that experience to abrupt ending. </li>
<li>He gives a shout-out to the FreeBSD Foundation as being a great go-to source for wrapup on the previous year in FreeBSD land, while also mentioning the great 4.4 release of DragonFly, and some of the variants, such as RetroBSD and LiteBSD</li>
<li>He leaves us with a tease for 2016 that work is ongoing on Twitter to port over Mopidy, a python based extensible music server
***</li>
</ul>

<h3><a href="http://www.bsdevents.org/scheduler/" rel="nofollow">A look forward at BSD events throughout 2016</a></h3>

<ul>
<li>After a quick look back at 2015, now its time to start planning your 2016 schedule. The BSDEvents site has a calendar of all the upcoming conferences / shows where BSD will have a presence this year. </li>
<li>There are quite a few items on the agenda, including non BSD specific conferences, such as SCALE / Fosdem and more.</li>
<li>Take a look and see, you may be able to find something close your location where you can come hang out with other BSD developers.</li>
<li>(or better yet), if a linux conference is coming to your town, think about submitting a BSD talk!</li>
<li>Additionally, if getting BSD Certification is something on your 2016 resolutions, you can often take the test at one of these shows, avoiding the need to travel to a testing center. 
***</li>
</ul>

<h3><a href="http://louwrentius.com/the-hidden-cost-of-using-zfs-for-your-home-nas.html" rel="nofollow">The &#39;Hidden&#39; Cost of Using ZFS for Your Home NAS</a></h3>

<ul>
<li>An article was recently posted that seems to be trying to dissuade people from using ZFS for their home NAS</li>
<li>It points out what experienced users already know, but many newcomers are not strictly aware of: Expanding a ZFS pool is not always as straightforward as you think it should be</li>
<li>ZFS was designed to be expanded, and it handled this very well</li>
<li>However, a ZFS pool is made up of VDEVs, and it is these VDEVs that provide the redundancy. RAID-Z VDEVs cannot be changed once they are created. You can replace each disk individually, and the VDEV will grow to its new larger size, but you cannot add additional disks to a RAID-Z VDEV</li>
<li>At this point, your option is to add an additional VDEV, although best practises dictate that the new VDEV should use an equal number of disks, to avoid uneven performance</li>
<li>So, if you started with a 6 disk RAID-Z2, having to add 6 more disks to grow the pool does seem excessive</li>
<li>For the best flexibility, use mirrors. If you had used 6 disks as 3 mirrors of 2 disks each, you could then just add 2 more disks at a time. The downside is that using 2TB disks, you’d only have 6TB of usable space, versus the 8TB you would get from those disks in a RAID-Z2</li>
<li>This is the trade-off, mirrors give you better performance and flexibility, but less space efficiency</li>
<li>It is important to note that the diagrams in this article make it appear as if all parity information is stored on specific drives. In ZFS parity is spread across all drives. Often times, the data written to the drive is not of a size that can evenly be split across all drives, so the data actually ends up <a href="http://blog.delphix.com/matt/files/2014/06/RAIDZ.png" rel="nofollow">looking like this</a></li>
<li>The errors as I see it in the original article are:

<ul>
<li>It notes that the hidden cost of ZFS is that if you add a second RAID-Z VDEV, you will have a whole second set of parity drives. While this is a cost, it is the cost of making sure your data is safe. If you had an array with more than 12 drives, it is likely that you would to be able to withstand the failure of the larger number of drives</li>
<li>The article does not consider the resilver time. If you did create a configuration with a very wide RAID-Z stripe, the failure of a disk would leave the pool degraded for a much longer time, leaving your pool at risk for that longer period.</li>
<li>The article does not consider performance. Two RAID-Z2 VDEVs of 6 disks each will give much better performance than a single VDEV of 10 or 12 disks, especially when it comes to IOPS.
***</li>
</ul></li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=293001" rel="nofollow">ZFS Boot Enviroments now availble in the FreeBSD bootloader</a></h3>

<ul>
<li>It’s been in phabricator for a while (and PC-BSD), but the support for Boot-Environments has now landed upstream in -CURRENT</li>
<li>This work was helped by cross-project collaboration when an IllumOS Developer, Toomas Soome, started porting the FreeBSD loader to IllumOS to replace GRUB there</li>
<li>This gives Beastie menu the ability to look at the ZFS disk, and dynamically list boot-environments that it finds. (Much nicer than GRUB, which required a pre-written configuration file)</li>
<li>This work was extended further, when Toomas Soome also ported the <a href="https://svnweb.freebsd.org/base?view=revision&revision=293233" rel="nofollow">Beastie Menu to the UEFI loader</a> which is now <a href="https://svnweb.freebsd.org/base?view=revision&revision=293234" rel="nofollow">enabled by default for UEFI</a></li>
<li>All of these changes are scheduled to be merged back in time for FreeBSD 10.3 as well.</li>
<li>There is also a patch being worked on to <a href="https://reviews.freebsd.org/D4515" rel="nofollow">support booting from ZFS in UEFI</a> </li>
<li>This is exciting times for doing neat things with ZFS on root, these plus Allans forthcoming <a href="https://reviews.freebsd.org/D4593" rel="nofollow">GELI support</a> will negate the necessity for GRUB on PC-BSD for example (Kris is very happy)
***</li>
</ul>

<h2>Interview - Josh Paetzel - <a href="mailto:email@email" rel="nofollow">email@email</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<ul>
<li>ZFS Support
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://retrobsd.org/viewtopic.php?f=1&t=37470" rel="nofollow">RetroBSD being tested on ESP32</a></h3>

<ul>
<li>More hardware news for RetroBSD and LiteBSD</li>
<li>I don’t know much about this hardware, but there is a lot of discussion in the forum threads about it</li>
<li>Not sure what you are supposed to accomplish with only 400kb of ram</li>
<li><a href="https://hackaday.com/2016/01/04/litebsd-brings-4-4bsd-to-pic32/" rel="nofollow">LITEBSD Brings 4.4BSD to PIC32</a></li>
<li>It is interesting to see these super-small boards with only 512kb of memory, but will crypto offload support</li>
<li>It is also interesting to see talk of 140mbps WiFi, can the processor actually handle that much traffic?
<a href="http://thevarguy.com/open-source-application-software-companies/bsd-unix-os-resurrected-embedded-iot-market" rel="nofollow">BSD Unix-like OS is Resurrected for Embedded IoT Market</a></li>
<li>Related to the above stories, we also have an article about BSD making a resurgence on various Internet of things devices, which mentions both RetroBSD and LiteBSD</li>
<li>The article mentions that this is an exciting development for embedded vars who now have an alternative licensed open-source OS to potentially use
***</li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2015-12-31/introducing-hardenedbsds-new-binary-updater" rel="nofollow">HardenedBSD’s new Binary Updater</a></h3>

<ul>
<li>It looks like there is now another way to update your FreeBSD(hardened) system</li>
<li>The post by Shawn Web, details how the new updater will work in future releases of HBSD</li>
<li> Right now it looks fairly straight-forward, creating both the base.txz and kernel.txz, along with some data for etcupdate</li>
<li>It includes a nice option for the kernel name in the update, allowing different kernels to be installed / updated at will</li>
<li>Everything is cryptographically signed and verified using the base system openssl</li>
<li>The build system is fairly simple, only requiring “sh/git/openssl” to create the binary updates</li>
<li>Planned features also include updating of jails, and ZFS boot-environments
***</li>
</ul>

<h3><a href="http://functionallyparanoid.com/2016/01/02/sometimes-processors-need-love-too/" rel="nofollow">Sometimes, processors need (BSD) love too</a></h3>

<ul>
<li>We have a blog post from Brian Everly, talking about his long journey into legacy processors and the plans for the future to work on better supporting them on OpenBSD ports</li>
<li>He begins with the story of his UNIX journey to today, and why this fostered his love for many of these old (and not so old) architectures, such as Sparc64, PPC32, i386.</li>
<li>This journey ended up with the purchase of some legacy hardware (ebay is your friend), and the creation of a database listing the major port blockers on each platform</li>
<li>This is the great kind of thing folks can do to step up and help a project, even as a weekend hobby it’s great to run some hardware and help test / fix up issues that other developers maybe don’t interact with as much anymore. 
***</li>
</ul>

<h3>Beastie Bits</h3>

<p><a href="http://blather.michaelwlucas.com/archives/2510" rel="nofollow">The standard MWL disclaimer</a></p>

<p><a href="http://lists.pcbsd.org/pipermail/testing/2016-January/010350.html" rel="nofollow">PC-BSD 11.0-CURRENTJAN2016 Available</a> </p>

<p><a href="http://mail-index.netbsd.org/tech-pkg/2015/12/28/msg016193.html" rel="nofollow">NetBSD pkgsrc-2015Q3 statistics</a></p>

<p><a href="http://mail-index.netbsd.org/tech-pkg/2016/01/01/msg016213.html" rel="nofollow">NetBSD pkgsrc-2015Q4 released</a></p>

<p><a href="http://blog.netbsd.org/tnf/entry/reproducible_builds_conference_in_athens" rel="nofollow">First Reproducible builds conference in Athens</a></p>

<p><a href="http://www.theregister.co.uk/2016/01/06/thinkpad_designer_obituary" rel="nofollow">The creator of the original ThinkPad design passes away </a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213iCKLwn" rel="nofollow"> Andrew - High Contrast</a> </li>
<li><a href="http://slexy.org/view/s21ClGePLP" rel="nofollow"> John - FreeNAS followup</a> </li>
<li><a href="http://slexy.org/view/s21527pkO1" rel="nofollow"> Giorgio - Custom Install</a> </li>
<li><a href="http://slexy.org/view/s2jOlCsjkU" rel="nofollow"> Don - ZFS Slowdowns</a> </li>
<li><a href="http://slexy.org/view/s21uaB0FDU" rel="nofollow"> Fred - Dual Boot PC-BSD/Linux</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>122: The BSD Black Box</title>
  <link>https://www.bsdnow.tv/122</link>
  <guid isPermaLink="false">a7a3ccc1-f728-4364-b18d-f351af30438b</guid>
  <pubDate>Wed, 30 Dec 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a7a3ccc1-f728-4364-b18d-f351af30438b.mp3" length="86202628" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we will be interviewing Alex Rosenberg, to</itunes:subtitle>
  <itunes:duration>2:23:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we will be interviewing Alex Rosenberg, to&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.nycbug.org/event/10356/openbsd_laptop_nycbug_2015.pdf" target="_blank" rel="nofollow noopener"&gt;Life with an OpenBSD Laptop: A UNIX-lover's tale of migrating away from the Mac. The Good, The Bad, The Ugly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD user Isaac (.ike) Levy details his switch from a Mac to an OpenBSD laptop&lt;/li&gt;
&lt;li&gt;He covers a bit about selecting hardware and dealing with wifi&lt;/li&gt;
&lt;li&gt;Talks about binary packages and system upgrades&lt;/li&gt;
&lt;li&gt;Talks about power management, suspend/resume, battery life&lt;/li&gt;
&lt;li&gt;Show screenshots of some of his favourite window managers&lt;/li&gt;
&lt;li&gt;Browsers and email clients are also discussed&lt;/li&gt;
&lt;li&gt;Things he found missing in OpenBSD:

&lt;ul&gt;
&lt;li&gt;A journaling file system, every unclean shutdown means a full fsck(1)&lt;/li&gt;
&lt;li&gt;UTF-8/unicode was not everywhere&lt;/li&gt;
&lt;li&gt;Syncing pictures and contacts to his phone&lt;/li&gt;
&lt;li&gt;Drawing tools
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-December/459067.html" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD matches its Intel kernel graphics driver against Linux 4.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The DragonFlyBSD DRM stack continues to rapidly advance, now bringing in support from Linux 4.0!&lt;/li&gt;
&lt;li&gt;Some of the notable features:&lt;/li&gt;
&lt;li&gt;Basic Skylake support&lt;br&gt;

&lt;ul&gt;
&lt;li&gt;Panel Self-Refresh (PSR) now supported on Valleyview and Cherryview&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;Preparations for atomic display updates&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;Performance improvements on various GPU families, including Cherryview, Broadwell and Haswell&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;GPU frequencies are now kept at a minimum of 450MHz when possible on Haswell and Broadwell, ensuring a minimum experience level for various types of workloads&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;Improved reset support for gen3/4 GPUs, which should fix some OpenGL crashes on Core 2 and pre-2012 Atom machine&lt;/li&gt;
&lt;li&gt;Better sound/graphics driver synchronization for audio over hdmi support&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;As usual, small bugfixes and stability improvements here and there
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://fossforce.com/2015/12/bsd-wish-list-2016/" target="_blank" rel="nofollow noopener"&gt;A BSD Wish List for 2016&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Larry over at Foss Force brings us his wish list for BSD support in 2016. &lt;/li&gt;
&lt;li&gt;Since he has converted most of his daily desktop usage to PC-BSD, he is specifically wanting support for some desktop applications. Namely Google hangouts and Spotify. &lt;/li&gt;
&lt;li&gt;This is something which has come up periodically among the PC-BSD community. At the moment most users are dual-booting or using alternatives, like WebRTC. However the Google Hangouts plugin is available for Linux, and perhaps this will encourage some developers to see if we can get it running with the newer Linux stack on -CURRENT. &lt;/li&gt;
&lt;li&gt;Spotify also has a native Linux version, which may need testing on FreeBSD - CURRENT. It may be closer now, and should be updated on the Wanted Ports Page&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://wiki.freebsd.org/WantedPorts" target="_blank" rel="nofollow noopener"&gt;https://wiki.freebsd.org/WantedPorts&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdimp.blogspot.com/2015/12/hard-float-api-coming-soon-by-default.html" target="_blank" rel="nofollow noopener"&gt;Hard Float API coming soon by default to armv6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Warner Losh talks about upcoming changes to armv6 on FreeBSD &lt;/li&gt;
&lt;li&gt;“All the CPUs that FreeBSD supports have hard floating point in them. We've supported hard float for quite some time in the FreeBSD kernel. However, by default, we still use a soft-float ABI.”&lt;/li&gt;
&lt;li&gt;First, “A new armv6hf (architecture) was created, but that caused some issues with some ports, and the meaning of 'soft float' sadly was ambiguous between the soft-float ABI, and the soft-float libraries that implement floating point when there's no hardware FPU”&lt;/li&gt;
&lt;li&gt;“Over the spring and summer, I fixed ld.so so that it  can load both soft ABI and hard ABI libraries on the same system, depending on markings in the binaries themselves. Soft float ABI and hard float ABI binaries have different flags in the ELF headers, so it is relatively straightforward to know which is which.”&lt;/li&gt;
&lt;li&gt;“So, in the coming days, I'll commit the first set of changes to move to armv6 as a hard float ABI by default. The kernel doesn't care: it can execute both. The new ld.so will allow you to transition through this change by allowing old, compat soft ABI libraries to co-exist on the system with new hard ABI libraries. This change alone isn't enough, but it will be good to get it out into circulation.”&lt;/li&gt;
&lt;li&gt;“armv6hf will be removed before FreeBSD 11”&lt;/li&gt;
&lt;li&gt;A LIBSOFT will be created, similar in concept to the LIB32 available on AMD64
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Alex Rosenberg - &lt;a href="mailto:alexr@leftfield.org" target="_blank" rel="nofollow noopener"&gt;alexr@leftfield.org&lt;/a&gt; / &lt;a href="https://twitter.com/alexr" target="_blank" rel="nofollow noopener"&gt;@alexr&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Former Manager of Platform Architecture at Sony
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://bsdtalk.blogspot.com/2005/12/bsdtalk001-intro-to-bsd.html" target="_blank" rel="nofollow noopener"&gt;Tuesday, Dec 20, 2005 was the release date of the very first bsdtalkpodcast&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://reviews.freebsd.org/D4350" target="_blank" rel="nofollow noopener"&gt;Patch: Server side support for TCP FastOpen &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://www.openbsdjumpstart.org/" target="_blank" rel="nofollow noopener"&gt;Learn to tame OpenBSD quickly&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=292740" target="_blank" rel="nofollow noopener"&gt;Hardware Accerated iSCSI lands in FreeBSD &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.reddit.com/r/dragonflybsd/comments/3x4n7u/psa_1920x1080_on_dragonflybsd_44_under_qemukvm/" target="_blank" rel="nofollow noopener"&gt;Settings for full HD resolution on DragonFlyBSD under QEMU/KVM, thanks to reddit user Chapo_Rouge&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://reviews.freebsd.org/D4713" target="_blank" rel="nofollow noopener"&gt;Patch: An IllumOS developer has been porting the FreeBSD boot loader to replace their old version of GRUB. In doing so, he has also made improvements to the block caching in the boot loader &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blog.teleri.net/open-microsoft/" target="_blank" rel="nofollow noopener"&gt;A FreeBSD user working at Microsoft talks about Microsoft’s shift to Open Source &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://fosdem.org/2016/schedule/event/cert_bsdcg/" target="_blank" rel="nofollow noopener"&gt;BSDCG Exam Session at FOSDEM'16&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://fosdem.org/2016/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;Schedule for the BSD devroom at FOSDEM'16&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=145055446007162&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD snapshots are now 5.9&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://blog.erratasec.com/2015/12/some-notes-on-fast-grep.html#.VoQKD1JSRhx" target="_blank" rel="nofollow noopener"&gt;Notes on making BSD grep faster &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www-ssl.intel.com/content/www/us/en/jobs/job-search/js2.html?job=782165&amp;amp;src=ML-12080" target="_blank" rel="nofollow noopener"&gt;Intel’s Platform Application Engineering (PAE) group within the Networking Division (ND) is looking for a Network Software Engineer&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://locheil.shxd.cx/logo-tribute.4th" target="_blank" rel="nofollow noopener"&gt;Did you watch Die Hard at Christmas? Get the Die Hard FreeBSD boot screen: install this file in /boot and set loader_logo="tribute" in /boot/loader.conf &lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20CTqtEan" target="_blank" rel="nofollow noopener"&gt; Jeremy - ZFS without root&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20sNPoDm5" target="_blank" rel="nofollow noopener"&gt; Dan - Getting PC-BSD Media&lt;/a&gt;&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2hjsVgGBK" target="_blank" rel="nofollow noopener"&gt; Chris - VMs and FreeBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21pwYOTHi" target="_blank" rel="nofollow noopener"&gt; Ben - Haswell and IRC&lt;/a&gt; 

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://wiki.freebsd.org/Graphics/Update%20i915%20GPU%20driver%20to%20Linux%203.8" target="_blank" rel="nofollow noopener"&gt;Instructions for trying the Haswell patch&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20vifHCyc" target="_blank" rel="nofollow noopener"&gt; Matt - Donation to foundation&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we will be interviewing Alex Rosenberg, to</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://www.nycbug.org/event/10356/openbsd_laptop_nycbug_2015.pdf" rel="nofollow">Life with an OpenBSD Laptop: A UNIX-lover&#39;s tale of migrating away from the Mac. The Good, The Bad, The Ugly</a></h3>

<ul>
<li>OpenBSD user Isaac (.ike) Levy details his switch from a Mac to an OpenBSD laptop</li>
<li>He covers a bit about selecting hardware and dealing with wifi</li>
<li>Talks about binary packages and system upgrades</li>
<li>Talks about power management, suspend/resume, battery life</li>
<li>Show screenshots of some of his favourite window managers</li>
<li>Browsers and email clients are also discussed</li>
<li>Things he found missing in OpenBSD:

<ul>
<li>A journaling file system, every unclean shutdown means a full fsck(1)</li>
<li>UTF-8/unicode was not everywhere</li>
<li>Syncing pictures and contacts to his phone</li>
<li>Drawing tools
***</li>
</ul></li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-December/459067.html" rel="nofollow">DragonFlyBSD matches its Intel kernel graphics driver against Linux 4.0</a></h3>

<ul>
<li>The DragonFlyBSD DRM stack continues to rapidly advance, now bringing in support from Linux 4.0!</li>
<li>Some of the notable features:</li>
<li>Basic Skylake support<br>

<ul>
<li>Panel Self-Refresh (PSR) now supported on Valleyview and Cherryview<br></li>
<li>Preparations for atomic display updates<br></li>
<li>Performance improvements on various GPU families, including Cherryview, Broadwell and Haswell<br></li>
<li>GPU frequencies are now kept at a minimum of 450MHz when possible on Haswell and Broadwell, ensuring a minimum experience level for various types of workloads<br></li>
<li>Improved reset support for gen3/4 GPUs, which should fix some OpenGL crashes on Core 2 and pre-2012 Atom machine</li>
<li>Better sound/graphics driver synchronization for audio over hdmi support<br></li>
<li>As usual, small bugfixes and stability improvements here and there
***</li>
</ul></li>
</ul>

<h3><a href="http://fossforce.com/2015/12/bsd-wish-list-2016/" rel="nofollow">A BSD Wish List for 2016</a></h3>

<ul>
<li>Larry over at Foss Force brings us his wish list for BSD support in 2016. </li>
<li>Since he has converted most of his daily desktop usage to PC-BSD, he is specifically wanting support for some desktop applications. Namely Google hangouts and Spotify. </li>
<li>This is something which has come up periodically among the PC-BSD community. At the moment most users are dual-booting or using alternatives, like WebRTC. However the Google Hangouts plugin is available for Linux, and perhaps this will encourage some developers to see if we can get it running with the newer Linux stack on -CURRENT. </li>
<li>Spotify also has a native Linux version, which may need testing on FreeBSD - CURRENT. It may be closer now, and should be updated on the Wanted Ports Page</li>
<li><a href="https://wiki.freebsd.org/WantedPorts" rel="nofollow">https://wiki.freebsd.org/WantedPorts</a> 
***</li>
</ul>

<h3><a href="http://bsdimp.blogspot.com/2015/12/hard-float-api-coming-soon-by-default.html" rel="nofollow">Hard Float API coming soon by default to armv6</a></h3>

<ul>
<li>Warner Losh talks about upcoming changes to armv6 on FreeBSD </li>
<li>“All the CPUs that FreeBSD supports have hard floating point in them. We&#39;ve supported hard float for quite some time in the FreeBSD kernel. However, by default, we still use a soft-float ABI.”</li>
<li>First, “A new armv6hf (architecture) was created, but that caused some issues with some ports, and the meaning of &#39;soft float&#39; sadly was ambiguous between the soft-float ABI, and the soft-float libraries that implement floating point when there&#39;s no hardware FPU”</li>
<li>“Over the spring and summer, I fixed ld.so so that it  can load both soft ABI and hard ABI libraries on the same system, depending on markings in the binaries themselves. Soft float ABI and hard float ABI binaries have different flags in the ELF headers, so it is relatively straightforward to know which is which.”</li>
<li>“So, in the coming days, I&#39;ll commit the first set of changes to move to armv6 as a hard float ABI by default. The kernel doesn&#39;t care: it can execute both. The new ld.so will allow you to transition through this change by allowing old, compat soft ABI libraries to co-exist on the system with new hard ABI libraries. This change alone isn&#39;t enough, but it will be good to get it out into circulation.”</li>
<li>“armv6hf will be removed before FreeBSD 11”</li>
<li>A LIBSOFT will be created, similar in concept to the LIB32 available on AMD64
***</li>
</ul>

<h2>Interview - Alex Rosenberg - <a href="mailto:alexr@leftfield.org" rel="nofollow">alexr@leftfield.org</a> / <a href="https://twitter.com/alexr" rel="nofollow">@alexr</a></h2>

<ul>
<li>Former Manager of Platform Architecture at Sony
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="http://bsdtalk.blogspot.com/2005/12/bsdtalk001-intro-to-bsd.html" rel="nofollow">Tuesday, Dec 20, 2005 was the release date of the very first bsdtalkpodcast</a></p></li>
<li><p><a href="https://reviews.freebsd.org/D4350" rel="nofollow">Patch: Server side support for TCP FastOpen </a> </p></li>
<li><p><a href="http://www.openbsdjumpstart.org/" rel="nofollow">Learn to tame OpenBSD quickly</a></p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=292740" rel="nofollow">Hardware Accerated iSCSI lands in FreeBSD </a> </p></li>
<li><p><a href="https://www.reddit.com/r/dragonflybsd/comments/3x4n7u/psa_1920x1080_on_dragonflybsd_44_under_qemukvm/" rel="nofollow">Settings for full HD resolution on DragonFlyBSD under QEMU/KVM, thanks to reddit user Chapo_Rouge</a></p></li>
<li><p><a href="https://reviews.freebsd.org/D4713" rel="nofollow">Patch: An IllumOS developer has been porting the FreeBSD boot loader to replace their old version of GRUB. In doing so, he has also made improvements to the block caching in the boot loader </a> </p></li>
<li><p><a href="http://blog.teleri.net/open-microsoft/" rel="nofollow">A FreeBSD user working at Microsoft talks about Microsoft’s shift to Open Source </a> </p></li>
<li><p><a href="https://fosdem.org/2016/schedule/event/cert_bsdcg/" rel="nofollow">BSDCG Exam Session at FOSDEM&#39;16</a></p></li>
<li><p><a href="https://fosdem.org/2016/schedule/track/bsd/" rel="nofollow">Schedule for the BSD devroom at FOSDEM&#39;16</a></p></li>
<li><p><a href="http://marc.info/?l=openbsd-cvs&m=145055446007162&w=2" rel="nofollow">OpenBSD snapshots are now 5.9</a></p></li>
<li><p><a href="http://blog.erratasec.com/2015/12/some-notes-on-fast-grep.html#.VoQKD1JSRhx" rel="nofollow">Notes on making BSD grep faster </a> </p></li>
<li><p><a href="https://www-ssl.intel.com/content/www/us/en/jobs/job-search/js2.html?job=782165&src=ML-12080" rel="nofollow">Intel’s Platform Application Engineering (PAE) group within the Networking Division (ND) is looking for a Network Software Engineer</a> </p></li>
<li><p><a href="http://locheil.shxd.cx/logo-tribute.4th" rel="nofollow">Did you watch Die Hard at Christmas? Get the Die Hard FreeBSD boot screen: install this file in /boot and set loader_logo=&quot;tribute&quot; in /boot/loader.conf </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20CTqtEan" rel="nofollow"> Jeremy - ZFS without root</a> </li>
<li><a href="http://slexy.org/view/s20sNPoDm5" rel="nofollow"> Dan - Getting PC-BSD Media</a><br></li>
<li><a href="http://slexy.org/view/s2hjsVgGBK" rel="nofollow"> Chris - VMs and FreeBSD</a> </li>
<li><a href="http://slexy.org/view/s21pwYOTHi" rel="nofollow"> Ben - Haswell and IRC</a> 

<ul>
<li><a href="https://wiki.freebsd.org/Graphics/Update%20i915%20GPU%20driver%20to%20Linux%203.8" rel="nofollow">Instructions for trying the Haswell patch</a></li>
</ul></li>
<li><a href="http://slexy.org/view/s20vifHCyc" rel="nofollow"> Matt - Donation to foundation</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we will be interviewing Alex Rosenberg, to</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://www.nycbug.org/event/10356/openbsd_laptop_nycbug_2015.pdf" rel="nofollow">Life with an OpenBSD Laptop: A UNIX-lover&#39;s tale of migrating away from the Mac. The Good, The Bad, The Ugly</a></h3>

<ul>
<li>OpenBSD user Isaac (.ike) Levy details his switch from a Mac to an OpenBSD laptop</li>
<li>He covers a bit about selecting hardware and dealing with wifi</li>
<li>Talks about binary packages and system upgrades</li>
<li>Talks about power management, suspend/resume, battery life</li>
<li>Show screenshots of some of his favourite window managers</li>
<li>Browsers and email clients are also discussed</li>
<li>Things he found missing in OpenBSD:

<ul>
<li>A journaling file system, every unclean shutdown means a full fsck(1)</li>
<li>UTF-8/unicode was not everywhere</li>
<li>Syncing pictures and contacts to his phone</li>
<li>Drawing tools
***</li>
</ul></li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-December/459067.html" rel="nofollow">DragonFlyBSD matches its Intel kernel graphics driver against Linux 4.0</a></h3>

<ul>
<li>The DragonFlyBSD DRM stack continues to rapidly advance, now bringing in support from Linux 4.0!</li>
<li>Some of the notable features:</li>
<li>Basic Skylake support<br>

<ul>
<li>Panel Self-Refresh (PSR) now supported on Valleyview and Cherryview<br></li>
<li>Preparations for atomic display updates<br></li>
<li>Performance improvements on various GPU families, including Cherryview, Broadwell and Haswell<br></li>
<li>GPU frequencies are now kept at a minimum of 450MHz when possible on Haswell and Broadwell, ensuring a minimum experience level for various types of workloads<br></li>
<li>Improved reset support for gen3/4 GPUs, which should fix some OpenGL crashes on Core 2 and pre-2012 Atom machine</li>
<li>Better sound/graphics driver synchronization for audio over hdmi support<br></li>
<li>As usual, small bugfixes and stability improvements here and there
***</li>
</ul></li>
</ul>

<h3><a href="http://fossforce.com/2015/12/bsd-wish-list-2016/" rel="nofollow">A BSD Wish List for 2016</a></h3>

<ul>
<li>Larry over at Foss Force brings us his wish list for BSD support in 2016. </li>
<li>Since he has converted most of his daily desktop usage to PC-BSD, he is specifically wanting support for some desktop applications. Namely Google hangouts and Spotify. </li>
<li>This is something which has come up periodically among the PC-BSD community. At the moment most users are dual-booting or using alternatives, like WebRTC. However the Google Hangouts plugin is available for Linux, and perhaps this will encourage some developers to see if we can get it running with the newer Linux stack on -CURRENT. </li>
<li>Spotify also has a native Linux version, which may need testing on FreeBSD - CURRENT. It may be closer now, and should be updated on the Wanted Ports Page</li>
<li><a href="https://wiki.freebsd.org/WantedPorts" rel="nofollow">https://wiki.freebsd.org/WantedPorts</a> 
***</li>
</ul>

<h3><a href="http://bsdimp.blogspot.com/2015/12/hard-float-api-coming-soon-by-default.html" rel="nofollow">Hard Float API coming soon by default to armv6</a></h3>

<ul>
<li>Warner Losh talks about upcoming changes to armv6 on FreeBSD </li>
<li>“All the CPUs that FreeBSD supports have hard floating point in them. We&#39;ve supported hard float for quite some time in the FreeBSD kernel. However, by default, we still use a soft-float ABI.”</li>
<li>First, “A new armv6hf (architecture) was created, but that caused some issues with some ports, and the meaning of &#39;soft float&#39; sadly was ambiguous between the soft-float ABI, and the soft-float libraries that implement floating point when there&#39;s no hardware FPU”</li>
<li>“Over the spring and summer, I fixed ld.so so that it  can load both soft ABI and hard ABI libraries on the same system, depending on markings in the binaries themselves. Soft float ABI and hard float ABI binaries have different flags in the ELF headers, so it is relatively straightforward to know which is which.”</li>
<li>“So, in the coming days, I&#39;ll commit the first set of changes to move to armv6 as a hard float ABI by default. The kernel doesn&#39;t care: it can execute both. The new ld.so will allow you to transition through this change by allowing old, compat soft ABI libraries to co-exist on the system with new hard ABI libraries. This change alone isn&#39;t enough, but it will be good to get it out into circulation.”</li>
<li>“armv6hf will be removed before FreeBSD 11”</li>
<li>A LIBSOFT will be created, similar in concept to the LIB32 available on AMD64
***</li>
</ul>

<h2>Interview - Alex Rosenberg - <a href="mailto:alexr@leftfield.org" rel="nofollow">alexr@leftfield.org</a> / <a href="https://twitter.com/alexr" rel="nofollow">@alexr</a></h2>

<ul>
<li>Former Manager of Platform Architecture at Sony
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="http://bsdtalk.blogspot.com/2005/12/bsdtalk001-intro-to-bsd.html" rel="nofollow">Tuesday, Dec 20, 2005 was the release date of the very first bsdtalkpodcast</a></p></li>
<li><p><a href="https://reviews.freebsd.org/D4350" rel="nofollow">Patch: Server side support for TCP FastOpen </a> </p></li>
<li><p><a href="http://www.openbsdjumpstart.org/" rel="nofollow">Learn to tame OpenBSD quickly</a></p></li>
<li><p><a href="https://svnweb.freebsd.org/base?view=revision&revision=292740" rel="nofollow">Hardware Accerated iSCSI lands in FreeBSD </a> </p></li>
<li><p><a href="https://www.reddit.com/r/dragonflybsd/comments/3x4n7u/psa_1920x1080_on_dragonflybsd_44_under_qemukvm/" rel="nofollow">Settings for full HD resolution on DragonFlyBSD under QEMU/KVM, thanks to reddit user Chapo_Rouge</a></p></li>
<li><p><a href="https://reviews.freebsd.org/D4713" rel="nofollow">Patch: An IllumOS developer has been porting the FreeBSD boot loader to replace their old version of GRUB. In doing so, he has also made improvements to the block caching in the boot loader </a> </p></li>
<li><p><a href="http://blog.teleri.net/open-microsoft/" rel="nofollow">A FreeBSD user working at Microsoft talks about Microsoft’s shift to Open Source </a> </p></li>
<li><p><a href="https://fosdem.org/2016/schedule/event/cert_bsdcg/" rel="nofollow">BSDCG Exam Session at FOSDEM&#39;16</a></p></li>
<li><p><a href="https://fosdem.org/2016/schedule/track/bsd/" rel="nofollow">Schedule for the BSD devroom at FOSDEM&#39;16</a></p></li>
<li><p><a href="http://marc.info/?l=openbsd-cvs&m=145055446007162&w=2" rel="nofollow">OpenBSD snapshots are now 5.9</a></p></li>
<li><p><a href="http://blog.erratasec.com/2015/12/some-notes-on-fast-grep.html#.VoQKD1JSRhx" rel="nofollow">Notes on making BSD grep faster </a> </p></li>
<li><p><a href="https://www-ssl.intel.com/content/www/us/en/jobs/job-search/js2.html?job=782165&src=ML-12080" rel="nofollow">Intel’s Platform Application Engineering (PAE) group within the Networking Division (ND) is looking for a Network Software Engineer</a> </p></li>
<li><p><a href="http://locheil.shxd.cx/logo-tribute.4th" rel="nofollow">Did you watch Die Hard at Christmas? Get the Die Hard FreeBSD boot screen: install this file in /boot and set loader_logo=&quot;tribute&quot; in /boot/loader.conf </a> </p></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20CTqtEan" rel="nofollow"> Jeremy - ZFS without root</a> </li>
<li><a href="http://slexy.org/view/s20sNPoDm5" rel="nofollow"> Dan - Getting PC-BSD Media</a><br></li>
<li><a href="http://slexy.org/view/s2hjsVgGBK" rel="nofollow"> Chris - VMs and FreeBSD</a> </li>
<li><a href="http://slexy.org/view/s21pwYOTHi" rel="nofollow"> Ben - Haswell and IRC</a> 

<ul>
<li><a href="https://wiki.freebsd.org/Graphics/Update%20i915%20GPU%20driver%20to%20Linux%203.8" rel="nofollow">Instructions for trying the Haswell patch</a></li>
</ul></li>
<li><a href="http://slexy.org/view/s20vifHCyc" rel="nofollow"> Matt - Donation to foundation</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>121: All your hyves are belong to us</title>
  <link>https://www.bsdnow.tv/121</link>
  <guid isPermaLink="false">5b75bf88-8fe1-4fb0-a9c3-b66fb7e3fe1e</guid>
  <pubDate>Wed, 23 Dec 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5b75bf88-8fe1-4fb0-a9c3-b66fb7e3fe1e.mp3" length="70514932" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we are going to be talking to Trent Thompson,</itunes:subtitle>
  <itunes:duration>1:37:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we are going to be talking to Trent Thompson,&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://distrowatch.com/weekly.php?issue=20151207#openbsd" target="_blank" rel="nofollow noopener"&gt;Review: Guarding the gates with OpenBSD 5.8&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Jesse Smith over at DistroWatch treats us this week to a nice review of OpenBSD 5.8, which may be a good introduction for the uninitiated to learn more+ He first walks through some of the various highlights of 5.8, and spends time introducing the reader to a number of the projects that originate from OpenBSD, such as LibreSSL, OpenSSH, doas, the new “file” implementation and W&lt;sup&gt;X&lt;/sup&gt; support on i386. &lt;/li&gt;
&lt;li&gt;The article then walks through his impressions of performing a fresh install of 5.8, and then getting up and running in X. &lt;/li&gt;
&lt;li&gt;He mentions that you may want to check the installation defaults, since on his 8GB VM disk, it didn’t leave enough room for packages on the /usr partition. &lt;/li&gt;
&lt;li&gt;It also includes a nice heads-up for new users about using the pkg_add command, and where / how you can set the initial repository mirror address. &lt;/li&gt;
&lt;li&gt;The “doas” command was also praised:“I found I very much appreciated the doas command, its documentation and configuration file. The doas configuration file is much easier to read than sudo's and the available options are well explained. The doas command allowed me to assign root access to a user given the proper password and doas worked as advertised.”&lt;/li&gt;
&lt;li&gt;A glowing summary as well:“OpenBSD may be very secure, but I think what sets the operating system apart are its documentation and clean system design. It is so easy to find things and understand the configuration of an OpenBSD system. The file system is organized in a clean and orderly manner. It always takes me a while to get accustomed to using OpenBSD, as for me it is a rare occurrence, but once I get settled in I like how straight forward everything is. I can usually find and configure anything on the system without referring to external documents or searching for answers on-line and that is quite an accomplishment for an operating system where virtually everything is done from the command line. “
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;OpenBSD Hackathon Reports&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151212192918" target="_blank" rel="nofollow noopener"&gt;Alexander Bluhm: multiprocessor networking &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;“The next step, we are currently working on, is to remove the big kernel lock from forwarding and routing. mpi@ has been doing this for a long time, but some corner cases were still left. I have written a regression test for handling ARP packets to show that all cases including proxy ARP are still working. Another thing that may happen with lock-free routing is that the interface is destroyed on one CPU while another CPU is working with a route to that interface. We finally got this resolved. The code that destroys the interface has to wait until all routes don't use this interface anymore. I moved the sleep before the destruction of the interface is started, so that the routes can always operate on a completely valid interface structure.”&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151215150708" target="_blank" rel="nofollow noopener"&gt;Vincent Gross: ifa_ifwithaddr() &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Vincent worked on the function that finds the interface with the specified address, which is used to tell if the machine is the intended recipient of an incoming packet. A number of corner cases existed with broadcast addresses, especially if two interfaces were in the same subnet. This code was moved to the new in_broadcast()&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151216192843" target="_blank" rel="nofollow noopener"&gt;Ken Westerback: fdisk, installbot, and dhclient&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151217134417" target="_blank" rel="nofollow noopener"&gt;Reyk Floeter: Hosting a hackathon, vmd, vmctl &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;“When I heard that Martin Pieuchot (mpi@) was looking for a place to hold another mini-hackathon for three to four people to work on multiprocessor (MP) enhancements of the network stack, I offered to come to our work place in Hannover, Northern Germany. We have space, gear, fast Internet and it is easy to reach for the involved people. Little did I know that it would quickly turn into n2k15, a network hackathon with 20 attendees from all over the world”&lt;/li&gt;
&lt;li&gt;“If you ever hosted such an event or a party for many guests, you will know the dilemma of the host: you’re constantly concerned about your guests enjoying it, you have to take care about many trivial things, other things will break, and you get little to no time to attend or even enjoy it yourself. Fortunately, I had very experienced and welcomed guests: only one vintage table and a vase broke – the table can be fixed – and I even found some time for hacking myself.”&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151218175010" target="_blank" rel="nofollow noopener"&gt;Martin Pieuchot: MP networking &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;“ We found two kind of MP bugs! There are MP bugs that you fix without even understanding them, and there are MP bugs that you understand but can't fix”&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151219160501" target="_blank" rel="nofollow noopener"&gt;Stefan Sperling: initial 802.11n support &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://cturt.github.io/ps4.html" target="_blank" rel="nofollow noopener"&gt;Hacking the PS4&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As a followup to the story last week about the PS4 being “jailbroken”, we have a link to further information about how far this project has come along&lt;/li&gt;
&lt;li&gt;This article also provides some great background information about whats running under the hood of your PS4, including FreeBSD 9, Mono VM and WebKit, with WebKit being the primary point of entry to jailbreak the box. &lt;/li&gt;
&lt;li&gt;One particular point of interest, was the revelation that early firmware versions did not include ASLR, but it appears ASLR was added sometime around firmware 1.70. (Wonder if they used HardenedBSD’s implementation), and how they can bypass it entirely. “Luckily for us, we aren't limited to just writing static ROP chains. We can use JavaScript to read the modules table, which will tell us the base addresses of all loaded modules. Using these bases, we can then calculate the addresses of all our gadgets before we trigger ROP execution, bypassing ASLR.“&lt;/li&gt;
&lt;li&gt;The article also mentions that they can prove that jails are used in some fashion, and provides examples of how they can browse the file system and dump a module list.&lt;/li&gt;
&lt;li&gt;The kernel exploit in question is &lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-15:21.amd64.asc" target="_blank" rel="nofollow noopener"&gt;SA-15:21&lt;/a&gt; from August of this year. The jailbreaking appears to be against an older version of PS4 firmware that did not include this patch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.theregister.co.uk/2015/12/14/nokia_and_arm_bid_reinvent_tcpip_stack_5g/?page=1" target="_blank" rel="nofollow noopener"&gt;Nokia and ARM leading the charge to implement better TCP/IP as part of the 5G standard &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“Many believe that a critical success factor for 5G will be a fully revamped TCP/IP stack, optimized for the massively varied use cases of the next mobile generation, for cloud services, and for virtualization and software-defined networking (SDN). This is the goal of the new OpenFastPath (OFP) Foundation, founded by Nokia Networks, ARM and industrial IT services player Enea. This aims to create an open source TCP/IP stack which can accelerate the move towards SDN in carrier and enterprise networks. Other sign-ups include AMD, Cavium, Freescale, Hewlett Packard Enterprise and the ARM-associated open source initiative, Linaro.”&lt;/li&gt;
&lt;li&gt;“The new fast-path TCP/IP stack will be based on the open source FreeBSD operating system”&lt;/li&gt;
&lt;li&gt;The general idea is to have a fast, open source, user space networking stack, based on the FreeBSD stack&lt;/li&gt;
&lt;li&gt;with an “optimised callback-based zero-copy socket API” to keep packet processing in user-space as far as possible&lt;/li&gt;
&lt;li&gt;It will be interesting to see a little bit more FreeBSD getting into every mobile and cloud based device.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Trent Thompson - [&lt;a href="mailto:trentnthompson@gmail.com" target="_blank" rel="nofollow noopener"&gt;trentnthompson@gmail.com&lt;/a&gt;](&lt;a href="mailto:trentnthompson@gmail.com" target="_blank" rel="nofollow noopener"&gt;trentnthompson@gmail.com&lt;/a&gt;) / &lt;a href="https://twitter.com/pr1ntf" target="_blank" rel="nofollow noopener"&gt;@pr1ntf&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/pr1ntf/iohyve" target="_blank" rel="nofollow noopener"&gt;iohyve&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=292309" target="_blank" rel="nofollow noopener"&gt;First cut of the FreeBSD modularized TCP stack &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD now has more than one TCP stack, and better yet, you can use more than one at once&lt;/li&gt;
&lt;li&gt;Each socket pcb is associated with a stack, and it is possible to select a non-default stack with a socket option, so you can make a specific application use an experimental stack, while still defaulting to the known-good stack&lt;/li&gt;
&lt;li&gt;This should lead to a lot of interesting development and testing, without the level of risk usually associated with modifying the TCP stack&lt;/li&gt;
&lt;li&gt;The first new module available is ‘fastpath’, which may relate to the Nokia story earlier in the show&lt;/li&gt;
&lt;li&gt;There are also plans to support changing TCP stacks after establish a session, which might land as early as January
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/12/faces-of-freebsd-2015-erin-clark.html" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD : Erin Clark&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this edition of “Faces of FreeBSD” the FreeBSD foundation gives us an introduction to Erin Clark, of our very own iXsystems!&lt;/li&gt;
&lt;li&gt;Her journey to the BSD family may sound similar to a lot of ours. She first began using Linux / Slackware in the early 2000’s, but in 2009 a friend introduced her to FreeBSD and the rest, as they say, is history. &lt;/li&gt;
&lt;li&gt;“I use FreeBSD because it is very solid and secure and has a great selection of open source software that can be used with it from the ports collection.  I have always appreciated FreeBSD’s networking stack because it makes a great router or network appliance.  FreeBSD’s use of the ZFS file system is also very nice - ZFS snapshots definitely saved me a few times.  I also like that FreeBSD is very well documented; almost everything you need to know about working with FreeBSD can be found in the FreeBSD Handbook.”&lt;/li&gt;
&lt;li&gt;Originally a sys admin at iXsystems, where she helped managed PC-BSD desktops among others, now she works on the FreeNAS project as a developer for the CLI interface functionality. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://olimex.wordpress.com/2015/12/16/new-product-in-stock-pic32-retrobsd-open-source-hardware-board-running-unix-like-retrobsd-os/" target="_blank" rel="nofollow noopener"&gt;New Olimex board runs Unix&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for some small / embedded gear to mess around with? The Olimex folks have a new Pic32 system now available which runs “RetroBSD”&lt;/li&gt;
&lt;li&gt;“The current target is Microchip PIC32 microcontroller with 128 kbytes of RAM and 512 kbytes of Flash. PIC32 processor has MIPS M4K architecture, executable data memory and flexible RAM partitioning between user and kernel modes.”&lt;/li&gt;
&lt;li&gt;RetroBSD isn’t something we’ve covered extensively here on BSDNow, so to bring you up to speed, it is a port of 2.11 BSD&lt;/li&gt;
&lt;li&gt;Their website lists the following features of this 2.11 refresh:“&lt;/li&gt;
&lt;li&gt;Small resource requirements. RetroBSD needs only 128 kbytes of RAM to be up and running user applications.&lt;/li&gt;
&lt;li&gt;Memory protection. Kernel memory is fully protected from user application using hardware mechanisms.&lt;/li&gt;
&lt;li&gt;Open functionality. Usually, user application is fixed in Flash memory - but in case of RetroBSD, any number of applications could be placed into SD card, and run as required.&lt;/li&gt;
&lt;li&gt;Real multitasking. Standard POSIX API is implemented (fork, exec, wait4 etc).&lt;/li&gt;
&lt;li&gt;Development system on-board. It is possible to have C compiler in the system, and to recompile the user application (or the whole operating system) when needed.“&lt;/li&gt;
&lt;li&gt;For those looking into BSD history, or wanting something small and exotic to play with this may fit the bill nicely. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opensource.com/life/15/12/bsd-desktop-user-review-pc-bsd" target="_blank" rel="nofollow noopener"&gt;OpenSource.com reviews PCBSD &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Joshua over at opensource.com writes up a review of PC-BSD (10.2 we assume)&lt;/li&gt;
&lt;li&gt;Some of the highlights mentioned, include the easy to use graphical installer, but he does mention we should update the sorting of languages. (Good idea!)&lt;/li&gt;
&lt;li&gt;Along with including nice screenshots, it also covers the availability of various DE’s / WM’s, and talks a fair amount about the AppCafe and Control Panel utilities. &lt;/li&gt;
&lt;li&gt;“Thanks to being featured on PC-BSD's desktop, the PC-BSD Handbook is easily located by even the most novice user. There is no need to search through the system's installed applications for a manual, or relying solely on the help documentation for individual components. While not comprehensive, PC-BSD's handbook does a good job as striking a balance between concise and thorough. It contains enough information to help and provides detailed instructions for the topics it covers, but it avoids providing so much information that it overwhelms”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;BeastieBits&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.gandi.net/news/en/2015-12-23/6473-introducing_freebsd_and_trimming_down_the_official_image_list/" target="_blank" rel="nofollow noopener"&gt;Gandi introduces support for FreeBSD on their IaaS platform, with both ZFS and UFS based images available &lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f076ef44a44d02ed91543f820c14c2c7dff53716" target="_blank" rel="nofollow noopener"&gt;Funny commit message from the Linux kernel &lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/journal/vol2_no6" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal, Nov/Dec 2015 &lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2MPhvSFja" target="_blank" rel="nofollow noopener"&gt; Zafer - NetBSD on DO&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2hhJktjRu" target="_blank" rel="nofollow noopener"&gt; Richard - FreeNAS Replication&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2VK83ILlK" target="_blank" rel="nofollow noopener"&gt; Winston - Android ADP&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20UVY8Bs5" target="_blank" rel="nofollow noopener"&gt; Alex - Multiple Domains&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20Cb076tu" target="_blank" rel="nofollow noopener"&gt; Randy - Getting Involved&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2HNQ2aB42" target="_blank" rel="nofollow noopener"&gt; Craig - zprezto&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we are going to be talking to Trent Thompson,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://distrowatch.com/weekly.php?issue=20151207#openbsd" rel="nofollow">Review: Guarding the gates with OpenBSD 5.8</a></h3>

<ul>
<li>Jesse Smith over at DistroWatch treats us this week to a nice review of OpenBSD 5.8, which may be a good introduction for the uninitiated to learn more+ He first walks through some of the various highlights of 5.8, and spends time introducing the reader to a number of the projects that originate from OpenBSD, such as LibreSSL, OpenSSH, doas, the new “file” implementation and W<sup>X</sup> support on i386. </li>
<li>The article then walks through his impressions of performing a fresh install of 5.8, and then getting up and running in X. </li>
<li>He mentions that you may want to check the installation defaults, since on his 8GB VM disk, it didn’t leave enough room for packages on the /usr partition. </li>
<li>It also includes a nice heads-up for new users about using the pkg_add command, and where / how you can set the initial repository mirror address. </li>
<li>The “doas” command was also praised:“I found I very much appreciated the doas command, its documentation and configuration file. The doas configuration file is much easier to read than sudo&#39;s and the available options are well explained. The doas command allowed me to assign root access to a user given the proper password and doas worked as advertised.”</li>
<li>A glowing summary as well:“OpenBSD may be very secure, but I think what sets the operating system apart are its documentation and clean system design. It is so easy to find things and understand the configuration of an OpenBSD system. The file system is organized in a clean and orderly manner. It always takes me a while to get accustomed to using OpenBSD, as for me it is a rare occurrence, but once I get settled in I like how straight forward everything is. I can usually find and configure anything on the system without referring to external documents or searching for answers on-line and that is quite an accomplishment for an operating system where virtually everything is done from the command line. “
***</li>
</ul>

<h3>OpenBSD Hackathon Reports</h3>

<ul>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151212192918" rel="nofollow">Alexander Bluhm: multiprocessor networking </a> </li>
<li>“The next step, we are currently working on, is to remove the big kernel lock from forwarding and routing. mpi@ has been doing this for a long time, but some corner cases were still left. I have written a regression test for handling ARP packets to show that all cases including proxy ARP are still working. Another thing that may happen with lock-free routing is that the interface is destroyed on one CPU while another CPU is working with a route to that interface. We finally got this resolved. The code that destroys the interface has to wait until all routes don&#39;t use this interface anymore. I moved the sleep before the destruction of the interface is started, so that the routes can always operate on a completely valid interface structure.”</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151215150708" rel="nofollow">Vincent Gross: ifa_ifwithaddr() </a> </li>
<li>Vincent worked on the function that finds the interface with the specified address, which is used to tell if the machine is the intended recipient of an incoming packet. A number of corner cases existed with broadcast addresses, especially if two interfaces were in the same subnet. This code was moved to the new in_broadcast()</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151216192843" rel="nofollow">Ken Westerback: fdisk, installbot, and dhclient</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151217134417" rel="nofollow">Reyk Floeter: Hosting a hackathon, vmd, vmctl </a> </li>
<li>“When I heard that Martin Pieuchot (mpi@) was looking for a place to hold another mini-hackathon for three to four people to work on multiprocessor (MP) enhancements of the network stack, I offered to come to our work place in Hannover, Northern Germany. We have space, gear, fast Internet and it is easy to reach for the involved people. Little did I know that it would quickly turn into n2k15, a network hackathon with 20 attendees from all over the world”</li>
<li>“If you ever hosted such an event or a party for many guests, you will know the dilemma of the host: you’re constantly concerned about your guests enjoying it, you have to take care about many trivial things, other things will break, and you get little to no time to attend or even enjoy it yourself. Fortunately, I had very experienced and welcomed guests: only one vintage table and a vase broke – the table can be fixed – and I even found some time for hacking myself.”</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151218175010" rel="nofollow">Martin Pieuchot: MP networking </a> </li>
<li>“ We found two kind of MP bugs! There are MP bugs that you fix without even understanding them, and there are MP bugs that you understand but can&#39;t fix”</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151219160501" rel="nofollow">Stefan Sperling: initial 802.11n support </a> 
***</li>
</ul>

<h3><a href="https://cturt.github.io/ps4.html" rel="nofollow">Hacking the PS4</a></h3>

<ul>
<li>As a followup to the story last week about the PS4 being “jailbroken”, we have a link to further information about how far this project has come along</li>
<li>This article also provides some great background information about whats running under the hood of your PS4, including FreeBSD 9, Mono VM and WebKit, with WebKit being the primary point of entry to jailbreak the box. </li>
<li>One particular point of interest, was the revelation that early firmware versions did not include ASLR, but it appears ASLR was added sometime around firmware 1.70. (Wonder if they used HardenedBSD’s implementation), and how they can bypass it entirely. “Luckily for us, we aren&#39;t limited to just writing static ROP chains. We can use JavaScript to read the modules table, which will tell us the base addresses of all loaded modules. Using these bases, we can then calculate the addresses of all our gadgets before we trigger ROP execution, bypassing ASLR.“</li>
<li>The article also mentions that they can prove that jails are used in some fashion, and provides examples of how they can browse the file system and dump a module list.</li>
<li>The kernel exploit in question is <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-15:21.amd64.asc" rel="nofollow">SA-15:21</a> from August of this year. The jailbreaking appears to be against an older version of PS4 firmware that did not include this patch
***</li>
</ul>

<h3><a href="http://www.theregister.co.uk/2015/12/14/nokia_and_arm_bid_reinvent_tcpip_stack_5g/?page=1" rel="nofollow">Nokia and ARM leading the charge to implement better TCP/IP as part of the 5G standard </a></h3>

<ul>
<li>“Many believe that a critical success factor for 5G will be a fully revamped TCP/IP stack, optimized for the massively varied use cases of the next mobile generation, for cloud services, and for virtualization and software-defined networking (SDN). This is the goal of the new OpenFastPath (OFP) Foundation, founded by Nokia Networks, ARM and industrial IT services player Enea. This aims to create an open source TCP/IP stack which can accelerate the move towards SDN in carrier and enterprise networks. Other sign-ups include AMD, Cavium, Freescale, Hewlett Packard Enterprise and the ARM-associated open source initiative, Linaro.”</li>
<li>“The new fast-path TCP/IP stack will be based on the open source FreeBSD operating system”</li>
<li>The general idea is to have a fast, open source, user space networking stack, based on the FreeBSD stack</li>
<li>with an “optimised callback-based zero-copy socket API” to keep packet processing in user-space as far as possible</li>
<li>It will be interesting to see a little bit more FreeBSD getting into every mobile and cloud based device.
***</li>
</ul>

<h2>Interview - Trent Thompson - [<a href="mailto:trentnthompson@gmail.com" rel="nofollow">trentnthompson@gmail.com</a>](<a href="mailto:trentnthompson@gmail.com" rel="nofollow">trentnthompson@gmail.com</a>) / <a href="https://twitter.com/pr1ntf" rel="nofollow">@pr1ntf</a></h2>

<ul>
<li><a href="https://github.com/pr1ntf/iohyve" rel="nofollow">iohyve</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=292309" rel="nofollow">First cut of the FreeBSD modularized TCP stack </a></h3>

<ul>
<li>FreeBSD now has more than one TCP stack, and better yet, you can use more than one at once</li>
<li>Each socket pcb is associated with a stack, and it is possible to select a non-default stack with a socket option, so you can make a specific application use an experimental stack, while still defaulting to the known-good stack</li>
<li>This should lead to a lot of interesting development and testing, without the level of risk usually associated with modifying the TCP stack</li>
<li>The first new module available is ‘fastpath’, which may relate to the Nokia story earlier in the show</li>
<li>There are also plans to support changing TCP stacks after establish a session, which might land as early as January
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/12/faces-of-freebsd-2015-erin-clark.html" rel="nofollow">Faces of FreeBSD : Erin Clark</a></h3>

<ul>
<li>In this edition of “Faces of FreeBSD” the FreeBSD foundation gives us an introduction to Erin Clark, of our very own iXsystems!</li>
<li>Her journey to the BSD family may sound similar to a lot of ours. She first began using Linux / Slackware in the early 2000’s, but in 2009 a friend introduced her to FreeBSD and the rest, as they say, is history. </li>
<li>“I use FreeBSD because it is very solid and secure and has a great selection of open source software that can be used with it from the ports collection.  I have always appreciated FreeBSD’s networking stack because it makes a great router or network appliance.  FreeBSD’s use of the ZFS file system is also very nice - ZFS snapshots definitely saved me a few times.  I also like that FreeBSD is very well documented; almost everything you need to know about working with FreeBSD can be found in the FreeBSD Handbook.”</li>
<li>Originally a sys admin at iXsystems, where she helped managed PC-BSD desktops among others, now she works on the FreeNAS project as a developer for the CLI interface functionality. 
***</li>
</ul>

<h3><a href="https://olimex.wordpress.com/2015/12/16/new-product-in-stock-pic32-retrobsd-open-source-hardware-board-running-unix-like-retrobsd-os/" rel="nofollow">New Olimex board runs Unix</a></h3>

<ul>
<li>Looking for some small / embedded gear to mess around with? The Olimex folks have a new Pic32 system now available which runs “RetroBSD”</li>
<li>“The current target is Microchip PIC32 microcontroller with 128 kbytes of RAM and 512 kbytes of Flash. PIC32 processor has MIPS M4K architecture, executable data memory and flexible RAM partitioning between user and kernel modes.”</li>
<li>RetroBSD isn’t something we’ve covered extensively here on BSDNow, so to bring you up to speed, it is a port of 2.11 BSD</li>
<li>Their website lists the following features of this 2.11 refresh:“</li>
<li>Small resource requirements. RetroBSD needs only 128 kbytes of RAM to be up and running user applications.</li>
<li>Memory protection. Kernel memory is fully protected from user application using hardware mechanisms.</li>
<li>Open functionality. Usually, user application is fixed in Flash memory - but in case of RetroBSD, any number of applications could be placed into SD card, and run as required.</li>
<li>Real multitasking. Standard POSIX API is implemented (fork, exec, wait4 etc).</li>
<li>Development system on-board. It is possible to have C compiler in the system, and to recompile the user application (or the whole operating system) when needed.“</li>
<li>For those looking into BSD history, or wanting something small and exotic to play with this may fit the bill nicely. 
***</li>
</ul>

<h3><a href="https://opensource.com/life/15/12/bsd-desktop-user-review-pc-bsd" rel="nofollow">OpenSource.com reviews PCBSD </a></h3>

<ul>
<li>Joshua over at opensource.com writes up a review of PC-BSD (10.2 we assume)</li>
<li>Some of the highlights mentioned, include the easy to use graphical installer, but he does mention we should update the sorting of languages. (Good idea!)</li>
<li>Along with including nice screenshots, it also covers the availability of various DE’s / WM’s, and talks a fair amount about the AppCafe and Control Panel utilities. </li>
<li>“Thanks to being featured on PC-BSD&#39;s desktop, the PC-BSD Handbook is easily located by even the most novice user. There is no need to search through the system&#39;s installed applications for a manual, or relying solely on the help documentation for individual components. While not comprehensive, PC-BSD&#39;s handbook does a good job as striking a balance between concise and thorough. It contains enough information to help and provides detailed instructions for the topics it covers, but it avoids providing so much information that it overwhelms”
***</li>
</ul>

<h2>BeastieBits</h2>

<p><a href="https://www.gandi.net/news/en/2015-12-23/6473-introducing_freebsd_and_trimming_down_the_official_image_list/" rel="nofollow">Gandi introduces support for FreeBSD on their IaaS platform, with both ZFS and UFS based images available </a> </p>

<p><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f076ef44a44d02ed91543f820c14c2c7dff53716" rel="nofollow">Funny commit message from the Linux kernel </a> </p>

<p><a href="https://www.freebsdfoundation.org/journal/vol2_no6" rel="nofollow">FreeBSD Journal, Nov/Dec 2015 </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MPhvSFja" rel="nofollow"> Zafer - NetBSD on DO</a> </li>
<li><a href="http://slexy.org/view/s2hhJktjRu" rel="nofollow"> Richard - FreeNAS Replication</a> </li>
<li><a href="http://slexy.org/view/s2VK83ILlK" rel="nofollow"> Winston - Android ADP</a> </li>
<li><a href="http://slexy.org/view/s20UVY8Bs5" rel="nofollow"> Alex - Multiple Domains</a> </li>
<li><a href="http://slexy.org/view/s20Cb076tu" rel="nofollow"> Randy - Getting Involved</a> </li>
<li><a href="http://slexy.org/view/s2HNQ2aB42" rel="nofollow"> Craig - zprezto</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we are going to be talking to Trent Thompson,</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://distrowatch.com/weekly.php?issue=20151207#openbsd" rel="nofollow">Review: Guarding the gates with OpenBSD 5.8</a></h3>

<ul>
<li>Jesse Smith over at DistroWatch treats us this week to a nice review of OpenBSD 5.8, which may be a good introduction for the uninitiated to learn more+ He first walks through some of the various highlights of 5.8, and spends time introducing the reader to a number of the projects that originate from OpenBSD, such as LibreSSL, OpenSSH, doas, the new “file” implementation and W<sup>X</sup> support on i386. </li>
<li>The article then walks through his impressions of performing a fresh install of 5.8, and then getting up and running in X. </li>
<li>He mentions that you may want to check the installation defaults, since on his 8GB VM disk, it didn’t leave enough room for packages on the /usr partition. </li>
<li>It also includes a nice heads-up for new users about using the pkg_add command, and where / how you can set the initial repository mirror address. </li>
<li>The “doas” command was also praised:“I found I very much appreciated the doas command, its documentation and configuration file. The doas configuration file is much easier to read than sudo&#39;s and the available options are well explained. The doas command allowed me to assign root access to a user given the proper password and doas worked as advertised.”</li>
<li>A glowing summary as well:“OpenBSD may be very secure, but I think what sets the operating system apart are its documentation and clean system design. It is so easy to find things and understand the configuration of an OpenBSD system. The file system is organized in a clean and orderly manner. It always takes me a while to get accustomed to using OpenBSD, as for me it is a rare occurrence, but once I get settled in I like how straight forward everything is. I can usually find and configure anything on the system without referring to external documents or searching for answers on-line and that is quite an accomplishment for an operating system where virtually everything is done from the command line. “
***</li>
</ul>

<h3>OpenBSD Hackathon Reports</h3>

<ul>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151212192918" rel="nofollow">Alexander Bluhm: multiprocessor networking </a> </li>
<li>“The next step, we are currently working on, is to remove the big kernel lock from forwarding and routing. mpi@ has been doing this for a long time, but some corner cases were still left. I have written a regression test for handling ARP packets to show that all cases including proxy ARP are still working. Another thing that may happen with lock-free routing is that the interface is destroyed on one CPU while another CPU is working with a route to that interface. We finally got this resolved. The code that destroys the interface has to wait until all routes don&#39;t use this interface anymore. I moved the sleep before the destruction of the interface is started, so that the routes can always operate on a completely valid interface structure.”</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151215150708" rel="nofollow">Vincent Gross: ifa_ifwithaddr() </a> </li>
<li>Vincent worked on the function that finds the interface with the specified address, which is used to tell if the machine is the intended recipient of an incoming packet. A number of corner cases existed with broadcast addresses, especially if two interfaces were in the same subnet. This code was moved to the new in_broadcast()</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151216192843" rel="nofollow">Ken Westerback: fdisk, installbot, and dhclient</a> </li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151217134417" rel="nofollow">Reyk Floeter: Hosting a hackathon, vmd, vmctl </a> </li>
<li>“When I heard that Martin Pieuchot (mpi@) was looking for a place to hold another mini-hackathon for three to four people to work on multiprocessor (MP) enhancements of the network stack, I offered to come to our work place in Hannover, Northern Germany. We have space, gear, fast Internet and it is easy to reach for the involved people. Little did I know that it would quickly turn into n2k15, a network hackathon with 20 attendees from all over the world”</li>
<li>“If you ever hosted such an event or a party for many guests, you will know the dilemma of the host: you’re constantly concerned about your guests enjoying it, you have to take care about many trivial things, other things will break, and you get little to no time to attend or even enjoy it yourself. Fortunately, I had very experienced and welcomed guests: only one vintage table and a vase broke – the table can be fixed – and I even found some time for hacking myself.”</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151218175010" rel="nofollow">Martin Pieuchot: MP networking </a> </li>
<li>“ We found two kind of MP bugs! There are MP bugs that you fix without even understanding them, and there are MP bugs that you understand but can&#39;t fix”</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20151219160501" rel="nofollow">Stefan Sperling: initial 802.11n support </a> 
***</li>
</ul>

<h3><a href="https://cturt.github.io/ps4.html" rel="nofollow">Hacking the PS4</a></h3>

<ul>
<li>As a followup to the story last week about the PS4 being “jailbroken”, we have a link to further information about how far this project has come along</li>
<li>This article also provides some great background information about whats running under the hood of your PS4, including FreeBSD 9, Mono VM and WebKit, with WebKit being the primary point of entry to jailbreak the box. </li>
<li>One particular point of interest, was the revelation that early firmware versions did not include ASLR, but it appears ASLR was added sometime around firmware 1.70. (Wonder if they used HardenedBSD’s implementation), and how they can bypass it entirely. “Luckily for us, we aren&#39;t limited to just writing static ROP chains. We can use JavaScript to read the modules table, which will tell us the base addresses of all loaded modules. Using these bases, we can then calculate the addresses of all our gadgets before we trigger ROP execution, bypassing ASLR.“</li>
<li>The article also mentions that they can prove that jails are used in some fashion, and provides examples of how they can browse the file system and dump a module list.</li>
<li>The kernel exploit in question is <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-15:21.amd64.asc" rel="nofollow">SA-15:21</a> from August of this year. The jailbreaking appears to be against an older version of PS4 firmware that did not include this patch
***</li>
</ul>

<h3><a href="http://www.theregister.co.uk/2015/12/14/nokia_and_arm_bid_reinvent_tcpip_stack_5g/?page=1" rel="nofollow">Nokia and ARM leading the charge to implement better TCP/IP as part of the 5G standard </a></h3>

<ul>
<li>“Many believe that a critical success factor for 5G will be a fully revamped TCP/IP stack, optimized for the massively varied use cases of the next mobile generation, for cloud services, and for virtualization and software-defined networking (SDN). This is the goal of the new OpenFastPath (OFP) Foundation, founded by Nokia Networks, ARM and industrial IT services player Enea. This aims to create an open source TCP/IP stack which can accelerate the move towards SDN in carrier and enterprise networks. Other sign-ups include AMD, Cavium, Freescale, Hewlett Packard Enterprise and the ARM-associated open source initiative, Linaro.”</li>
<li>“The new fast-path TCP/IP stack will be based on the open source FreeBSD operating system”</li>
<li>The general idea is to have a fast, open source, user space networking stack, based on the FreeBSD stack</li>
<li>with an “optimised callback-based zero-copy socket API” to keep packet processing in user-space as far as possible</li>
<li>It will be interesting to see a little bit more FreeBSD getting into every mobile and cloud based device.
***</li>
</ul>

<h2>Interview - Trent Thompson - [<a href="mailto:trentnthompson@gmail.com" rel="nofollow">trentnthompson@gmail.com</a>](<a href="mailto:trentnthompson@gmail.com" rel="nofollow">trentnthompson@gmail.com</a>) / <a href="https://twitter.com/pr1ntf" rel="nofollow">@pr1ntf</a></h2>

<ul>
<li><a href="https://github.com/pr1ntf/iohyve" rel="nofollow">iohyve</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=292309" rel="nofollow">First cut of the FreeBSD modularized TCP stack </a></h3>

<ul>
<li>FreeBSD now has more than one TCP stack, and better yet, you can use more than one at once</li>
<li>Each socket pcb is associated with a stack, and it is possible to select a non-default stack with a socket option, so you can make a specific application use an experimental stack, while still defaulting to the known-good stack</li>
<li>This should lead to a lot of interesting development and testing, without the level of risk usually associated with modifying the TCP stack</li>
<li>The first new module available is ‘fastpath’, which may relate to the Nokia story earlier in the show</li>
<li>There are also plans to support changing TCP stacks after establish a session, which might land as early as January
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/12/faces-of-freebsd-2015-erin-clark.html" rel="nofollow">Faces of FreeBSD : Erin Clark</a></h3>

<ul>
<li>In this edition of “Faces of FreeBSD” the FreeBSD foundation gives us an introduction to Erin Clark, of our very own iXsystems!</li>
<li>Her journey to the BSD family may sound similar to a lot of ours. She first began using Linux / Slackware in the early 2000’s, but in 2009 a friend introduced her to FreeBSD and the rest, as they say, is history. </li>
<li>“I use FreeBSD because it is very solid and secure and has a great selection of open source software that can be used with it from the ports collection.  I have always appreciated FreeBSD’s networking stack because it makes a great router or network appliance.  FreeBSD’s use of the ZFS file system is also very nice - ZFS snapshots definitely saved me a few times.  I also like that FreeBSD is very well documented; almost everything you need to know about working with FreeBSD can be found in the FreeBSD Handbook.”</li>
<li>Originally a sys admin at iXsystems, where she helped managed PC-BSD desktops among others, now she works on the FreeNAS project as a developer for the CLI interface functionality. 
***</li>
</ul>

<h3><a href="https://olimex.wordpress.com/2015/12/16/new-product-in-stock-pic32-retrobsd-open-source-hardware-board-running-unix-like-retrobsd-os/" rel="nofollow">New Olimex board runs Unix</a></h3>

<ul>
<li>Looking for some small / embedded gear to mess around with? The Olimex folks have a new Pic32 system now available which runs “RetroBSD”</li>
<li>“The current target is Microchip PIC32 microcontroller with 128 kbytes of RAM and 512 kbytes of Flash. PIC32 processor has MIPS M4K architecture, executable data memory and flexible RAM partitioning between user and kernel modes.”</li>
<li>RetroBSD isn’t something we’ve covered extensively here on BSDNow, so to bring you up to speed, it is a port of 2.11 BSD</li>
<li>Their website lists the following features of this 2.11 refresh:“</li>
<li>Small resource requirements. RetroBSD needs only 128 kbytes of RAM to be up and running user applications.</li>
<li>Memory protection. Kernel memory is fully protected from user application using hardware mechanisms.</li>
<li>Open functionality. Usually, user application is fixed in Flash memory - but in case of RetroBSD, any number of applications could be placed into SD card, and run as required.</li>
<li>Real multitasking. Standard POSIX API is implemented (fork, exec, wait4 etc).</li>
<li>Development system on-board. It is possible to have C compiler in the system, and to recompile the user application (or the whole operating system) when needed.“</li>
<li>For those looking into BSD history, or wanting something small and exotic to play with this may fit the bill nicely. 
***</li>
</ul>

<h3><a href="https://opensource.com/life/15/12/bsd-desktop-user-review-pc-bsd" rel="nofollow">OpenSource.com reviews PCBSD </a></h3>

<ul>
<li>Joshua over at opensource.com writes up a review of PC-BSD (10.2 we assume)</li>
<li>Some of the highlights mentioned, include the easy to use graphical installer, but he does mention we should update the sorting of languages. (Good idea!)</li>
<li>Along with including nice screenshots, it also covers the availability of various DE’s / WM’s, and talks a fair amount about the AppCafe and Control Panel utilities. </li>
<li>“Thanks to being featured on PC-BSD&#39;s desktop, the PC-BSD Handbook is easily located by even the most novice user. There is no need to search through the system&#39;s installed applications for a manual, or relying solely on the help documentation for individual components. While not comprehensive, PC-BSD&#39;s handbook does a good job as striking a balance between concise and thorough. It contains enough information to help and provides detailed instructions for the topics it covers, but it avoids providing so much information that it overwhelms”
***</li>
</ul>

<h2>BeastieBits</h2>

<p><a href="https://www.gandi.net/news/en/2015-12-23/6473-introducing_freebsd_and_trimming_down_the_official_image_list/" rel="nofollow">Gandi introduces support for FreeBSD on their IaaS platform, with both ZFS and UFS based images available </a> </p>

<p><a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f076ef44a44d02ed91543f820c14c2c7dff53716" rel="nofollow">Funny commit message from the Linux kernel </a> </p>

<p><a href="https://www.freebsdfoundation.org/journal/vol2_no6" rel="nofollow">FreeBSD Journal, Nov/Dec 2015 </a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MPhvSFja" rel="nofollow"> Zafer - NetBSD on DO</a> </li>
<li><a href="http://slexy.org/view/s2hhJktjRu" rel="nofollow"> Richard - FreeNAS Replication</a> </li>
<li><a href="http://slexy.org/view/s2VK83ILlK" rel="nofollow"> Winston - Android ADP</a> </li>
<li><a href="http://slexy.org/view/s20UVY8Bs5" rel="nofollow"> Alex - Multiple Domains</a> </li>
<li><a href="http://slexy.org/view/s20Cb076tu" rel="nofollow"> Randy - Getting Involved</a> </li>
<li><a href="http://slexy.org/view/s2HNQ2aB42" rel="nofollow"> Craig - zprezto</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>120: I’m talking about the man in the middle</title>
  <link>https://www.bsdnow.tv/120</link>
  <guid isPermaLink="false">9fdf3957-250a-492b-8a41-e65e8d732656</guid>
  <pubDate>Wed, 16 Dec 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9fdf3957-250a-492b-8a41-e65e8d732656.mp3" length="83930260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we are going to be talking to Pawel about how his</itunes:subtitle>
  <itunes:duration>1:56:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we are going to be talking to Pawel about how his&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;Note the recent passing of 2 members of the BSD community&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributors/contrib-develinmemoriam.html" target="_blank" rel="nofollow noopener"&gt;Juergen Lock / Nox&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/michaeldexter/status/676290499389485057" target="_blank" rel="nofollow noopener"&gt;Benjamin Perrault / creepingfur&lt;/a&gt; &lt;a href="http://pastebin.com/4BQ5uVsT" target="_blank" rel="nofollow noopener"&gt;Memories from Michael Dexter &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.filis.org/rip_ben.txt" target="_blank" rel="nofollow noopener"&gt;Additional Memories &lt;/a&gt; 

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.allanjude.com/bsd/bp/IMG_20151101_161727-auto.jpg" target="_blank" rel="nofollow noopener"&gt;Benjamin and Allan at Ben’s local bar &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.allanjude.com/bsd/bp/IMG_20151101_191344-auto.jpg" target="_blank" rel="nofollow noopener"&gt;Benjamin treated Allan and Michael Dexter to their first ever Bermese food &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.allanjude.com/bsd/bp/IMG_20151003_105457-auto.jpg" target="_blank" rel="nofollow noopener"&gt;Benjamin enjoying the hallway track at EuroBSDCon 2015 &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://linoxide.com/linux-how-to/install-nginx-reverse-proxy-apache-freebsd-10-2/" target="_blank" rel="nofollow noopener"&gt;NGINX as Reverse Proxy for Apache on FreeBSD 10.2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A tutorial on setting up NGINX as a reverse proxy for Apache&lt;/li&gt;
&lt;li&gt;Sometimes your users or application require some feature of Apache, that cannot be easily replicated in NGINX, like .htaccess files or a custom apache module&lt;/li&gt;
&lt;li&gt;In addition, because the default worker model in Apache does not accept new work until it is finished sending the request, a user with a slow connection can tie down that worker for a long time&lt;/li&gt;
&lt;li&gt;With NGINX as a reverse proxy, it will receive the data from the Apache worker over localhost, freeing that worker to answer the next request, while NGINX takes care of sending the data to the user&lt;/li&gt;
&lt;li&gt;The tutorial walks through the setup, which is very easy on modern FreeBSD&lt;/li&gt;
&lt;li&gt;One could also add mod_rpaf2 to the Apache, to securely pass through the users’ real IP address for use by Apache’s logging and the PHP scripts
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/freebsd_freenas/" target="_blank" rel="nofollow noopener"&gt;FreeBSD and FreeNAS in Business by Randy Westlund&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The story of how a Tent &amp;amp; Awning company switched from managing orders with paper, to a computerized system backed by a FreeNAS&lt;/li&gt;
&lt;li&gt;“At first, I looked at off-the-shelf solutions. I found a number of cloud services that were like Dropbox, but with some generic management stuff layered on top. Not only did these all feel like a poor solution, they were very expensive. If the provider were to go out of business, what would happen to my dad’s company?”&lt;/li&gt;
&lt;li&gt;“Fortunately, sourcing the hardware and setting up the OS was the easiest part; I talked to iXsystems. I ordered a FreeNAS Mini and a nice workstation tower”&lt;/li&gt;
&lt;li&gt;“I have r2d2 (the tower, which hosts the database) replicating ZFS snapshots to c3po (the FreeNAS mini), and the data is backed up off-site regularly. This data is absolutely mission-critical, so I can’t take any risks. I’m glad I have ZFS on my side.”&lt;/li&gt;
&lt;li&gt;“I replaced Dropbox with Samba on c3po, and the Windows machines in the office now store important data on the NAS, rather than their local drives.”&lt;/li&gt;
&lt;li&gt;“I also replaced their router with an APU board running pfSense and replaced their PPTP VPN with OpenVPN and certificate authorization.”&lt;/li&gt;
&lt;li&gt;“FreeBSD (in three different incarnations) helped me focus on improving the company’s workflow without spending much time on the OS. And now there’s an awning company that is, in a very real sense, powered by FreeBSD.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pr1ntf.xyz/windowsunderbhyve.html" target="_blank" rel="nofollow noopener"&gt;Tutorial, Windows running under bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With the recent passing of the world’s foremost expert on running Windows under bhyve on FreeBSD, this tutorial will help you get up to speed&lt;/li&gt;
&lt;li&gt;“The secret sauce to getting Windows running under bhyve is the new UEFI support. This is pretty great news, because when you utilize UEFI in bhyve, you don't have to load the operating system in bhyveload or grub-bhyve first.”&lt;/li&gt;
&lt;li&gt;The author works on iohyve, and wanted to migrate away from VirtualBox, the only thing stopping that was support for Windows Guests&lt;/li&gt;
&lt;li&gt;iohyve now has support for managing Windows VMs&lt;/li&gt;
&lt;li&gt;The tutorial uses a script to extract the Windows Server 2008 ISO and set up AutoUnattend.xml to handle the installation of Windows, including setting the default administrator password, this is required because there is no graphical console yet&lt;/li&gt;
&lt;li&gt;The AutoUnattended setup also includes setting the IP address, laying out the partitions, and configuring the serial console&lt;/li&gt;
&lt;li&gt;A second script is then used to make a new ISO with the modifications&lt;/li&gt;
&lt;li&gt;The user is directed to fetch the UEFI firmware and some other bits&lt;/li&gt;
&lt;li&gt;Then iohyve is used to create the Windows VM&lt;/li&gt;
&lt;li&gt;The first boot uses the newly created ISO to install Windows Server 2008&lt;/li&gt;
&lt;li&gt;Subsequent boots start Windows directly from the virtual disk&lt;/li&gt;
&lt;li&gt;Remote Desktop is enabled, so the user can manage the Windows Server graphically, using FreeRDP or a Windows client&lt;/li&gt;
&lt;li&gt;iohyve can then be used to take snapshots of the machine, and clone it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.58/" target="_blank" rel="nofollow noopener"&gt;BSD Router Project has released 1.58&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The BSD Router project has announced the release of version 1.58 with some notable new features&lt;/li&gt;
&lt;li&gt;Update to FreeBSD 10.2-RELEASE-p8&lt;/li&gt;
&lt;li&gt;Disabled some Chelsio Nic features not used by a router&lt;/li&gt;
&lt;li&gt;Added new easy installation helper option, use with “system install ”&lt;/li&gt;
&lt;li&gt;Added the debugging symbols for userland&lt;/li&gt;
&lt;li&gt;Includes the iperf package, and flashrom package, which allows updating system BIOS on supported boxes&lt;/li&gt;
&lt;li&gt;IMPORTANT: Corrects an important UFS label bug introduced on 1.57. If you are running 1.57, you will need to fetch their fixlabel.sh script before upgrading to 1.58
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-15-7-22-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.7.22 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An update to OPNsense has landed this week which includes the important updates to OpenSSL 1.0.2e and LibreSSL 2.2.5&lt;/li&gt;
&lt;li&gt;A long-standing annoying bug with filter reload timeouts has finally been identified and sorted out as well, allowing the functionality to run quickly and “glitch free” again. &lt;/li&gt;
&lt;li&gt;Some newer ports for curl (7.46), squid (3.5.12) and lighttpd (1.4.38) have also been thrown in for good measure&lt;/li&gt;
&lt;li&gt;Some other minor UI fixes have also been included as well&lt;/li&gt;
&lt;li&gt;With the holidays coming up, if you are still running a consumer router, this may be a good time to convert over to a OPNsense or PFsense box and get yourself ready for the new year. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/whats-new/2015/12/vcenter-web-client-plug-in-for-truenas-now-available/" target="_blank" rel="nofollow noopener"&gt;iXSystems releases vCenter Web Client Plug-in for TrueNAS&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Pawel Jakub Dawidek - &lt;a href="mailto:pjd@FreeBSD.org" target="_blank" rel="nofollow noopener"&gt;pjd@FreeBSD.org&lt;/a&gt;
&lt;/h2&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.networkworld.com/article/3014714/security/developer-claims-ps4-officially-jailbroken.html" target="_blank" rel="nofollow noopener"&gt;Developer claims the PS4 has been jail-broken&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While not exactly a well-kept secret, the PS4’s proprietary “OrbOS” is FreeBSD based. &lt;/li&gt;
&lt;li&gt;Using this knowledge and a Kernel exploit, developer CTurt (&lt;a href="https://twitter.com/CTurtE/" target="_blank" rel="nofollow noopener"&gt;https://twitter.com/CTurtE/&lt;/a&gt;) claims he was able jailbreak a WebKit process and gain access to the system. &lt;/li&gt;
&lt;li&gt;He has posted a small tease to GitHub, detailing some of the information gleaned from the exploit, such as PID list and root FS dump&lt;/li&gt;
&lt;li&gt;As such with these kinds of jailbreaks, he already requested that users stop sending him requests about game piracy, but the ability to hack on / run homebrew apps on the PS4 seems intriguing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-December/228461.html" target="_blank" rel="nofollow noopener"&gt;Sepherosa Ziehau is looking for testers if you have a em(4), emx(4), or igb(4) Intel device&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly Testers wanted! Sephe has posted a request for users of the em(4), emx(4) and igb(4) intel drivers to test his latest branch and report back results&lt;/li&gt;
&lt;li&gt;He mentions that he has tested the models 82571, 82574 and 82573 (em/emx); 82575, 82576, 82580 and i350 specifically, so if you have something different, I’m sure he would be much appreciative of the help. &lt;/li&gt;
&lt;li&gt;It looks like the em(4) driver has been updated to 7.5.2, and igb(4) 2.4.3, and adds support for the I219-LM and I219-V NICS.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=144933933119525&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD Xen Support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Filed under the “Ohh, look what’s coming soon” section, it appears that patches are starting to surface for OpenBSD Xen DOMU support. &lt;/li&gt;
&lt;li&gt;For those who aren’t up on their Xen terminology, DomU is the unprivileged domain (I.E. Guest mode)&lt;/li&gt;
&lt;li&gt;Right now the patch exists at the link above, and adds a new (commented out) device to the GENERIC kernel, but this gives Xen users something new to watch for updates to. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freshbsd.org/commit/openbsd/b355449caa22e7bb6c460f7a647874836ef604f0" target="_blank" rel="nofollow noopener"&gt;Thinkpad Backlit Keyboard support being worked on&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another reason why Lenovo / ThinkPads are some of the best laptops currently to use with BSD, the kettenis over at the OpenBSD project has committed a patch to enable support for the “ThinkLight”&lt;/li&gt;
&lt;li&gt;For those who don’t know, this is the little light that helps illuminate the laptop’s keyboard under low-light situations. &lt;/li&gt;
&lt;li&gt;While the initial patch only supports the “real-deal” ThinkLight, he does mention that support will be added soon for the others on ThinkPads&lt;/li&gt;
&lt;li&gt;No sysctl’s to fiddle with, this works directly with the ACPI / keyboard function keys directly, nice!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://2016.asiabsdcon.org/cfp.html" target="_blank" rel="nofollow noopener"&gt;Deadline is approaching for Submissions of Tutorial Proposals for AsiaBSDCon 2016&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://www.bsdcan.org/2016/papers.php" target="_blank" rel="nofollow noopener"&gt;Call for Papers for BSDCAN 2016 now open&lt;/a&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The next two major BSD conferences both have their CFP up right now. First up is AsiaBSDCon in Tokyo from March 10th-13th, followed by BSDCan in Ottawa, June 8th-11th.&lt;/li&gt;
&lt;li&gt;If you are working on anything interesting in the BSD community, this is a good way to get the word out about your project, plus the conference pays for Hotel / Travel. &lt;/li&gt;
&lt;li&gt;If you can make it to both, DO SO, you won’t regret it. Both Allan and Kris will be attending and we would look forward to meeting you. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/pr1ntf/iohyve" target="_blank" rel="nofollow noopener"&gt;iohyve lands in ports&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;(&lt;a href="http://www.freshports.org/sysutils/iohyve/" target="_blank" rel="nofollow noopener"&gt;http://www.freshports.org/sysutils/iohyve/&lt;/a&gt;)&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Something we’ve mentioned in passing has taken its first steps in becoming reality for users! “iohyve” has now landed in the FreeBSD ports tree&lt;/li&gt;
&lt;li&gt;While it shares a similar name to “iocage” its not directly related, different developers and such. However it does share a very similar syntax and some principles of ZFS usage&lt;/li&gt;
&lt;li&gt;The current version is 0.7, but it already has a rather large feature set&lt;/li&gt;
&lt;li&gt;Among the current features are ISO Management, resource management, snapshot support (via ZFS), and support for OpenBSD, NetBSD and Linux (Using grub-bhyve port)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;BeastieBits&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-November/228445.html" target="_blank" rel="nofollow noopener"&gt;hammer mount is forced noatime by default&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/12/show-your-support-for-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Show your support for FreeBSD&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://gist.github.com/reyk/e23fde95354d4bc35a40" target="_blank" rel="nofollow noopener"&gt;OpenBSD running in an Amazon EC2 t2.micro&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/tech-pkg/2015/12/05/msg016059.html" target="_blank" rel="nofollow noopener"&gt;NetBSD's 2015Q4 Package freeze is coming&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://anders.unix.se/2015/12/10/screenshots-from-developers--2002-vs.-2015/" target="_blank" rel="nofollow noopener"&gt;‘Screenshots from Developers’ that we covered previously from 2002, updated for 2015 &lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions (slexy was down when I made these, I only did 3, since the last is really long, save rest for next week)&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/g0DnFG95" target="_blank" rel="nofollow noopener"&gt; Mark - BSD laptops&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/BNCmDgTe" target="_blank" rel="nofollow noopener"&gt; Jamie - zxfer&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pastebin.com/iw0dXZ9P" target="_blank" rel="nofollow noopener"&gt; Anonymous - Long Story&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we are going to be talking to Pawel about how his</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3>Note the recent passing of 2 members of the BSD community</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributors/contrib-develinmemoriam.html" rel="nofollow">Juergen Lock / Nox</a> </li>
<li><a href="https://twitter.com/michaeldexter/status/676290499389485057" rel="nofollow">Benjamin Perrault / creepingfur</a> <a href="http://pastebin.com/4BQ5uVsT" rel="nofollow">Memories from Michael Dexter </a> </li>
<li><a href="http://www.filis.org/rip_ben.txt" rel="nofollow">Additional Memories </a> 

<ul>
<li><a href="http://www.allanjude.com/bsd/bp/IMG_20151101_161727-auto.jpg" rel="nofollow">Benjamin and Allan at Ben’s local bar </a> </li>
<li><a href="http://www.allanjude.com/bsd/bp/IMG_20151101_191344-auto.jpg" rel="nofollow">Benjamin treated Allan and Michael Dexter to their first ever Bermese food </a> </li>
<li><a href="http://www.allanjude.com/bsd/bp/IMG_20151003_105457-auto.jpg" rel="nofollow">Benjamin enjoying the hallway track at EuroBSDCon 2015 </a> 
***</li>
</ul></li>
</ul>

<h3><a href="http://linoxide.com/linux-how-to/install-nginx-reverse-proxy-apache-freebsd-10-2/" rel="nofollow">NGINX as Reverse Proxy for Apache on FreeBSD 10.2</a></h3>

<ul>
<li>A tutorial on setting up NGINX as a reverse proxy for Apache</li>
<li>Sometimes your users or application require some feature of Apache, that cannot be easily replicated in NGINX, like .htaccess files or a custom apache module</li>
<li>In addition, because the default worker model in Apache does not accept new work until it is finished sending the request, a user with a slow connection can tie down that worker for a long time</li>
<li>With NGINX as a reverse proxy, it will receive the data from the Apache worker over localhost, freeing that worker to answer the next request, while NGINX takes care of sending the data to the user</li>
<li>The tutorial walks through the setup, which is very easy on modern FreeBSD</li>
<li>One could also add mod_rpaf2 to the Apache, to securely pass through the users’ real IP address for use by Apache’s logging and the PHP scripts
***</li>
</ul>

<h3><a href="http://bsdmag.org/freebsd_freenas/" rel="nofollow">FreeBSD and FreeNAS in Business by Randy Westlund</a></h3>

<ul>
<li>The story of how a Tent &amp; Awning company switched from managing orders with paper, to a computerized system backed by a FreeNAS</li>
<li>“At first, I looked at off-the-shelf solutions. I found a number of cloud services that were like Dropbox, but with some generic management stuff layered on top. Not only did these all feel like a poor solution, they were very expensive. If the provider were to go out of business, what would happen to my dad’s company?”</li>
<li>“Fortunately, sourcing the hardware and setting up the OS was the easiest part; I talked to iXsystems. I ordered a FreeNAS Mini and a nice workstation tower”</li>
<li>“I have r2d2 (the tower, which hosts the database) replicating ZFS snapshots to c3po (the FreeNAS mini), and the data is backed up off-site regularly. This data is absolutely mission-critical, so I can’t take any risks. I’m glad I have ZFS on my side.”</li>
<li>“I replaced Dropbox with Samba on c3po, and the Windows machines in the office now store important data on the NAS, rather than their local drives.”</li>
<li>“I also replaced their router with an APU board running pfSense and replaced their PPTP VPN with OpenVPN and certificate authorization.”</li>
<li>“FreeBSD (in three different incarnations) helped me focus on improving the company’s workflow without spending much time on the OS. And now there’s an awning company that is, in a very real sense, powered by FreeBSD.”
***</li>
</ul>

<h3><a href="http://pr1ntf.xyz/windowsunderbhyve.html" rel="nofollow">Tutorial, Windows running under bhyve</a></h3>

<ul>
<li>With the recent passing of the world’s foremost expert on running Windows under bhyve on FreeBSD, this tutorial will help you get up to speed</li>
<li>“The secret sauce to getting Windows running under bhyve is the new UEFI support. This is pretty great news, because when you utilize UEFI in bhyve, you don&#39;t have to load the operating system in bhyveload or grub-bhyve first.”</li>
<li>The author works on iohyve, and wanted to migrate away from VirtualBox, the only thing stopping that was support for Windows Guests</li>
<li>iohyve now has support for managing Windows VMs</li>
<li>The tutorial uses a script to extract the Windows Server 2008 ISO and set up AutoUnattend.xml to handle the installation of Windows, including setting the default administrator password, this is required because there is no graphical console yet</li>
<li>The AutoUnattended setup also includes setting the IP address, laying out the partitions, and configuring the serial console</li>
<li>A second script is then used to make a new ISO with the modifications</li>
<li>The user is directed to fetch the UEFI firmware and some other bits</li>
<li>Then iohyve is used to create the Windows VM</li>
<li>The first boot uses the newly created ISO to install Windows Server 2008</li>
<li>Subsequent boots start Windows directly from the virtual disk</li>
<li>Remote Desktop is enabled, so the user can manage the Windows Server graphically, using FreeRDP or a Windows client</li>
<li>iohyve can then be used to take snapshots of the machine, and clone it
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.58/" rel="nofollow">BSD Router Project has released 1.58</a></h3>

<ul>
<li>The BSD Router project has announced the release of version 1.58 with some notable new features</li>
<li>Update to FreeBSD 10.2-RELEASE-p8</li>
<li>Disabled some Chelsio Nic features not used by a router</li>
<li>Added new easy installation helper option, use with “system install <disk>”</li>
<li>Added the debugging symbols for userland</li>
<li>Includes the iperf package, and flashrom package, which allows updating system BIOS on supported boxes</li>
<li>IMPORTANT: Corrects an important UFS label bug introduced on 1.57. If you are running 1.57, you will need to fetch their fixlabel.sh script before upgrading to 1.58
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-15-7-22-released/" rel="nofollow">OPNsense 15.7.22 Released</a></h3>

<ul>
<li>An update to OPNsense has landed this week which includes the important updates to OpenSSL 1.0.2e and LibreSSL 2.2.5</li>
<li>A long-standing annoying bug with filter reload timeouts has finally been identified and sorted out as well, allowing the functionality to run quickly and “glitch free” again. </li>
<li>Some newer ports for curl (7.46), squid (3.5.12) and lighttpd (1.4.38) have also been thrown in for good measure</li>
<li>Some other minor UI fixes have also been included as well</li>
<li>With the holidays coming up, if you are still running a consumer router, this may be a good time to convert over to a OPNsense or PFsense box and get yourself ready for the new year. 
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/2015/12/vcenter-web-client-plug-in-for-truenas-now-available/" rel="nofollow">iXSystems releases vCenter Web Client Plug-in for TrueNAS</a> </li>
</ul>

<h2>Interview - Pawel Jakub Dawidek - <a href="mailto:pjd@FreeBSD.org" rel="nofollow">pjd@FreeBSD.org</a></h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.networkworld.com/article/3014714/security/developer-claims-ps4-officially-jailbroken.html" rel="nofollow">Developer claims the PS4 has been jail-broken</a></h3>

<ul>
<li>While not exactly a well-kept secret, the PS4’s proprietary “OrbOS” is FreeBSD based. </li>
<li>Using this knowledge and a Kernel exploit, developer CTurt (<a href="https://twitter.com/CTurtE/" rel="nofollow">https://twitter.com/CTurtE/</a>) claims he was able jailbreak a WebKit process and gain access to the system. </li>
<li>He has posted a small tease to GitHub, detailing some of the information gleaned from the exploit, such as PID list and root FS dump</li>
<li>As such with these kinds of jailbreaks, he already requested that users stop sending him requests about game piracy, but the ability to hack on / run homebrew apps on the PS4 seems intriguing
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-December/228461.html" rel="nofollow">Sepherosa Ziehau is looking for testers if you have a em(4), emx(4), or igb(4) Intel device</a></h3>

<ul>
<li>DragonFly Testers wanted! Sephe has posted a request for users of the em(4), emx(4) and igb(4) intel drivers to test his latest branch and report back results</li>
<li>He mentions that he has tested the models 82571, 82574 and 82573 (em/emx); 82575, 82576, 82580 and i350 specifically, so if you have something different, I’m sure he would be much appreciative of the help. </li>
<li>It looks like the em(4) driver has been updated to 7.5.2, and igb(4) 2.4.3, and adds support for the I219-LM and I219-V NICS.
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-tech&m=144933933119525&w=2" rel="nofollow">OpenBSD Xen Support</a></h3>

<ul>
<li>Filed under the “Ohh, look what’s coming soon” section, it appears that patches are starting to surface for OpenBSD Xen DOMU support. </li>
<li>For those who aren’t up on their Xen terminology, DomU is the unprivileged domain (I.E. Guest mode)</li>
<li>Right now the patch exists at the link above, and adds a new (commented out) device to the GENERIC kernel, but this gives Xen users something new to watch for updates to. 
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/b355449caa22e7bb6c460f7a647874836ef604f0" rel="nofollow">Thinkpad Backlit Keyboard support being worked on</a></h3>

<ul>
<li>Another reason why Lenovo / ThinkPads are some of the best laptops currently to use with BSD, the kettenis over at the OpenBSD project has committed a patch to enable support for the “ThinkLight”</li>
<li>For those who don’t know, this is the little light that helps illuminate the laptop’s keyboard under low-light situations. </li>
<li>While the initial patch only supports the “real-deal” ThinkLight, he does mention that support will be added soon for the others on ThinkPads</li>
<li>No sysctl’s to fiddle with, this works directly with the ACPI / keyboard function keys directly, nice!
***</li>
</ul>

<h3><a href="https://2016.asiabsdcon.org/cfp.html" rel="nofollow">Deadline is approaching for Submissions of Tutorial Proposals for AsiaBSDCon 2016</a></h3>

<p><a href="http://www.bsdcan.org/2016/papers.php" rel="nofollow">Call for Papers for BSDCAN 2016 now open</a> </p>

<ul>
<li>The next two major BSD conferences both have their CFP up right now. First up is AsiaBSDCon in Tokyo from March 10th-13th, followed by BSDCan in Ottawa, June 8th-11th.</li>
<li>If you are working on anything interesting in the BSD community, this is a good way to get the word out about your project, plus the conference pays for Hotel / Travel. </li>
<li>If you can make it to both, DO SO, you won’t regret it. Both Allan and Kris will be attending and we would look forward to meeting you. 
***</li>
</ul>

<h3><a href="https://github.com/pr1ntf/iohyve" rel="nofollow">iohyve lands in ports</a></h3>

<p>(<a href="http://www.freshports.org/sysutils/iohyve/" rel="nofollow">http://www.freshports.org/sysutils/iohyve/</a>)</p>

<ul>
<li>Something we’ve mentioned in passing has taken its first steps in becoming reality for users! “iohyve” has now landed in the FreeBSD ports tree</li>
<li>While it shares a similar name to “iocage” its not directly related, different developers and such. However it does share a very similar syntax and some principles of ZFS usage</li>
<li>The current version is 0.7, but it already has a rather large feature set</li>
<li>Among the current features are ISO Management, resource management, snapshot support (via ZFS), and support for OpenBSD, NetBSD and Linux (Using grub-bhyve port)
***</li>
</ul>

<h2>BeastieBits</h2>

<p><a href="http://lists.dragonflybsd.org/pipermail/users/2015-November/228445.html" rel="nofollow">hammer mount is forced noatime by default</a></p>

<p><a href="http://freebsdfoundation.blogspot.com/2015/12/show-your-support-for-freebsd.html" rel="nofollow">Show your support for FreeBSD</a> </p>

<p><a href="https://gist.github.com/reyk/e23fde95354d4bc35a40" rel="nofollow">OpenBSD running in an Amazon EC2 t2.micro</a> </p>

<p><a href="http://mail-index.netbsd.org/tech-pkg/2015/12/05/msg016059.html" rel="nofollow">NetBSD&#39;s 2015Q4 Package freeze is coming</a></p>

<p><a href="https://anders.unix.se/2015/12/10/screenshots-from-developers--2002-vs.-2015/" rel="nofollow">‘Screenshots from Developers’ that we covered previously from 2002, updated for 2015 </a> </p>

<hr>

<h2>Feedback/Questions (slexy was down when I made these, I only did 3, since the last is really long, save rest for next week)</h2>

<ul>
<li><a href="http://pastebin.com/g0DnFG95" rel="nofollow"> Mark - BSD laptops</a> </li>
<li><a href="http://pastebin.com/BNCmDgTe" rel="nofollow"> Jamie - zxfer</a> </li>
<li><a href="http://pastebin.com/iw0dXZ9P" rel="nofollow"> Anonymous - Long Story</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we are going to be talking to Pawel about how his</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3>Note the recent passing of 2 members of the BSD community</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/articles/contributors/contrib-develinmemoriam.html" rel="nofollow">Juergen Lock / Nox</a> </li>
<li><a href="https://twitter.com/michaeldexter/status/676290499389485057" rel="nofollow">Benjamin Perrault / creepingfur</a> <a href="http://pastebin.com/4BQ5uVsT" rel="nofollow">Memories from Michael Dexter </a> </li>
<li><a href="http://www.filis.org/rip_ben.txt" rel="nofollow">Additional Memories </a> 

<ul>
<li><a href="http://www.allanjude.com/bsd/bp/IMG_20151101_161727-auto.jpg" rel="nofollow">Benjamin and Allan at Ben’s local bar </a> </li>
<li><a href="http://www.allanjude.com/bsd/bp/IMG_20151101_191344-auto.jpg" rel="nofollow">Benjamin treated Allan and Michael Dexter to their first ever Bermese food </a> </li>
<li><a href="http://www.allanjude.com/bsd/bp/IMG_20151003_105457-auto.jpg" rel="nofollow">Benjamin enjoying the hallway track at EuroBSDCon 2015 </a> 
***</li>
</ul></li>
</ul>

<h3><a href="http://linoxide.com/linux-how-to/install-nginx-reverse-proxy-apache-freebsd-10-2/" rel="nofollow">NGINX as Reverse Proxy for Apache on FreeBSD 10.2</a></h3>

<ul>
<li>A tutorial on setting up NGINX as a reverse proxy for Apache</li>
<li>Sometimes your users or application require some feature of Apache, that cannot be easily replicated in NGINX, like .htaccess files or a custom apache module</li>
<li>In addition, because the default worker model in Apache does not accept new work until it is finished sending the request, a user with a slow connection can tie down that worker for a long time</li>
<li>With NGINX as a reverse proxy, it will receive the data from the Apache worker over localhost, freeing that worker to answer the next request, while NGINX takes care of sending the data to the user</li>
<li>The tutorial walks through the setup, which is very easy on modern FreeBSD</li>
<li>One could also add mod_rpaf2 to the Apache, to securely pass through the users’ real IP address for use by Apache’s logging and the PHP scripts
***</li>
</ul>

<h3><a href="http://bsdmag.org/freebsd_freenas/" rel="nofollow">FreeBSD and FreeNAS in Business by Randy Westlund</a></h3>

<ul>
<li>The story of how a Tent &amp; Awning company switched from managing orders with paper, to a computerized system backed by a FreeNAS</li>
<li>“At first, I looked at off-the-shelf solutions. I found a number of cloud services that were like Dropbox, but with some generic management stuff layered on top. Not only did these all feel like a poor solution, they were very expensive. If the provider were to go out of business, what would happen to my dad’s company?”</li>
<li>“Fortunately, sourcing the hardware and setting up the OS was the easiest part; I talked to iXsystems. I ordered a FreeNAS Mini and a nice workstation tower”</li>
<li>“I have r2d2 (the tower, which hosts the database) replicating ZFS snapshots to c3po (the FreeNAS mini), and the data is backed up off-site regularly. This data is absolutely mission-critical, so I can’t take any risks. I’m glad I have ZFS on my side.”</li>
<li>“I replaced Dropbox with Samba on c3po, and the Windows machines in the office now store important data on the NAS, rather than their local drives.”</li>
<li>“I also replaced their router with an APU board running pfSense and replaced their PPTP VPN with OpenVPN and certificate authorization.”</li>
<li>“FreeBSD (in three different incarnations) helped me focus on improving the company’s workflow without spending much time on the OS. And now there’s an awning company that is, in a very real sense, powered by FreeBSD.”
***</li>
</ul>

<h3><a href="http://pr1ntf.xyz/windowsunderbhyve.html" rel="nofollow">Tutorial, Windows running under bhyve</a></h3>

<ul>
<li>With the recent passing of the world’s foremost expert on running Windows under bhyve on FreeBSD, this tutorial will help you get up to speed</li>
<li>“The secret sauce to getting Windows running under bhyve is the new UEFI support. This is pretty great news, because when you utilize UEFI in bhyve, you don&#39;t have to load the operating system in bhyveload or grub-bhyve first.”</li>
<li>The author works on iohyve, and wanted to migrate away from VirtualBox, the only thing stopping that was support for Windows Guests</li>
<li>iohyve now has support for managing Windows VMs</li>
<li>The tutorial uses a script to extract the Windows Server 2008 ISO and set up AutoUnattend.xml to handle the installation of Windows, including setting the default administrator password, this is required because there is no graphical console yet</li>
<li>The AutoUnattended setup also includes setting the IP address, laying out the partitions, and configuring the serial console</li>
<li>A second script is then used to make a new ISO with the modifications</li>
<li>The user is directed to fetch the UEFI firmware and some other bits</li>
<li>Then iohyve is used to create the Windows VM</li>
<li>The first boot uses the newly created ISO to install Windows Server 2008</li>
<li>Subsequent boots start Windows directly from the virtual disk</li>
<li>Remote Desktop is enabled, so the user can manage the Windows Server graphically, using FreeRDP or a Windows client</li>
<li>iohyve can then be used to take snapshots of the machine, and clone it
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.58/" rel="nofollow">BSD Router Project has released 1.58</a></h3>

<ul>
<li>The BSD Router project has announced the release of version 1.58 with some notable new features</li>
<li>Update to FreeBSD 10.2-RELEASE-p8</li>
<li>Disabled some Chelsio Nic features not used by a router</li>
<li>Added new easy installation helper option, use with “system install <disk>”</li>
<li>Added the debugging symbols for userland</li>
<li>Includes the iperf package, and flashrom package, which allows updating system BIOS on supported boxes</li>
<li>IMPORTANT: Corrects an important UFS label bug introduced on 1.57. If you are running 1.57, you will need to fetch their fixlabel.sh script before upgrading to 1.58
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-15-7-22-released/" rel="nofollow">OPNsense 15.7.22 Released</a></h3>

<ul>
<li>An update to OPNsense has landed this week which includes the important updates to OpenSSL 1.0.2e and LibreSSL 2.2.5</li>
<li>A long-standing annoying bug with filter reload timeouts has finally been identified and sorted out as well, allowing the functionality to run quickly and “glitch free” again. </li>
<li>Some newer ports for curl (7.46), squid (3.5.12) and lighttpd (1.4.38) have also been thrown in for good measure</li>
<li>Some other minor UI fixes have also been included as well</li>
<li>With the holidays coming up, if you are still running a consumer router, this may be a good time to convert over to a OPNsense or PFsense box and get yourself ready for the new year. 
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/2015/12/vcenter-web-client-plug-in-for-truenas-now-available/" rel="nofollow">iXSystems releases vCenter Web Client Plug-in for TrueNAS</a> </li>
</ul>

<h2>Interview - Pawel Jakub Dawidek - <a href="mailto:pjd@FreeBSD.org" rel="nofollow">pjd@FreeBSD.org</a></h2>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.networkworld.com/article/3014714/security/developer-claims-ps4-officially-jailbroken.html" rel="nofollow">Developer claims the PS4 has been jail-broken</a></h3>

<ul>
<li>While not exactly a well-kept secret, the PS4’s proprietary “OrbOS” is FreeBSD based. </li>
<li>Using this knowledge and a Kernel exploit, developer CTurt (<a href="https://twitter.com/CTurtE/" rel="nofollow">https://twitter.com/CTurtE/</a>) claims he was able jailbreak a WebKit process and gain access to the system. </li>
<li>He has posted a small tease to GitHub, detailing some of the information gleaned from the exploit, such as PID list and root FS dump</li>
<li>As such with these kinds of jailbreaks, he already requested that users stop sending him requests about game piracy, but the ability to hack on / run homebrew apps on the PS4 seems intriguing
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-December/228461.html" rel="nofollow">Sepherosa Ziehau is looking for testers if you have a em(4), emx(4), or igb(4) Intel device</a></h3>

<ul>
<li>DragonFly Testers wanted! Sephe has posted a request for users of the em(4), emx(4) and igb(4) intel drivers to test his latest branch and report back results</li>
<li>He mentions that he has tested the models 82571, 82574 and 82573 (em/emx); 82575, 82576, 82580 and i350 specifically, so if you have something different, I’m sure he would be much appreciative of the help. </li>
<li>It looks like the em(4) driver has been updated to 7.5.2, and igb(4) 2.4.3, and adds support for the I219-LM and I219-V NICS.
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-tech&m=144933933119525&w=2" rel="nofollow">OpenBSD Xen Support</a></h3>

<ul>
<li>Filed under the “Ohh, look what’s coming soon” section, it appears that patches are starting to surface for OpenBSD Xen DOMU support. </li>
<li>For those who aren’t up on their Xen terminology, DomU is the unprivileged domain (I.E. Guest mode)</li>
<li>Right now the patch exists at the link above, and adds a new (commented out) device to the GENERIC kernel, but this gives Xen users something new to watch for updates to. 
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/b355449caa22e7bb6c460f7a647874836ef604f0" rel="nofollow">Thinkpad Backlit Keyboard support being worked on</a></h3>

<ul>
<li>Another reason why Lenovo / ThinkPads are some of the best laptops currently to use with BSD, the kettenis over at the OpenBSD project has committed a patch to enable support for the “ThinkLight”</li>
<li>For those who don’t know, this is the little light that helps illuminate the laptop’s keyboard under low-light situations. </li>
<li>While the initial patch only supports the “real-deal” ThinkLight, he does mention that support will be added soon for the others on ThinkPads</li>
<li>No sysctl’s to fiddle with, this works directly with the ACPI / keyboard function keys directly, nice!
***</li>
</ul>

<h3><a href="https://2016.asiabsdcon.org/cfp.html" rel="nofollow">Deadline is approaching for Submissions of Tutorial Proposals for AsiaBSDCon 2016</a></h3>

<p><a href="http://www.bsdcan.org/2016/papers.php" rel="nofollow">Call for Papers for BSDCAN 2016 now open</a> </p>

<ul>
<li>The next two major BSD conferences both have their CFP up right now. First up is AsiaBSDCon in Tokyo from March 10th-13th, followed by BSDCan in Ottawa, June 8th-11th.</li>
<li>If you are working on anything interesting in the BSD community, this is a good way to get the word out about your project, plus the conference pays for Hotel / Travel. </li>
<li>If you can make it to both, DO SO, you won’t regret it. Both Allan and Kris will be attending and we would look forward to meeting you. 
***</li>
</ul>

<h3><a href="https://github.com/pr1ntf/iohyve" rel="nofollow">iohyve lands in ports</a></h3>

<p>(<a href="http://www.freshports.org/sysutils/iohyve/" rel="nofollow">http://www.freshports.org/sysutils/iohyve/</a>)</p>

<ul>
<li>Something we’ve mentioned in passing has taken its first steps in becoming reality for users! “iohyve” has now landed in the FreeBSD ports tree</li>
<li>While it shares a similar name to “iocage” its not directly related, different developers and such. However it does share a very similar syntax and some principles of ZFS usage</li>
<li>The current version is 0.7, but it already has a rather large feature set</li>
<li>Among the current features are ISO Management, resource management, snapshot support (via ZFS), and support for OpenBSD, NetBSD and Linux (Using grub-bhyve port)
***</li>
</ul>

<h2>BeastieBits</h2>

<p><a href="http://lists.dragonflybsd.org/pipermail/users/2015-November/228445.html" rel="nofollow">hammer mount is forced noatime by default</a></p>

<p><a href="http://freebsdfoundation.blogspot.com/2015/12/show-your-support-for-freebsd.html" rel="nofollow">Show your support for FreeBSD</a> </p>

<p><a href="https://gist.github.com/reyk/e23fde95354d4bc35a40" rel="nofollow">OpenBSD running in an Amazon EC2 t2.micro</a> </p>

<p><a href="http://mail-index.netbsd.org/tech-pkg/2015/12/05/msg016059.html" rel="nofollow">NetBSD&#39;s 2015Q4 Package freeze is coming</a></p>

<p><a href="https://anders.unix.se/2015/12/10/screenshots-from-developers--2002-vs.-2015/" rel="nofollow">‘Screenshots from Developers’ that we covered previously from 2002, updated for 2015 </a> </p>

<hr>

<h2>Feedback/Questions (slexy was down when I made these, I only did 3, since the last is really long, save rest for next week)</h2>

<ul>
<li><a href="http://pastebin.com/g0DnFG95" rel="nofollow"> Mark - BSD laptops</a> </li>
<li><a href="http://pastebin.com/BNCmDgTe" rel="nofollow"> Jamie - zxfer</a> </li>
<li><a href="http://pastebin.com/iw0dXZ9P" rel="nofollow"> Anonymous - Long Story</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>119: There be Dragons, BSD Dragons anyway</title>
  <link>https://www.bsdnow.tv/119</link>
  <guid isPermaLink="false">37b89eb3-cafc-4d08-916c-024e11347e21</guid>
  <pubDate>Wed, 09 Dec 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/37b89eb3-cafc-4d08-916c-024e11347e21.mp3" length="72811156" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow - It’s getting close to christmas and the</itunes:subtitle>
  <itunes:duration>1:41:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow - It’s getting close to christmas and the&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151208172029" target="_blank" rel="nofollow noopener"&gt;n2k15 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;tedu@ worked on rebound, malloc hardening, removing legacy code&lt;/li&gt;
&lt;li&gt;“I don't usually get too involved with the network stack, but sometimes you find yourself at a network hackathon and have to go with the flow. With many developers working in the same area, it can be hard to find an appropriate project, but fortunately there are a few dusty corners in networking land that can be swept up without too much disturbance to others.”&lt;/li&gt;
&lt;li&gt;“IPv6 is the future of networking. IPv6 has also been the future of networking for 20 years. As a result, a number of features have been proposed, implemented, then obsoleted, but the corresponding code never quite gets deleted. The IPsec stack has followed a somewhat similar trajectory”&lt;/li&gt;
&lt;li&gt;“I read through various networking headers in search of features that would normally be exposed to userland, but were instead guarded by ifdef _KERNEL. This identified a number of options for setsockopt() that had been officially retired from the API, but the kernel code retained to provide ABI compatibility during a transition period. That transition occurred more than a decade ago. Binary programs from that era no longer run for many other reasons, and so we can delete support. It's only a small improvement, but it gradually reduces the amount of code that needs to be reviewed when making larger more important changes”&lt;/li&gt;
&lt;li&gt;Ifconfig txpower got similar treatment, as no modern WiFi driver supports it&lt;/li&gt;
&lt;li&gt;Support for Ethernet Trailers, &lt;a href="https://tools.ietf.org/html/rfc893" target="_blank" rel="nofollow noopener"&gt;RFC 893&lt;/a&gt;, enabled zero copy networking on a VAX with 512 byte hardware pages, the feature was removed even before OpenBSD was founded, but the ifconfig option was still in place&lt;/li&gt;
&lt;li&gt;Alexandr Nedvedicky (sashan@) worked on &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151207143819" target="_blank" rel="nofollow noopener"&gt;MP-Safe PF&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;“I'd like to thank Reyk for hackroom and showing us a Christmas market. It was also my pleasure to meet Mr. Henning in person. Speaking of Henning, let's switch to PF hacking.”&lt;/li&gt;
&lt;li&gt;“mpi@ came with patch (sent to priv. list only currently), which adds a new lock for PF. It's called PF big lock. The big PF lock essentially establishes a safe playground for PF hackers. The lock currently covers all pf_test() function. The pf_test() function parts will be gradually unlocked as the work will progress.&lt;/li&gt;
&lt;li&gt;To make PF big lock safe few more details must be sorted out. The first of them is to avoid recursive calls to pf_test(). The pf_test() could get entered recursively, when packet hits block rule with return-* action. This is no longer the case as ip*_send() functions got introduced (committed change has been discussed privately). Packets sent on behalf of kernel are dispatched using softnet task queue now. We still have to sort out pf_route*() functions. The other thing we need to sort out with respect to PF big lock is reference counting for statekey, which gets attached to mbuf. Patch has been sent to hackers, waiting for OK too. The plan is to commit reference counting sometimes next year after CVS will be unlocked. There is one more patch at tech@ waiting for OK. It brings OpenBSD and Solaris PF closer to each other by one tiny little step.”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://queue.acm.org/detail.cfm?id=2852078" target="_blank" rel="nofollow noopener"&gt;ACM Queue: Challenges of Memory Management on Modern NUMA System&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“Modern server-class systems are typically built as several multicore chips put together in a single system. Each chip has a local DRAM (dynamic random-access memory) module; together they are referred to as a node. Nodes are connected via a high-speed interconnect, and the system is fully coherent. This means that, transparently to the programmer, a core can issue requests to its node's local memory as well as to the memories of other nodes. The key distinction is that remote requests will take longer, because they are subject to longer wire delays and may have to jump several hops as they traverse the interconnect. The latency of memory-access times is hence non-uniform, because it depends on where the request originates and where it is destined to go. Such systems are referred to as NUMA (non-uniform memory access).”&lt;/li&gt;
&lt;li&gt;So, depending what core a program is running on, it will have different throughput and latency to specific banks of memory. Therefore, it is usually optimal to try to allocate memory from the bank of ram connected to the CPU that the program is running on, and to keep that program running on that same CPU, rather than moving it around&lt;/li&gt;
&lt;li&gt;There are a number of different NUMA strategies, including:&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Fixed&lt;/strong&gt;, memory is always allocated from a specific bank of memory&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;First Touch&lt;/strong&gt;, which means that memory is allocated from the bank connected to the CPU that the application is running on when it requests the memory, which can increase performance if the application remains on that same CPU, and the load is balanced optimally&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Round Robin&lt;/strong&gt; or &lt;strong&gt;Interleave&lt;/strong&gt;, where memory is allocated evenly, each allocation coming from the next bank of memory so that all banks are used. This method can provide more uniform performance, because it ensures that all memory accesses have the same change to be local vs remote. If even performance is required, this method can be better than something more focused on locality, but that might fail and result in remote access&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;AutoNUMA&lt;/strong&gt;, A kernel task routinely iterates through the allocated memory of each process and tallies the number of memory pages on each node for that process. It also clears the present bit on the pages, which will force the CPU to stop and enter the page-fault handler when the page is next accessed. In the page-fault handler it records which node and thread is trying to access the page before setting the present bit and allowing execution to continue. Pages that are accessed from remote nodes are put into a queue to be migrated to that node. After a page has already been migrated once, though, future migrations require two recorded accesses from a remote node, which is designed to prevent excessive migrations (known as page bouncing).&lt;/li&gt;
&lt;li&gt;The paper also introduces a new strategy:&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Carrefour&lt;/strong&gt; is a memory-placement algorithm for NUMA systems that focuses on traffic management: placing memory so as to minimize congestion on interconnect links or memory controllers. Trying to strike a balance between locality, and ensuring that the interconnect between a specific pair of CPUs does not become congested, which can make remote accesses even slower&lt;/li&gt;
&lt;li&gt;Carrefour uses three primary techniques:&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Memory collocation&lt;/strong&gt;, Moving memory to a different node so that accesses will likely be local.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Replication&lt;/strong&gt;, Copying memory to several nodes so that threads from each node can access it locally (useful for read-only and read-mostly data).&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Interleaving&lt;/strong&gt;, Moving memory such that it is distributed evenly among all nodes.&lt;/li&gt;
&lt;li&gt;FreeBSD is slowly gaining NUMA capabilities, and currently supports: fixed, round-robin, first-touch. Additionally, it also supports fixed-rr, and first-touch-rr, where if the memory allocation fails, because the fixed domain or first-touch domain is full, it falls back to round-robin.&lt;/li&gt;
&lt;li&gt;For more information, see numa(4) and numa_setaffinity(2) on 11-CURRENT
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://fossforce.com/2015/12/linux-no-pc-bsd/" target="_blank" rel="nofollow noopener"&gt;Is that Linux? No it is PC-BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Larry Cafiero continues to make some news about his switch to PC-BSD from Linux. This time in an blog post titled “Is that Linux? No, its PC-BSD” he describes an experience out and about where he was asked what is running on his laptop, and was unable for the first time in 9 years to answer, it’s Linux. &lt;/li&gt;
&lt;li&gt;The blog then goes on to mention his experience up to now running PC-BSD, how the learning curve was fairly easy coming from a Linux background. &lt;/li&gt;
&lt;li&gt;He mentions that he has noticed an uptick in performance on the system, no specific benchmarks but this “Linux was fast enough on this machine. But in street racing parlance, with PC-BSD I’m burning rubber in all four gears.”&lt;/li&gt;
&lt;li&gt;The only major nits he mentions is having trouble getting a font to switch in FireFox, and not knowing how to enable GRUB quiet mode. (I’ll have to add a knob back for that)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://gist.github.com/jcs/5573685" target="_blank" rel="nofollow noopener"&gt;Dual booting OS X and OpenBSD with full disk encryption&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New GPT and UEFI support allow OpenBSD to co-exist with Mac OS X without the need for Boot Camp Assistant or Hybrid MBRs&lt;/li&gt;
&lt;li&gt;This tutorial walks the read through the steps of installing OpenBSD side-by-side with Mac OS X&lt;/li&gt;
&lt;li&gt;First the HFS+ partition is shrunk to make room for a new OpenBSD partition&lt;/li&gt;
&lt;li&gt;Then the OpenBSD installer is run, and the available free space is setup as an encrypted softraid &lt;/li&gt;
&lt;li&gt;The OpenBSD installer will add itself to the EFI partition&lt;/li&gt;
&lt;li&gt;Rename the boot loader installed by OpenBSD and replace it with rEFInd, so you will get a boot menu allowing you to select between OpenBSD and OS X
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Paul Goyette - &lt;a href="mailto:pgoyette@netbsd.org" target="_blank" rel="nofollow noopener"&gt;pgoyette@netbsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD Testing and Modularity
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.virtual-strategy.com/2015/12/08/ixsystems-wins-press-and-industry-analyst-accolades-best-biz-awards-2015" target="_blank" rel="nofollow noopener"&gt;iXsystems Wins Press and Industry Analyst Accolades in Best in Biz Awards 2015&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.geeklan.co.uk/?p=2019" target="_blank" rel="nofollow noopener"&gt;HOWTO: L2TP/IPSec with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;*BSD contributor Sevan Janiyan provides an update on setting up a road-warrior VPN&lt;/li&gt;
&lt;li&gt;This first article walks through setting up the OpenBSD server side, and followup articles will cover configuring various client systems to connect to it&lt;/li&gt;
&lt;li&gt;The previous tutorial on this configuration is from 2012, and things have improved greatly since then, and is much easier to set up now&lt;/li&gt;
&lt;li&gt;The tutorial includes PF rules, npppd configuration, and how to enable isakmpd and ipsec&lt;/li&gt;
&lt;li&gt;L2TP/IPSec is chosen because most operating systems, including Windows, OS X, iOS, and Android, include a native L2TP client, rather than requiring some additional software to be installed
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/release44/" target="_blank" rel="nofollow noopener"&gt;DragonFly 4.4 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly BSD has made its 4.4 release official this week!&lt;/li&gt;
&lt;li&gt;A lot of big changes, but some of the highlights

&lt;ul&gt;
&lt;li&gt;Radeon / i915 DRM support for up to Linux Kernel 3.18&lt;/li&gt;
&lt;li&gt;Proper collation support for named locales, shared back to FreeBSD 11-CURRENT&lt;/li&gt;
&lt;li&gt;Regex Support using TRE “As a consequence of the locale upgrades, the original regex library had to be forced into POSIX (single-byte) mode always. The support for multi-byte characters just wasn't there. ” …. “TRE is faster, more capable, and supports multibyte characters, so it's a nice addition to this release.”&lt;/li&gt;
&lt;li&gt;Other noteworthy, iwm(4) driver, CPU power-saving improvements, import ipfw from FreeBSD (named ipfw3)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;An interesting tidbit is &lt;a href="http://bsd.slashdot.org/story/15/12/04/2351241/dragonflybsd-44-switches-to-the-gold-linker-by-default" target="_blank" rel="nofollow noopener"&gt;switching to the Gold linker&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://linoxide.com/linux-how-to/install-ajenti-nginx-ssl-freebsd-10-2/" target="_blank" rel="nofollow noopener"&gt;Guide to install Ajenti on Nginx with SSL on FreeBSD 10.2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for a webmin-like interface to control your FreeBSD box? Enter Ajenti, and today we have a walkthrough posted on how to get it setup on a FreeBSD 10.2 system.&lt;/li&gt;
&lt;li&gt;The walkthrough is mostly straightforward, you’ll need a FreeBSD box with root, and will need to install several packages / ports initially. &lt;/li&gt;
&lt;li&gt;Because there is no native package (yet), it guides you through using python’s PIP installer to fetch and get Ajenti running. &lt;/li&gt;
&lt;li&gt;The author links to some pre-built rc.d scripts and other helpful config files on GitHub, which will further assist in the process of making it run on FreeBSD.&lt;/li&gt;
&lt;li&gt;Ajenti by itself may not be the best to serve publically, so it also provides instructions on how to protect the connection by serving it through nginx / SSL, a must-have if you plan on using this over unsecure networks. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.bsdcan.org/2016/papers.php" target="_blank" rel="nofollow noopener"&gt;BSDCan 2016 CFP is up!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan is the biggest North American BSD conference, and my personal favourite&lt;/li&gt;
&lt;li&gt;The call for papers is now out, and I would like to see more first-time submitters this year&lt;/li&gt;
&lt;li&gt;If you do anything interesting with or on a BSD, please write a proposal&lt;/li&gt;
&lt;li&gt;Are the machines you run BSD on bigger or smaller than what most people have? Tell us about it&lt;/li&gt;
&lt;li&gt;Are you running a big farm that does something interesting?&lt;/li&gt;
&lt;li&gt;Is your university research using BSD?&lt;/li&gt;
&lt;li&gt;Do you have an idea for a great new subsystem or utility?&lt;/li&gt;
&lt;li&gt;Have you suffered through some horrible ordeal? Make sure the rest of us know the best way out when it happens to us.&lt;/li&gt;
&lt;li&gt;Did you build a radar that runs NetBSD? A telescope controlled by FreeBSD?&lt;/li&gt;
&lt;li&gt;Have you run an ISP at the north pole using Jails?&lt;/li&gt;
&lt;li&gt;Do you run a usergroup and have tips to share?&lt;/li&gt;
&lt;li&gt;Have you combined the features and tools of a BSD in a new and interesting way?&lt;/li&gt;
&lt;li&gt;Don’t have a talk to give? Teach a tutorial!&lt;/li&gt;
&lt;li&gt;The conference will arrange your air travel and hotel, and you’ll get to spend a few great days with the best community on earth&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blather.michaelwlucas.com/archives/2325" target="_blank" rel="nofollow noopener"&gt;Michael W. Lucas’s post about the 2015 proposals and rejections &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.freshports.org/www/obhttpd/" target="_blank" rel="nofollow noopener"&gt;OpenBSD's lightweight web server now in FreeBSD's ports tree&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=FI_bZhV7wpI" target="_blank" rel="nofollow noopener"&gt;Stephen Bourne's NYCBUG talk is online&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://freebsdwiki.net/index.php/Main_Page" target="_blank" rel="nofollow noopener"&gt;Looking for owner to FreeBSDWiki&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://frozen-geek.net/openbsd-email-server-1/" target="_blank" rel="nofollow noopener"&gt;HOWTO: OpenBSD Mail Server &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.daemonology.net/blog/2015-12-06-magic-getopt.html" target="_blank" rel="nofollow noopener"&gt;A new magic getopt library&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://uggedal.com/journal/pxe-boot-openbsd-from-openwrt/" target="_blank" rel="nofollow noopener"&gt;PXE boot OpenBSD from OpenWRT&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://permalink.gmane.org/gmane.os.openbsd.misc/227054" target="_blank" rel="nofollow noopener"&gt;Supporting the OpenBSD project&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20pbRLRRz" target="_blank" rel="nofollow noopener"&gt; Zachary - FreeBSD Jails&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2jGy34fy2" target="_blank" rel="nofollow noopener"&gt; Robert - Iocage help!&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20Ht8JfpL" target="_blank" rel="nofollow noopener"&gt; Kjell - Server Management&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2GYtvd7hU" target="_blank" rel="nofollow noopener"&gt; Brian - NAS Setup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21EVs6aUg" target="_blank" rel="nofollow noopener"&gt; Mike - Radius Followup&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s205zZiJCv" target="_blank" rel="nofollow noopener"&gt; Laszlo - Best Stocking Ever&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow - It’s getting close to christmas and the</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151208172029" rel="nofollow">n2k15 hackathon reports</a></h3>

<ul>
<li>tedu@ worked on rebound, malloc hardening, removing legacy code</li>
<li>“I don&#39;t usually get too involved with the network stack, but sometimes you find yourself at a network hackathon and have to go with the flow. With many developers working in the same area, it can be hard to find an appropriate project, but fortunately there are a few dusty corners in networking land that can be swept up without too much disturbance to others.”</li>
<li>“IPv6 is the future of networking. IPv6 has also been the future of networking for 20 years. As a result, a number of features have been proposed, implemented, then obsoleted, but the corresponding code never quite gets deleted. The IPsec stack has followed a somewhat similar trajectory”</li>
<li>“I read through various networking headers in search of features that would normally be exposed to userland, but were instead guarded by ifdef _KERNEL. This identified a number of options for setsockopt() that had been officially retired from the API, but the kernel code retained to provide ABI compatibility during a transition period. That transition occurred more than a decade ago. Binary programs from that era no longer run for many other reasons, and so we can delete support. It&#39;s only a small improvement, but it gradually reduces the amount of code that needs to be reviewed when making larger more important changes”</li>
<li>Ifconfig txpower got similar treatment, as no modern WiFi driver supports it</li>
<li>Support for Ethernet Trailers, <a href="https://tools.ietf.org/html/rfc893" rel="nofollow">RFC 893</a>, enabled zero copy networking on a VAX with 512 byte hardware pages, the feature was removed even before OpenBSD was founded, but the ifconfig option was still in place</li>
<li>Alexandr Nedvedicky (sashan@) worked on <a href="http://undeadly.org/cgi?action=article&sid=20151207143819" rel="nofollow">MP-Safe PF</a> </li>
<li>“I&#39;d like to thank Reyk for hackroom and showing us a Christmas market. It was also my pleasure to meet Mr. Henning in person. Speaking of Henning, let&#39;s switch to PF hacking.”</li>
<li>“mpi@ came with patch (sent to priv. list only currently), which adds a new lock for PF. It&#39;s called PF big lock. The big PF lock essentially establishes a safe playground for PF hackers. The lock currently covers all pf_test() function. The pf_test() function parts will be gradually unlocked as the work will progress.</li>
<li>To make PF big lock safe few more details must be sorted out. The first of them is to avoid recursive calls to pf_test(). The pf_test() could get entered recursively, when packet hits block rule with return-* action. This is no longer the case as ip*_send() functions got introduced (committed change has been discussed privately). Packets sent on behalf of kernel are dispatched using softnet task queue now. We still have to sort out pf_route*() functions. The other thing we need to sort out with respect to PF big lock is reference counting for statekey, which gets attached to mbuf. Patch has been sent to hackers, waiting for OK too. The plan is to commit reference counting sometimes next year after CVS will be unlocked. There is one more patch at tech@ waiting for OK. It brings OpenBSD and Solaris PF closer to each other by one tiny little step.”
***</li>
</ul>

<h3><a href="http://queue.acm.org/detail.cfm?id=2852078" rel="nofollow">ACM Queue: Challenges of Memory Management on Modern NUMA System</a></h3>

<ul>
<li>“Modern server-class systems are typically built as several multicore chips put together in a single system. Each chip has a local DRAM (dynamic random-access memory) module; together they are referred to as a node. Nodes are connected via a high-speed interconnect, and the system is fully coherent. This means that, transparently to the programmer, a core can issue requests to its node&#39;s local memory as well as to the memories of other nodes. The key distinction is that remote requests will take longer, because they are subject to longer wire delays and may have to jump several hops as they traverse the interconnect. The latency of memory-access times is hence non-uniform, because it depends on where the request originates and where it is destined to go. Such systems are referred to as NUMA (non-uniform memory access).”</li>
<li>So, depending what core a program is running on, it will have different throughput and latency to specific banks of memory. Therefore, it is usually optimal to try to allocate memory from the bank of ram connected to the CPU that the program is running on, and to keep that program running on that same CPU, rather than moving it around</li>
<li>There are a number of different NUMA strategies, including:</li>
<li><strong>Fixed</strong>, memory is always allocated from a specific bank of memory</li>
<li><strong>First Touch</strong>, which means that memory is allocated from the bank connected to the CPU that the application is running on when it requests the memory, which can increase performance if the application remains on that same CPU, and the load is balanced optimally</li>
<li><strong>Round Robin</strong> or <strong>Interleave</strong>, where memory is allocated evenly, each allocation coming from the next bank of memory so that all banks are used. This method can provide more uniform performance, because it ensures that all memory accesses have the same change to be local vs remote. If even performance is required, this method can be better than something more focused on locality, but that might fail and result in remote access</li>
<li><strong>AutoNUMA</strong>, A kernel task routinely iterates through the allocated memory of each process and tallies the number of memory pages on each node for that process. It also clears the present bit on the pages, which will force the CPU to stop and enter the page-fault handler when the page is next accessed. In the page-fault handler it records which node and thread is trying to access the page before setting the present bit and allowing execution to continue. Pages that are accessed from remote nodes are put into a queue to be migrated to that node. After a page has already been migrated once, though, future migrations require two recorded accesses from a remote node, which is designed to prevent excessive migrations (known as page bouncing).</li>
<li>The paper also introduces a new strategy:</li>
<li><strong>Carrefour</strong> is a memory-placement algorithm for NUMA systems that focuses on traffic management: placing memory so as to minimize congestion on interconnect links or memory controllers. Trying to strike a balance between locality, and ensuring that the interconnect between a specific pair of CPUs does not become congested, which can make remote accesses even slower</li>
<li>Carrefour uses three primary techniques:</li>
<li><strong>Memory collocation</strong>, Moving memory to a different node so that accesses will likely be local.</li>
<li><strong>Replication</strong>, Copying memory to several nodes so that threads from each node can access it locally (useful for read-only and read-mostly data).</li>
<li><strong>Interleaving</strong>, Moving memory such that it is distributed evenly among all nodes.</li>
<li>FreeBSD is slowly gaining NUMA capabilities, and currently supports: fixed, round-robin, first-touch. Additionally, it also supports fixed-rr, and first-touch-rr, where if the memory allocation fails, because the fixed domain or first-touch domain is full, it falls back to round-robin.</li>
<li>For more information, see numa(4) and numa_setaffinity(2) on 11-CURRENT
***</li>
</ul>

<h3><a href="http://fossforce.com/2015/12/linux-no-pc-bsd/" rel="nofollow">Is that Linux? No it is PC-BSD</a></h3>

<ul>
<li>Larry Cafiero continues to make some news about his switch to PC-BSD from Linux. This time in an blog post titled “Is that Linux? No, its PC-BSD” he describes an experience out and about where he was asked what is running on his laptop, and was unable for the first time in 9 years to answer, it’s Linux. </li>
<li>The blog then goes on to mention his experience up to now running PC-BSD, how the learning curve was fairly easy coming from a Linux background. </li>
<li>He mentions that he has noticed an uptick in performance on the system, no specific benchmarks but this “Linux was fast enough on this machine. But in street racing parlance, with PC-BSD I’m burning rubber in all four gears.”</li>
<li>The only major nits he mentions is having trouble getting a font to switch in FireFox, and not knowing how to enable GRUB quiet mode. (I’ll have to add a knob back for that)
***</li>
</ul>

<h3><a href="https://gist.github.com/jcs/5573685" rel="nofollow">Dual booting OS X and OpenBSD with full disk encryption</a></h3>

<ul>
<li>New GPT and UEFI support allow OpenBSD to co-exist with Mac OS X without the need for Boot Camp Assistant or Hybrid MBRs</li>
<li>This tutorial walks the read through the steps of installing OpenBSD side-by-side with Mac OS X</li>
<li>First the HFS+ partition is shrunk to make room for a new OpenBSD partition</li>
<li>Then the OpenBSD installer is run, and the available free space is setup as an encrypted softraid </li>
<li>The OpenBSD installer will add itself to the EFI partition</li>
<li>Rename the boot loader installed by OpenBSD and replace it with rEFInd, so you will get a boot menu allowing you to select between OpenBSD and OS X
***</li>
</ul>

<h2>Interview - Paul Goyette - <a href="mailto:pgoyette@netbsd.org" rel="nofollow">pgoyette@netbsd.org</a></h2>

<ul>
<li>NetBSD Testing and Modularity
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="http://www.virtual-strategy.com/2015/12/08/ixsystems-wins-press-and-industry-analyst-accolades-best-biz-awards-2015" rel="nofollow">iXsystems Wins Press and Industry Analyst Accolades in Best in Biz Awards 2015</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.geeklan.co.uk/?p=2019" rel="nofollow">HOWTO: L2TP/IPSec with OpenBSD</a></h3>

<ul>
<li>*BSD contributor Sevan Janiyan provides an update on setting up a road-warrior VPN</li>
<li>This first article walks through setting up the OpenBSD server side, and followup articles will cover configuring various client systems to connect to it</li>
<li>The previous tutorial on this configuration is from 2012, and things have improved greatly since then, and is much easier to set up now</li>
<li>The tutorial includes PF rules, npppd configuration, and how to enable isakmpd and ipsec</li>
<li>L2TP/IPSec is chosen because most operating systems, including Windows, OS X, iOS, and Android, include a native L2TP client, rather than requiring some additional software to be installed
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release44/" rel="nofollow">DragonFly 4.4 Released</a></h3>

<ul>
<li>DragonFly BSD has made its 4.4 release official this week!</li>
<li>A lot of big changes, but some of the highlights

<ul>
<li>Radeon / i915 DRM support for up to Linux Kernel 3.18</li>
<li>Proper collation support for named locales, shared back to FreeBSD 11-CURRENT</li>
<li>Regex Support using TRE “As a consequence of the locale upgrades, the original regex library had to be forced into POSIX (single-byte) mode always. The support for multi-byte characters just wasn&#39;t there. ” …. “TRE is faster, more capable, and supports multibyte characters, so it&#39;s a nice addition to this release.”</li>
<li>Other noteworthy, iwm(4) driver, CPU power-saving improvements, import ipfw from FreeBSD (named ipfw3)</li>
</ul></li>
<li>An interesting tidbit is <a href="http://bsd.slashdot.org/story/15/12/04/2351241/dragonflybsd-44-switches-to-the-gold-linker-by-default" rel="nofollow">switching to the Gold linker</a> 
***</li>
</ul>

<h3><a href="http://linoxide.com/linux-how-to/install-ajenti-nginx-ssl-freebsd-10-2/" rel="nofollow">Guide to install Ajenti on Nginx with SSL on FreeBSD 10.2</a></h3>

<ul>
<li>Looking for a webmin-like interface to control your FreeBSD box? Enter Ajenti, and today we have a walkthrough posted on how to get it setup on a FreeBSD 10.2 system.</li>
<li>The walkthrough is mostly straightforward, you’ll need a FreeBSD box with root, and will need to install several packages / ports initially. </li>
<li>Because there is no native package (yet), it guides you through using python’s PIP installer to fetch and get Ajenti running. </li>
<li>The author links to some pre-built rc.d scripts and other helpful config files on GitHub, which will further assist in the process of making it run on FreeBSD.</li>
<li>Ajenti by itself may not be the best to serve publically, so it also provides instructions on how to protect the connection by serving it through nginx / SSL, a must-have if you plan on using this over unsecure networks. 
***</li>
</ul>

<h3><a href="http://www.bsdcan.org/2016/papers.php" rel="nofollow">BSDCan 2016 CFP is up!</a></h3>

<ul>
<li>BSDCan is the biggest North American BSD conference, and my personal favourite</li>
<li>The call for papers is now out, and I would like to see more first-time submitters this year</li>
<li>If you do anything interesting with or on a BSD, please write a proposal</li>
<li>Are the machines you run BSD on bigger or smaller than what most people have? Tell us about it</li>
<li>Are you running a big farm that does something interesting?</li>
<li>Is your university research using BSD?</li>
<li>Do you have an idea for a great new subsystem or utility?</li>
<li>Have you suffered through some horrible ordeal? Make sure the rest of us know the best way out when it happens to us.</li>
<li>Did you build a radar that runs NetBSD? A telescope controlled by FreeBSD?</li>
<li>Have you run an ISP at the north pole using Jails?</li>
<li>Do you run a usergroup and have tips to share?</li>
<li>Have you combined the features and tools of a BSD in a new and interesting way?</li>
<li>Don’t have a talk to give? Teach a tutorial!</li>
<li>The conference will arrange your air travel and hotel, and you’ll get to spend a few great days with the best community on earth</li>
<li><a href="http://blather.michaelwlucas.com/archives/2325" rel="nofollow">Michael W. Lucas’s post about the 2015 proposals and rejections </a>
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><a href="http://www.freshports.org/www/obhttpd/" rel="nofollow">OpenBSD&#39;s lightweight web server now in FreeBSD&#39;s ports tree</a> </li>
<li><a href="https://www.youtube.com/watch?v=FI_bZhV7wpI" rel="nofollow">Stephen Bourne&#39;s NYCBUG talk is online</a></li>
<li><a href="http://freebsdwiki.net/index.php/Main_Page" rel="nofollow">Looking for owner to FreeBSDWiki</a> </li>
<li><a href="http://frozen-geek.net/openbsd-email-server-1/" rel="nofollow">HOWTO: OpenBSD Mail Server </a> </li>
<li><a href="http://www.daemonology.net/blog/2015-12-06-magic-getopt.html" rel="nofollow">A new magic getopt library</a></li>
<li><a href="http://uggedal.com/journal/pxe-boot-openbsd-from-openwrt/" rel="nofollow">PXE boot OpenBSD from OpenWRT</a> </li>
<li><a href="http://permalink.gmane.org/gmane.os.openbsd.misc/227054" rel="nofollow">Supporting the OpenBSD project</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20pbRLRRz" rel="nofollow"> Zachary - FreeBSD Jails</a> </li>
<li><a href="http://slexy.org/view/s2jGy34fy2" rel="nofollow"> Robert - Iocage help!</a> </li>
<li><a href="http://slexy.org/view/s20Ht8JfpL" rel="nofollow"> Kjell - Server Management</a> </li>
<li><a href="http://slexy.org/view/s2GYtvd7hU" rel="nofollow"> Brian - NAS Setup</a> </li>
<li><a href="http://slexy.org/view/s21EVs6aUg" rel="nofollow"> Mike - Radius Followup</a> </li>
<li><a href="http://slexy.org/view/s205zZiJCv" rel="nofollow"> Laszlo - Best Stocking Ever</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow - It’s getting close to christmas and the</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151208172029" rel="nofollow">n2k15 hackathon reports</a></h3>

<ul>
<li>tedu@ worked on rebound, malloc hardening, removing legacy code</li>
<li>“I don&#39;t usually get too involved with the network stack, but sometimes you find yourself at a network hackathon and have to go with the flow. With many developers working in the same area, it can be hard to find an appropriate project, but fortunately there are a few dusty corners in networking land that can be swept up without too much disturbance to others.”</li>
<li>“IPv6 is the future of networking. IPv6 has also been the future of networking for 20 years. As a result, a number of features have been proposed, implemented, then obsoleted, but the corresponding code never quite gets deleted. The IPsec stack has followed a somewhat similar trajectory”</li>
<li>“I read through various networking headers in search of features that would normally be exposed to userland, but were instead guarded by ifdef _KERNEL. This identified a number of options for setsockopt() that had been officially retired from the API, but the kernel code retained to provide ABI compatibility during a transition period. That transition occurred more than a decade ago. Binary programs from that era no longer run for many other reasons, and so we can delete support. It&#39;s only a small improvement, but it gradually reduces the amount of code that needs to be reviewed when making larger more important changes”</li>
<li>Ifconfig txpower got similar treatment, as no modern WiFi driver supports it</li>
<li>Support for Ethernet Trailers, <a href="https://tools.ietf.org/html/rfc893" rel="nofollow">RFC 893</a>, enabled zero copy networking on a VAX with 512 byte hardware pages, the feature was removed even before OpenBSD was founded, but the ifconfig option was still in place</li>
<li>Alexandr Nedvedicky (sashan@) worked on <a href="http://undeadly.org/cgi?action=article&sid=20151207143819" rel="nofollow">MP-Safe PF</a> </li>
<li>“I&#39;d like to thank Reyk for hackroom and showing us a Christmas market. It was also my pleasure to meet Mr. Henning in person. Speaking of Henning, let&#39;s switch to PF hacking.”</li>
<li>“mpi@ came with patch (sent to priv. list only currently), which adds a new lock for PF. It&#39;s called PF big lock. The big PF lock essentially establishes a safe playground for PF hackers. The lock currently covers all pf_test() function. The pf_test() function parts will be gradually unlocked as the work will progress.</li>
<li>To make PF big lock safe few more details must be sorted out. The first of them is to avoid recursive calls to pf_test(). The pf_test() could get entered recursively, when packet hits block rule with return-* action. This is no longer the case as ip*_send() functions got introduced (committed change has been discussed privately). Packets sent on behalf of kernel are dispatched using softnet task queue now. We still have to sort out pf_route*() functions. The other thing we need to sort out with respect to PF big lock is reference counting for statekey, which gets attached to mbuf. Patch has been sent to hackers, waiting for OK too. The plan is to commit reference counting sometimes next year after CVS will be unlocked. There is one more patch at tech@ waiting for OK. It brings OpenBSD and Solaris PF closer to each other by one tiny little step.”
***</li>
</ul>

<h3><a href="http://queue.acm.org/detail.cfm?id=2852078" rel="nofollow">ACM Queue: Challenges of Memory Management on Modern NUMA System</a></h3>

<ul>
<li>“Modern server-class systems are typically built as several multicore chips put together in a single system. Each chip has a local DRAM (dynamic random-access memory) module; together they are referred to as a node. Nodes are connected via a high-speed interconnect, and the system is fully coherent. This means that, transparently to the programmer, a core can issue requests to its node&#39;s local memory as well as to the memories of other nodes. The key distinction is that remote requests will take longer, because they are subject to longer wire delays and may have to jump several hops as they traverse the interconnect. The latency of memory-access times is hence non-uniform, because it depends on where the request originates and where it is destined to go. Such systems are referred to as NUMA (non-uniform memory access).”</li>
<li>So, depending what core a program is running on, it will have different throughput and latency to specific banks of memory. Therefore, it is usually optimal to try to allocate memory from the bank of ram connected to the CPU that the program is running on, and to keep that program running on that same CPU, rather than moving it around</li>
<li>There are a number of different NUMA strategies, including:</li>
<li><strong>Fixed</strong>, memory is always allocated from a specific bank of memory</li>
<li><strong>First Touch</strong>, which means that memory is allocated from the bank connected to the CPU that the application is running on when it requests the memory, which can increase performance if the application remains on that same CPU, and the load is balanced optimally</li>
<li><strong>Round Robin</strong> or <strong>Interleave</strong>, where memory is allocated evenly, each allocation coming from the next bank of memory so that all banks are used. This method can provide more uniform performance, because it ensures that all memory accesses have the same change to be local vs remote. If even performance is required, this method can be better than something more focused on locality, but that might fail and result in remote access</li>
<li><strong>AutoNUMA</strong>, A kernel task routinely iterates through the allocated memory of each process and tallies the number of memory pages on each node for that process. It also clears the present bit on the pages, which will force the CPU to stop and enter the page-fault handler when the page is next accessed. In the page-fault handler it records which node and thread is trying to access the page before setting the present bit and allowing execution to continue. Pages that are accessed from remote nodes are put into a queue to be migrated to that node. After a page has already been migrated once, though, future migrations require two recorded accesses from a remote node, which is designed to prevent excessive migrations (known as page bouncing).</li>
<li>The paper also introduces a new strategy:</li>
<li><strong>Carrefour</strong> is a memory-placement algorithm for NUMA systems that focuses on traffic management: placing memory so as to minimize congestion on interconnect links or memory controllers. Trying to strike a balance between locality, and ensuring that the interconnect between a specific pair of CPUs does not become congested, which can make remote accesses even slower</li>
<li>Carrefour uses three primary techniques:</li>
<li><strong>Memory collocation</strong>, Moving memory to a different node so that accesses will likely be local.</li>
<li><strong>Replication</strong>, Copying memory to several nodes so that threads from each node can access it locally (useful for read-only and read-mostly data).</li>
<li><strong>Interleaving</strong>, Moving memory such that it is distributed evenly among all nodes.</li>
<li>FreeBSD is slowly gaining NUMA capabilities, and currently supports: fixed, round-robin, first-touch. Additionally, it also supports fixed-rr, and first-touch-rr, where if the memory allocation fails, because the fixed domain or first-touch domain is full, it falls back to round-robin.</li>
<li>For more information, see numa(4) and numa_setaffinity(2) on 11-CURRENT
***</li>
</ul>

<h3><a href="http://fossforce.com/2015/12/linux-no-pc-bsd/" rel="nofollow">Is that Linux? No it is PC-BSD</a></h3>

<ul>
<li>Larry Cafiero continues to make some news about his switch to PC-BSD from Linux. This time in an blog post titled “Is that Linux? No, its PC-BSD” he describes an experience out and about where he was asked what is running on his laptop, and was unable for the first time in 9 years to answer, it’s Linux. </li>
<li>The blog then goes on to mention his experience up to now running PC-BSD, how the learning curve was fairly easy coming from a Linux background. </li>
<li>He mentions that he has noticed an uptick in performance on the system, no specific benchmarks but this “Linux was fast enough on this machine. But in street racing parlance, with PC-BSD I’m burning rubber in all four gears.”</li>
<li>The only major nits he mentions is having trouble getting a font to switch in FireFox, and not knowing how to enable GRUB quiet mode. (I’ll have to add a knob back for that)
***</li>
</ul>

<h3><a href="https://gist.github.com/jcs/5573685" rel="nofollow">Dual booting OS X and OpenBSD with full disk encryption</a></h3>

<ul>
<li>New GPT and UEFI support allow OpenBSD to co-exist with Mac OS X without the need for Boot Camp Assistant or Hybrid MBRs</li>
<li>This tutorial walks the read through the steps of installing OpenBSD side-by-side with Mac OS X</li>
<li>First the HFS+ partition is shrunk to make room for a new OpenBSD partition</li>
<li>Then the OpenBSD installer is run, and the available free space is setup as an encrypted softraid </li>
<li>The OpenBSD installer will add itself to the EFI partition</li>
<li>Rename the boot loader installed by OpenBSD and replace it with rEFInd, so you will get a boot menu allowing you to select between OpenBSD and OS X
***</li>
</ul>

<h2>Interview - Paul Goyette - <a href="mailto:pgoyette@netbsd.org" rel="nofollow">pgoyette@netbsd.org</a></h2>

<ul>
<li>NetBSD Testing and Modularity
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="http://www.virtual-strategy.com/2015/12/08/ixsystems-wins-press-and-industry-analyst-accolades-best-biz-awards-2015" rel="nofollow">iXsystems Wins Press and Industry Analyst Accolades in Best in Biz Awards 2015</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://www.geeklan.co.uk/?p=2019" rel="nofollow">HOWTO: L2TP/IPSec with OpenBSD</a></h3>

<ul>
<li>*BSD contributor Sevan Janiyan provides an update on setting up a road-warrior VPN</li>
<li>This first article walks through setting up the OpenBSD server side, and followup articles will cover configuring various client systems to connect to it</li>
<li>The previous tutorial on this configuration is from 2012, and things have improved greatly since then, and is much easier to set up now</li>
<li>The tutorial includes PF rules, npppd configuration, and how to enable isakmpd and ipsec</li>
<li>L2TP/IPSec is chosen because most operating systems, including Windows, OS X, iOS, and Android, include a native L2TP client, rather than requiring some additional software to be installed
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release44/" rel="nofollow">DragonFly 4.4 Released</a></h3>

<ul>
<li>DragonFly BSD has made its 4.4 release official this week!</li>
<li>A lot of big changes, but some of the highlights

<ul>
<li>Radeon / i915 DRM support for up to Linux Kernel 3.18</li>
<li>Proper collation support for named locales, shared back to FreeBSD 11-CURRENT</li>
<li>Regex Support using TRE “As a consequence of the locale upgrades, the original regex library had to be forced into POSIX (single-byte) mode always. The support for multi-byte characters just wasn&#39;t there. ” …. “TRE is faster, more capable, and supports multibyte characters, so it&#39;s a nice addition to this release.”</li>
<li>Other noteworthy, iwm(4) driver, CPU power-saving improvements, import ipfw from FreeBSD (named ipfw3)</li>
</ul></li>
<li>An interesting tidbit is <a href="http://bsd.slashdot.org/story/15/12/04/2351241/dragonflybsd-44-switches-to-the-gold-linker-by-default" rel="nofollow">switching to the Gold linker</a> 
***</li>
</ul>

<h3><a href="http://linoxide.com/linux-how-to/install-ajenti-nginx-ssl-freebsd-10-2/" rel="nofollow">Guide to install Ajenti on Nginx with SSL on FreeBSD 10.2</a></h3>

<ul>
<li>Looking for a webmin-like interface to control your FreeBSD box? Enter Ajenti, and today we have a walkthrough posted on how to get it setup on a FreeBSD 10.2 system.</li>
<li>The walkthrough is mostly straightforward, you’ll need a FreeBSD box with root, and will need to install several packages / ports initially. </li>
<li>Because there is no native package (yet), it guides you through using python’s PIP installer to fetch and get Ajenti running. </li>
<li>The author links to some pre-built rc.d scripts and other helpful config files on GitHub, which will further assist in the process of making it run on FreeBSD.</li>
<li>Ajenti by itself may not be the best to serve publically, so it also provides instructions on how to protect the connection by serving it through nginx / SSL, a must-have if you plan on using this over unsecure networks. 
***</li>
</ul>

<h3><a href="http://www.bsdcan.org/2016/papers.php" rel="nofollow">BSDCan 2016 CFP is up!</a></h3>

<ul>
<li>BSDCan is the biggest North American BSD conference, and my personal favourite</li>
<li>The call for papers is now out, and I would like to see more first-time submitters this year</li>
<li>If you do anything interesting with or on a BSD, please write a proposal</li>
<li>Are the machines you run BSD on bigger or smaller than what most people have? Tell us about it</li>
<li>Are you running a big farm that does something interesting?</li>
<li>Is your university research using BSD?</li>
<li>Do you have an idea for a great new subsystem or utility?</li>
<li>Have you suffered through some horrible ordeal? Make sure the rest of us know the best way out when it happens to us.</li>
<li>Did you build a radar that runs NetBSD? A telescope controlled by FreeBSD?</li>
<li>Have you run an ISP at the north pole using Jails?</li>
<li>Do you run a usergroup and have tips to share?</li>
<li>Have you combined the features and tools of a BSD in a new and interesting way?</li>
<li>Don’t have a talk to give? Teach a tutorial!</li>
<li>The conference will arrange your air travel and hotel, and you’ll get to spend a few great days with the best community on earth</li>
<li><a href="http://blather.michaelwlucas.com/archives/2325" rel="nofollow">Michael W. Lucas’s post about the 2015 proposals and rejections </a>
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><a href="http://www.freshports.org/www/obhttpd/" rel="nofollow">OpenBSD&#39;s lightweight web server now in FreeBSD&#39;s ports tree</a> </li>
<li><a href="https://www.youtube.com/watch?v=FI_bZhV7wpI" rel="nofollow">Stephen Bourne&#39;s NYCBUG talk is online</a></li>
<li><a href="http://freebsdwiki.net/index.php/Main_Page" rel="nofollow">Looking for owner to FreeBSDWiki</a> </li>
<li><a href="http://frozen-geek.net/openbsd-email-server-1/" rel="nofollow">HOWTO: OpenBSD Mail Server </a> </li>
<li><a href="http://www.daemonology.net/blog/2015-12-06-magic-getopt.html" rel="nofollow">A new magic getopt library</a></li>
<li><a href="http://uggedal.com/journal/pxe-boot-openbsd-from-openwrt/" rel="nofollow">PXE boot OpenBSD from OpenWRT</a> </li>
<li><a href="http://permalink.gmane.org/gmane.os.openbsd.misc/227054" rel="nofollow">Supporting the OpenBSD project</a></li>
</ul>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20pbRLRRz" rel="nofollow"> Zachary - FreeBSD Jails</a> </li>
<li><a href="http://slexy.org/view/s2jGy34fy2" rel="nofollow"> Robert - Iocage help!</a> </li>
<li><a href="http://slexy.org/view/s20Ht8JfpL" rel="nofollow"> Kjell - Server Management</a> </li>
<li><a href="http://slexy.org/view/s2GYtvd7hU" rel="nofollow"> Brian - NAS Setup</a> </li>
<li><a href="http://slexy.org/view/s21EVs6aUg" rel="nofollow"> Mike - Radius Followup</a> </li>
<li><a href="http://slexy.org/view/s205zZiJCv" rel="nofollow"> Laszlo - Best Stocking Ever</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>118: BSD is go for Launch</title>
  <link>https://www.bsdnow.tv/118</link>
  <guid isPermaLink="false">f6f6236e-2e69-406f-879c-67f05cf5e490</guid>
  <pubDate>Wed, 02 Dec 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f6f6236e-2e69-406f-879c-67f05cf5e490.mp3" length="66828532" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on BSDNow - We know init systems have been all the rage</itunes:subtitle>
  <itunes:duration>1:32:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on BSDNow - We know init systems have been all the rage&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151123113224&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;Interview with Renato Westphal&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An interview with Brazilian OpenBSD developer Renato Westphal&lt;/li&gt;
&lt;li&gt;He describes how he first got into OpenBSD, working on a University-Industry partnership program and looking to deploy LDP (Label Distribution Protocol) for MPLS.&lt;/li&gt;
&lt;li&gt;He ported OpenBSDs ldpd(8) to Linux, but then contributed his bug fixes and improvements back to OpenBSD&lt;/li&gt;
&lt;li&gt;When asked if he was motivated to replace closed-source router implementations with OpenBSD: “Well, I don't administer any network, I work full time as a programmer. I have some friends however that succeeded replacing closed vendor solutions with OpenBSD boxes and that for sure motivates me to keep doing what I'm doing. My biggest motivation, however, is the challenge of resolving complex problems writing trivially simple code that is both secure and efficient.”&lt;/li&gt;
&lt;li&gt;They also go on to discuss some of the interesting features of EIGRP, and developing eigrpd(8)&lt;/li&gt;
&lt;li&gt;What do you think is missing from routing in OpenBSD: “Implementing new features and protocols while they are in their draft stage in IETF. I'd like to see OpenBSD as the reference platform for the development of new routing and networking technologies in general”
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://savagedlight.me/2015/11/24/lets-encrypt-on-a-freebsd-nginx-reverse-proxy/" target="_blank" rel="nofollow noopener"&gt;Let’s Encrypt on a FreeBSD NGINX reverse proxy&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a neat guide/story today on how to setup the “Let’s Encrypt” certificates on a FreeBSD / nginx reverse proxy&lt;/li&gt;
&lt;li&gt;Backstory: For those who don’t know, “Let’s Encrypt” (&lt;a href="https://letsencrypt.org" target="_blank" rel="nofollow noopener"&gt;https://letsencrypt.org&lt;/a&gt;) is a new Certificate Authority, which will allow you to create free and automated certificates.&lt;/li&gt;
&lt;li&gt;They have been in closed beta for several months now, and will be opening to a public beta Dec 3rd (tomorrow)&lt;/li&gt;
&lt;li&gt;This guide is particularly timely, since by the time most of you are watching this episode, the public beta will be up and running.&lt;/li&gt;
&lt;li&gt;Most of the instructions are fairly straight-forward. She starts by installing the lets-encrypt package from ports/pkg and modifying her nginx with a ‘catch-all’ vhost that re-directs traffic to the https versions of a site.&lt;/li&gt;
&lt;li&gt;With that done, the certificate creation is just a few commands to get started, in which she shows creating a cert for multiple domains&lt;/li&gt;
&lt;li&gt;As a bonus! She includes a nice renewal script which can be run from cron. It will monitor the certs daily, and renew it when it’s 14 days from expiring, or throw an error for somebody to look at.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=144822644214614&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Mike Larkins OpenBSD vmm subsystem now in tree&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An openBSD native hypervisor has taken another step closer to reality, with Mike Larkin pushing the initial bits of “vmm” into the base kernel/world&lt;/li&gt;
&lt;li&gt;He mentions in the commit message that it still needs a lot of work, and as such is disabled by default. &lt;/li&gt;
&lt;li&gt;However for the adventurous among you, it can be turned on and tested&lt;/li&gt;
&lt;li&gt;Right now there is no BIOS, and as such it can only be used to boot other OpenBSD instances, although he mentions other BSD’s could be supported fairly quickly (He did a 1 hour port to bootstrap NetBSD)&lt;/li&gt;
&lt;li&gt;No big documentation expected for this release, since there is so much ongoing churn. Take a look at the man page for details on getting started. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://zer0.org/daemons/yahoobsd.html" target="_blank" rel="nofollow noopener"&gt;The story of how Yahoo switched to FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Yahoo originally started running on SunOS, but quickly found it not able to cope with the high frequency of HTTP requests&lt;/li&gt;
&lt;li&gt;“Having spend many frustrating hours trying to install other PC OS's, I was a bit skeptical. I had no intention of spending three days trying to install yet another one. To my surprise I went to the FreeBSD Web site, downloaded the floppy boot image, booted a PC with the created floppy, answered a few install questions, and a few minutes later FreeBSD was installing over the Net. The real surprise was when I came back later to a fully configured system that actually worked.”&lt;/li&gt;
&lt;li&gt;“If anything had gone wrong with that install it would likely been the end of that trial. Luckily for us that it was the easiest and most painless OS installs I had ever experienced.”&lt;/li&gt;
&lt;li&gt;Just that easily, Yahoo might never have ended up on FreeBSD&lt;/li&gt;
&lt;li&gt;“A couple of days later we added a FreeBSD box to our cluster of Web servers. Not only did it out-perform the rest of our machines, but it was more stable.”&lt;/li&gt;
&lt;li&gt;From my understanding of stories told over dinner, Yahoo had a few very important perl scripts, and they tended to crash on Linux, but kept running without issue on FreeBSD&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://news.ycombinator.com/item?id=10558288" target="_blank" rel="nofollow noopener"&gt;Related hackernews thread&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/whats-new/lisa-2015/" target="_blank" rel="nofollow noopener"&gt;iXsystem's recap of LISA 2015&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Mark Heily - &lt;a href="mailto:mark@heily.com" target="_blank" rel="nofollow noopener"&gt;mark@heily.com&lt;/a&gt; / &lt;a href="https://twitter.com/MarkHeily" target="_blank" rel="nofollow noopener"&gt;@MarkHeily&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://github.com/mheily/relaunchd" target="_blank" rel="nofollow noopener"&gt;relaunchd&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/inline-intrusion-prevention/" target="_blank" rel="nofollow noopener"&gt;Inline Intrusion Prevision System is an upcoming OPNSense Feature&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The next OPNSense release, 16.1 is around the corner and today we have a sneak peek at their new Inline Intrusion Prevention system&lt;/li&gt;
&lt;li&gt;Suricata working with Netmap 2.1 enabled version, which allows Deep Packet Inspection of traffic. Such as looking at each packet individually and only blocking specific ones. They use the example of blocking Warcraft (oh noes!)&lt;/li&gt;
&lt;li&gt;Enabling this feature is just a simple mouse-click away, and various default rules are included as part of the Emerging Threats Community rules. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458763.html" target="_blank" rel="nofollow noopener"&gt;Matthew Dillion working on Hardlinks in Hammer2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have an interesting commit from Matthew Dillon for Hammer2, specifically targeted at hard-links&lt;/li&gt;
&lt;li&gt;The backstory he gives us: “The H2 design has had a long-standing problem of losing track of hardlinks when intermediate directories are renamed, breaking the  common-parent-directory design for the inode target.”&lt;/li&gt;
&lt;li&gt;The implemented fix was one which instead places the hardlink target in the first common parent directory, which is marked with “xlink” via chflag&lt;/li&gt;
&lt;li&gt;If no parent directory is marked “xlink”, it will fall-through instead to the root of the mount&lt;/li&gt;
&lt;li&gt;They also modified their installworld to set “/&lt;em&gt;” /usr/&lt;/em&gt;,/var/&lt;em&gt;,/home/&lt;/em&gt; as “xlink” flagged&lt;/li&gt;
&lt;li&gt;This prevents moving hard-links across these directories, but is similar to dealing with multiple partitions / datasets already.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2015-November/016403.html" target="_blank" rel="nofollow noopener"&gt;Japan's NetBSD User Group showed off some NetBSD machines at the 2015 Tokushima Open Source Conference&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It’s been a little while since we’ve shown off a bunch of odd devices running NetBSD, but we have an update from the 2015 Tokushima Open Source Conference.&lt;/li&gt;
&lt;li&gt;This time around, we have pictures of the booth, as well as a variety of oddities such as:&lt;/li&gt;
&lt;li&gt;ODroid-C1 / Sharp X68030&lt;/li&gt;
&lt;li&gt;Sharp NetWalker&lt;/li&gt;
&lt;li&gt;Sharp WZero3 (Cell phone)&lt;/li&gt;
&lt;li&gt;Give them a look, this time around they have nice cards pictured which details the hardware being used (in english none the less!)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.tintagel.pl/2015/11/22/one-of-the-three-openbsd-users.html" target="_blank" rel="nofollow noopener"&gt;One of the three OpenBSD users Blog Post by Adam Wolk&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An OpenBSD user comments on a recent interaction with the syncthing project (a dropbox like alternative)&lt;/li&gt;
&lt;li&gt;The application has an auto-update feature (which doesn’t mix well with package systems in the first place), but it doesn’t work on OpenBSD because there is no /proc/curproc/file to determine the filename of the executable. This is a trivially easy task, but when the bug was reported, syncthings response was “Maybe one of the &lt;a href="https://data.syncthing.net/#metrics" target="_blank" rel="nofollow noopener"&gt;three&lt;/a&gt; OpenBSD users feel strongly enough about this to propose a patch. :D”&lt;/li&gt;
&lt;li&gt;Part of the issue is that many users (especially the type that would run OpenBSD) opt out of reporting metrics, so OpenBSD is under-represented in the metrics the project developers are basing their decisions on&lt;/li&gt;
&lt;li&gt;Maybe someone can post a patch to solve the problem. While FreeBSD can provide a linux procfs, it would be better to use a more portable way to get the location of the process binary
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;BeastieBits&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458818.html" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD 4.4 RC branch created&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://oshogbo.vexillium.org/blog/39/" target="_blank" rel="nofollow noopener"&gt;HOWTO: NFS booting bhyve&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/kernel/2015-November/175040.html" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD is looking for a 4.4 RC image by the end of November&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=290910" target="_blank" rel="nofollow noopener"&gt;Support for Atheros QCA953x "Honeybee" has been added to FreeBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458692.html" target="_blank" rel="nofollow noopener"&gt;Top updated in DragonflyBSD to allow the 'c' command&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.npo.nl/nos-journaal/30-11-2015/POW_00941854" target="_blank" rel="nofollow noopener"&gt;FreeBSD textbook makes appearance on the 6pm news in the Netherlands 12:49&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blather.michaelwlucas.com/archives/2495" target="_blank" rel="nofollow noopener"&gt;SemiBug gives a recap of its Inaugural meeting and its plans for future meetups&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s204HRCPdR" target="_blank" rel="nofollow noopener"&gt; Adam - GELI on USB&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21q2WWisr" target="_blank" rel="nofollow noopener"&gt; Noble - Radius on FreeBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21L59OGyF" target="_blank" rel="nofollow noopener"&gt; Jim - Backporting Wifi Code&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20nWwzTGS" target="_blank" rel="nofollow noopener"&gt; Mohammad - Zombies!&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s201Kpd4GX" target="_blank" rel="nofollow noopener"&gt; Miguel - ScaleEngine BTS&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on BSDNow - We know init systems have been all the rage</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151123113224&mode=expanded" rel="nofollow">Interview with Renato Westphal</a></h3>

<ul>
<li>An interview with Brazilian OpenBSD developer Renato Westphal</li>
<li>He describes how he first got into OpenBSD, working on a University-Industry partnership program and looking to deploy LDP (Label Distribution Protocol) for MPLS.</li>
<li>He ported OpenBSDs ldpd(8) to Linux, but then contributed his bug fixes and improvements back to OpenBSD</li>
<li>When asked if he was motivated to replace closed-source router implementations with OpenBSD: “Well, I don&#39;t administer any network, I work full time as a programmer. I have some friends however that succeeded replacing closed vendor solutions with OpenBSD boxes and that for sure motivates me to keep doing what I&#39;m doing. My biggest motivation, however, is the challenge of resolving complex problems writing trivially simple code that is both secure and efficient.”</li>
<li>They also go on to discuss some of the interesting features of EIGRP, and developing eigrpd(8)</li>
<li>What do you think is missing from routing in OpenBSD: “Implementing new features and protocols while they are in their draft stage in IETF. I&#39;d like to see OpenBSD as the reference platform for the development of new routing and networking technologies in general”
***</li>
</ul>

<h3><a href="http://savagedlight.me/2015/11/24/lets-encrypt-on-a-freebsd-nginx-reverse-proxy/" rel="nofollow">Let’s Encrypt on a FreeBSD NGINX reverse proxy</a></h3>

<ul>
<li>We have a neat guide/story today on how to setup the “Let’s Encrypt” certificates on a FreeBSD / nginx reverse proxy</li>
<li>Backstory: For those who don’t know, “Let’s Encrypt” (<a href="https://letsencrypt.org" rel="nofollow">https://letsencrypt.org</a>) is a new Certificate Authority, which will allow you to create free and automated certificates.</li>
<li>They have been in closed beta for several months now, and will be opening to a public beta Dec 3rd (tomorrow)</li>
<li>This guide is particularly timely, since by the time most of you are watching this episode, the public beta will be up and running.</li>
<li>Most of the instructions are fairly straight-forward. She starts by installing the lets-encrypt package from ports/pkg and modifying her nginx with a ‘catch-all’ vhost that re-directs traffic to the https versions of a site.</li>
<li>With that done, the certificate creation is just a few commands to get started, in which she shows creating a cert for multiple domains</li>
<li>As a bonus! She includes a nice renewal script which can be run from cron. It will monitor the certs daily, and renew it when it’s 14 days from expiring, or throw an error for somebody to look at.
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-tech&m=144822644214614&w=2" rel="nofollow">Mike Larkins OpenBSD vmm subsystem now in tree</a></h3>

<ul>
<li>An openBSD native hypervisor has taken another step closer to reality, with Mike Larkin pushing the initial bits of “vmm” into the base kernel/world</li>
<li>He mentions in the commit message that it still needs a lot of work, and as such is disabled by default. </li>
<li>However for the adventurous among you, it can be turned on and tested</li>
<li>Right now there is no BIOS, and as such it can only be used to boot other OpenBSD instances, although he mentions other BSD’s could be supported fairly quickly (He did a 1 hour port to bootstrap NetBSD)</li>
<li>No big documentation expected for this release, since there is so much ongoing churn. Take a look at the man page for details on getting started. 
***</li>
</ul>

<h3><a href="http://zer0.org/daemons/yahoobsd.html" rel="nofollow">The story of how Yahoo switched to FreeBSD</a></h3>

<ul>
<li>Yahoo originally started running on SunOS, but quickly found it not able to cope with the high frequency of HTTP requests</li>
<li>“Having spend many frustrating hours trying to install other PC OS&#39;s, I was a bit skeptical. I had no intention of spending three days trying to install yet another one. To my surprise I went to the FreeBSD Web site, downloaded the floppy boot image, booted a PC with the created floppy, answered a few install questions, and a few minutes later FreeBSD was installing over the Net. The real surprise was when I came back later to a fully configured system that actually worked.”</li>
<li>“If anything had gone wrong with that install it would likely been the end of that trial. Luckily for us that it was the easiest and most painless OS installs I had ever experienced.”</li>
<li>Just that easily, Yahoo might never have ended up on FreeBSD</li>
<li>“A couple of days later we added a FreeBSD box to our cluster of Web servers. Not only did it out-perform the rest of our machines, but it was more stable.”</li>
<li>From my understanding of stories told over dinner, Yahoo had a few very important perl scripts, and they tended to crash on Linux, but kept running without issue on FreeBSD</li>
<li><a href="https://news.ycombinator.com/item?id=10558288" rel="nofollow">Related hackernews thread</a> 
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/lisa-2015/" rel="nofollow">iXsystem&#39;s recap of LISA 2015</a> 
***</li>
</ul>

<h2>Interview - Mark Heily - <a href="mailto:mark@heily.com" rel="nofollow">mark@heily.com</a> / <a href="https://twitter.com/MarkHeily" rel="nofollow">@MarkHeily</a></h2>

<ul>
<li><a href="https://github.com/mheily/relaunchd" rel="nofollow">relaunchd</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/inline-intrusion-prevention/" rel="nofollow">Inline Intrusion Prevision System is an upcoming OPNSense Feature</a></h3>

<ul>
<li>The next OPNSense release, 16.1 is around the corner and today we have a sneak peek at their new Inline Intrusion Prevention system</li>
<li>Suricata working with Netmap 2.1 enabled version, which allows Deep Packet Inspection of traffic. Such as looking at each packet individually and only blocking specific ones. They use the example of blocking Warcraft (oh noes!)</li>
<li>Enabling this feature is just a simple mouse-click away, and various default rules are included as part of the Emerging Threats Community rules. 
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458763.html" rel="nofollow">Matthew Dillion working on Hardlinks in Hammer2</a></h3>

<ul>
<li>We have an interesting commit from Matthew Dillon for Hammer2, specifically targeted at hard-links</li>
<li>The backstory he gives us: “The H2 design has had a long-standing problem of losing track of hardlinks when intermediate directories are renamed, breaking the  common-parent-directory design for the inode target.”</li>
<li>The implemented fix was one which instead places the hardlink target in the first common parent directory, which is marked with “xlink” via chflag</li>
<li>If no parent directory is marked “xlink”, it will fall-through instead to the root of the mount</li>
<li>They also modified their installworld to set “/<em>” /usr/</em>,/var/<em>,/home/</em> as “xlink” flagged</li>
<li>This prevents moving hard-links across these directories, but is similar to dealing with multiple partitions / datasets already.
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2015-November/016403.html" rel="nofollow">Japan&#39;s NetBSD User Group showed off some NetBSD machines at the 2015 Tokushima Open Source Conference</a></h3>

<ul>
<li>It’s been a little while since we’ve shown off a bunch of odd devices running NetBSD, but we have an update from the 2015 Tokushima Open Source Conference.</li>
<li>This time around, we have pictures of the booth, as well as a variety of oddities such as:</li>
<li>ODroid-C1 / Sharp X68030</li>
<li>Sharp NetWalker</li>
<li>Sharp WZero3 (Cell phone)</li>
<li>Give them a look, this time around they have nice cards pictured which details the hardware being used (in english none the less!)
***</li>
</ul>

<h3><a href="http://blog.tintagel.pl/2015/11/22/one-of-the-three-openbsd-users.html" rel="nofollow">One of the three OpenBSD users Blog Post by Adam Wolk</a></h3>

<ul>
<li>An OpenBSD user comments on a recent interaction with the syncthing project (a dropbox like alternative)</li>
<li>The application has an auto-update feature (which doesn’t mix well with package systems in the first place), but it doesn’t work on OpenBSD because there is no /proc/curproc/file to determine the filename of the executable. This is a trivially easy task, but when the bug was reported, syncthings response was “Maybe one of the <a href="https://data.syncthing.net/#metrics" rel="nofollow">three</a> OpenBSD users feel strongly enough about this to propose a patch. :D”</li>
<li>Part of the issue is that many users (especially the type that would run OpenBSD) opt out of reporting metrics, so OpenBSD is under-represented in the metrics the project developers are basing their decisions on</li>
<li>Maybe someone can post a patch to solve the problem. While FreeBSD can provide a linux procfs, it would be better to use a more portable way to get the location of the process binary
***</li>
</ul>

<h2>BeastieBits</h2>

<ul>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458818.html" rel="nofollow">DragonFly BSD 4.4 RC branch created</a> </li>
<li><a href="http://oshogbo.vexillium.org/blog/39/" rel="nofollow">HOWTO: NFS booting bhyve</a> </li>
<li><a href="http://lists.dragonflybsd.org/pipermail/kernel/2015-November/175040.html" rel="nofollow">DragonFly BSD is looking for a 4.4 RC image by the end of November</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=290910" rel="nofollow">Support for Atheros QCA953x &quot;Honeybee&quot; has been added to FreeBSD</a> </li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458692.html" rel="nofollow">Top updated in DragonflyBSD to allow the &#39;c&#39; command</a> </li>
<li><a href="http://www.npo.nl/nos-journaal/30-11-2015/POW_00941854" rel="nofollow">FreeBSD textbook makes appearance on the 6pm news in the Netherlands 12:49</a> </li>
<li><a href="http://blather.michaelwlucas.com/archives/2495" rel="nofollow">SemiBug gives a recap of its Inaugural meeting and its plans for future meetups</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s204HRCPdR" rel="nofollow"> Adam - GELI on USB</a> </li>
<li><a href="http://slexy.org/view/s21q2WWisr" rel="nofollow"> Noble - Radius on FreeBSD</a> </li>
<li><a href="http://slexy.org/view/s21L59OGyF" rel="nofollow"> Jim - Backporting Wifi Code</a> </li>
<li><a href="http://slexy.org/view/s20nWwzTGS" rel="nofollow"> Mohammad - Zombies!</a> </li>
<li><a href="http://slexy.org/view/s201Kpd4GX" rel="nofollow"> Miguel - ScaleEngine BTS</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on BSDNow - We know init systems have been all the rage</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151123113224&mode=expanded" rel="nofollow">Interview with Renato Westphal</a></h3>

<ul>
<li>An interview with Brazilian OpenBSD developer Renato Westphal</li>
<li>He describes how he first got into OpenBSD, working on a University-Industry partnership program and looking to deploy LDP (Label Distribution Protocol) for MPLS.</li>
<li>He ported OpenBSDs ldpd(8) to Linux, but then contributed his bug fixes and improvements back to OpenBSD</li>
<li>When asked if he was motivated to replace closed-source router implementations with OpenBSD: “Well, I don&#39;t administer any network, I work full time as a programmer. I have some friends however that succeeded replacing closed vendor solutions with OpenBSD boxes and that for sure motivates me to keep doing what I&#39;m doing. My biggest motivation, however, is the challenge of resolving complex problems writing trivially simple code that is both secure and efficient.”</li>
<li>They also go on to discuss some of the interesting features of EIGRP, and developing eigrpd(8)</li>
<li>What do you think is missing from routing in OpenBSD: “Implementing new features and protocols while they are in their draft stage in IETF. I&#39;d like to see OpenBSD as the reference platform for the development of new routing and networking technologies in general”
***</li>
</ul>

<h3><a href="http://savagedlight.me/2015/11/24/lets-encrypt-on-a-freebsd-nginx-reverse-proxy/" rel="nofollow">Let’s Encrypt on a FreeBSD NGINX reverse proxy</a></h3>

<ul>
<li>We have a neat guide/story today on how to setup the “Let’s Encrypt” certificates on a FreeBSD / nginx reverse proxy</li>
<li>Backstory: For those who don’t know, “Let’s Encrypt” (<a href="https://letsencrypt.org" rel="nofollow">https://letsencrypt.org</a>) is a new Certificate Authority, which will allow you to create free and automated certificates.</li>
<li>They have been in closed beta for several months now, and will be opening to a public beta Dec 3rd (tomorrow)</li>
<li>This guide is particularly timely, since by the time most of you are watching this episode, the public beta will be up and running.</li>
<li>Most of the instructions are fairly straight-forward. She starts by installing the lets-encrypt package from ports/pkg and modifying her nginx with a ‘catch-all’ vhost that re-directs traffic to the https versions of a site.</li>
<li>With that done, the certificate creation is just a few commands to get started, in which she shows creating a cert for multiple domains</li>
<li>As a bonus! She includes a nice renewal script which can be run from cron. It will monitor the certs daily, and renew it when it’s 14 days from expiring, or throw an error for somebody to look at.
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-tech&m=144822644214614&w=2" rel="nofollow">Mike Larkins OpenBSD vmm subsystem now in tree</a></h3>

<ul>
<li>An openBSD native hypervisor has taken another step closer to reality, with Mike Larkin pushing the initial bits of “vmm” into the base kernel/world</li>
<li>He mentions in the commit message that it still needs a lot of work, and as such is disabled by default. </li>
<li>However for the adventurous among you, it can be turned on and tested</li>
<li>Right now there is no BIOS, and as such it can only be used to boot other OpenBSD instances, although he mentions other BSD’s could be supported fairly quickly (He did a 1 hour port to bootstrap NetBSD)</li>
<li>No big documentation expected for this release, since there is so much ongoing churn. Take a look at the man page for details on getting started. 
***</li>
</ul>

<h3><a href="http://zer0.org/daemons/yahoobsd.html" rel="nofollow">The story of how Yahoo switched to FreeBSD</a></h3>

<ul>
<li>Yahoo originally started running on SunOS, but quickly found it not able to cope with the high frequency of HTTP requests</li>
<li>“Having spend many frustrating hours trying to install other PC OS&#39;s, I was a bit skeptical. I had no intention of spending three days trying to install yet another one. To my surprise I went to the FreeBSD Web site, downloaded the floppy boot image, booted a PC with the created floppy, answered a few install questions, and a few minutes later FreeBSD was installing over the Net. The real surprise was when I came back later to a fully configured system that actually worked.”</li>
<li>“If anything had gone wrong with that install it would likely been the end of that trial. Luckily for us that it was the easiest and most painless OS installs I had ever experienced.”</li>
<li>Just that easily, Yahoo might never have ended up on FreeBSD</li>
<li>“A couple of days later we added a FreeBSD box to our cluster of Web servers. Not only did it out-perform the rest of our machines, but it was more stable.”</li>
<li>From my understanding of stories told over dinner, Yahoo had a few very important perl scripts, and they tended to crash on Linux, but kept running without issue on FreeBSD</li>
<li><a href="https://news.ycombinator.com/item?id=10558288" rel="nofollow">Related hackernews thread</a> 
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/lisa-2015/" rel="nofollow">iXsystem&#39;s recap of LISA 2015</a> 
***</li>
</ul>

<h2>Interview - Mark Heily - <a href="mailto:mark@heily.com" rel="nofollow">mark@heily.com</a> / <a href="https://twitter.com/MarkHeily" rel="nofollow">@MarkHeily</a></h2>

<ul>
<li><a href="https://github.com/mheily/relaunchd" rel="nofollow">relaunchd</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/inline-intrusion-prevention/" rel="nofollow">Inline Intrusion Prevision System is an upcoming OPNSense Feature</a></h3>

<ul>
<li>The next OPNSense release, 16.1 is around the corner and today we have a sneak peek at their new Inline Intrusion Prevention system</li>
<li>Suricata working with Netmap 2.1 enabled version, which allows Deep Packet Inspection of traffic. Such as looking at each packet individually and only blocking specific ones. They use the example of blocking Warcraft (oh noes!)</li>
<li>Enabling this feature is just a simple mouse-click away, and various default rules are included as part of the Emerging Threats Community rules. 
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458763.html" rel="nofollow">Matthew Dillion working on Hardlinks in Hammer2</a></h3>

<ul>
<li>We have an interesting commit from Matthew Dillon for Hammer2, specifically targeted at hard-links</li>
<li>The backstory he gives us: “The H2 design has had a long-standing problem of losing track of hardlinks when intermediate directories are renamed, breaking the  common-parent-directory design for the inode target.”</li>
<li>The implemented fix was one which instead places the hardlink target in the first common parent directory, which is marked with “xlink” via chflag</li>
<li>If no parent directory is marked “xlink”, it will fall-through instead to the root of the mount</li>
<li>They also modified their installworld to set “/<em>” /usr/</em>,/var/<em>,/home/</em> as “xlink” flagged</li>
<li>This prevents moving hard-links across these directories, but is similar to dealing with multiple partitions / datasets already.
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2015-November/016403.html" rel="nofollow">Japan&#39;s NetBSD User Group showed off some NetBSD machines at the 2015 Tokushima Open Source Conference</a></h3>

<ul>
<li>It’s been a little while since we’ve shown off a bunch of odd devices running NetBSD, but we have an update from the 2015 Tokushima Open Source Conference.</li>
<li>This time around, we have pictures of the booth, as well as a variety of oddities such as:</li>
<li>ODroid-C1 / Sharp X68030</li>
<li>Sharp NetWalker</li>
<li>Sharp WZero3 (Cell phone)</li>
<li>Give them a look, this time around they have nice cards pictured which details the hardware being used (in english none the less!)
***</li>
</ul>

<h3><a href="http://blog.tintagel.pl/2015/11/22/one-of-the-three-openbsd-users.html" rel="nofollow">One of the three OpenBSD users Blog Post by Adam Wolk</a></h3>

<ul>
<li>An OpenBSD user comments on a recent interaction with the syncthing project (a dropbox like alternative)</li>
<li>The application has an auto-update feature (which doesn’t mix well with package systems in the first place), but it doesn’t work on OpenBSD because there is no /proc/curproc/file to determine the filename of the executable. This is a trivially easy task, but when the bug was reported, syncthings response was “Maybe one of the <a href="https://data.syncthing.net/#metrics" rel="nofollow">three</a> OpenBSD users feel strongly enough about this to propose a patch. :D”</li>
<li>Part of the issue is that many users (especially the type that would run OpenBSD) opt out of reporting metrics, so OpenBSD is under-represented in the metrics the project developers are basing their decisions on</li>
<li>Maybe someone can post a patch to solve the problem. While FreeBSD can provide a linux procfs, it would be better to use a more portable way to get the location of the process binary
***</li>
</ul>

<h2>BeastieBits</h2>

<ul>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458818.html" rel="nofollow">DragonFly BSD 4.4 RC branch created</a> </li>
<li><a href="http://oshogbo.vexillium.org/blog/39/" rel="nofollow">HOWTO: NFS booting bhyve</a> </li>
<li><a href="http://lists.dragonflybsd.org/pipermail/kernel/2015-November/175040.html" rel="nofollow">DragonFly BSD is looking for a 4.4 RC image by the end of November</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=290910" rel="nofollow">Support for Atheros QCA953x &quot;Honeybee&quot; has been added to FreeBSD</a> </li>
<li><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-November/458692.html" rel="nofollow">Top updated in DragonflyBSD to allow the &#39;c&#39; command</a> </li>
<li><a href="http://www.npo.nl/nos-journaal/30-11-2015/POW_00941854" rel="nofollow">FreeBSD textbook makes appearance on the 6pm news in the Netherlands 12:49</a> </li>
<li><a href="http://blather.michaelwlucas.com/archives/2495" rel="nofollow">SemiBug gives a recap of its Inaugural meeting and its plans for future meetups</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s204HRCPdR" rel="nofollow"> Adam - GELI on USB</a> </li>
<li><a href="http://slexy.org/view/s21q2WWisr" rel="nofollow"> Noble - Radius on FreeBSD</a> </li>
<li><a href="http://slexy.org/view/s21L59OGyF" rel="nofollow"> Jim - Backporting Wifi Code</a> </li>
<li><a href="http://slexy.org/view/s20nWwzTGS" rel="nofollow"> Mohammad - Zombies!</a> </li>
<li><a href="http://slexy.org/view/s201Kpd4GX" rel="nofollow"> Miguel - ScaleEngine BTS</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>117: The Cantrill Strikes Back: ...</title>
  <link>https://www.bsdnow.tv/117</link>
  <guid isPermaLink="false">729727f1-dbfe-4631-ab85-62cded2f6ef6</guid>
  <pubDate>Tue, 24 Nov 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/729727f1-dbfe-4631-ab85-62cded2f6ef6.mp3" length="96142900" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle></itunes:subtitle>
  <itunes:duration>2:13:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or 
iXsystems hardware, and you could win monthly prizes, and have your story featured 
in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/siju_george/" target="_blank" rel="nofollow noopener"&gt;Why did I choose the DragonFlyBSD Operating System by Siju George&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a new article this week by Siju George posted over at BSDMag, talking about his reasons for using DragonFlyBSD in production. &lt;/li&gt;
&lt;li&gt;He ran through periods of using both Free/OpenBSD, but different reasons led him away from each. Specifically problems doing port upgrades on FreeBSD, and the time required to do fsck / raid parity checks on OpenBSD. &lt;/li&gt;
&lt;li&gt;During his research, he had heard about the HAMMER file-system, but didn’t know of anybody running it in production. After some mailing list conversions, and pointers from Matthew Dillon, he took the plunge and switched. &lt;/li&gt;
&lt;li&gt;Now he has fallen in love with the operating system, some of the key strengths he notes at:&lt;/li&gt;
&lt;li&gt;Rolling-Release model, which can be upgraded every few weeks or whenever he has the time

&lt;ul&gt;
&lt;li&gt;No time-consuming fsck after a unclean shutdown&lt;/li&gt;
&lt;li&gt;No RAID parity checks while still having redundancy&lt;/li&gt;
&lt;li&gt;Able to add volumes to HAMMER on the fly&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;He also mentions looking forward to HAMMER2, and its potential for easy clustering support, along with eventual CARP implementation so he can run two systems on the same IP. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://fossforce.com/2015/11/devil-bsd-leaving-linux-behind/" target="_blank" rel="nofollow noopener"&gt;The Devil &amp;amp; BSD - Larry Cafiero&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A story that has been making the rounds on social media is by Larry Cafiero, on his reasons for deciding to switch from Linux over to the BSD side of things.&lt;/li&gt;
&lt;li&gt;While most of the reasons are over the conflicts surrounding behavior by Linux leaders towards those in the community, he does mention that he has converted his main workstation over to PC-BSD. &lt;/li&gt;
&lt;li&gt;According to Larry, “With a couple of hours of adding backup files and tweaking (augmented by a variety of “oh, look” moments which could easily make me the ADHD Foundation Poster Boy), it looks exactly like my personally modified Korora 22 Xfce which graced the machine earlier. “&lt;/li&gt;
&lt;li&gt;He also gave a great compliment to the quality of the docs / applications in PC-BSD: “In addition, you have to like a operating system which gives you a book — in this case, the PC-BSD Handbook — which should be the gold standard of documentation. It’s enviable, as in, “man, I wish I had written that.” Also programs like AppCafe provide a plethora of FOSS software, so there’s no shortage of programs. Side by side, there’s nothing on the Linux side of things that is lacking on the BSD side of things.”&lt;/li&gt;
&lt;li&gt;Regardless the initial reason for the switch, we are glad to have him and any other switchers join us on the BSD side of FOSS.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://teachbsd.org/" target="_blank" rel="nofollow noopener"&gt;New resource for BSD-schoolin’&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;“The &lt;a href="https://github.com/teachbsd/course" target="_blank" rel="nofollow noopener"&gt;initial repository&lt;/a&gt; contains all of the material for the practitioner and masters style courses as well as a PDF for the teaching guide.  All of the material is licensed under a BSD doc team license, also visible in the repo and on the github site.”&lt;/li&gt;
&lt;li&gt;“we expect all other work, including the extension of the practitioner course to 5 days, and the adaptation of the graduate course to undergraduates will be in the github repo”&lt;/li&gt;
&lt;li&gt;“Our goal now is to recruit a small number of universities to partner with us to teach this material.  We will keep you posted on our progress.”&lt;/li&gt;
&lt;li&gt;We are working on getting an interview lined up to talk more about this project&lt;/li&gt;
&lt;li&gt;If I somehow find the time, I am try to contribute towards a sysadmin course similar to what I used to teach at an Arts&amp;amp;Tech College here in Canada
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lippard.blogspot.co.uk/2015/11/a-few-thoughts-on-openbsd-58.html" target="_blank" rel="nofollow noopener"&gt;A Few thoughts on OpenBSD 5.8&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A user details their thoughts, reactions, and concerns after upgrading to OpenBSD 5.8&lt;/li&gt;
&lt;li&gt;Among the changes: &lt;/li&gt;
&lt;li&gt;sudo was removed and replaced as doas. The user decided to make the switch, but ran into a bug with line continuation (\ to escape newline to continue a long line)&lt;/li&gt;
&lt;li&gt;The removal of TCP Wrappers support from ssh - this caused a number of rules in hosts.allow to no longer be respected. &lt;/li&gt;
&lt;li&gt;The FreeBSD port of openssh-portable has a patch to readd TCP wrappers because many people find it useful, including myself, when the ssh is in a jail and cannot run a firewall&lt;/li&gt;
&lt;li&gt;The removal of the pf_rules= rc.conf variable. “I used to just put the default pf.conf rules file in place with each release and upgrade, and keep my changes in a pf.conf.local file that was specified in the pf_rules variable. The effect was that from the period after the upgrade until I noticed the change, my systems were using the default rules and thus more exposed than they were supposed to be”&lt;/li&gt;
&lt;li&gt;This is what is often called a “POLA Violation”, Policy of Least Astonishment. When deciding what the system should do after some change or new feature is introduced, it should be the thing that will be the least “surprising” to the user. Having your firewall rules suddenly not apply, is surprising.&lt;/li&gt;
&lt;li&gt;“A minor annoying change that was made in 5.8 was putting the file /var/unbound/db/root.key into /etc/changelist, so that the file gets checked daily by the security script. The issue with this is that if you are actually using unbound with DNSSEC, this file changes daily, though only in the comments”&lt;/li&gt;
&lt;li&gt;It is very helpful to see a list of feedback like this after a release, so that the next release can be better&lt;/li&gt;
&lt;li&gt;I would be interested in seeing similar feedback for the other BSDs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Bryan Cantrill - &lt;a href="https://twitter.com/bcantrill" target="_blank" rel="nofollow noopener"&gt;@bcantrill&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Linux Interface Rants&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2015-11-21-FreeBSD-AMI-builder-AMI.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD AMI building AMI - Colin’s Corner&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Colin Percival (Of TarSnap Fame) has brought us a new article this week on how to create your own custom EC2 AMI builds.&lt;/li&gt;
&lt;li&gt;This new tool and instructions allows the creation of AMI files, without needing to go through the hassle of doing a fresh FreeBSD release build each time.&lt;/li&gt;
&lt;li&gt;Essentially it works similar to Colin’s previous “de-penguinator” utility, by running a FreeBSD in a memory instance, allowing the disk to be unmounted and prepped for becoming an AMI.&lt;/li&gt;
&lt;li&gt;The hope  is that this new work allows easier creation of a new variety of “customized” FreeBSD instances, for end users to download and deploy at will. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://ripe71.ripe.net/archives/video/1200/" target="_blank" rel="nofollow noopener"&gt;Peter Hessler on OpenBSD / OpenBGPd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Last week a new video landed of Peter Hessler giving us a status update on OpenBSD tech, and OpenBGPd specifically&lt;/li&gt;
&lt;li&gt;Of interest, he notes that LibreSSL is being used in iOS / OSX, and of course PF is used all over, Apple, BSD, Solaris and even a Windows port!&lt;/li&gt;
&lt;li&gt;OpenNTPD gets a mention as well, still ZERO CVEs for the lifetime of the project&lt;/li&gt;
&lt;li&gt;On the OpenBGPd side, it is considered production ready, so no reason to hold back deployment&lt;/li&gt;
&lt;li&gt;Very “feature-complete”, able to handle Edge Router, Route server, Multi-RIB. Slew of optional features like route reflector, looking glass, mrt dumps, mpls / mpls vpn. &lt;/li&gt;
&lt;li&gt;Bugs fixed, crashers, memory constraints and performance has been improved&lt;/li&gt;
&lt;li&gt;Filtering Performance, in example provided, importing 561K rules / 60K prefixes, went from 35 minutes down to 30 seconds. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/freebsd/freebsd-wifi-build/wiki/Onion-Omega" target="_blank" rel="nofollow noopener"&gt;Onion Omega Updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;I have a newer kernel config that will be committed soon that hooks up the system LED, and the three LEDs on the expansion dock via /dev/led&lt;/li&gt;
&lt;li&gt;I also have the I2C interface working to talk to the Relay and Servo expansions&lt;/li&gt;
&lt;li&gt;I have not determined the exact protocol for the Servo expansions, but the relay expansion is fairly simple to operate&lt;/li&gt;
&lt;li&gt;Instructions have been added to the wiki&lt;/li&gt;
&lt;li&gt;I have managed to use the GPIO to toggle external LEDs and to read the value from a switch&lt;/li&gt;
&lt;li&gt;I have also used the Servo PWM controller to dim an LED and control the speed of a PWM computer case fan&lt;/li&gt;
&lt;li&gt;My plan is to operate a 32x32 multi colour LED matrix from the device for an interactive christmas display
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.cyberciti.biz/datacenter/book-review-freebsd-mastery-zfs/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Mastery: ZFS Book review&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Book can be &lt;a href="http://smile.amazon.com/FreeBSD-Mastery-ZFS-7/dp/0692452354/" target="_blank" rel="nofollow noopener"&gt;purchased here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;or &lt;a href="http://www.zfsbook.com/" target="_blank" rel="nofollow noopener"&gt;from the list of vendors including directly from the author here&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.computerhistory.org/artifactdonation/" target="_blank" rel="nofollow noopener"&gt;Computer History Museum is looking for Bell Labs UNIX&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://youtu.be/rA_5Cz99z28" target="_blank" rel="nofollow noopener"&gt;ACM Queue Portrait: Robert Watson &lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.freebsdnews.com/2015/11/12/bsd-videos/" target="_blank" rel="nofollow noopener"&gt;Video Collection about BSD History, put together by FreeBSDNews&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.minix3.org/conference/2016/" target="_blank" rel="nofollow noopener"&gt;Minix announces its 2016 conference&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://bsdtalk.blogspot.com/2015/10/bsdtalk258-chris-henschen-from-fp.html" target="_blank" rel="nofollow noopener"&gt;Chris Henschen from fP Technologies' talk about BSD is now online&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151123161651&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;Mike Larkin and Theo de Raadt's talks from Hackfest this year in Quebec are online&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://kernelnomicon.org/?p=534" target="_blank" rel="nofollow noopener"&gt;FreeBSD on a BeagleBoneBlack with a Touchscreen Display&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.cinlug.org/meetings/2015/December" target="_blank" rel="nofollow noopener"&gt;Dan Langille will be talking at CINLUG&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Gm06eC0Y" target="_blank" rel="nofollow noopener"&gt;John - Rpi2 and BSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Kf2FG84H" target="_blank" rel="nofollow noopener"&gt;Roger - Win10 + FreeBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21bOG5UhS" target="_blank" rel="nofollow noopener"&gt; Anonymous - Sharing Socket&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20bKjCNXW" target="_blank" rel="nofollow noopener"&gt; Brad - Scrub Repaired&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2qb07BC2G" target="_blank" rel="nofollow noopener"&gt; Kelly - Automated Provisioning&lt;/a&gt; 
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd,</itunes:keywords>
  <content:encoded>
    <![CDATA[<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or 
iXsystems hardware, and you could win monthly prizes, and have your story featured 
in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://bsdmag.org/siju_george/" rel="nofollow">Why did I choose the DragonFlyBSD Operating System by Siju George</a></h3>

<ul>
<li>We have a new article this week by Siju George posted over at BSDMag, talking about his reasons for using DragonFlyBSD in production. </li>
<li>He ran through periods of using both Free/OpenBSD, but different reasons led him away from each. Specifically problems doing port upgrades on FreeBSD, and the time required to do fsck / raid parity checks on OpenBSD. </li>
<li>During his research, he had heard about the HAMMER file-system, but didn’t know of anybody running it in production. After some mailing list conversions, and pointers from Matthew Dillon, he took the plunge and switched. </li>
<li>Now he has fallen in love with the operating system, some of the key strengths he notes at:</li>
<li>Rolling-Release model, which can be upgraded every few weeks or whenever he has the time

<ul>
<li>No time-consuming fsck after a unclean shutdown</li>
<li>No RAID parity checks while still having redundancy</li>
<li>Able to add volumes to HAMMER on the fly</li>
</ul></li>
<li>He also mentions looking forward to HAMMER2, and its potential for easy clustering support, along with eventual CARP implementation so he can run two systems on the same IP. 
***</li>
</ul>

<h3><a href="http://fossforce.com/2015/11/devil-bsd-leaving-linux-behind/" rel="nofollow">The Devil &amp; BSD - Larry Cafiero</a></h3>

<ul>
<li>A story that has been making the rounds on social media is by Larry Cafiero, on his reasons for deciding to switch from Linux over to the BSD side of things.</li>
<li>While most of the reasons are over the conflicts surrounding behavior by Linux leaders towards those in the community, he does mention that he has converted his main workstation over to PC-BSD. </li>
<li>According to Larry, “With a couple of hours of adding backup files and tweaking (augmented by a variety of “oh, look” moments which could easily make me the ADHD Foundation Poster Boy), it looks exactly like my personally modified Korora 22 Xfce which graced the machine earlier. “</li>
<li>He also gave a great compliment to the quality of the docs / applications in PC-BSD: “In addition, you have to like a operating system which gives you a book — in this case, the PC-BSD Handbook — which should be the gold standard of documentation. It’s enviable, as in, “man, I wish I had written that.” Also programs like AppCafe provide a plethora of FOSS software, so there’s no shortage of programs. Side by side, there’s nothing on the Linux side of things that is lacking on the BSD side of things.”</li>
<li>Regardless the initial reason for the switch, we are glad to have him and any other switchers join us on the BSD side of FOSS.
***</li>
</ul>

<h3><a href="http://teachbsd.org/" rel="nofollow">New resource for BSD-schoolin’</a></h3>

<ul>
<li>“The <a href="https://github.com/teachbsd/course" rel="nofollow">initial repository</a> contains all of the material for the practitioner and masters style courses as well as a PDF for the teaching guide.  All of the material is licensed under a BSD doc team license, also visible in the repo and on the github site.”</li>
<li>“we expect all other work, including the extension of the practitioner course to 5 days, and the adaptation of the graduate course to undergraduates will be in the github repo”</li>
<li>“Our goal now is to recruit a small number of universities to partner with us to teach this material.  We will keep you posted on our progress.”</li>
<li>We are working on getting an interview lined up to talk more about this project</li>
<li>If I somehow find the time, I am try to contribute towards a sysadmin course similar to what I used to teach at an Arts&amp;Tech College here in Canada
***</li>
</ul>

<h3><a href="http://lippard.blogspot.co.uk/2015/11/a-few-thoughts-on-openbsd-58.html" rel="nofollow">A Few thoughts on OpenBSD 5.8</a></h3>

<ul>
<li>A user details their thoughts, reactions, and concerns after upgrading to OpenBSD 5.8</li>
<li>Among the changes: </li>
<li>sudo was removed and replaced as doas. The user decided to make the switch, but ran into a bug with line continuation (\ to escape newline to continue a long line)</li>
<li>The removal of TCP Wrappers support from ssh - this caused a number of rules in hosts.allow to no longer be respected. </li>
<li>The FreeBSD port of openssh-portable has a patch to readd TCP wrappers because many people find it useful, including myself, when the ssh is in a jail and cannot run a firewall</li>
<li>The removal of the pf_rules= rc.conf variable. “I used to just put the default pf.conf rules file in place with each release and upgrade, and keep my changes in a pf.conf.local file that was specified in the pf_rules variable. The effect was that from the period after the upgrade until I noticed the change, my systems were using the default rules and thus more exposed than they were supposed to be”</li>
<li>This is what is often called a “POLA Violation”, Policy of Least Astonishment. When deciding what the system should do after some change or new feature is introduced, it should be the thing that will be the least “surprising” to the user. Having your firewall rules suddenly not apply, is surprising.</li>
<li>“A minor annoying change that was made in 5.8 was putting the file /var/unbound/db/root.key into /etc/changelist, so that the file gets checked daily by the security script. The issue with this is that if you are actually using unbound with DNSSEC, this file changes daily, though only in the comments”</li>
<li>It is very helpful to see a list of feedback like this after a release, so that the next release can be better</li>
<li>I would be interested in seeing similar feedback for the other BSDs
***</li>
</ul>

<h2>Interview - Bryan Cantrill - <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>Linux Interface Rants</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2015-11-21-FreeBSD-AMI-builder-AMI.html" rel="nofollow">FreeBSD AMI building AMI - Colin’s Corner</a></h3>

<ul>
<li>Colin Percival (Of TarSnap Fame) has brought us a new article this week on how to create your own custom EC2 AMI builds.</li>
<li>This new tool and instructions allows the creation of AMI files, without needing to go through the hassle of doing a fresh FreeBSD release build each time.</li>
<li>Essentially it works similar to Colin’s previous “de-penguinator” utility, by running a FreeBSD in a memory instance, allowing the disk to be unmounted and prepped for becoming an AMI.</li>
<li>The hope  is that this new work allows easier creation of a new variety of “customized” FreeBSD instances, for end users to download and deploy at will. 
***</li>
</ul>

<h3><a href="https://ripe71.ripe.net/archives/video/1200/" rel="nofollow">Peter Hessler on OpenBSD / OpenBGPd</a></h3>

<ul>
<li>Last week a new video landed of Peter Hessler giving us a status update on OpenBSD tech, and OpenBGPd specifically</li>
<li>Of interest, he notes that LibreSSL is being used in iOS / OSX, and of course PF is used all over, Apple, BSD, Solaris and even a Windows port!</li>
<li>OpenNTPD gets a mention as well, still ZERO CVEs for the lifetime of the project</li>
<li>On the OpenBGPd side, it is considered production ready, so no reason to hold back deployment</li>
<li>Very “feature-complete”, able to handle Edge Router, Route server, Multi-RIB. Slew of optional features like route reflector, looking glass, mrt dumps, mpls / mpls vpn. </li>
<li>Bugs fixed, crashers, memory constraints and performance has been improved</li>
<li>Filtering Performance, in example provided, importing 561K rules / 60K prefixes, went from 35 minutes down to 30 seconds. 
***</li>
</ul>

<h3><a href="https://github.com/freebsd/freebsd-wifi-build/wiki/Onion-Omega" rel="nofollow">Onion Omega Updates</a></h3>

<ul>
<li>I have a newer kernel config that will be committed soon that hooks up the system LED, and the three LEDs on the expansion dock via /dev/led</li>
<li>I also have the I2C interface working to talk to the Relay and Servo expansions</li>
<li>I have not determined the exact protocol for the Servo expansions, but the relay expansion is fairly simple to operate</li>
<li>Instructions have been added to the wiki</li>
<li>I have managed to use the GPIO to toggle external LEDs and to read the value from a switch</li>
<li>I have also used the Servo PWM controller to dim an LED and control the speed of a PWM computer case fan</li>
<li>My plan is to operate a 32x32 multi colour LED matrix from the device for an interactive christmas display
***</li>
</ul>

<h3><a href="http://www.cyberciti.biz/datacenter/book-review-freebsd-mastery-zfs/" rel="nofollow">FreeBSD Mastery: ZFS Book review</a></h3>

<ul>
<li>Book can be <a href="http://smile.amazon.com/FreeBSD-Mastery-ZFS-7/dp/0692452354/" rel="nofollow">purchased here</a></li>
<li>or <a href="http://www.zfsbook.com/" rel="nofollow">from the list of vendors including directly from the author here</a> 
***</li>
</ul>

<h2>Beastie Bits</h2>

<p><a href="http://www.computerhistory.org/artifactdonation/" rel="nofollow">Computer History Museum is looking for Bell Labs UNIX</a> </p>

<p><a href="https://youtu.be/rA_5Cz99z28" rel="nofollow">ACM Queue Portrait: Robert Watson </a> </p>

<p><a href="https://www.freebsdnews.com/2015/11/12/bsd-videos/" rel="nofollow">Video Collection about BSD History, put together by FreeBSDNews</a></p>

<p><a href="http://www.minix3.org/conference/2016/" rel="nofollow">Minix announces its 2016 conference</a> </p>

<p><a href="http://bsdtalk.blogspot.com/2015/10/bsdtalk258-chris-henschen-from-fp.html" rel="nofollow">Chris Henschen from fP Technologies&#39; talk about BSD is now online</a></p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20151123161651&mode=expanded" rel="nofollow">Mike Larkin and Theo de Raadt&#39;s talks from Hackfest this year in Quebec are online</a> </p>

<p><a href="http://kernelnomicon.org/?p=534" rel="nofollow">FreeBSD on a BeagleBoneBlack with a Touchscreen Display</a></p>

<p><a href="http://www.cinlug.org/meetings/2015/December" rel="nofollow">Dan Langille will be talking at CINLUG</a></p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Gm06eC0Y" rel="nofollow">John - Rpi2 and BSD</a> </li>
<li><a href="http://slexy.org/view/s2Kf2FG84H" rel="nofollow">Roger - Win10 + FreeBSD</a> </li>
<li><a href="http://slexy.org/view/s21bOG5UhS" rel="nofollow"> Anonymous - Sharing Socket</a> </li>
<li><a href="http://slexy.org/view/s20bKjCNXW" rel="nofollow"> Brad - Scrub Repaired</a> </li>
<li><a href="http://slexy.org/view/s2qb07BC2G" rel="nofollow"> Kelly - Automated Provisioning</a> 
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or 
iXsystems hardware, and you could win monthly prizes, and have your story featured 
in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://bsdmag.org/siju_george/" rel="nofollow">Why did I choose the DragonFlyBSD Operating System by Siju George</a></h3>

<ul>
<li>We have a new article this week by Siju George posted over at BSDMag, talking about his reasons for using DragonFlyBSD in production. </li>
<li>He ran through periods of using both Free/OpenBSD, but different reasons led him away from each. Specifically problems doing port upgrades on FreeBSD, and the time required to do fsck / raid parity checks on OpenBSD. </li>
<li>During his research, he had heard about the HAMMER file-system, but didn’t know of anybody running it in production. After some mailing list conversions, and pointers from Matthew Dillon, he took the plunge and switched. </li>
<li>Now he has fallen in love with the operating system, some of the key strengths he notes at:</li>
<li>Rolling-Release model, which can be upgraded every few weeks or whenever he has the time

<ul>
<li>No time-consuming fsck after a unclean shutdown</li>
<li>No RAID parity checks while still having redundancy</li>
<li>Able to add volumes to HAMMER on the fly</li>
</ul></li>
<li>He also mentions looking forward to HAMMER2, and its potential for easy clustering support, along with eventual CARP implementation so he can run two systems on the same IP. 
***</li>
</ul>

<h3><a href="http://fossforce.com/2015/11/devil-bsd-leaving-linux-behind/" rel="nofollow">The Devil &amp; BSD - Larry Cafiero</a></h3>

<ul>
<li>A story that has been making the rounds on social media is by Larry Cafiero, on his reasons for deciding to switch from Linux over to the BSD side of things.</li>
<li>While most of the reasons are over the conflicts surrounding behavior by Linux leaders towards those in the community, he does mention that he has converted his main workstation over to PC-BSD. </li>
<li>According to Larry, “With a couple of hours of adding backup files and tweaking (augmented by a variety of “oh, look” moments which could easily make me the ADHD Foundation Poster Boy), it looks exactly like my personally modified Korora 22 Xfce which graced the machine earlier. “</li>
<li>He also gave a great compliment to the quality of the docs / applications in PC-BSD: “In addition, you have to like a operating system which gives you a book — in this case, the PC-BSD Handbook — which should be the gold standard of documentation. It’s enviable, as in, “man, I wish I had written that.” Also programs like AppCafe provide a plethora of FOSS software, so there’s no shortage of programs. Side by side, there’s nothing on the Linux side of things that is lacking on the BSD side of things.”</li>
<li>Regardless the initial reason for the switch, we are glad to have him and any other switchers join us on the BSD side of FOSS.
***</li>
</ul>

<h3><a href="http://teachbsd.org/" rel="nofollow">New resource for BSD-schoolin’</a></h3>

<ul>
<li>“The <a href="https://github.com/teachbsd/course" rel="nofollow">initial repository</a> contains all of the material for the practitioner and masters style courses as well as a PDF for the teaching guide.  All of the material is licensed under a BSD doc team license, also visible in the repo and on the github site.”</li>
<li>“we expect all other work, including the extension of the practitioner course to 5 days, and the adaptation of the graduate course to undergraduates will be in the github repo”</li>
<li>“Our goal now is to recruit a small number of universities to partner with us to teach this material.  We will keep you posted on our progress.”</li>
<li>We are working on getting an interview lined up to talk more about this project</li>
<li>If I somehow find the time, I am try to contribute towards a sysadmin course similar to what I used to teach at an Arts&amp;Tech College here in Canada
***</li>
</ul>

<h3><a href="http://lippard.blogspot.co.uk/2015/11/a-few-thoughts-on-openbsd-58.html" rel="nofollow">A Few thoughts on OpenBSD 5.8</a></h3>

<ul>
<li>A user details their thoughts, reactions, and concerns after upgrading to OpenBSD 5.8</li>
<li>Among the changes: </li>
<li>sudo was removed and replaced as doas. The user decided to make the switch, but ran into a bug with line continuation (\ to escape newline to continue a long line)</li>
<li>The removal of TCP Wrappers support from ssh - this caused a number of rules in hosts.allow to no longer be respected. </li>
<li>The FreeBSD port of openssh-portable has a patch to readd TCP wrappers because many people find it useful, including myself, when the ssh is in a jail and cannot run a firewall</li>
<li>The removal of the pf_rules= rc.conf variable. “I used to just put the default pf.conf rules file in place with each release and upgrade, and keep my changes in a pf.conf.local file that was specified in the pf_rules variable. The effect was that from the period after the upgrade until I noticed the change, my systems were using the default rules and thus more exposed than they were supposed to be”</li>
<li>This is what is often called a “POLA Violation”, Policy of Least Astonishment. When deciding what the system should do after some change or new feature is introduced, it should be the thing that will be the least “surprising” to the user. Having your firewall rules suddenly not apply, is surprising.</li>
<li>“A minor annoying change that was made in 5.8 was putting the file /var/unbound/db/root.key into /etc/changelist, so that the file gets checked daily by the security script. The issue with this is that if you are actually using unbound with DNSSEC, this file changes daily, though only in the comments”</li>
<li>It is very helpful to see a list of feedback like this after a release, so that the next release can be better</li>
<li>I would be interested in seeing similar feedback for the other BSDs
***</li>
</ul>

<h2>Interview - Bryan Cantrill - <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>Linux Interface Rants</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2015-11-21-FreeBSD-AMI-builder-AMI.html" rel="nofollow">FreeBSD AMI building AMI - Colin’s Corner</a></h3>

<ul>
<li>Colin Percival (Of TarSnap Fame) has brought us a new article this week on how to create your own custom EC2 AMI builds.</li>
<li>This new tool and instructions allows the creation of AMI files, without needing to go through the hassle of doing a fresh FreeBSD release build each time.</li>
<li>Essentially it works similar to Colin’s previous “de-penguinator” utility, by running a FreeBSD in a memory instance, allowing the disk to be unmounted and prepped for becoming an AMI.</li>
<li>The hope  is that this new work allows easier creation of a new variety of “customized” FreeBSD instances, for end users to download and deploy at will. 
***</li>
</ul>

<h3><a href="https://ripe71.ripe.net/archives/video/1200/" rel="nofollow">Peter Hessler on OpenBSD / OpenBGPd</a></h3>

<ul>
<li>Last week a new video landed of Peter Hessler giving us a status update on OpenBSD tech, and OpenBGPd specifically</li>
<li>Of interest, he notes that LibreSSL is being used in iOS / OSX, and of course PF is used all over, Apple, BSD, Solaris and even a Windows port!</li>
<li>OpenNTPD gets a mention as well, still ZERO CVEs for the lifetime of the project</li>
<li>On the OpenBGPd side, it is considered production ready, so no reason to hold back deployment</li>
<li>Very “feature-complete”, able to handle Edge Router, Route server, Multi-RIB. Slew of optional features like route reflector, looking glass, mrt dumps, mpls / mpls vpn. </li>
<li>Bugs fixed, crashers, memory constraints and performance has been improved</li>
<li>Filtering Performance, in example provided, importing 561K rules / 60K prefixes, went from 35 minutes down to 30 seconds. 
***</li>
</ul>

<h3><a href="https://github.com/freebsd/freebsd-wifi-build/wiki/Onion-Omega" rel="nofollow">Onion Omega Updates</a></h3>

<ul>
<li>I have a newer kernel config that will be committed soon that hooks up the system LED, and the three LEDs on the expansion dock via /dev/led</li>
<li>I also have the I2C interface working to talk to the Relay and Servo expansions</li>
<li>I have not determined the exact protocol for the Servo expansions, but the relay expansion is fairly simple to operate</li>
<li>Instructions have been added to the wiki</li>
<li>I have managed to use the GPIO to toggle external LEDs and to read the value from a switch</li>
<li>I have also used the Servo PWM controller to dim an LED and control the speed of a PWM computer case fan</li>
<li>My plan is to operate a 32x32 multi colour LED matrix from the device for an interactive christmas display
***</li>
</ul>

<h3><a href="http://www.cyberciti.biz/datacenter/book-review-freebsd-mastery-zfs/" rel="nofollow">FreeBSD Mastery: ZFS Book review</a></h3>

<ul>
<li>Book can be <a href="http://smile.amazon.com/FreeBSD-Mastery-ZFS-7/dp/0692452354/" rel="nofollow">purchased here</a></li>
<li>or <a href="http://www.zfsbook.com/" rel="nofollow">from the list of vendors including directly from the author here</a> 
***</li>
</ul>

<h2>Beastie Bits</h2>

<p><a href="http://www.computerhistory.org/artifactdonation/" rel="nofollow">Computer History Museum is looking for Bell Labs UNIX</a> </p>

<p><a href="https://youtu.be/rA_5Cz99z28" rel="nofollow">ACM Queue Portrait: Robert Watson </a> </p>

<p><a href="https://www.freebsdnews.com/2015/11/12/bsd-videos/" rel="nofollow">Video Collection about BSD History, put together by FreeBSDNews</a></p>

<p><a href="http://www.minix3.org/conference/2016/" rel="nofollow">Minix announces its 2016 conference</a> </p>

<p><a href="http://bsdtalk.blogspot.com/2015/10/bsdtalk258-chris-henschen-from-fp.html" rel="nofollow">Chris Henschen from fP Technologies&#39; talk about BSD is now online</a></p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20151123161651&mode=expanded" rel="nofollow">Mike Larkin and Theo de Raadt&#39;s talks from Hackfest this year in Quebec are online</a> </p>

<p><a href="http://kernelnomicon.org/?p=534" rel="nofollow">FreeBSD on a BeagleBoneBlack with a Touchscreen Display</a></p>

<p><a href="http://www.cinlug.org/meetings/2015/December" rel="nofollow">Dan Langille will be talking at CINLUG</a></p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Gm06eC0Y" rel="nofollow">John - Rpi2 and BSD</a> </li>
<li><a href="http://slexy.org/view/s2Kf2FG84H" rel="nofollow">Roger - Win10 + FreeBSD</a> </li>
<li><a href="http://slexy.org/view/s21bOG5UhS" rel="nofollow"> Anonymous - Sharing Socket</a> </li>
<li><a href="http://slexy.org/view/s20bKjCNXW" rel="nofollow"> Brad - Scrub Repaired</a> </li>
<li><a href="http://slexy.org/view/s2qb07BC2G" rel="nofollow"> Kelly - Automated Provisioning</a> 
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>116: Arcing ZFS</title>
  <link>https://www.bsdnow.tv/116</link>
  <guid isPermaLink="false">ae6271fa-c8be-4fb6-9e87-d13ea9fccf1a</guid>
  <pubDate>Wed, 18 Nov 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ae6271fa-c8be-4fb6-9e87-d13ea9fccf1a.mp3" length="84798292" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we are going to be talking to George Wilson AKA</itunes:subtitle>
  <itunes:duration>1:57:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://functionallyparanoid.com/2015/11/06/where-do-binary-packages-come-from/" target="_blank" rel="nofollow noopener"&gt;How to create new binary packages in the Ports system on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Creating a port is often a great first step you can take to get involved in your favorite BSD of choice, and (often) doesn’t require any actual programming to do so.&lt;/li&gt;
&lt;li&gt;In this article we have a great walkthrough for users on creating a new ported application, and eventually binary package, on OpenBSD&lt;/li&gt;
&lt;li&gt;As mentioned in the tutorial, a good starting place is always an existing port, which can you use as a template for your new creation. Tip: Try to pick something similar, I.E. python for a python app, Qt for Qt, etc.&lt;/li&gt;
&lt;li&gt;This tutorial will first walk you through the process of creating your Makefile and related description about the new port. &lt;/li&gt;
&lt;li&gt;Once you’ve created the initial Makefile, there are a bunch of new “make” targets you can begin to run to try building your port, everything from “make fetch” to “make makesum” and “make package”. Using these tests you can verify that your port is correct and results in the installable package/app you wanted.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151116152318" target="_blank" rel="nofollow noopener"&gt;Status update on pledge(2)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has been working very aggressively to convert much of their base system applications to using pledge(2) “Formerly Tame(2))&lt;/li&gt;
&lt;li&gt;Theo has provided a great status update on where that stands as of right now and the numbers look like the following:&lt;/li&gt;
&lt;li&gt;Out of 600 ELF binaries, 368 of them have been updated to utilize pledge(2) in some manner&lt;/li&gt;
&lt;li&gt;This is quite a few, and includes everything from openssl, ping, sftp, grep, gzip and much more&lt;/li&gt;
&lt;li&gt;There are still a number of “pledge-able” commands waiting for conversion, such as login, sysctl, nfsd, ssh and others.&lt;/li&gt;
&lt;li&gt;He also mentions that there does exist some subset of commands which aren’t viable pledge(2) candidates, such as simple things like “true”, or commands like reboot/mount or even perl itself. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://onion.io/omega/" target="_blank" rel="nofollow noopener"&gt;FreeBSD booting on the Onion Omega&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Tiny $19 MIPS SoC ($25 with dock that provides built in mini-USB Serial interface, power supply, LED lights, GPIO expansion, USB port, etc)&lt;/li&gt;
&lt;li&gt;A number of pluggable ‘expansions’ are available, including:

&lt;ul&gt;
&lt;li&gt;Arduino Dock (connect the Omega device to your existing Arduino components)&lt;/li&gt;
&lt;li&gt;Blue Tooth Lower Energy&lt;/li&gt;
&lt;li&gt;10/100 Ethernet Port&lt;/li&gt;
&lt;li&gt;Relay expansion (2 relays each, can stack up to 8 expansions to control 16 relays)&lt;/li&gt;
&lt;li&gt;Servo expansion (control up to 16 PWM servos, like robotic arms or camera mounts)&lt;/li&gt;
&lt;li&gt;OLED expansion (1" monochrome 128x64 OLED display)&lt;/li&gt;
&lt;li&gt;Thermal Printer Kit (includes all wiring and other components)&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The device is the product of a successful &lt;a href="https://www.kickstarter.com/projects/onion/onion-omega-invention-platform-for-the-internet-of/description" target="_blank" rel="nofollow noopener"&gt;Kick Starter campaign&lt;/a&gt; from March of this year&lt;/li&gt;
&lt;li&gt;Specs:&lt;/li&gt;
&lt;li&gt;Atheros AR9330 rev1 400MHZ MIPS 24K&lt;/li&gt;
&lt;li&gt;64MB DDR2 400MHz&lt;/li&gt;
&lt;li&gt;16MB Flash &lt;/li&gt;
&lt;li&gt;802.11b/g/n 150Mbps Atheros Wifi + 100mbps Atheros Wired Ethernet&lt;/li&gt;
&lt;li&gt;18 GPIO Pins&lt;/li&gt;
&lt;li&gt;USB Controller&lt;/li&gt;
&lt;li&gt;Using the &lt;a href="https://github.com/freebsd/freebsd-wifi-build/wiki" target="_blank" rel="nofollow noopener"&gt;freebsd-wifi-build&lt;/a&gt; tool, I was able to build a new firmware for the device based on a profile for a similar device based on the same Atheros chip. I hope to have time to validate some of the settings and get them posted up into the wiki and get the kernel configuration committed to FreeBSD in the next week or two&lt;/li&gt;
&lt;li&gt;It is an interesting device compared to the TP-Link WDR3600’s we did at BSDCan, as it has twice as much flash, leaving more room for the system image, but only half as much ram, and a slower CPU
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/SSHPerf" target="_blank" rel="nofollow noopener"&gt;SSH Performance testing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There has &lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058244.html" target="_blank" rel="nofollow noopener"&gt;been a discussion&lt;/a&gt;  about the value of upkeeping the HPN (High Performance Networking) patch to OpenSSH in the base system of FreeBSD&lt;/li&gt;
&lt;li&gt;As part of this, I did some fresh benchmarks on my pair of new high end servers&lt;/li&gt;
&lt;li&gt;The remaining part to be done is testing different levels of latency&lt;/li&gt;
&lt;li&gt;By tweaking the socket buffer sizes, I was able to saturate the full 10 gigabit with netcat, iperf, etc&lt;/li&gt;
&lt;li&gt;From the tests that have been done so far, it doesn’t look like even the NONE cipher can reach that level of performance because of the MAC (Message Authentication Code)&lt;/li&gt;
&lt;li&gt;It does appear that some of the auto-tuning in HPN is not worked as expected&lt;/li&gt;
&lt;li&gt;Explicitly setting -oTcpRcvBuf=7168 (KB) is enough to saturate a gigabit with 50ms RTT (round trip time)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/whats-new/seagl-2015/" target="_blank" rel="nofollow noopener"&gt;iX gives an overview of FreeBSD at SeaGl 2015&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.freenas.org/whats-new/2015/11/zfs-zil-and-slog-demystified.html" target="_blank" rel="nofollow noopener"&gt;On the FreeNAS Blog, Michael Dexter explains the ZFS Intent Log and SLOG &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - George Wilson - &lt;a href="mailto:wilzun@gmail.com" target="_blank" rel="nofollow noopener"&gt;wilzun@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/zfsdude" target="_blank" rel="nofollow noopener"&gt;@zfsdude&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;OpenZFS and Delphix
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151105223808" target="_blank" rel="nofollow noopener"&gt;Nicholas Marriott has replaced the aging version of less(1) in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sometimes less isn’t more, it’s just less&lt;/li&gt;
&lt;li&gt;In this story, we have news that the old version of less(1) in OpenBSD has now been ripped out in favor of the more modern fork from illumos founder Garrett D’Amore.&lt;/li&gt;
&lt;li&gt;In addition to being a “more” modern version, it also includes far “less” of the portability code, uses terminfo, replacing termcap and is more POSIX compliant. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058522.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD gets initial support for advanced SMR drives &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Kenneth D. Merry &lt;a href="mailto:ken@freebsd.org" target="_blank" rel="nofollow noopener"&gt;ken@freebsd.org&lt;/a&gt; has developed initial support for Host Managed, and Host Aware Shingled Magnetic Recording drives in FreeBSD, available as a patch against both -current and 10-stable&lt;/li&gt;
&lt;li&gt;“This includes support for Host Managed, Host Aware and Drive Managed SMRdrives that are either SCSI (ZBC) or ATA (ZAC) attached via a SAScontroller.  This does not include support for SMR ATA drives attached viaan ATA controller.  Also, I have not yet figured out how to properly detecta Host Managed ATA drive, so this code won't do that.”&lt;/li&gt;
&lt;li&gt;SMR drives have overlapping tracks, because the read head can be much smaller than the write head&lt;/li&gt;
&lt;li&gt;The drawback to this approach is that writes to the disk must take place in 256 MB “zones” that must be written from the beginning&lt;/li&gt;
&lt;li&gt;New features in the patch:&lt;/li&gt;
&lt;li&gt;A new 'camcontrol zone' command that allows displaying and managing drive zones via SCSI/ATA passthrough.

&lt;ul&gt;
&lt;li&gt;A new zonectl(8) utility that uses the new DIOCZONECMD ioctl to display and manage zones via the da(4) (and later ada(4)) driver.&lt;/li&gt;
&lt;li&gt;Changes to diskinfo -v to display the zone mode of a drive.&lt;/li&gt;
&lt;li&gt;A new disk zone API, sys/sys/disk_zone.h.&lt;/li&gt;
&lt;li&gt;A new bio type, BIO_ZONE, and modifications to GEOM to support it.  This new bio will allow filesystems to query zone support in a drive and manage zoned drives.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Extensive modifications to the da(4) driver to handle probing SCSI and SATA behind SAS SMR drives.

&lt;ul&gt;
&lt;li&gt;Additional CAM CDB building functions for zone commands.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;“We (Spectra Logic) are working on ZFS changes that will use this CAM and GEOM infrastructure to make ZFS play well with SMR drives.  Those changes aren't yet done.”&lt;/li&gt;
&lt;li&gt;It is good to see active development in this area, especially from experts in archival storage&lt;/li&gt;
&lt;li&gt;A &lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058521.html" target="_blank" rel="nofollow noopener"&gt;second patch&lt;/a&gt; is also offered, that improves the pass(4) passthrough interface for disks, and introduces a new camdd(8) command, a version of dd that uses the pass(4) interface, kqueue, and separate reader/writer threads for improved performance&lt;/li&gt;
&lt;li&gt;He also presents a feature wishlist that includes some interesting benchmarking features, including a ‘sink’ mode, where reads from the device are just thrown away, rather than having to write then to /dev/null
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151112212739" target="_blank" rel="nofollow noopener"&gt;Initial implemtnation of 802.11n now in iwm(4)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD laptop users rejoice! 802.11n has landed!&lt;/li&gt;
&lt;li&gt;Initially only for the iwm(4) driver, support is planned for other devices in the future&lt;/li&gt;
&lt;li&gt;Includes support for all the required (non-optional) bits to make 802.11N functional&lt;/li&gt;
&lt;li&gt;Adds a new 11n mode to ifmedia, and MCS (modulation coding scheme) that sits alongside the ieee80211_rateset structure. &lt;/li&gt;
&lt;li&gt;No support for MIMO / SGI (Short Guard Interval) or 40 MHz wide-channels, but perhaps we will see those in a future update.&lt;/li&gt;
&lt;li&gt;They are asking users for testing against a wide variety of any/all APs!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=290038" target="_blank" rel="nofollow noopener"&gt;Freebsd adds support for Bluetooth LE Security Management&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD + BlueTooth, not something we discuss a lot about, but it is still under active development.&lt;/li&gt;
&lt;li&gt;The most recently added features come from Takanori Watanabe, and adds new LE Security Management. &lt;/li&gt;
&lt;li&gt;Specifically, it enables support for BLE Security Manager Protocol(SMP), and enables a userland tool to wait for the underlying HCI connection to be encrypted.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://0xfeedface.org/2015/11/07/hbsd-opnsense.html" target="_blank" rel="nofollow noopener"&gt;Building OpnSense on HardenedBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looking for a way to further Harden your router? We have a tutorial from the HardenedBSD developer, Shawn Webb, about how to build OpnSense on HBSD 10-STABLE.&lt;/li&gt;
&lt;li&gt;You’ll need to first be running HBSD 10-STABLE somewhere, in this article he is using bhyve for the builder VM.&lt;/li&gt;
&lt;li&gt;The build process itself is mostly pretty straight-forward, but there are a number of different repos that all have to be checked out, so pay attention to which goes where. 
+In this example he does a targeted build for a Netgate RCC-VE-4860, but you can pick your particular build. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://github.com/gliaskos/freebsd-chromium/issues/40" target="_blank" rel="nofollow noopener"&gt;1 BTC bounty for chromium bug!&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.desktopbsd.net/forums/threads/desktopbsd-2-0-m1-released.806/" target="_blank" rel="nofollow noopener"&gt;DesktopBSD 2.0 M1 released&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-October/458500.html" target="_blank" rel="nofollow noopener"&gt;By implementing asynchronous pru_attach for UDP, Sepherosa Ziehau has increased connect rate by around 15K connections per second&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2015-October/016384.html" target="_blank" rel="nofollow noopener"&gt;Stephen Bourne, known for the Bourne Shell, will be giving a talk at NYCBUG this week&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2015-October/016390.html" target="_blank" rel="nofollow noopener"&gt;Tor Browser 5.0.3 for OpenBSD released&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://torbsd.github.io/" target="_blank" rel="nofollow noopener"&gt;The Tor BSD Diversity Project&lt;/a&gt; aim to

&lt;ul&gt;
&lt;li&gt;Increase the number of Tor relays running BSDs. We envision this happening by increasing the total number of relays, with the addition of more BSD users running relays;&lt;/li&gt;
&lt;li&gt;Make the Tor Browser available under BSD operating systems using native packaging mechanisms. Our first target is OpenBSD;&lt;/li&gt;
&lt;li&gt;Engage the broader BSD community about the Tor anonymity network and the place that BSD Unix should occupy in the privacy community at large.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://anders.unix.se/2015/10/28/screenshots-from-developers--unix-people-2002/" target="_blank" rel="nofollow noopener"&gt;Screenshots from Unix People circa 2002&lt;/a&gt; &lt;/p&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21xTyirkO" target="_blank" rel="nofollow noopener"&gt;Dominik - Bhyve Setup&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2YVi7ULlJ" target="_blank" rel="nofollow noopener"&gt; John - beadm + GELI &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20lRTaZSy" target="_blank" rel="nofollow noopener"&gt; Darrall - ZFS + RAID = Problems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2omNWdTBU" target="_blank" rel="nofollow noopener"&gt; Hamza - Which shell?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Y8bPbnm" target="_blank" rel="nofollow noopener"&gt; Amenia - FreeBSD routing&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!</li>
</ul>

<hr>

<h2>Headlines</h2>

<h3><a href="http://functionallyparanoid.com/2015/11/06/where-do-binary-packages-come-from/" rel="nofollow">How to create new binary packages in the Ports system on OpenBSD</a></h3>

<ul>
<li>Creating a port is often a great first step you can take to get involved in your favorite BSD of choice, and (often) doesn’t require any actual programming to do so.</li>
<li>In this article we have a great walkthrough for users on creating a new ported application, and eventually binary package, on OpenBSD</li>
<li>As mentioned in the tutorial, a good starting place is always an existing port, which can you use as a template for your new creation. Tip: Try to pick something similar, I.E. python for a python app, Qt for Qt, etc.</li>
<li>This tutorial will first walk you through the process of creating your Makefile and related description about the new port. </li>
<li>Once you’ve created the initial Makefile, there are a bunch of new “make” targets you can begin to run to try building your port, everything from “make fetch” to “make makesum” and “make package”. Using these tests you can verify that your port is correct and results in the installable package/app you wanted.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151116152318" rel="nofollow">Status update on pledge(2)</a></h3>

<ul>
<li>OpenBSD has been working very aggressively to convert much of their base system applications to using pledge(2) “Formerly Tame(2))</li>
<li>Theo has provided a great status update on where that stands as of right now and the numbers look like the following:</li>
<li>Out of 600 ELF binaries, 368 of them have been updated to utilize pledge(2) in some manner</li>
<li>This is quite a few, and includes everything from openssl, ping, sftp, grep, gzip and much more</li>
<li>There are still a number of “pledge-able” commands waiting for conversion, such as login, sysctl, nfsd, ssh and others.</li>
<li>He also mentions that there does exist some subset of commands which aren’t viable pledge(2) candidates, such as simple things like “true”, or commands like reboot/mount or even perl itself. 
***</li>
</ul>

<h3><a href="https://onion.io/omega/" rel="nofollow">FreeBSD booting on the Onion Omega</a></h3>

<ul>
<li>Tiny $19 MIPS SoC ($25 with dock that provides built in mini-USB Serial interface, power supply, LED lights, GPIO expansion, USB port, etc)</li>
<li>A number of pluggable ‘expansions’ are available, including:

<ul>
<li>Arduino Dock (connect the Omega device to your existing Arduino components)</li>
<li>Blue Tooth Lower Energy</li>
<li>10/100 Ethernet Port</li>
<li>Relay expansion (2 relays each, can stack up to 8 expansions to control 16 relays)</li>
<li>Servo expansion (control up to 16 PWM servos, like robotic arms or camera mounts)</li>
<li>OLED expansion (1&quot; monochrome 128x64 OLED display)</li>
<li>Thermal Printer Kit (includes all wiring and other components)</li>
</ul></li>
<li>The device is the product of a successful <a href="https://www.kickstarter.com/projects/onion/onion-omega-invention-platform-for-the-internet-of/description" rel="nofollow">Kick Starter campaign</a> from March of this year</li>
<li>Specs:</li>
<li>Atheros AR9330 rev1 400MHZ MIPS 24K</li>
<li>64MB DDR2 400MHz</li>
<li>16MB Flash </li>
<li>802.11b/g/n 150Mbps Atheros Wifi + 100mbps Atheros Wired Ethernet</li>
<li>18 GPIO Pins</li>
<li>USB Controller</li>
<li>Using the <a href="https://github.com/freebsd/freebsd-wifi-build/wiki" rel="nofollow">freebsd-wifi-build</a> tool, I was able to build a new firmware for the device based on a profile for a similar device based on the same Atheros chip. I hope to have time to validate some of the settings and get them posted up into the wiki and get the kernel configuration committed to FreeBSD in the next week or two</li>
<li>It is an interesting device compared to the TP-Link WDR3600’s we did at BSDCan, as it has twice as much flash, leaving more room for the system image, but only half as much ram, and a slower CPU
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/SSHPerf" rel="nofollow">SSH Performance testing</a></h3>

<ul>
<li>There has <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058244.html" rel="nofollow">been a discussion</a>  about the value of upkeeping the HPN (High Performance Networking) patch to OpenSSH in the base system of FreeBSD</li>
<li>As part of this, I did some fresh benchmarks on my pair of new high end servers</li>
<li>The remaining part to be done is testing different levels of latency</li>
<li>By tweaking the socket buffer sizes, I was able to saturate the full 10 gigabit with netcat, iperf, etc</li>
<li>From the tests that have been done so far, it doesn’t look like even the NONE cipher can reach that level of performance because of the MAC (Message Authentication Code)</li>
<li>It does appear that some of the auto-tuning in HPN is not worked as expected</li>
<li>Explicitly setting -oTcpRcvBuf=7168 (KB) is enough to saturate a gigabit with 50ms RTT (round trip time)
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/seagl-2015/" rel="nofollow">iX gives an overview of FreeBSD at SeaGl 2015</a> </li>
<li><a href="http://www.freenas.org/whats-new/2015/11/zfs-zil-and-slog-demystified.html" rel="nofollow">On the FreeNAS Blog, Michael Dexter explains the ZFS Intent Log and SLOG </a> </li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<ul>
<li>OpenZFS and Delphix
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151105223808" rel="nofollow">Nicholas Marriott has replaced the aging version of less(1) in OpenBSD</a></h3>

<ul>
<li>Sometimes less isn’t more, it’s just less</li>
<li>In this story, we have news that the old version of less(1) in OpenBSD has now been ripped out in favor of the more modern fork from illumos founder Garrett D’Amore.</li>
<li>In addition to being a “more” modern version, it also includes far “less” of the portability code, uses terminfo, replacing termcap and is more POSIX compliant. 
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058522.html" rel="nofollow">FreeBSD gets initial support for advanced SMR drives </a></h3>

<ul>
<li>Kenneth D. Merry <a href="mailto:ken@freebsd.org" rel="nofollow">ken@freebsd.org</a> has developed initial support for Host Managed, and Host Aware Shingled Magnetic Recording drives in FreeBSD, available as a patch against both -current and 10-stable</li>
<li>“This includes support for Host Managed, Host Aware and Drive Managed SMRdrives that are either SCSI (ZBC) or ATA (ZAC) attached via a SAScontroller.  This does not include support for SMR ATA drives attached viaan ATA controller.  Also, I have not yet figured out how to properly detecta Host Managed ATA drive, so this code won&#39;t do that.”</li>
<li>SMR drives have overlapping tracks, because the read head can be much smaller than the write head</li>
<li>The drawback to this approach is that writes to the disk must take place in 256 MB “zones” that must be written from the beginning</li>
<li>New features in the patch:</li>
<li>A new &#39;camcontrol zone&#39; command that allows displaying and managing drive zones via SCSI/ATA passthrough.

<ul>
<li>A new zonectl(8) utility that uses the new DIOCZONECMD ioctl to display and manage zones via the da(4) (and later ada(4)) driver.</li>
<li>Changes to diskinfo -v to display the zone mode of a drive.</li>
<li>A new disk zone API, sys/sys/disk_zone.h.</li>
<li>A new bio type, BIO_ZONE, and modifications to GEOM to support it.  This new bio will allow filesystems to query zone support in a drive and manage zoned drives.</li>
</ul></li>
<li>Extensive modifications to the da(4) driver to handle probing SCSI and SATA behind SAS SMR drives.

<ul>
<li>Additional CAM CDB building functions for zone commands.</li>
</ul></li>
<li>“We (Spectra Logic) are working on ZFS changes that will use this CAM and GEOM infrastructure to make ZFS play well with SMR drives.  Those changes aren&#39;t yet done.”</li>
<li>It is good to see active development in this area, especially from experts in archival storage</li>
<li>A <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058521.html" rel="nofollow">second patch</a> is also offered, that improves the pass(4) passthrough interface for disks, and introduces a new camdd(8) command, a version of dd that uses the pass(4) interface, kqueue, and separate reader/writer threads for improved performance</li>
<li>He also presents a feature wishlist that includes some interesting benchmarking features, including a ‘sink’ mode, where reads from the device are just thrown away, rather than having to write then to /dev/null
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151112212739" rel="nofollow">Initial implemtnation of 802.11n now in iwm(4)</a></h3>

<ul>
<li>OpenBSD laptop users rejoice! 802.11n has landed!</li>
<li>Initially only for the iwm(4) driver, support is planned for other devices in the future</li>
<li>Includes support for all the required (non-optional) bits to make 802.11N functional</li>
<li>Adds a new 11n mode to ifmedia, and MCS (modulation coding scheme) that sits alongside the ieee80211_rateset structure. </li>
<li>No support for MIMO / SGI (Short Guard Interval) or 40 MHz wide-channels, but perhaps we will see those in a future update.</li>
<li>They are asking users for testing against a wide variety of any/all APs!
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=290038" rel="nofollow">Freebsd adds support for Bluetooth LE Security Management</a></h3>

<ul>
<li>FreeBSD + BlueTooth, not something we discuss a lot about, but it is still under active development.</li>
<li>The most recently added features come from Takanori Watanabe, and adds new LE Security Management. </li>
<li>Specifically, it enables support for BLE Security Manager Protocol(SMP), and enables a userland tool to wait for the underlying HCI connection to be encrypted.
***</li>
</ul>

<h3><a href="http://0xfeedface.org/2015/11/07/hbsd-opnsense.html" rel="nofollow">Building OpnSense on HardenedBSD</a></h3>

<ul>
<li>Looking for a way to further Harden your router? We have a tutorial from the HardenedBSD developer, Shawn Webb, about how to build OpnSense on HBSD 10-STABLE.</li>
<li>You’ll need to first be running HBSD 10-STABLE somewhere, in this article he is using bhyve for the builder VM.</li>
<li>The build process itself is mostly pretty straight-forward, but there are a number of different repos that all have to be checked out, so pay attention to which goes where. 
+In this example he does a targeted build for a Netgate RCC-VE-4860, but you can pick your particular build. 
***</li>
</ul>

<h2>Beastie Bits</h2>

<p><a href="https://github.com/gliaskos/freebsd-chromium/issues/40" rel="nofollow">1 BTC bounty for chromium bug!</a></p>

<p><a href="http://www.desktopbsd.net/forums/threads/desktopbsd-2-0-m1-released.806/" rel="nofollow">DesktopBSD 2.0 M1 released</a></p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-October/458500.html" rel="nofollow">By implementing asynchronous pru_attach for UDP, Sepherosa Ziehau has increased connect rate by around 15K connections per second</a></p>

<p><a href="http://lists.nycbug.org/pipermail/talk/2015-October/016384.html" rel="nofollow">Stephen Bourne, known for the Bourne Shell, will be giving a talk at NYCBUG this week</a> </p>

<p><a href="http://lists.nycbug.org/pipermail/talk/2015-October/016390.html" rel="nofollow">Tor Browser 5.0.3 for OpenBSD released</a></p>

<ul>
<li><a href="https://torbsd.github.io/" rel="nofollow">The Tor BSD Diversity Project</a> aim to

<ul>
<li>Increase the number of Tor relays running BSDs. We envision this happening by increasing the total number of relays, with the addition of more BSD users running relays;</li>
<li>Make the Tor Browser available under BSD operating systems using native packaging mechanisms. Our first target is OpenBSD;</li>
<li>Engage the broader BSD community about the Tor anonymity network and the place that BSD Unix should occupy in the privacy community at large.</li>
</ul></li>
</ul>

<p><a href="https://anders.unix.se/2015/10/28/screenshots-from-developers--unix-people-2002/" rel="nofollow">Screenshots from Unix People circa 2002</a> </p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21xTyirkO" rel="nofollow">Dominik - Bhyve Setup</a></li>
<li><a href="http://slexy.org/view/s2YVi7ULlJ" rel="nofollow"> John - beadm + GELI </a></li>
<li><a href="http://slexy.org/view/s20lRTaZSy" rel="nofollow"> Darrall - ZFS + RAID = Problems</a></li>
<li><a href="http://slexy.org/view/s2omNWdTBU" rel="nofollow"> Hamza - Which shell?</a></li>
<li><a href="http://slexy.org/view/s21Y8bPbnm" rel="nofollow"> Amenia - FreeBSD routing</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!</li>
</ul>

<hr>

<h2>Headlines</h2>

<h3><a href="http://functionallyparanoid.com/2015/11/06/where-do-binary-packages-come-from/" rel="nofollow">How to create new binary packages in the Ports system on OpenBSD</a></h3>

<ul>
<li>Creating a port is often a great first step you can take to get involved in your favorite BSD of choice, and (often) doesn’t require any actual programming to do so.</li>
<li>In this article we have a great walkthrough for users on creating a new ported application, and eventually binary package, on OpenBSD</li>
<li>As mentioned in the tutorial, a good starting place is always an existing port, which can you use as a template for your new creation. Tip: Try to pick something similar, I.E. python for a python app, Qt for Qt, etc.</li>
<li>This tutorial will first walk you through the process of creating your Makefile and related description about the new port. </li>
<li>Once you’ve created the initial Makefile, there are a bunch of new “make” targets you can begin to run to try building your port, everything from “make fetch” to “make makesum” and “make package”. Using these tests you can verify that your port is correct and results in the installable package/app you wanted.
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151116152318" rel="nofollow">Status update on pledge(2)</a></h3>

<ul>
<li>OpenBSD has been working very aggressively to convert much of their base system applications to using pledge(2) “Formerly Tame(2))</li>
<li>Theo has provided a great status update on where that stands as of right now and the numbers look like the following:</li>
<li>Out of 600 ELF binaries, 368 of them have been updated to utilize pledge(2) in some manner</li>
<li>This is quite a few, and includes everything from openssl, ping, sftp, grep, gzip and much more</li>
<li>There are still a number of “pledge-able” commands waiting for conversion, such as login, sysctl, nfsd, ssh and others.</li>
<li>He also mentions that there does exist some subset of commands which aren’t viable pledge(2) candidates, such as simple things like “true”, or commands like reboot/mount or even perl itself. 
***</li>
</ul>

<h3><a href="https://onion.io/omega/" rel="nofollow">FreeBSD booting on the Onion Omega</a></h3>

<ul>
<li>Tiny $19 MIPS SoC ($25 with dock that provides built in mini-USB Serial interface, power supply, LED lights, GPIO expansion, USB port, etc)</li>
<li>A number of pluggable ‘expansions’ are available, including:

<ul>
<li>Arduino Dock (connect the Omega device to your existing Arduino components)</li>
<li>Blue Tooth Lower Energy</li>
<li>10/100 Ethernet Port</li>
<li>Relay expansion (2 relays each, can stack up to 8 expansions to control 16 relays)</li>
<li>Servo expansion (control up to 16 PWM servos, like robotic arms or camera mounts)</li>
<li>OLED expansion (1&quot; monochrome 128x64 OLED display)</li>
<li>Thermal Printer Kit (includes all wiring and other components)</li>
</ul></li>
<li>The device is the product of a successful <a href="https://www.kickstarter.com/projects/onion/onion-omega-invention-platform-for-the-internet-of/description" rel="nofollow">Kick Starter campaign</a> from March of this year</li>
<li>Specs:</li>
<li>Atheros AR9330 rev1 400MHZ MIPS 24K</li>
<li>64MB DDR2 400MHz</li>
<li>16MB Flash </li>
<li>802.11b/g/n 150Mbps Atheros Wifi + 100mbps Atheros Wired Ethernet</li>
<li>18 GPIO Pins</li>
<li>USB Controller</li>
<li>Using the <a href="https://github.com/freebsd/freebsd-wifi-build/wiki" rel="nofollow">freebsd-wifi-build</a> tool, I was able to build a new firmware for the device based on a profile for a similar device based on the same Atheros chip. I hope to have time to validate some of the settings and get them posted up into the wiki and get the kernel configuration committed to FreeBSD in the next week or two</li>
<li>It is an interesting device compared to the TP-Link WDR3600’s we did at BSDCan, as it has twice as much flash, leaving more room for the system image, but only half as much ram, and a slower CPU
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/SSHPerf" rel="nofollow">SSH Performance testing</a></h3>

<ul>
<li>There has <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058244.html" rel="nofollow">been a discussion</a>  about the value of upkeeping the HPN (High Performance Networking) patch to OpenSSH in the base system of FreeBSD</li>
<li>As part of this, I did some fresh benchmarks on my pair of new high end servers</li>
<li>The remaining part to be done is testing different levels of latency</li>
<li>By tweaking the socket buffer sizes, I was able to saturate the full 10 gigabit with netcat, iperf, etc</li>
<li>From the tests that have been done so far, it doesn’t look like even the NONE cipher can reach that level of performance because of the MAC (Message Authentication Code)</li>
<li>It does appear that some of the auto-tuning in HPN is not worked as expected</li>
<li>Explicitly setting -oTcpRcvBuf=7168 (KB) is enough to saturate a gigabit with 50ms RTT (round trip time)
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/seagl-2015/" rel="nofollow">iX gives an overview of FreeBSD at SeaGl 2015</a> </li>
<li><a href="http://www.freenas.org/whats-new/2015/11/zfs-zil-and-slog-demystified.html" rel="nofollow">On the FreeNAS Blog, Michael Dexter explains the ZFS Intent Log and SLOG </a> </li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<ul>
<li>OpenZFS and Delphix
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151105223808" rel="nofollow">Nicholas Marriott has replaced the aging version of less(1) in OpenBSD</a></h3>

<ul>
<li>Sometimes less isn’t more, it’s just less</li>
<li>In this story, we have news that the old version of less(1) in OpenBSD has now been ripped out in favor of the more modern fork from illumos founder Garrett D’Amore.</li>
<li>In addition to being a “more” modern version, it also includes far “less” of the portability code, uses terminfo, replacing termcap and is more POSIX compliant. 
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058522.html" rel="nofollow">FreeBSD gets initial support for advanced SMR drives </a></h3>

<ul>
<li>Kenneth D. Merry <a href="mailto:ken@freebsd.org" rel="nofollow">ken@freebsd.org</a> has developed initial support for Host Managed, and Host Aware Shingled Magnetic Recording drives in FreeBSD, available as a patch against both -current and 10-stable</li>
<li>“This includes support for Host Managed, Host Aware and Drive Managed SMRdrives that are either SCSI (ZBC) or ATA (ZAC) attached via a SAScontroller.  This does not include support for SMR ATA drives attached viaan ATA controller.  Also, I have not yet figured out how to properly detecta Host Managed ATA drive, so this code won&#39;t do that.”</li>
<li>SMR drives have overlapping tracks, because the read head can be much smaller than the write head</li>
<li>The drawback to this approach is that writes to the disk must take place in 256 MB “zones” that must be written from the beginning</li>
<li>New features in the patch:</li>
<li>A new &#39;camcontrol zone&#39; command that allows displaying and managing drive zones via SCSI/ATA passthrough.

<ul>
<li>A new zonectl(8) utility that uses the new DIOCZONECMD ioctl to display and manage zones via the da(4) (and later ada(4)) driver.</li>
<li>Changes to diskinfo -v to display the zone mode of a drive.</li>
<li>A new disk zone API, sys/sys/disk_zone.h.</li>
<li>A new bio type, BIO_ZONE, and modifications to GEOM to support it.  This new bio will allow filesystems to query zone support in a drive and manage zoned drives.</li>
</ul></li>
<li>Extensive modifications to the da(4) driver to handle probing SCSI and SATA behind SAS SMR drives.

<ul>
<li>Additional CAM CDB building functions for zone commands.</li>
</ul></li>
<li>“We (Spectra Logic) are working on ZFS changes that will use this CAM and GEOM infrastructure to make ZFS play well with SMR drives.  Those changes aren&#39;t yet done.”</li>
<li>It is good to see active development in this area, especially from experts in archival storage</li>
<li>A <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058521.html" rel="nofollow">second patch</a> is also offered, that improves the pass(4) passthrough interface for disks, and introduces a new camdd(8) command, a version of dd that uses the pass(4) interface, kqueue, and separate reader/writer threads for improved performance</li>
<li>He also presents a feature wishlist that includes some interesting benchmarking features, including a ‘sink’ mode, where reads from the device are just thrown away, rather than having to write then to /dev/null
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151112212739" rel="nofollow">Initial implemtnation of 802.11n now in iwm(4)</a></h3>

<ul>
<li>OpenBSD laptop users rejoice! 802.11n has landed!</li>
<li>Initially only for the iwm(4) driver, support is planned for other devices in the future</li>
<li>Includes support for all the required (non-optional) bits to make 802.11N functional</li>
<li>Adds a new 11n mode to ifmedia, and MCS (modulation coding scheme) that sits alongside the ieee80211_rateset structure. </li>
<li>No support for MIMO / SGI (Short Guard Interval) or 40 MHz wide-channels, but perhaps we will see those in a future update.</li>
<li>They are asking users for testing against a wide variety of any/all APs!
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=290038" rel="nofollow">Freebsd adds support for Bluetooth LE Security Management</a></h3>

<ul>
<li>FreeBSD + BlueTooth, not something we discuss a lot about, but it is still under active development.</li>
<li>The most recently added features come from Takanori Watanabe, and adds new LE Security Management. </li>
<li>Specifically, it enables support for BLE Security Manager Protocol(SMP), and enables a userland tool to wait for the underlying HCI connection to be encrypted.
***</li>
</ul>

<h3><a href="http://0xfeedface.org/2015/11/07/hbsd-opnsense.html" rel="nofollow">Building OpnSense on HardenedBSD</a></h3>

<ul>
<li>Looking for a way to further Harden your router? We have a tutorial from the HardenedBSD developer, Shawn Webb, about how to build OpnSense on HBSD 10-STABLE.</li>
<li>You’ll need to first be running HBSD 10-STABLE somewhere, in this article he is using bhyve for the builder VM.</li>
<li>The build process itself is mostly pretty straight-forward, but there are a number of different repos that all have to be checked out, so pay attention to which goes where. 
+In this example he does a targeted build for a Netgate RCC-VE-4860, but you can pick your particular build. 
***</li>
</ul>

<h2>Beastie Bits</h2>

<p><a href="https://github.com/gliaskos/freebsd-chromium/issues/40" rel="nofollow">1 BTC bounty for chromium bug!</a></p>

<p><a href="http://www.desktopbsd.net/forums/threads/desktopbsd-2-0-m1-released.806/" rel="nofollow">DesktopBSD 2.0 M1 released</a></p>

<p><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-October/458500.html" rel="nofollow">By implementing asynchronous pru_attach for UDP, Sepherosa Ziehau has increased connect rate by around 15K connections per second</a></p>

<p><a href="http://lists.nycbug.org/pipermail/talk/2015-October/016384.html" rel="nofollow">Stephen Bourne, known for the Bourne Shell, will be giving a talk at NYCBUG this week</a> </p>

<p><a href="http://lists.nycbug.org/pipermail/talk/2015-October/016390.html" rel="nofollow">Tor Browser 5.0.3 for OpenBSD released</a></p>

<ul>
<li><a href="https://torbsd.github.io/" rel="nofollow">The Tor BSD Diversity Project</a> aim to

<ul>
<li>Increase the number of Tor relays running BSDs. We envision this happening by increasing the total number of relays, with the addition of more BSD users running relays;</li>
<li>Make the Tor Browser available under BSD operating systems using native packaging mechanisms. Our first target is OpenBSD;</li>
<li>Engage the broader BSD community about the Tor anonymity network and the place that BSD Unix should occupy in the privacy community at large.</li>
</ul></li>
</ul>

<p><a href="https://anders.unix.se/2015/10/28/screenshots-from-developers--unix-people-2002/" rel="nofollow">Screenshots from Unix People circa 2002</a> </p>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21xTyirkO" rel="nofollow">Dominik - Bhyve Setup</a></li>
<li><a href="http://slexy.org/view/s2YVi7ULlJ" rel="nofollow"> John - beadm + GELI </a></li>
<li><a href="http://slexy.org/view/s20lRTaZSy" rel="nofollow"> Darrall - ZFS + RAID = Problems</a></li>
<li><a href="http://slexy.org/view/s2omNWdTBU" rel="nofollow"> Hamza - Which shell?</a></li>
<li><a href="http://slexy.org/view/s21Y8bPbnm" rel="nofollow"> Amenia - FreeBSD routing</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>115: Controlling the Transmissions</title>
  <link>https://www.bsdnow.tv/115</link>
  <guid isPermaLink="false">b30ad3ce-cbcf-4d14-8d50-f41bd6f0b74a</guid>
  <pubDate>Wed, 11 Nov 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b30ad3ce-cbcf-4d14-8d50-f41bd6f0b74a.mp3" length="68483380" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Controlling the Transmissions</itunes:subtitle>
  <itunes:duration>1:35:06</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Controlling the Transmissions&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/201511VendorDevSummit" target="_blank" rel="nofollow noopener"&gt;FreeBSD 2015 Vendor Dev Summit&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2015-07-2015-09.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Quarterly Status Report - Third Quarter 2015&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a fresh quarterly status report from the FreeBSD project. Once again it almost merits an entire show, but we will try to hit all the highlights. &lt;/li&gt;
&lt;li&gt;Bhyve - Porting of the Intel edk2 UEFI firmware, allowing Windows in headless mode, and Illumos support. Also porting to ARM has begun!&lt;/li&gt;
&lt;li&gt;Improved Support for Acer C720 ChromeBooks&lt;/li&gt;
&lt;li&gt;High Availability Clustering in CTL (Cam Target Layer)&lt;/li&gt;
&lt;li&gt;Root Remounting (Similar to pivot_root in Linux). This work allows using “reboot -r” to do a fast-reboot, with a partial shutdown, kill all processes, and re-mount rootfs and boot. Especially useful for booting from mfs or similar then transitioning to iscsi or some other backing storage&lt;/li&gt;
&lt;li&gt;OpenCL Support in Mesa, as well as kernel progress on the i915 driver&lt;/li&gt;
&lt;li&gt;Improved support for UEFI FrameBuffer on a bunch of recent MacBook Pro and other Macs, in addition to improvements to “vt” framebuffer driver for high resolution displays. &lt;/li&gt;
&lt;li&gt;ZFS support for UEFI Boot (Needs testing, but used in PC-BSD for a couple months now), and importing new features from IllumOS (resumable send, receive prefetch, replication checksumming, 50% less ram required for L2ARC, better prefetch)&lt;/li&gt;
&lt;li&gt;DTrace SDT probes added to TCP code, to replace the old TCPDEBUG kernel option. Recompiling the kernel is no longer required to debug TCP, just use DTrace&lt;/li&gt;
&lt;li&gt;Ongoing work to bring us a native port/package of GitLab
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forums.meteor.com/t/freebsd-testers-please/12919/10" target="_blank" rel="nofollow noopener"&gt;Meteor, the popular javascript web application framework has been forked to run on FreeBSD, OpenBSD and NetBSD - FreeBSD testers requested&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a public call for testing for FreeBSD users of Meteor by Tom Freudenberg&lt;/li&gt;
&lt;li&gt;The included link includes all the details on how to currently get meteor boot-strapped on your box and bring up the server&lt;/li&gt;
&lt;li&gt;So far the reports are positive, many users reporting that it is running on their 10.2 systems / jails just fine. &lt;/li&gt;
&lt;li&gt;Just a day ago the original porter mentioned that OpenBSD is ready to go for testing using the prepared dev bundle. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151101223132" target="_blank" rel="nofollow noopener"&gt;Mike Larkin work continues on an native OpenBSD hypervisor, which he has announced is now booting&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Speaking of OpenBSD, we have an update from Mike Larkin about the status of the OpenBSD native hypervisor vmm(4). &lt;/li&gt;
&lt;li&gt;His twitter post included the output from a successful VM bootup of OpenBSD 5.8-current, all the way to multi-user&lt;/li&gt;
&lt;li&gt;While the code hasn’t been committed (yet) we will keep you informed when it lands so you too can begin playing with it. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.etoilebsd.net/post/This_is_how_I_like_opensource" target="_blank" rel="nofollow noopener"&gt;This is how I like open source&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A blog post by FreeBSD Core Team member, and one of the lead developers of pkg, Baptiste Daroussin&lt;/li&gt;
&lt;li&gt;One project he has been working on is string collation&lt;/li&gt;
&lt;li&gt;Garrett d'Amore (of IllumOS) implemented unicode string collation while working for Nexenta and made it BSD license&lt;/li&gt;
&lt;li&gt;John Marino (from Dragonfly) imported the work done on Illumos into Dragonfly, while he was doing that he decided, it was probably a good idea to rework how locales are handled&lt;/li&gt;
&lt;li&gt;He discovered that Edwin Groothuis (from FreeBSD) had long ago started a project to simplify locales handling on FreeBSD&lt;/li&gt;
&lt;li&gt;He extended the tools written by Edwin and has been able to update Dragonfly to the latest (v27 so far) unicode definitions&lt;/li&gt;
&lt;li&gt;John Marino has worked with Bapt many times on various projects (including bringing pkg and ports to Dragonfly)&lt;/li&gt;
&lt;li&gt;Bapt decided it was time that FreeBSD got proper string collation support as well, and worked with John to import the support to FreeBSD&lt;/li&gt;
&lt;li&gt;Bapt spotted a couple of bugs and worked with John on fixing them: issues with eucJP encoding, issues with Russian encoding (John did most of the work on tracking down and fixing the bugs), Bapt also converted localedef (the tool to generate the locales) into using BSD license only code (original version used the CDDL libavl library which I modified to use tree(3)), fixed issues. I also took the locale generation from Edwin (extended by John)&lt;/li&gt;
&lt;li&gt;This work resulted in a nice flow of patches going from Dragonfly to FreeBSD and from FreeBSD to Dragonfly.&lt;/li&gt;
&lt;li&gt;And now Garrett is interested in grabbing back our patches into Illumos!&lt;/li&gt;
&lt;li&gt;The result of this collaboration is that now 3 OS share the same implementation for collation support! This is very good because when one discovers a bug the 3 of them benefit the fix!&lt;/li&gt;
&lt;li&gt;The biggest win here is that this was a lot of work, and not an area that many people are interested in working on, so it was especially important to share the work rather than reimplement it separately.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Hiren Panchasara - &lt;a href="mailto:hiren@freebsd.org" target="_blank" rel="nofollow noopener"&gt;hiren@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/hirenpanchasara" target="_blank" rel="nofollow noopener"&gt;@hirenpanchasara&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Improving TCP
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;iXsystems&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.ixsystems.com/whats-new/october-missioncomplete-winners/" target="_blank" rel="nofollow noopener"&gt;MissonComplete winners&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.1-relnotes.txt" target="_blank" rel="nofollow noopener"&gt;LibreSSL 2.3.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;LibreSSl keeps on chugging, the latest release has landed, 2.3.1, which is the second snapshot based upon the OpenBSD 5.9 development branch.&lt;/li&gt;
&lt;li&gt;Currently they are targeting a stable ABI/API sometime around March 2016 for the 2.3.X series.&lt;/li&gt;
&lt;li&gt;Included in this update are ASN. 1 cleanups and some compliance fixes for RFC5280&lt;/li&gt;
&lt;li&gt;Switched internally to time_t, with a check that the host OS supports 64bit time_t&lt;/li&gt;
&lt;li&gt;Various TLS fixes, including the ability to check cert validity times with tls_peer_cert_not{before|after}&lt;/li&gt;
&lt;li&gt;Fixed a reported memory leak in OBJ_obj2txt
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://linoxide.com/linux-how-to/install-ghost-nginx-freebsd-10-2/" target="_blank" rel="nofollow noopener"&gt;Guide for Installing Ghost w/ Nginx on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A nice walkthrough for the week, we’ve found an article about how to install the Ghost blogging platform on FreeBSD 10.2. &lt;/li&gt;
&lt;li&gt;For those who don’t know, Ghost is a MIT licensed blogging tool, started in 2012 by a former WordPress UI developer and is entirely coded in Node.js&lt;/li&gt;
&lt;li&gt;While a port for FreeBSD does not yet exist (somebody get on that please), this tutorial can walk you through the process of getting it deployed manually&lt;/li&gt;
&lt;li&gt;Most of the requirements are simple, www/node, www/npm and sqlite3. &lt;/li&gt;
&lt;li&gt;With those installed, most of the steps are simply creating the username / home for ghost, and some “npm” setup. &lt;/li&gt;
&lt;li&gt;The walkthrough even includes a handy rc.d script, making the possibility of a port seem much more likely
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2015/10/fixing-up-qca9558-performance-on.html" target="_blank" rel="nofollow noopener"&gt;Adrian Chadd on 'Why attention to detail matters when you're a kernel developer&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian was correctly trolled in the FreeBSD embedded IRC chatroom and started looking at why the bridging performance in MIPS boards was so bad&lt;/li&gt;
&lt;li&gt;120-150 mbit/sec is not really enough anymore&lt;/li&gt;
&lt;li&gt;Using previous MIPS24k support as a starting point, Adrian managed to get HWPMC (Hardware Performance Monitoring Counters) working on MIPS74k&lt;/li&gt;
&lt;li&gt;Using the data collected from the performance counters Adrian was able to figure out that packets were being copied in order to meet alignment requirements of the NIC and the FreeBSD networking stack. It turns out this is no longer a requirement for most modern Atheros NICs, so the workaround could be removed&lt;/li&gt;
&lt;li&gt;Now performance was 180 mbit/sec&lt;/li&gt;
&lt;li&gt;Next, on the receive side, only the TCP stack requires strict alignment, the ethernet stack does not, so offset the start point by 2 bytes so that TCP ends up aligned, and problem solved. Or not, no performance difference...&lt;/li&gt;
&lt;li&gt;The problem appeared to be busdma, Ian Lepore had recently made improves in this area on armv6 and helpfully ported these over to MIPS&lt;/li&gt;
&lt;li&gt;Now 420 mbit/sec. Getting better, but not as fast as Linux&lt;/li&gt;
&lt;li&gt;After some further investigation, a missing ‘sync’ operation was added, and the memory caching was changed from writethrough to writeback&lt;/li&gt;
&lt;li&gt;Things were so fast now, that the descriptor ring was being run through the ring so quickly as to hit the next descriptor that is still being setup. The first was to mark the first descriptor of a multi-descriptor packet as ‘empty’ until the entire chain was setup, so it would not be processed before the latter bits were done being added to the ring.&lt;/li&gt;
&lt;li&gt;So now MIPS can bridge at 720 mbit/sec, and route 320 mbit/sec&lt;/li&gt;
&lt;li&gt;Adrian wants to improve the routing speed and get it caught up to the bridging speed, but as always, free time is scarce.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mirrorshades.net/post/132753032310" target="_blank" rel="nofollow noopener"&gt;Switching from OS X to FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The story of a user who had used OS X since its beta, but 10.9 and 10.10, became more and more dissatisfied&lt;/li&gt;
&lt;li&gt;They found they were spending too much time fighting with the system, rather than getting work done&lt;/li&gt;
&lt;li&gt;They cover the new workstation they bought, and the process of getting FreeBSD going on it, including why they chose FreeBSD rather than PCBSD&lt;/li&gt;
&lt;li&gt;Also covered it setting up a Lenovo X220 laptop&lt;/li&gt;
&lt;li&gt;They setup the i3wm and mutt&lt;/li&gt;
&lt;li&gt;The blog is very detailed and goes so far as to share a github repo of dotfiles and configuration files to ease the transition from OS X.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;BeastieBits&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.scalescale.com/the-stack-behind-netflix-scaling/" target="_blank" rel="nofollow noopener"&gt;The Stack behind Netflix's scaling&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/source-changes/2015/11/04/msg069873.html" target="_blank" rel="nofollow noopener"&gt;The Amiga port of NetBSD now has xorg support&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://blog.netbsd.org/tnf/entry/end_of_life_for_netbsd" target="_blank" rel="nofollow noopener"&gt;NetBSD has announced EOL for v5.x to be November 9th&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058266.html" target="_blank" rel="nofollow noopener"&gt;RetroArch ports allow playing PlayStation, Sega, Atari, etc., games on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;h3&gt;&lt;a href="http://gfycat.com/InnocentSneakyEwe" target="_blank" rel="nofollow noopener"&gt;OpenBSD booting on a 75mhz Cyrex system with 32MB RAM&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/source-changes/2015/10/29/msg069729.html" target="_blank" rel="nofollow noopener"&gt;Matthew Green reports Nouveau Nvidia can support GL with his latest commit&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h3&gt;Releases!&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://opnsense.org/opnsense-15-7-18-released/" target="_blank" rel="nofollow noopener"&gt;OPNsense releases 15.7.18&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://blog.pfsense.org/?p=1925" target="_blank" rel="nofollow noopener"&gt;pfSense releases 2.2.5&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ogdURldm" target="_blank" rel="nofollow noopener"&gt; Eric&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s22bK2LZLm" target="_blank" rel="nofollow noopener"&gt; Andrew&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2to6ZpBTc" target="_blank" rel="nofollow noopener"&gt; Joseph&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2oLU0KM7Y" target="_blank" rel="nofollow noopener"&gt; Sean&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21k6oKvle" target="_blank" rel="nofollow noopener"&gt; Dustin&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;For those of you curious about Kris' new lighting here are the links to what he is using.&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&amp;amp;redirect=true&amp;amp;ref_=oh_aui_detailpage_o01_s00&amp;amp;pldnSite=1" target="_blank" rel="nofollow noopener"&gt;Softbox Light Diffuser&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&amp;amp;redirect=true&amp;amp;ref_=oh_aui_detailpage_o06_s00" target="_blank" rel="nofollow noopener"&gt;Full Spectrum 5500K CFL Bulb&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Controlling the Transmissions</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/201511VendorDevSummit" rel="nofollow">FreeBSD 2015 Vendor Dev Summit</a></h3>

<hr>

<h3><a href="https://www.freebsd.org/news/status/report-2015-07-2015-09.html" rel="nofollow">FreeBSD Quarterly Status Report - Third Quarter 2015</a></h3>

<ul>
<li>We have a fresh quarterly status report from the FreeBSD project. Once again it almost merits an entire show, but we will try to hit all the highlights. </li>
<li>Bhyve - Porting of the Intel edk2 UEFI firmware, allowing Windows in headless mode, and Illumos support. Also porting to ARM has begun!</li>
<li>Improved Support for Acer C720 ChromeBooks</li>
<li>High Availability Clustering in CTL (Cam Target Layer)</li>
<li>Root Remounting (Similar to pivot_root in Linux). This work allows using “reboot -r” to do a fast-reboot, with a partial shutdown, kill all processes, and re-mount rootfs and boot. Especially useful for booting from mfs or similar then transitioning to iscsi or some other backing storage</li>
<li>OpenCL Support in Mesa, as well as kernel progress on the i915 driver</li>
<li>Improved support for UEFI FrameBuffer on a bunch of recent MacBook Pro and other Macs, in addition to improvements to “vt” framebuffer driver for high resolution displays. </li>
<li>ZFS support for UEFI Boot (Needs testing, but used in PC-BSD for a couple months now), and importing new features from IllumOS (resumable send, receive prefetch, replication checksumming, 50% less ram required for L2ARC, better prefetch)</li>
<li>DTrace SDT probes added to TCP code, to replace the old TCPDEBUG kernel option. Recompiling the kernel is no longer required to debug TCP, just use DTrace</li>
<li>Ongoing work to bring us a native port/package of GitLab
***</li>
</ul>

<h3><a href="https://forums.meteor.com/t/freebsd-testers-please/12919/10" rel="nofollow">Meteor, the popular javascript web application framework has been forked to run on FreeBSD, OpenBSD and NetBSD - FreeBSD testers requested</a></h3>

<ul>
<li>We have a public call for testing for FreeBSD users of Meteor by Tom Freudenberg</li>
<li>The included link includes all the details on how to currently get meteor boot-strapped on your box and bring up the server</li>
<li>So far the reports are positive, many users reporting that it is running on their 10.2 systems / jails just fine. </li>
<li>Just a day ago the original porter mentioned that OpenBSD is ready to go for testing using the prepared dev bundle. 
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151101223132" rel="nofollow">Mike Larkin work continues on an native OpenBSD hypervisor, which he has announced is now booting</a></h3>

<ul>
<li>Speaking of OpenBSD, we have an update from Mike Larkin about the status of the OpenBSD native hypervisor vmm(4). </li>
<li>His twitter post included the output from a successful VM bootup of OpenBSD 5.8-current, all the way to multi-user</li>
<li>While the code hasn’t been committed (yet) we will keep you informed when it lands so you too can begin playing with it. 
***</li>
</ul>

<h3><a href="http://blog.etoilebsd.net/post/This_is_how_I_like_opensource" rel="nofollow">This is how I like open source</a></h3>

<ul>
<li>A blog post by FreeBSD Core Team member, and one of the lead developers of pkg, Baptiste Daroussin</li>
<li>One project he has been working on is string collation</li>
<li>Garrett d&#39;Amore (of IllumOS) implemented unicode string collation while working for Nexenta and made it BSD license</li>
<li>John Marino (from Dragonfly) imported the work done on Illumos into Dragonfly, while he was doing that he decided, it was probably a good idea to rework how locales are handled</li>
<li>He discovered that Edwin Groothuis (from FreeBSD) had long ago started a project to simplify locales handling on FreeBSD</li>
<li>He extended the tools written by Edwin and has been able to update Dragonfly to the latest (v27 so far) unicode definitions</li>
<li>John Marino has worked with Bapt many times on various projects (including bringing pkg and ports to Dragonfly)</li>
<li>Bapt decided it was time that FreeBSD got proper string collation support as well, and worked with John to import the support to FreeBSD</li>
<li>Bapt spotted a couple of bugs and worked with John on fixing them: issues with eucJP encoding, issues with Russian encoding (John did most of the work on tracking down and fixing the bugs), Bapt also converted localedef (the tool to generate the locales) into using BSD license only code (original version used the CDDL libavl library which I modified to use tree(3)), fixed issues. I also took the locale generation from Edwin (extended by John)</li>
<li>This work resulted in a nice flow of patches going from Dragonfly to FreeBSD and from FreeBSD to Dragonfly.</li>
<li>And now Garrett is interested in grabbing back our patches into Illumos!</li>
<li>The result of this collaboration is that now 3 OS share the same implementation for collation support! This is very good because when one discovers a bug the 3 of them benefit the fix!</li>
<li>The biggest win here is that this was a lot of work, and not an area that many people are interested in working on, so it was especially important to share the work rather than reimplement it separately.
***</li>
</ul>

<h2>Interview - Hiren Panchasara - <a href="mailto:hiren@freebsd.org" rel="nofollow">hiren@freebsd.org</a> / <a href="https://twitter.com/hirenpanchasara" rel="nofollow">@hirenpanchasara</a></h2>

<ul>
<li>Improving TCP
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/october-missioncomplete-winners/" rel="nofollow">MissonComplete winners</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.1-relnotes.txt" rel="nofollow">LibreSSL 2.3.1 released</a></h3>

<ul>
<li>LibreSSl keeps on chugging, the latest release has landed, 2.3.1, which is the second snapshot based upon the OpenBSD 5.9 development branch.</li>
<li>Currently they are targeting a stable ABI/API sometime around March 2016 for the 2.3.X series.</li>
<li>Included in this update are ASN. 1 cleanups and some compliance fixes for RFC5280</li>
<li>Switched internally to time_t, with a check that the host OS supports 64bit time_t</li>
<li>Various TLS fixes, including the ability to check cert validity times with tls_peer_cert_not{before|after}</li>
<li>Fixed a reported memory leak in OBJ_obj2txt
***</li>
</ul>

<h3><a href="http://linoxide.com/linux-how-to/install-ghost-nginx-freebsd-10-2/" rel="nofollow">Guide for Installing Ghost w/ Nginx on FreeBSD</a></h3>

<ul>
<li>A nice walkthrough for the week, we’ve found an article about how to install the Ghost blogging platform on FreeBSD 10.2. </li>
<li>For those who don’t know, Ghost is a MIT licensed blogging tool, started in 2012 by a former WordPress UI developer and is entirely coded in Node.js</li>
<li>While a port for FreeBSD does not yet exist (somebody get on that please), this tutorial can walk you through the process of getting it deployed manually</li>
<li>Most of the requirements are simple, www/node, www/npm and sqlite3. </li>
<li>With those installed, most of the steps are simply creating the username / home for ghost, and some “npm” setup. </li>
<li>The walkthrough even includes a handy rc.d script, making the possibility of a port seem much more likely
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2015/10/fixing-up-qca9558-performance-on.html" rel="nofollow">Adrian Chadd on &#39;Why attention to detail matters when you&#39;re a kernel developer</a></h3>

<ul>
<li>Adrian was correctly trolled in the FreeBSD embedded IRC chatroom and started looking at why the bridging performance in MIPS boards was so bad</li>
<li>120-150 mbit/sec is not really enough anymore</li>
<li>Using previous MIPS24k support as a starting point, Adrian managed to get HWPMC (Hardware Performance Monitoring Counters) working on MIPS74k</li>
<li>Using the data collected from the performance counters Adrian was able to figure out that packets were being copied in order to meet alignment requirements of the NIC and the FreeBSD networking stack. It turns out this is no longer a requirement for most modern Atheros NICs, so the workaround could be removed</li>
<li>Now performance was 180 mbit/sec</li>
<li>Next, on the receive side, only the TCP stack requires strict alignment, the ethernet stack does not, so offset the start point by 2 bytes so that TCP ends up aligned, and problem solved. Or not, no performance difference...</li>
<li>The problem appeared to be busdma, Ian Lepore had recently made improves in this area on armv6 and helpfully ported these over to MIPS</li>
<li>Now 420 mbit/sec. Getting better, but not as fast as Linux</li>
<li>After some further investigation, a missing ‘sync’ operation was added, and the memory caching was changed from writethrough to writeback</li>
<li>Things were so fast now, that the descriptor ring was being run through the ring so quickly as to hit the next descriptor that is still being setup. The first was to mark the first descriptor of a multi-descriptor packet as ‘empty’ until the entire chain was setup, so it would not be processed before the latter bits were done being added to the ring.</li>
<li>So now MIPS can bridge at 720 mbit/sec, and route 320 mbit/sec</li>
<li>Adrian wants to improve the routing speed and get it caught up to the bridging speed, but as always, free time is scarce.
***</li>
</ul>

<h3><a href="http://mirrorshades.net/post/132753032310" rel="nofollow">Switching from OS X to FreeBSD</a></h3>

<ul>
<li>The story of a user who had used OS X since its beta, but 10.9 and 10.10, became more and more dissatisfied</li>
<li>They found they were spending too much time fighting with the system, rather than getting work done</li>
<li>They cover the new workstation they bought, and the process of getting FreeBSD going on it, including why they chose FreeBSD rather than PCBSD</li>
<li>Also covered it setting up a Lenovo X220 laptop</li>
<li>They setup the i3wm and mutt</li>
<li>The blog is very detailed and goes so far as to share a github repo of dotfiles and configuration files to ease the transition from OS X.
***</li>
</ul>

<h2>BeastieBits</h2>

<h3><a href="http://www.scalescale.com/the-stack-behind-netflix-scaling/" rel="nofollow">The Stack behind Netflix&#39;s scaling</a></h3>

<hr>

<h3><a href="https://mail-index.netbsd.org/source-changes/2015/11/04/msg069873.html" rel="nofollow">The Amiga port of NetBSD now has xorg support</a></h3>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/end_of_life_for_netbsd" rel="nofollow">NetBSD has announced EOL for v5.x to be November 9th</a></h3>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058266.html" rel="nofollow">RetroArch ports allow playing PlayStation, Sega, Atari, etc., games on FreeBSD</a></h3>

<h3><a href="http://gfycat.com/InnocentSneakyEwe" rel="nofollow">OpenBSD booting on a 75mhz Cyrex system with 32MB RAM</a></h3>

<hr>

<h3><a href="http://mail-index.netbsd.org/source-changes/2015/10/29/msg069729.html" rel="nofollow">Matthew Green reports Nouveau Nvidia can support GL with his latest commit</a></h3>

<hr>

<h3>Releases!</h3>

<p><a href="https://opnsense.org/opnsense-15-7-18-released/" rel="nofollow">OPNsense releases 15.7.18</a></p>

<p><a href="https://blog.pfsense.org/?p=1925" rel="nofollow">pfSense releases 2.2.5</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ogdURldm" rel="nofollow"> Eric</a></li>
<li><a href="http://slexy.org/view/s22bK2LZLm" rel="nofollow"> Andrew</a></li>
<li><a href="http://slexy.org/view/s2to6ZpBTc" rel="nofollow"> Joseph</a></li>
<li><a href="http://slexy.org/view/s2oLU0KM7Y" rel="nofollow"> Sean</a></li>
<li><a href="http://slexy.org/view/s21k6oKvle" rel="nofollow"> Dustin</a>
***</li>
</ul>

<h3>For those of you curious about Kris&#39; new lighting here are the links to what he is using.</h3>

<ul>
<li><a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&redirect=true&ref_=oh_aui_detailpage_o01_s00&pldnSite=1" rel="nofollow">Softbox Light Diffuser</a></li>
<li><a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00" rel="nofollow">Full Spectrum 5500K CFL Bulb</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Controlling the Transmissions</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/201511VendorDevSummit" rel="nofollow">FreeBSD 2015 Vendor Dev Summit</a></h3>

<hr>

<h3><a href="https://www.freebsd.org/news/status/report-2015-07-2015-09.html" rel="nofollow">FreeBSD Quarterly Status Report - Third Quarter 2015</a></h3>

<ul>
<li>We have a fresh quarterly status report from the FreeBSD project. Once again it almost merits an entire show, but we will try to hit all the highlights. </li>
<li>Bhyve - Porting of the Intel edk2 UEFI firmware, allowing Windows in headless mode, and Illumos support. Also porting to ARM has begun!</li>
<li>Improved Support for Acer C720 ChromeBooks</li>
<li>High Availability Clustering in CTL (Cam Target Layer)</li>
<li>Root Remounting (Similar to pivot_root in Linux). This work allows using “reboot -r” to do a fast-reboot, with a partial shutdown, kill all processes, and re-mount rootfs and boot. Especially useful for booting from mfs or similar then transitioning to iscsi or some other backing storage</li>
<li>OpenCL Support in Mesa, as well as kernel progress on the i915 driver</li>
<li>Improved support for UEFI FrameBuffer on a bunch of recent MacBook Pro and other Macs, in addition to improvements to “vt” framebuffer driver for high resolution displays. </li>
<li>ZFS support for UEFI Boot (Needs testing, but used in PC-BSD for a couple months now), and importing new features from IllumOS (resumable send, receive prefetch, replication checksumming, 50% less ram required for L2ARC, better prefetch)</li>
<li>DTrace SDT probes added to TCP code, to replace the old TCPDEBUG kernel option. Recompiling the kernel is no longer required to debug TCP, just use DTrace</li>
<li>Ongoing work to bring us a native port/package of GitLab
***</li>
</ul>

<h3><a href="https://forums.meteor.com/t/freebsd-testers-please/12919/10" rel="nofollow">Meteor, the popular javascript web application framework has been forked to run on FreeBSD, OpenBSD and NetBSD - FreeBSD testers requested</a></h3>

<ul>
<li>We have a public call for testing for FreeBSD users of Meteor by Tom Freudenberg</li>
<li>The included link includes all the details on how to currently get meteor boot-strapped on your box and bring up the server</li>
<li>So far the reports are positive, many users reporting that it is running on their 10.2 systems / jails just fine. </li>
<li>Just a day ago the original porter mentioned that OpenBSD is ready to go for testing using the prepared dev bundle. 
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151101223132" rel="nofollow">Mike Larkin work continues on an native OpenBSD hypervisor, which he has announced is now booting</a></h3>

<ul>
<li>Speaking of OpenBSD, we have an update from Mike Larkin about the status of the OpenBSD native hypervisor vmm(4). </li>
<li>His twitter post included the output from a successful VM bootup of OpenBSD 5.8-current, all the way to multi-user</li>
<li>While the code hasn’t been committed (yet) we will keep you informed when it lands so you too can begin playing with it. 
***</li>
</ul>

<h3><a href="http://blog.etoilebsd.net/post/This_is_how_I_like_opensource" rel="nofollow">This is how I like open source</a></h3>

<ul>
<li>A blog post by FreeBSD Core Team member, and one of the lead developers of pkg, Baptiste Daroussin</li>
<li>One project he has been working on is string collation</li>
<li>Garrett d&#39;Amore (of IllumOS) implemented unicode string collation while working for Nexenta and made it BSD license</li>
<li>John Marino (from Dragonfly) imported the work done on Illumos into Dragonfly, while he was doing that he decided, it was probably a good idea to rework how locales are handled</li>
<li>He discovered that Edwin Groothuis (from FreeBSD) had long ago started a project to simplify locales handling on FreeBSD</li>
<li>He extended the tools written by Edwin and has been able to update Dragonfly to the latest (v27 so far) unicode definitions</li>
<li>John Marino has worked with Bapt many times on various projects (including bringing pkg and ports to Dragonfly)</li>
<li>Bapt decided it was time that FreeBSD got proper string collation support as well, and worked with John to import the support to FreeBSD</li>
<li>Bapt spotted a couple of bugs and worked with John on fixing them: issues with eucJP encoding, issues with Russian encoding (John did most of the work on tracking down and fixing the bugs), Bapt also converted localedef (the tool to generate the locales) into using BSD license only code (original version used the CDDL libavl library which I modified to use tree(3)), fixed issues. I also took the locale generation from Edwin (extended by John)</li>
<li>This work resulted in a nice flow of patches going from Dragonfly to FreeBSD and from FreeBSD to Dragonfly.</li>
<li>And now Garrett is interested in grabbing back our patches into Illumos!</li>
<li>The result of this collaboration is that now 3 OS share the same implementation for collation support! This is very good because when one discovers a bug the 3 of them benefit the fix!</li>
<li>The biggest win here is that this was a lot of work, and not an area that many people are interested in working on, so it was especially important to share the work rather than reimplement it separately.
***</li>
</ul>

<h2>Interview - Hiren Panchasara - <a href="mailto:hiren@freebsd.org" rel="nofollow">hiren@freebsd.org</a> / <a href="https://twitter.com/hirenpanchasara" rel="nofollow">@hirenpanchasara</a></h2>

<ul>
<li>Improving TCP
***</li>
</ul>

<h2>iXsystems</h2>

<ul>
<li><a href="https://www.ixsystems.com/whats-new/october-missioncomplete-winners/" rel="nofollow">MissonComplete winners</a>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.3.1-relnotes.txt" rel="nofollow">LibreSSL 2.3.1 released</a></h3>

<ul>
<li>LibreSSl keeps on chugging, the latest release has landed, 2.3.1, which is the second snapshot based upon the OpenBSD 5.9 development branch.</li>
<li>Currently they are targeting a stable ABI/API sometime around March 2016 for the 2.3.X series.</li>
<li>Included in this update are ASN. 1 cleanups and some compliance fixes for RFC5280</li>
<li>Switched internally to time_t, with a check that the host OS supports 64bit time_t</li>
<li>Various TLS fixes, including the ability to check cert validity times with tls_peer_cert_not{before|after}</li>
<li>Fixed a reported memory leak in OBJ_obj2txt
***</li>
</ul>

<h3><a href="http://linoxide.com/linux-how-to/install-ghost-nginx-freebsd-10-2/" rel="nofollow">Guide for Installing Ghost w/ Nginx on FreeBSD</a></h3>

<ul>
<li>A nice walkthrough for the week, we’ve found an article about how to install the Ghost blogging platform on FreeBSD 10.2. </li>
<li>For those who don’t know, Ghost is a MIT licensed blogging tool, started in 2012 by a former WordPress UI developer and is entirely coded in Node.js</li>
<li>While a port for FreeBSD does not yet exist (somebody get on that please), this tutorial can walk you through the process of getting it deployed manually</li>
<li>Most of the requirements are simple, www/node, www/npm and sqlite3. </li>
<li>With those installed, most of the steps are simply creating the username / home for ghost, and some “npm” setup. </li>
<li>The walkthrough even includes a handy rc.d script, making the possibility of a port seem much more likely
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2015/10/fixing-up-qca9558-performance-on.html" rel="nofollow">Adrian Chadd on &#39;Why attention to detail matters when you&#39;re a kernel developer</a></h3>

<ul>
<li>Adrian was correctly trolled in the FreeBSD embedded IRC chatroom and started looking at why the bridging performance in MIPS boards was so bad</li>
<li>120-150 mbit/sec is not really enough anymore</li>
<li>Using previous MIPS24k support as a starting point, Adrian managed to get HWPMC (Hardware Performance Monitoring Counters) working on MIPS74k</li>
<li>Using the data collected from the performance counters Adrian was able to figure out that packets were being copied in order to meet alignment requirements of the NIC and the FreeBSD networking stack. It turns out this is no longer a requirement for most modern Atheros NICs, so the workaround could be removed</li>
<li>Now performance was 180 mbit/sec</li>
<li>Next, on the receive side, only the TCP stack requires strict alignment, the ethernet stack does not, so offset the start point by 2 bytes so that TCP ends up aligned, and problem solved. Or not, no performance difference...</li>
<li>The problem appeared to be busdma, Ian Lepore had recently made improves in this area on armv6 and helpfully ported these over to MIPS</li>
<li>Now 420 mbit/sec. Getting better, but not as fast as Linux</li>
<li>After some further investigation, a missing ‘sync’ operation was added, and the memory caching was changed from writethrough to writeback</li>
<li>Things were so fast now, that the descriptor ring was being run through the ring so quickly as to hit the next descriptor that is still being setup. The first was to mark the first descriptor of a multi-descriptor packet as ‘empty’ until the entire chain was setup, so it would not be processed before the latter bits were done being added to the ring.</li>
<li>So now MIPS can bridge at 720 mbit/sec, and route 320 mbit/sec</li>
<li>Adrian wants to improve the routing speed and get it caught up to the bridging speed, but as always, free time is scarce.
***</li>
</ul>

<h3><a href="http://mirrorshades.net/post/132753032310" rel="nofollow">Switching from OS X to FreeBSD</a></h3>

<ul>
<li>The story of a user who had used OS X since its beta, but 10.9 and 10.10, became more and more dissatisfied</li>
<li>They found they were spending too much time fighting with the system, rather than getting work done</li>
<li>They cover the new workstation they bought, and the process of getting FreeBSD going on it, including why they chose FreeBSD rather than PCBSD</li>
<li>Also covered it setting up a Lenovo X220 laptop</li>
<li>They setup the i3wm and mutt</li>
<li>The blog is very detailed and goes so far as to share a github repo of dotfiles and configuration files to ease the transition from OS X.
***</li>
</ul>

<h2>BeastieBits</h2>

<h3><a href="http://www.scalescale.com/the-stack-behind-netflix-scaling/" rel="nofollow">The Stack behind Netflix&#39;s scaling</a></h3>

<hr>

<h3><a href="https://mail-index.netbsd.org/source-changes/2015/11/04/msg069873.html" rel="nofollow">The Amiga port of NetBSD now has xorg support</a></h3>

<hr>

<h3><a href="http://blog.netbsd.org/tnf/entry/end_of_life_for_netbsd" rel="nofollow">NetBSD has announced EOL for v5.x to be November 9th</a></h3>

<hr>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-November/058266.html" rel="nofollow">RetroArch ports allow playing PlayStation, Sega, Atari, etc., games on FreeBSD</a></h3>

<h3><a href="http://gfycat.com/InnocentSneakyEwe" rel="nofollow">OpenBSD booting on a 75mhz Cyrex system with 32MB RAM</a></h3>

<hr>

<h3><a href="http://mail-index.netbsd.org/source-changes/2015/10/29/msg069729.html" rel="nofollow">Matthew Green reports Nouveau Nvidia can support GL with his latest commit</a></h3>

<hr>

<h3>Releases!</h3>

<p><a href="https://opnsense.org/opnsense-15-7-18-released/" rel="nofollow">OPNsense releases 15.7.18</a></p>

<p><a href="https://blog.pfsense.org/?p=1925" rel="nofollow">pfSense releases 2.2.5</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ogdURldm" rel="nofollow"> Eric</a></li>
<li><a href="http://slexy.org/view/s22bK2LZLm" rel="nofollow"> Andrew</a></li>
<li><a href="http://slexy.org/view/s2to6ZpBTc" rel="nofollow"> Joseph</a></li>
<li><a href="http://slexy.org/view/s2oLU0KM7Y" rel="nofollow"> Sean</a></li>
<li><a href="http://slexy.org/view/s21k6oKvle" rel="nofollow"> Dustin</a>
***</li>
</ul>

<h3>For those of you curious about Kris&#39; new lighting here are the links to what he is using.</h3>

<ul>
<li><a href="http://smile.amazon.com/gp/product/B00OTG6474?psc=1&redirect=true&ref_=oh_aui_detailpage_o01_s00&pldnSite=1" rel="nofollow">Softbox Light Diffuser</a></li>
<li><a href="http://smile.amazon.com/gp/product/B00198U6U6?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00" rel="nofollow">Full Spectrum 5500K CFL Bulb</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>114: BSD-Schooling</title>
  <link>https://www.bsdnow.tv/114</link>
  <guid isPermaLink="false">c2648e61-e485-4213-a0de-d1afa10c713f</guid>
  <pubDate>Wed, 04 Nov 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c2648e61-e485-4213-a0de-d1afa10c713f.mp3" length="64337620" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, Allan is out of town at another Developer Summit, but we have a great episode coming</itunes:subtitle>
  <itunes:duration>1:29:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, Allan is out of town at another Developer Summit, but we have a great episode coming&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, &amp;lt;br&amp;gt;
Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.wired.com/2015/10/whatsapps-co-founder-on-how-the-iconoclastic-app-got-huge/" target="_blank" rel="nofollow noopener"&gt;WhatsApp founder, on how it got so HUGE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Wired has interviewed WhatsApp co-founder Brian Acton, about the infrastructure behind WhatsApp&lt;/li&gt;
&lt;li&gt;WhatsApp manages 900 million users with a team of 50, while Twitter needs around 4,000 employees to manage 300 million users.&lt;/li&gt;
&lt;li&gt;“FreeBSD has a nicely tuned network stack and extremely good reliability. We find managing FreeBSD installations to be quite straightforward.”&lt;/li&gt;
&lt;li&gt;“Linux is a beast of complexity. FreeBSD has the advantage of being a single distribution with an extraordinarily good ports collection.”&lt;/li&gt;
&lt;li&gt;“To us, it has been an advantage as we have had very few problems that have occurred at the OS level. With Linux, you tend to have to wrangle more and you want to avoid that if you can.”&lt;/li&gt;
&lt;li&gt;“FreeBSD happened because both Jan and I have experience with FreeBSD from Yahoo!.”&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://uk.businessinsider.com/whatsapp-built-using-erlang-and-freebsd-2015-10" target="_blank" rel="nofollow noopener"&gt;Additional Coverage &lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.textplain.net/blog/2015/problems-with-systemd-and-why-i-like-bsd-init/" target="_blank" rel="nofollow noopener"&gt;User feedback in the SystemD vs BSD init&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a very detailed blog post this week from Randy Westlund, about his experiences on Linux and BSD, contrasting the init systems.&lt;/li&gt;
&lt;li&gt;What he finds is that while, it does make some things easier, such as writing a service file once, and having it run everywhere, the tradeoff comes in the complexity and lack of transparency. &lt;/li&gt;
&lt;li&gt;Another area of concern was the reproducibility of boots, how in his examples on servers, there can often be times when services start in different orders, to save a few moments of boot-time.&lt;/li&gt;
&lt;li&gt;His take on the simplicity of BSD’s startup scripts is that they are very easy to hack on and monitor, while not introducing the feature creep we have seen in sysd. &lt;/li&gt;
&lt;li&gt;It will be interesting to see NextBSD / LaunchD and how it compares in the future!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://opensource.com/business/15/10/ato-interview-jim-salter" target="_blank" rel="nofollow noopener"&gt;Learn to embrace open source, or get buried&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;At the recent “All Things Open” conference, opensource.com interviewed Jim Salter&lt;/li&gt;
&lt;li&gt;He describes how he first got started using FreeBSD to host his personal website&lt;/li&gt;
&lt;li&gt;He then goes on to talk about starting FreeBSDWiki.net and what its goals were&lt;/li&gt;
&lt;li&gt;The interview then talks about using Open Source at solve customers’ problems at his consulting firm&lt;/li&gt;
&lt;li&gt;Finally, the talks about his presentation at AllThingsOpen: &lt;a href="http://allthingsopen.org/talks/move-over-rsync/" target="_blank" rel="nofollow noopener"&gt;Move Over, Rsync 
&lt;/a&gt; about switching to ZFS replication
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lwn.net/Articles/660428/" target="_blank" rel="nofollow noopener"&gt;HP’s CTO Urges businesses to avoid permissive licenses &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Martin Fink went on a rant about the negative effects of license proliferation&lt;/li&gt;
&lt;li&gt;While I agree that having too many new licenses is confusing and adds difficulty, I didn’t agree with his closing point&lt;/li&gt;
&lt;li&gt;“He then ended the session with an extended appeal to move the open-source software industry away from permissive licenses like Apache 2.0 and toward copyleft licenses like the GPL”&lt;/li&gt;
&lt;li&gt;“The Apache 2.0 license is currently the most widely used "permissive" license. But the thing that developers overlook when adopting it, he said, is that by using Apache they are also making a choice about how much work they will have to put into building any sort of community around the project. If you look at Apache-licensed projects, he noted, "you'll find that they are very top-heavy with 'governance' structures." Technical committees, working groups, and various boards, he said, are needed to make such projects function. But if you look at copyleft projects, he added, you find that those structures simply are not needed.”&lt;/li&gt;
&lt;li&gt;There are plenty of smaller permissively licensed projects that do not have this sort of structure, infact, most of this structure comes from being an Apache run project, rather than from using the Apache or any other permissive license&lt;/li&gt;
&lt;li&gt;Luckily, he goes on to state that the “OpenSwitch code is released under the Apache 2.0 license, he said, because the other partner companies viewed that as a requirement.”&lt;/li&gt;
&lt;li&gt;“HP wanted to get networking companies and hardware suppliers on board. In order to get all of the legal departments at all of the partners to sign on to the project, he said, HP was forced to go with a permissive license”&lt;/li&gt;
&lt;li&gt;Hopefully the trend towards permissive licenses continues&lt;/li&gt;
&lt;li&gt;Additionally, in a separate LWN post:&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lwn.net/Articles/659757/" target="_blank" rel="nofollow noopener"&gt;RMS Says: “I am not saying that competitors to a GNU package are unjust or bad -- that isn't necessarily so. The pertinent point is that they are &lt;em&gt;competitors&lt;/em&gt;. The goal of the GNU Project is for GNU to win the competition. Each GNU package is a part of the GNU system, and should contribute to the success of the GNU Project. Thus, each GNU package should encourage people to run other GNU packages rather than their competitors -- even competitors which are free software.” &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;Never thought I’d see RMS espousing vendor lock-in
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brian Callahan - &lt;a href="mailto:bcallah@devio.us" target="_blank" rel="nofollow noopener"&gt;bcallah@devio.us&lt;/a&gt; / &lt;a href="https://twitter.com/__briancallahan" target="_blank" rel="nofollow noopener"&gt;@twitter&lt;/a&gt;
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;The BSDs in Education
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-October/228403.html" target="_blank" rel="nofollow noopener"&gt;Digital Libraries in Africa making use of DragonflyBSD and HAMMER&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In the international development context, we have an interesting post from Michael Wilson of the PeerCorps Trust Fund.&lt;/li&gt;
&lt;li&gt;They are using DragonFlyBSD and FreeBSD to support the Tanzanian Digital Library Initiative in very resource-limited settings.&lt;br&gt;
&lt;/li&gt;
&lt;li&gt;They cite among the most important reasons for using BSD as the availability and quality of the documentation, as well as the robustness of the filesystems, both ZFS and HAMMER.&lt;/li&gt;
&lt;li&gt;Their website is now online over at (&lt;a href="http://www.tandli.com/" target="_blank" rel="nofollow noopener"&gt;http://www.tandli.com/&lt;/a&gt;) , check it out to see exactly how BSD is being used in the field
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://twitter.com/ed_maste/status/655120086248763396" target="_blank" rel="nofollow noopener"&gt;netflix hits &amp;gt; 65gbps from a single freebsd box&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A single socket server, with a high end Xeon E5 processor and a dual ported Chelsio T580 (2x 40 Gbps ports) set a netflix record pushing over 65 Gbps of traffic from a single machine&lt;/li&gt;
&lt;li&gt;The videos were being pushed from SSDs and some new high end NVMe devices&lt;/li&gt;
&lt;li&gt;The previous record at Netflix was 52 Gbps from a single machine, but only with very experimental settings. The current work is under much more typical settings&lt;/li&gt;
&lt;li&gt;By the end of that night, traffic surged to over 70 Gbps&lt;/li&gt;
&lt;li&gt;Only about 10-15% of that traffic was encrypted with the in-kernel TLS engine that Netflix has been working on with John-Mark Gurney&lt;/li&gt;
&lt;li&gt;It was reported that the machine was only using about 65% cpu, and had plenty of head room&lt;/li&gt;
&lt;li&gt;If I remember the discussion correctly, there were about 60,000 streams running off the machine
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lumina-desktop.org/lumina-desktop-0-8-7-released/" target="_blank" rel="nofollow noopener"&gt;Lumina Desktop 0.8.7 has been released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A very large update has landed for PC-BSD’s Lumina desktop&lt;/li&gt;
&lt;li&gt;A brand new “Start” menu has been added, which enables quick launch of favorite apps, pinning to desktop / favorites and more.&lt;/li&gt;
&lt;li&gt;Desktop icons have been overhauled, with better font support, and a new Grid system for placement of icons.&lt;/li&gt;
&lt;li&gt;Support for other BSD’s such as DragonFly has been improved, along with TONS of internal changes to functionality and backends.&lt;/li&gt;
&lt;li&gt;Almost too many things to list here, but the link above will have full details, along with screenshots.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.jibbed.org/" target="_blank" rel="nofollow noopener"&gt;A LiveUSB for NetBSD has been released by Jibbed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After a three year absence, the Jibbed project has come back with a Live USB image for NetBSD!&lt;/li&gt;
&lt;li&gt;The image contains NetBSD 7.0, and is fully R/W, allowing you to run the entire system from a single USB drive.&lt;/li&gt;
&lt;li&gt;Images are available for 8Gb and 4Gb sticks (64bit and 32bit respectively), along with VirtualBox images as well&lt;/li&gt;
&lt;li&gt;For those wanting X, it includes both X and TWM, although ‘pkgin’ is available, so you can quickly add other desktops to the image
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie Bits&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151021191401&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;After recent discussions of revisiting W&lt;sup&gt;X&lt;/sup&gt; support in Mozilla Firefox, David Coppa has flipped the switch to enable it for OpenBSD users running -current.&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://lme.postach.io/post/changing-console-resolution-in-freebsd-10-with-vt-4" target="_blank" rel="nofollow noopener"&gt;Using the vt(4) driver to change console resolution&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/10/conference-recap-grace-hopper.html" target="_blank" rel="nofollow noopener"&gt;The FreeBSD Foundation gives a great final overview of the Grace Hopper Conference&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://medium.com/@jmmv/compilers-in-the-bsd-base-system-1c4515a18c49" target="_blank" rel="nofollow noopener"&gt;A dialog about Compilers in the (BSD) base system&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=1q5aDEt18mw" target="_blank" rel="nofollow noopener"&gt;One upping their 48-core work from July, The Semihalf team shows off their the 96-core SMP support for FreeBSD on Cavium ThunderX (ARMv8 architecture&lt;/a&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.nycbug.org/pipermail/talk/2015-October/016384.html" target="_blank" rel="nofollow noopener"&gt;NYC Bug's November meeting will be featuring a talk by Stephen R. Bourne&lt;/a&gt;&lt;/h3&gt;

&lt;h3&gt;&lt;a href="http://garbage.fm/" target="_blank" rel="nofollow noopener"&gt;New not-just-BSD postcast, hosted by two OpenBSD devs Brandon Mercer and Joshua Stein&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21wjbhCJ4" target="_blank" rel="nofollow noopener"&gt; Stefan &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21TbKS5t0" target="_blank" rel="nofollow noopener"&gt; Zach &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20AkO1i1R" target="_blank" rel="nofollow noopener"&gt; Jake &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2nrUMatU5" target="_blank" rel="nofollow noopener"&gt; Corey &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="http://slexy.org/view/s2pZsC7arX" target="_blank" rel="nofollow noopener"&gt; Robroy &lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;
&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Send questions, comments, show ideas/topics, or stories you want mentioned on the show to &lt;br&gt;
&lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;feedback@bsdnow.tv&lt;/a&gt; &lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, Allan is out of town at another Developer Summit, but we have a great episode coming</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" <br>
alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" <br>
title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, <br>
Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://www.wired.com/2015/10/whatsapps-co-founder-on-how-the-iconoclastic-app-got-huge/" rel="nofollow">WhatsApp founder, on how it got so HUGE</a></h3>

<ul>
<li>Wired has interviewed WhatsApp co-founder Brian Acton, about the infrastructure behind WhatsApp</li>
<li>WhatsApp manages 900 million users with a team of 50, while Twitter needs around 4,000 employees to manage 300 million users.</li>
<li>“FreeBSD has a nicely tuned network stack and extremely good reliability. We find managing FreeBSD installations to be quite straightforward.”</li>
<li>“Linux is a beast of complexity. FreeBSD has the advantage of being a single distribution with an extraordinarily good ports collection.”</li>
<li>“To us, it has been an advantage as we have had very few problems that have occurred at the OS level. With Linux, you tend to have to wrangle more and you want to avoid that if you can.”</li>
<li>“FreeBSD happened because both Jan and I have experience with FreeBSD from Yahoo!.”</li>
<li><a href="http://uk.businessinsider.com/whatsapp-built-using-erlang-and-freebsd-2015-10" rel="nofollow">Additional Coverage </a> 
***</li>
</ul>

<h3><a href="https://www.textplain.net/blog/2015/problems-with-systemd-and-why-i-like-bsd-init/" rel="nofollow">User feedback in the SystemD vs BSD init</a></h3>

<ul>
<li>We have a very detailed blog post this week from Randy Westlund, about his experiences on Linux and BSD, contrasting the init systems.</li>
<li>What he finds is that while, it does make some things easier, such as writing a service file once, and having it run everywhere, the tradeoff comes in the complexity and lack of transparency. </li>
<li>Another area of concern was the reproducibility of boots, how in his examples on servers, there can often be times when services start in different orders, to save a few moments of boot-time.</li>
<li>His take on the simplicity of BSD’s startup scripts is that they are very easy to hack on and monitor, while not introducing the feature creep we have seen in sysd. </li>
<li>It will be interesting to see NextBSD / LaunchD and how it compares in the future!
***</li>
</ul>

<h3><a href="http://opensource.com/business/15/10/ato-interview-jim-salter" rel="nofollow">Learn to embrace open source, or get buried</a></h3>

<ul>
<li>At the recent “All Things Open” conference, opensource.com interviewed Jim Salter</li>
<li>He describes how he first got started using FreeBSD to host his personal website</li>
<li>He then goes on to talk about starting FreeBSDWiki.net and what its goals were</li>
<li>The interview then talks about using Open Source at solve customers’ problems at his consulting firm</li>
<li>Finally, the talks about his presentation at AllThingsOpen: <a href="http://allthingsopen.org/talks/move-over-rsync/" rel="nofollow">Move Over, Rsync 
</a> about switching to ZFS replication
***</li>
</ul>

<h3><a href="http://lwn.net/Articles/660428/" rel="nofollow">HP’s CTO Urges businesses to avoid permissive licenses </a></h3>

<ul>
<li>Martin Fink went on a rant about the negative effects of license proliferation</li>
<li>While I agree that having too many new licenses is confusing and adds difficulty, I didn’t agree with his closing point</li>
<li>“He then ended the session with an extended appeal to move the open-source software industry away from permissive licenses like Apache 2.0 and toward copyleft licenses like the GPL”</li>
<li>“The Apache 2.0 license is currently the most widely used &quot;permissive&quot; license. But the thing that developers overlook when adopting it, he said, is that by using Apache they are also making a choice about how much work they will have to put into building any sort of community around the project. If you look at Apache-licensed projects, he noted, &quot;you&#39;ll find that they are very top-heavy with &#39;governance&#39; structures.&quot; Technical committees, working groups, and various boards, he said, are needed to make such projects function. But if you look at copyleft projects, he added, you find that those structures simply are not needed.”</li>
<li>There are plenty of smaller permissively licensed projects that do not have this sort of structure, infact, most of this structure comes from being an Apache run project, rather than from using the Apache or any other permissive license</li>
<li>Luckily, he goes on to state that the “OpenSwitch code is released under the Apache 2.0 license, he said, because the other partner companies viewed that as a requirement.”</li>
<li>“HP wanted to get networking companies and hardware suppliers on board. In order to get all of the legal departments at all of the partners to sign on to the project, he said, HP was forced to go with a permissive license”</li>
<li>Hopefully the trend towards permissive licenses continues</li>
<li>Additionally, in a separate LWN post:</li>
<li><a href="http://lwn.net/Articles/659757/" rel="nofollow">RMS Says: “I am not saying that competitors to a GNU package are unjust or bad -- that isn&#39;t necessarily so. The pertinent point is that they are <em>competitors</em>. The goal of the GNU Project is for GNU to win the competition. Each GNU package is a part of the GNU system, and should contribute to the success of the GNU Project. Thus, each GNU package should encourage people to run other GNU packages rather than their competitors -- even competitors which are free software.” </a> </li>
<li>Never thought I’d see RMS espousing vendor lock-in
***</li>
</ul>

<h2>Interview - Brian Callahan - <a href="mailto:bcallah@devio.us" rel="nofollow">bcallah@devio.us</a> / <a href="https://twitter.com/__briancallahan" rel="nofollow">@twitter</a></h2>

<ul>
<li>The BSDs in Education
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-October/228403.html" rel="nofollow">Digital Libraries in Africa making use of DragonflyBSD and HAMMER</a></h3>

<ul>
<li>In the international development context, we have an interesting post from Michael Wilson of the PeerCorps Trust Fund.</li>
<li>They are using DragonFlyBSD and FreeBSD to support the Tanzanian Digital Library Initiative in very resource-limited settings.<br></li>
<li>They cite among the most important reasons for using BSD as the availability and quality of the documentation, as well as the robustness of the filesystems, both ZFS and HAMMER.</li>
<li>Their website is now online over at (<a href="http://www.tandli.com/" rel="nofollow">http://www.tandli.com/</a>) , check it out to see exactly how BSD is being used in the field
***</li>
</ul>

<h3><a href="https://twitter.com/ed_maste/status/655120086248763396" rel="nofollow">netflix hits &gt; 65gbps from a single freebsd box</a></h3>

<ul>
<li>A single socket server, with a high end Xeon E5 processor and a dual ported Chelsio T580 (2x 40 Gbps ports) set a netflix record pushing over 65 Gbps of traffic from a single machine</li>
<li>The videos were being pushed from SSDs and some new high end NVMe devices</li>
<li>The previous record at Netflix was 52 Gbps from a single machine, but only with very experimental settings. The current work is under much more typical settings</li>
<li>By the end of that night, traffic surged to over 70 Gbps</li>
<li>Only about 10-15% of that traffic was encrypted with the in-kernel TLS engine that Netflix has been working on with John-Mark Gurney</li>
<li>It was reported that the machine was only using about 65% cpu, and had plenty of head room</li>
<li>If I remember the discussion correctly, there were about 60,000 streams running off the machine
***</li>
</ul>

<h3><a href="http://lumina-desktop.org/lumina-desktop-0-8-7-released/" rel="nofollow">Lumina Desktop 0.8.7 has been released</a></h3>

<ul>
<li>A very large update has landed for PC-BSD’s Lumina desktop</li>
<li>A brand new “Start” menu has been added, which enables quick launch of favorite apps, pinning to desktop / favorites and more.</li>
<li>Desktop icons have been overhauled, with better font support, and a new Grid system for placement of icons.</li>
<li>Support for other BSD’s such as DragonFly has been improved, along with TONS of internal changes to functionality and backends.</li>
<li>Almost too many things to list here, but the link above will have full details, along with screenshots.
***</li>
</ul>

<h3><a href="http://www.jibbed.org/" rel="nofollow">A LiveUSB for NetBSD has been released by Jibbed</a></h3>

<ul>
<li>After a three year absence, the Jibbed project has come back with a Live USB image for NetBSD!</li>
<li>The image contains NetBSD 7.0, and is fully R/W, allowing you to run the entire system from a single USB drive.</li>
<li>Images are available for 8Gb and 4Gb sticks (64bit and 32bit respectively), along with VirtualBox images as well</li>
<li>For those wanting X, it includes both X and TWM, although ‘pkgin’ is available, so you can quickly add other desktops to the image
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20151021191401&mode=expanded" rel="nofollow">After recent discussions of revisiting W<sup>X</sup> support in Mozilla Firefox, David Coppa has flipped the switch to enable it for OpenBSD users running -current.</a></p></li>
<li><p><a href="http://lme.postach.io/post/changing-console-resolution-in-freebsd-10-with-vt-4" rel="nofollow">Using the vt(4) driver to change console resolution</a> </p></li>
<li><p><a href="http://freebsdfoundation.blogspot.com/2015/10/conference-recap-grace-hopper.html" rel="nofollow">The FreeBSD Foundation gives a great final overview of the Grace Hopper Conference</a></p></li>
<li><p><a href="https://medium.com/@jmmv/compilers-in-the-bsd-base-system-1c4515a18c49" rel="nofollow">A dialog about Compilers in the (BSD) base system</a></p></li>
<li><p><a href="https://www.youtube.com/watch?v=1q5aDEt18mw" rel="nofollow">One upping their 48-core work from July, The Semihalf team shows off their the 96-core SMP support for FreeBSD on Cavium ThunderX (ARMv8 architecture</a></p></li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2015-October/016384.html" rel="nofollow">NYC Bug&#39;s November meeting will be featuring a talk by Stephen R. Bourne</a></h3>

<h3><a href="http://garbage.fm/" rel="nofollow">New not-just-BSD postcast, hosted by two OpenBSD devs Brandon Mercer and Joshua Stein</a></h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21wjbhCJ4" rel="nofollow"> Stefan </a> </li>
<li><a href="http://slexy.org/view/s21TbKS5t0" rel="nofollow"> Zach </a> </li>
<li><a href="http://slexy.org/view/s20AkO1i1R" rel="nofollow"> Jake </a> </li>
<li><a href="http://slexy.org/view/s2nrUMatU5" rel="nofollow"> Corey </a> </li>
<li><p><a href="http://slexy.org/view/s2pZsC7arX" rel="nofollow"> Robroy </a> </p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <br>
<a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, Allan is out of town at another Developer Summit, but we have a great episode coming</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" <br>
alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" <br>
title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, <br>
Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://www.wired.com/2015/10/whatsapps-co-founder-on-how-the-iconoclastic-app-got-huge/" rel="nofollow">WhatsApp founder, on how it got so HUGE</a></h3>

<ul>
<li>Wired has interviewed WhatsApp co-founder Brian Acton, about the infrastructure behind WhatsApp</li>
<li>WhatsApp manages 900 million users with a team of 50, while Twitter needs around 4,000 employees to manage 300 million users.</li>
<li>“FreeBSD has a nicely tuned network stack and extremely good reliability. We find managing FreeBSD installations to be quite straightforward.”</li>
<li>“Linux is a beast of complexity. FreeBSD has the advantage of being a single distribution with an extraordinarily good ports collection.”</li>
<li>“To us, it has been an advantage as we have had very few problems that have occurred at the OS level. With Linux, you tend to have to wrangle more and you want to avoid that if you can.”</li>
<li>“FreeBSD happened because both Jan and I have experience with FreeBSD from Yahoo!.”</li>
<li><a href="http://uk.businessinsider.com/whatsapp-built-using-erlang-and-freebsd-2015-10" rel="nofollow">Additional Coverage </a> 
***</li>
</ul>

<h3><a href="https://www.textplain.net/blog/2015/problems-with-systemd-and-why-i-like-bsd-init/" rel="nofollow">User feedback in the SystemD vs BSD init</a></h3>

<ul>
<li>We have a very detailed blog post this week from Randy Westlund, about his experiences on Linux and BSD, contrasting the init systems.</li>
<li>What he finds is that while, it does make some things easier, such as writing a service file once, and having it run everywhere, the tradeoff comes in the complexity and lack of transparency. </li>
<li>Another area of concern was the reproducibility of boots, how in his examples on servers, there can often be times when services start in different orders, to save a few moments of boot-time.</li>
<li>His take on the simplicity of BSD’s startup scripts is that they are very easy to hack on and monitor, while not introducing the feature creep we have seen in sysd. </li>
<li>It will be interesting to see NextBSD / LaunchD and how it compares in the future!
***</li>
</ul>

<h3><a href="http://opensource.com/business/15/10/ato-interview-jim-salter" rel="nofollow">Learn to embrace open source, or get buried</a></h3>

<ul>
<li>At the recent “All Things Open” conference, opensource.com interviewed Jim Salter</li>
<li>He describes how he first got started using FreeBSD to host his personal website</li>
<li>He then goes on to talk about starting FreeBSDWiki.net and what its goals were</li>
<li>The interview then talks about using Open Source at solve customers’ problems at his consulting firm</li>
<li>Finally, the talks about his presentation at AllThingsOpen: <a href="http://allthingsopen.org/talks/move-over-rsync/" rel="nofollow">Move Over, Rsync 
</a> about switching to ZFS replication
***</li>
</ul>

<h3><a href="http://lwn.net/Articles/660428/" rel="nofollow">HP’s CTO Urges businesses to avoid permissive licenses </a></h3>

<ul>
<li>Martin Fink went on a rant about the negative effects of license proliferation</li>
<li>While I agree that having too many new licenses is confusing and adds difficulty, I didn’t agree with his closing point</li>
<li>“He then ended the session with an extended appeal to move the open-source software industry away from permissive licenses like Apache 2.0 and toward copyleft licenses like the GPL”</li>
<li>“The Apache 2.0 license is currently the most widely used &quot;permissive&quot; license. But the thing that developers overlook when adopting it, he said, is that by using Apache they are also making a choice about how much work they will have to put into building any sort of community around the project. If you look at Apache-licensed projects, he noted, &quot;you&#39;ll find that they are very top-heavy with &#39;governance&#39; structures.&quot; Technical committees, working groups, and various boards, he said, are needed to make such projects function. But if you look at copyleft projects, he added, you find that those structures simply are not needed.”</li>
<li>There are plenty of smaller permissively licensed projects that do not have this sort of structure, infact, most of this structure comes from being an Apache run project, rather than from using the Apache or any other permissive license</li>
<li>Luckily, he goes on to state that the “OpenSwitch code is released under the Apache 2.0 license, he said, because the other partner companies viewed that as a requirement.”</li>
<li>“HP wanted to get networking companies and hardware suppliers on board. In order to get all of the legal departments at all of the partners to sign on to the project, he said, HP was forced to go with a permissive license”</li>
<li>Hopefully the trend towards permissive licenses continues</li>
<li>Additionally, in a separate LWN post:</li>
<li><a href="http://lwn.net/Articles/659757/" rel="nofollow">RMS Says: “I am not saying that competitors to a GNU package are unjust or bad -- that isn&#39;t necessarily so. The pertinent point is that they are <em>competitors</em>. The goal of the GNU Project is for GNU to win the competition. Each GNU package is a part of the GNU system, and should contribute to the success of the GNU Project. Thus, each GNU package should encourage people to run other GNU packages rather than their competitors -- even competitors which are free software.” </a> </li>
<li>Never thought I’d see RMS espousing vendor lock-in
***</li>
</ul>

<h2>Interview - Brian Callahan - <a href="mailto:bcallah@devio.us" rel="nofollow">bcallah@devio.us</a> / <a href="https://twitter.com/__briancallahan" rel="nofollow">@twitter</a></h2>

<ul>
<li>The BSDs in Education
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-October/228403.html" rel="nofollow">Digital Libraries in Africa making use of DragonflyBSD and HAMMER</a></h3>

<ul>
<li>In the international development context, we have an interesting post from Michael Wilson of the PeerCorps Trust Fund.</li>
<li>They are using DragonFlyBSD and FreeBSD to support the Tanzanian Digital Library Initiative in very resource-limited settings.<br></li>
<li>They cite among the most important reasons for using BSD as the availability and quality of the documentation, as well as the robustness of the filesystems, both ZFS and HAMMER.</li>
<li>Their website is now online over at (<a href="http://www.tandli.com/" rel="nofollow">http://www.tandli.com/</a>) , check it out to see exactly how BSD is being used in the field
***</li>
</ul>

<h3><a href="https://twitter.com/ed_maste/status/655120086248763396" rel="nofollow">netflix hits &gt; 65gbps from a single freebsd box</a></h3>

<ul>
<li>A single socket server, with a high end Xeon E5 processor and a dual ported Chelsio T580 (2x 40 Gbps ports) set a netflix record pushing over 65 Gbps of traffic from a single machine</li>
<li>The videos were being pushed from SSDs and some new high end NVMe devices</li>
<li>The previous record at Netflix was 52 Gbps from a single machine, but only with very experimental settings. The current work is under much more typical settings</li>
<li>By the end of that night, traffic surged to over 70 Gbps</li>
<li>Only about 10-15% of that traffic was encrypted with the in-kernel TLS engine that Netflix has been working on with John-Mark Gurney</li>
<li>It was reported that the machine was only using about 65% cpu, and had plenty of head room</li>
<li>If I remember the discussion correctly, there were about 60,000 streams running off the machine
***</li>
</ul>

<h3><a href="http://lumina-desktop.org/lumina-desktop-0-8-7-released/" rel="nofollow">Lumina Desktop 0.8.7 has been released</a></h3>

<ul>
<li>A very large update has landed for PC-BSD’s Lumina desktop</li>
<li>A brand new “Start” menu has been added, which enables quick launch of favorite apps, pinning to desktop / favorites and more.</li>
<li>Desktop icons have been overhauled, with better font support, and a new Grid system for placement of icons.</li>
<li>Support for other BSD’s such as DragonFly has been improved, along with TONS of internal changes to functionality and backends.</li>
<li>Almost too many things to list here, but the link above will have full details, along with screenshots.
***</li>
</ul>

<h3><a href="http://www.jibbed.org/" rel="nofollow">A LiveUSB for NetBSD has been released by Jibbed</a></h3>

<ul>
<li>After a three year absence, the Jibbed project has come back with a Live USB image for NetBSD!</li>
<li>The image contains NetBSD 7.0, and is fully R/W, allowing you to run the entire system from a single USB drive.</li>
<li>Images are available for 8Gb and 4Gb sticks (64bit and 32bit respectively), along with VirtualBox images as well</li>
<li>For those wanting X, it includes both X and TWM, although ‘pkgin’ is available, so you can quickly add other desktops to the image
***</li>
</ul>

<h3>Beastie Bits</h3>

<ul>
<li><p><a href="http://undeadly.org/cgi?action=article&sid=20151021191401&mode=expanded" rel="nofollow">After recent discussions of revisiting W<sup>X</sup> support in Mozilla Firefox, David Coppa has flipped the switch to enable it for OpenBSD users running -current.</a></p></li>
<li><p><a href="http://lme.postach.io/post/changing-console-resolution-in-freebsd-10-with-vt-4" rel="nofollow">Using the vt(4) driver to change console resolution</a> </p></li>
<li><p><a href="http://freebsdfoundation.blogspot.com/2015/10/conference-recap-grace-hopper.html" rel="nofollow">The FreeBSD Foundation gives a great final overview of the Grace Hopper Conference</a></p></li>
<li><p><a href="https://medium.com/@jmmv/compilers-in-the-bsd-base-system-1c4515a18c49" rel="nofollow">A dialog about Compilers in the (BSD) base system</a></p></li>
<li><p><a href="https://www.youtube.com/watch?v=1q5aDEt18mw" rel="nofollow">One upping their 48-core work from July, The Semihalf team shows off their the 96-core SMP support for FreeBSD on Cavium ThunderX (ARMv8 architecture</a></p></li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/talk/2015-October/016384.html" rel="nofollow">NYC Bug&#39;s November meeting will be featuring a talk by Stephen R. Bourne</a></h3>

<h3><a href="http://garbage.fm/" rel="nofollow">New not-just-BSD postcast, hosted by two OpenBSD devs Brandon Mercer and Joshua Stein</a></h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21wjbhCJ4" rel="nofollow"> Stefan </a> </li>
<li><a href="http://slexy.org/view/s21TbKS5t0" rel="nofollow"> Zach </a> </li>
<li><a href="http://slexy.org/view/s20AkO1i1R" rel="nofollow"> Jake </a> </li>
<li><a href="http://slexy.org/view/s2nrUMatU5" rel="nofollow"> Corey </a> </li>
<li><p><a href="http://slexy.org/view/s2pZsC7arX" rel="nofollow"> Robroy </a> </p>

<hr></li>
<li><p>Send questions, comments, show ideas/topics, or stories you want mentioned on the show to <br>
<a href="mailto:feedback@bsdnow.tv" rel="nofollow">feedback@bsdnow.tv</a></p></li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>113: What’s Next for BSD?</title>
  <link>https://www.bsdnow.tv/113</link>
  <guid isPermaLink="false">894b07bf-05ec-4da1-aeb5-9850cfdd6880</guid>
  <pubDate>Wed, 28 Oct 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/894b07bf-05ec-4da1-aeb5-9850cfdd6880.mp3" length="83640388" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on this week’s episode, we have an interview</itunes:subtitle>
  <itunes:duration>2:19:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on this week’s episode, we have an interview&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise &amp;lt;br&amp;gt;
Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud &amp;lt;br&amp;gt;
Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups &amp;lt;br&amp;gt;
for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h4&gt;&lt;a href="https://www.ixsystems.com/missioncomplete/" target="_blank" rel="nofollow noopener"&gt;iX Systems Mission Complete&lt;/a&gt;&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdsec.net/articles/openbsd-5-8-released" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.8 is released on the 20th birthday of the OpenBSD project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;5.8 has landed, and just in time for the 20th birthday of OpenBSD, Oct 18th&lt;/li&gt;
&lt;li&gt;A long list of changes can be found on the release announcement, but here’s a small scattering of them&lt;/li&gt;
&lt;li&gt;Drivers for new hardware, such as:

&lt;ul&gt;
&lt;li&gt;rtwn = Realtek RTL8188CE wifi&lt;/li&gt;
&lt;li&gt;hpb = HyperTransport bridge in IBM CPC945&lt;/li&gt;
&lt;li&gt;Improved sensor support for upd driver (USB power devices)&lt;/li&gt;
&lt;li&gt;Jumbo frame support on re driver, using RTL8168C/D/E/F/G and RTL8411&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Updated to installer, improve autoinstall, and questions about SSH setup&lt;/li&gt;
&lt;li&gt;Sudo in base has been replace with “doas”, sudo moved to package tree&lt;/li&gt;
&lt;li&gt;New file(1) command with sandboxing and priv separation&lt;/li&gt;
&lt;li&gt;The tame(2) API WiP&lt;/li&gt;
&lt;li&gt;Improvements to the httpd(8) daemon, such as support for lua pattern matching redirections&lt;/li&gt;
&lt;li&gt;Bugfixes and the security updates to OpenSMTPD 5.4.4&lt;/li&gt;
&lt;li&gt;LibreSSL security fixes, removed SSLv3 support from openssl(1) (Still working on nuking SSLv3 from all ports)&lt;/li&gt;
&lt;li&gt;And much more, too much to mention here, read the notes for all the gory details!&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;OpenBSD Developer Interviews&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;To go along with the 20th birthday, we have a whole slew of new interviews brought to us by the beastie.pl team. English and Polish are both provided, so be sure not to miss these!

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://beastie.pl/deweloperzy-openbsd-dmitrij-d-czarkoff/" target="_blank" rel="nofollow noopener"&gt;Dmitrij D. Czarkoff&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://beastie.pl/deweloperzy-openbsd-vadim-zhukov/" target="_blank" rel="nofollow noopener"&gt;Vadim Zhukov&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://beastie.pl/deweloperzy-openbsd-marc-espie/" target="_blank" rel="nofollow noopener"&gt;Marc Espie&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://beastie.pl/deweloperzy-openbsd-bryan-steele/" target="_blank" rel="nofollow noopener"&gt;Bryan Steele&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://beastie.pl/deweloperzy-openbsd-ingo-schwarze/" target="_blank" rel="nofollow noopener"&gt;Ingo Schwarze&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://beastie.pl/deweloperzy-openbsd-gilles-chehade/" target="_blank" rel="nofollow noopener"&gt;Gilles Chehade&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://lists.freebsd.org/pipermail/freebsd-x11/2015-October/016758.html" target="_blank" rel="nofollow noopener"&gt;Jean-Sébastien Pédron has submitted a call for testing out the neIntel i915 driver&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A very eagerly awaited feature, Haswell GPU support has begun the testing process&lt;/li&gt;
&lt;li&gt;The main developer, Jean-Sébastien Pédron &lt;a href="mailto:dumbbell@freebsd.org" target="_blank" rel="nofollow noopener"&gt;dumbbell@freebsd.org&lt;/a&gt;  looking for users to test the patch, both those that have older supported cards (Sandybridge, Ivybridge) that are currently working, and users with Haswell devices that have, until now, not been supported&lt;/li&gt;
&lt;li&gt;Included is a link to the Wiki with instructions on how to enable debugging, and grab the updated branch of FreeBSD with the graphical improvements. Jean-Sébastien is calling for testers to send results both good and bad over to the freebsd-x11 mailing lists&lt;/li&gt;
&lt;li&gt;For those who want an “out of box solution” the next PC-BSD 11.0-CURRENT November images will include these changes as well&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h3&gt;&lt;a href="http://www.cyberciti.biz/faq/how-to-install-freebsd-on-raspberry-pi-2-model-b/" target="_blank" rel="nofollow noopener"&gt;How to install FreeBSD on a Raspberry Pi 2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We have a nice walkthrough this week on how to install FreeBSD, both 
10 or 11-CURRENT on a RPi 2!&lt;/li&gt;
&lt;li&gt;The walkthrough shows us how to use OSX to copy the image to SD card, 
then booting.&lt;/li&gt;
&lt;li&gt;In this case, we have him using a USB to serial cable to capture 
output with screen&lt;/li&gt;
&lt;li&gt;This is a pretty quick way for users sitting on a RPi2 to get up and 
running with FreeBSD &lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Jordan Hubbard - &lt;a href="mailto:email@email" target="_blank" rel="nofollow noopener"&gt;jkh@ixsystems.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.nextbsd.org/" target="_blank" rel="nofollow noopener"&gt;NextBSD&lt;/a&gt; | &lt;a href="https://github.com/NextBSD/NextBSD" target="_blank" rel="nofollow noopener"&gt;NextBSD Github&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Beastie Bits&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://marc.info/?l=openbsd-misc&amp;amp;m=144515087006177&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD's Source Tree turned 20 on October 18th&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://plus.google.com/+GhostbsdOrg/posts/JoNZzrKrhtB" target="_blank" rel="nofollow noopener"&gt;GhostBSD working on Graphical ZFS Configuration Utility&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/channel/UCz6C-szau90f9Vn07A6W2aA/videos" target="_blank" rel="nofollow noopener"&gt;EuroBSDcon 2014 videos finally online&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.mun.ca/postdoc/tc-postdoc-2015.pdf" target="_blank" rel="nofollow noopener"&gt;Postdoctoral research position at Memorial University is open&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-009.txt.asc" target="_blank" rel="nofollow noopener"&gt;NetBSD Security Advisory: TCP LAST_ACK memory exhaustion, reported by NetFlix and Juniper &lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.desktopbsd.net/forums/threads/desktopbsd-2-0-roadmap.798/" target="_blank" rel="nofollow noopener"&gt;DesktopBSD making a comeback?&lt;/a&gt; &lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20PllfFXt" target="_blank" rel="nofollow noopener"&gt; Steve &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21jJm1lFN" target="_blank" rel="nofollow noopener"&gt; Ben &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20TsrN3uq" target="_blank" rel="nofollow noopener"&gt; Frank &lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20AydOevW" target="_blank" rel="nofollow noopener"&gt; Tyler &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on this week’s episode, we have an interview</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img <br>
src="/images/1.png" alt="iXsystems - Enterprise <br>
Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud <br>
Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups <br>
for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://bsdsec.net/articles/openbsd-5-8-released" rel="nofollow">OpenBSD 5.8 is released on the 20th birthday of the OpenBSD project</a></h3>

<ul>
<li>5.8 has landed, and just in time for the 20th birthday of OpenBSD, Oct 18th</li>
<li>A long list of changes can be found on the release announcement, but here’s a small scattering of them</li>
<li>Drivers for new hardware, such as:

<ul>
<li>rtwn = Realtek RTL8188CE wifi</li>
<li>hpb = HyperTransport bridge in IBM CPC945</li>
<li>Improved sensor support for upd driver (USB power devices)</li>
<li>Jumbo frame support on re driver, using RTL8168C/D/E/F/G and RTL8411</li>
</ul></li>
<li>Updated to installer, improve autoinstall, and questions about SSH setup</li>
<li>Sudo in base has been replace with “doas”, sudo moved to package tree</li>
<li>New file(1) command with sandboxing and priv separation</li>
<li>The tame(2) API WiP</li>
<li>Improvements to the httpd(8) daemon, such as support for lua pattern matching redirections</li>
<li>Bugfixes and the security updates to OpenSMTPD 5.4.4</li>
<li>LibreSSL security fixes, removed SSLv3 support from openssl(1) (Still working on nuking SSLv3 from all ports)</li>
<li>And much more, too much to mention here, read the notes for all the gory details!</li>
</ul>

<hr>

<h2>OpenBSD Developer Interviews</h2>

<ul>
<li>To go along with the 20th birthday, we have a whole slew of new interviews brought to us by the beastie.pl team. English and Polish are both provided, so be sure not to miss these!

<ul>
<li><a href="http://beastie.pl/deweloperzy-openbsd-dmitrij-d-czarkoff/" rel="nofollow">Dmitrij D. Czarkoff</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-vadim-zhukov/" rel="nofollow">Vadim Zhukov</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-marc-espie/" rel="nofollow">Marc Espie</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-bryan-steele/" rel="nofollow">Bryan Steele</a> </li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-ingo-schwarze/" rel="nofollow">Ingo Schwarze</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-gilles-chehade/" rel="nofollow">Gilles Chehade</a> </li>
</ul></li>
</ul>

<hr>

<h3><a href="http://lists.freebsd.org/pipermail/freebsd-x11/2015-October/016758.html" rel="nofollow">Jean-Sébastien Pédron has submitted a call for testing out the neIntel i915 driver</a></h3>

<ul>
<li>A very eagerly awaited feature, Haswell GPU support has begun the testing process</li>
<li>The main developer, Jean-Sébastien Pédron <a href="mailto:dumbbell@freebsd.org" rel="nofollow">dumbbell@freebsd.org</a>  looking for users to test the patch, both those that have older supported cards (Sandybridge, Ivybridge) that are currently working, and users with Haswell devices that have, until now, not been supported</li>
<li>Included is a link to the Wiki with instructions on how to enable debugging, and grab the updated branch of FreeBSD with the graphical improvements. Jean-Sébastien is calling for testers to send results both good and bad over to the freebsd-x11 mailing lists</li>
<li>For those who want an “out of box solution” the next PC-BSD 11.0-CURRENT November images will include these changes as well</li>
</ul>

<hr>

<h3><a href="http://www.cyberciti.biz/faq/how-to-install-freebsd-on-raspberry-pi-2-model-b/" rel="nofollow">How to install FreeBSD on a Raspberry Pi 2</a></h3>

<ul>
<li>We have a nice walkthrough this week on how to install FreeBSD, both 
10 or 11-CURRENT on a RPi 2!</li>
<li>The walkthrough shows us how to use OSX to copy the image to SD card, 
then booting.</li>
<li>In this case, we have him using a USB to serial cable to capture 
output with screen</li>
<li>This is a pretty quick way for users sitting on a RPi2 to get up and 
running with FreeBSD </li>
</ul>

<hr>

<h2>Interview - Jordan Hubbard - <a href="mailto:email@email" rel="nofollow">jkh@ixsystems.com</a></h2>

<p><a href="http://www.nextbsd.org/" rel="nofollow">NextBSD</a> | <a href="https://github.com/NextBSD/NextBSD" rel="nofollow">NextBSD Github</a></p>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://marc.info/?l=openbsd-misc&m=144515087006177&w=2" rel="nofollow">OpenBSD&#39;s Source Tree turned 20 on October 18th</a></p>

<p><a href="https://plus.google.com/+GhostbsdOrg/posts/JoNZzrKrhtB" rel="nofollow">GhostBSD working on Graphical ZFS Configuration Utility</a></p>

<p><a href="https://www.youtube.com/channel/UCz6C-szau90f9Vn07A6W2aA/videos" rel="nofollow">EuroBSDcon 2014 videos finally online</a></p>

<p><a href="http://www.mun.ca/postdoc/tc-postdoc-2015.pdf" rel="nofollow">Postdoctoral research position at Memorial University is open</a></p>

<p><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-009.txt.asc" rel="nofollow">NetBSD Security Advisory: TCP LAST_ACK memory exhaustion, reported by NetFlix and Juniper </a> </p>

<p><a href="http://www.desktopbsd.net/forums/threads/desktopbsd-2-0-roadmap.798/" rel="nofollow">DesktopBSD making a comeback?</a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20PllfFXt" rel="nofollow"> Steve </a> </li>
<li><a href="http://slexy.org/view/s21jJm1lFN" rel="nofollow"> Ben </a> </li>
<li><a href="http://slexy.org/view/s20TsrN3uq" rel="nofollow"> Frank </a> </li>
<li><a href="http://slexy.org/view/s20AydOevW" rel="nofollow"> Tyler </a></li>
</ul>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on this week’s episode, we have an interview</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img <br>
src="/images/1.png" alt="iXsystems - Enterprise <br>
Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud <br>
Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups <br>
for the Truly Paranoid" /></a></p>

<h4><a href="https://www.ixsystems.com/missioncomplete/" rel="nofollow">iX Systems Mission Complete</a></h4>

<ul>
<li>Submit your story of how you accomplished a mission with FreeBSD, FreeNAS, or iXsystems hardware, and you could win monthly prizes, and have your story featured in the FreeBSD Journal!
***</li>
</ul>

<h2>Headlines</h2>

<h3><a href="http://bsdsec.net/articles/openbsd-5-8-released" rel="nofollow">OpenBSD 5.8 is released on the 20th birthday of the OpenBSD project</a></h3>

<ul>
<li>5.8 has landed, and just in time for the 20th birthday of OpenBSD, Oct 18th</li>
<li>A long list of changes can be found on the release announcement, but here’s a small scattering of them</li>
<li>Drivers for new hardware, such as:

<ul>
<li>rtwn = Realtek RTL8188CE wifi</li>
<li>hpb = HyperTransport bridge in IBM CPC945</li>
<li>Improved sensor support for upd driver (USB power devices)</li>
<li>Jumbo frame support on re driver, using RTL8168C/D/E/F/G and RTL8411</li>
</ul></li>
<li>Updated to installer, improve autoinstall, and questions about SSH setup</li>
<li>Sudo in base has been replace with “doas”, sudo moved to package tree</li>
<li>New file(1) command with sandboxing and priv separation</li>
<li>The tame(2) API WiP</li>
<li>Improvements to the httpd(8) daemon, such as support for lua pattern matching redirections</li>
<li>Bugfixes and the security updates to OpenSMTPD 5.4.4</li>
<li>LibreSSL security fixes, removed SSLv3 support from openssl(1) (Still working on nuking SSLv3 from all ports)</li>
<li>And much more, too much to mention here, read the notes for all the gory details!</li>
</ul>

<hr>

<h2>OpenBSD Developer Interviews</h2>

<ul>
<li>To go along with the 20th birthday, we have a whole slew of new interviews brought to us by the beastie.pl team. English and Polish are both provided, so be sure not to miss these!

<ul>
<li><a href="http://beastie.pl/deweloperzy-openbsd-dmitrij-d-czarkoff/" rel="nofollow">Dmitrij D. Czarkoff</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-vadim-zhukov/" rel="nofollow">Vadim Zhukov</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-marc-espie/" rel="nofollow">Marc Espie</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-bryan-steele/" rel="nofollow">Bryan Steele</a> </li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-ingo-schwarze/" rel="nofollow">Ingo Schwarze</a></li>
<li><a href="http://beastie.pl/deweloperzy-openbsd-gilles-chehade/" rel="nofollow">Gilles Chehade</a> </li>
</ul></li>
</ul>

<hr>

<h3><a href="http://lists.freebsd.org/pipermail/freebsd-x11/2015-October/016758.html" rel="nofollow">Jean-Sébastien Pédron has submitted a call for testing out the neIntel i915 driver</a></h3>

<ul>
<li>A very eagerly awaited feature, Haswell GPU support has begun the testing process</li>
<li>The main developer, Jean-Sébastien Pédron <a href="mailto:dumbbell@freebsd.org" rel="nofollow">dumbbell@freebsd.org</a>  looking for users to test the patch, both those that have older supported cards (Sandybridge, Ivybridge) that are currently working, and users with Haswell devices that have, until now, not been supported</li>
<li>Included is a link to the Wiki with instructions on how to enable debugging, and grab the updated branch of FreeBSD with the graphical improvements. Jean-Sébastien is calling for testers to send results both good and bad over to the freebsd-x11 mailing lists</li>
<li>For those who want an “out of box solution” the next PC-BSD 11.0-CURRENT November images will include these changes as well</li>
</ul>

<hr>

<h3><a href="http://www.cyberciti.biz/faq/how-to-install-freebsd-on-raspberry-pi-2-model-b/" rel="nofollow">How to install FreeBSD on a Raspberry Pi 2</a></h3>

<ul>
<li>We have a nice walkthrough this week on how to install FreeBSD, both 
10 or 11-CURRENT on a RPi 2!</li>
<li>The walkthrough shows us how to use OSX to copy the image to SD card, 
then booting.</li>
<li>In this case, we have him using a USB to serial cable to capture 
output with screen</li>
<li>This is a pretty quick way for users sitting on a RPi2 to get up and 
running with FreeBSD </li>
</ul>

<hr>

<h2>Interview - Jordan Hubbard - <a href="mailto:email@email" rel="nofollow">jkh@ixsystems.com</a></h2>

<p><a href="http://www.nextbsd.org/" rel="nofollow">NextBSD</a> | <a href="https://github.com/NextBSD/NextBSD" rel="nofollow">NextBSD Github</a></p>

<hr>

<h2>Beastie Bits</h2>

<p><a href="https://marc.info/?l=openbsd-misc&m=144515087006177&w=2" rel="nofollow">OpenBSD&#39;s Source Tree turned 20 on October 18th</a></p>

<p><a href="https://plus.google.com/+GhostbsdOrg/posts/JoNZzrKrhtB" rel="nofollow">GhostBSD working on Graphical ZFS Configuration Utility</a></p>

<p><a href="https://www.youtube.com/channel/UCz6C-szau90f9Vn07A6W2aA/videos" rel="nofollow">EuroBSDcon 2014 videos finally online</a></p>

<p><a href="http://www.mun.ca/postdoc/tc-postdoc-2015.pdf" rel="nofollow">Postdoctoral research position at Memorial University is open</a></p>

<p><a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2015-009.txt.asc" rel="nofollow">NetBSD Security Advisory: TCP LAST_ACK memory exhaustion, reported by NetFlix and Juniper </a> </p>

<p><a href="http://www.desktopbsd.net/forums/threads/desktopbsd-2-0-roadmap.798/" rel="nofollow">DesktopBSD making a comeback?</a> </p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20PllfFXt" rel="nofollow"> Steve </a> </li>
<li><a href="http://slexy.org/view/s21jJm1lFN" rel="nofollow"> Ben </a> </li>
<li><a href="http://slexy.org/view/s20TsrN3uq" rel="nofollow"> Frank </a> </li>
<li><a href="http://slexy.org/view/s20AydOevW" rel="nofollow"> Tyler </a></li>
</ul>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>112: Tracing the source</title>
  <link>https://www.bsdnow.tv/112</link>
  <guid isPermaLink="false">c85e2b31-1e84-4751-8348-25bcba47d013</guid>
  <pubDate>Wed, 21 Oct 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c85e2b31-1e84-4751-8348-25bcba47d013.mp3" length="42396340" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week Allan is away at a ZFS conference, so it seems</itunes:subtitle>
  <itunes:duration>58:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week Allan is away at a ZFS conference, so it seems&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise &amp;lt;br&amp;gt;
Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud &amp;lt;br&amp;gt;
Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups &amp;lt;br&amp;gt;
for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1854" target="_blank" rel="nofollow noopener"&gt;pfsense - 2.3 alpha snapshots available&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://doc.pfsense.org/index.php/2.3_New_Features_and_Changes" target="_blank" rel="nofollow noopener"&gt;pfsense 2.3 Features and Changes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The entire front end has been re-written&lt;/li&gt;
&lt;li&gt;Upgrade of base OS to FreeBSD 10-STABLE&lt;/li&gt;
&lt;li&gt;The PPTP server component has been removed,&lt;/li&gt;
&lt;li&gt;PBIs have been replaced with pkg&lt;/li&gt;
&lt;li&gt;PHP upgraded to 5.6&lt;/li&gt;
&lt;li&gt;The web interface has been converted to Bootstrap
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/download/bsd-09-2015/" target="_blank" rel="nofollow noopener"&gt;BSDMag October 2015 out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A Look at the New PC-BSD 10.2 - Kris Moore&lt;/li&gt;
&lt;li&gt;Basis Of The Lumina Desktop Environment 18 - Ken Moore&lt;/li&gt;
&lt;li&gt;A Secure Webserver on FreeBSD with Hiawatha - David Carlier&lt;/li&gt;
&lt;li&gt;Defeating CryptoLocker Attacks with ZFS - Michael Dexter&lt;/li&gt;
&lt;li&gt;Emerging Technology Has Increasingly Been a Force for Both Good and 
Evil - Rob Somerville&lt;/li&gt;
&lt;li&gt;Interviews with: Dru Lavigne, Luca Ferrari, Oleksandr Rybalko
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-15-7-14-released/" target="_blank" rel="nofollow noopener"&gt;OpnSense 15.7.14 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another update to OpnSense has landed!&lt;/li&gt;
&lt;li&gt;Some of the notable takeaways this time are that it isn’t a 
security update&lt;/li&gt;
&lt;li&gt;Major rework of the firewall rules sections including, rules, 
schedules, virtual ip, nat and aliases pages&lt;/li&gt;
&lt;li&gt;Latest BIND and Squid packages&lt;/li&gt;
&lt;li&gt;Improved configuration management, including fixes to importing an old 
config file. New location for configuration history / backups. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=144327954931983&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD in Toyota Highlander&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://imgur.com/a/SMVdp" target="_blank" rel="nofollow noopener"&gt;Images&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;While looking through the ‘Software Information’ screen of a Toyota Highlander, Chad Dougherty of the ACM found a bunch of OpenBSD copyright notices&lt;/li&gt;
&lt;li&gt;At least one of which I recognize as OpenCrypto, because of the comment about “transforms”&lt;/li&gt;
&lt;li&gt;It is likely that the vehicle is running QNX, which contains various bits of BSD&lt;/li&gt;
&lt;li&gt;&lt;a href="http://support7.qnx.com/download/download/25111/TPLTL.v2.17.Jul23-13.pdf" target="_blank" rel="nofollow noopener"&gt;QNX: Third Party License Terms List version 2.17&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Some highlights

&lt;ul&gt;
&lt;li&gt;Robert N. M. Watson (FreeBSD)&lt;/li&gt;
&lt;li&gt;TrustedBSD Project (FreeBSD)&lt;/li&gt;
&lt;li&gt;NetBSD Foundation&lt;/li&gt;
&lt;li&gt;NASA Ames Research Center (NetBSD)&lt;/li&gt;
&lt;li&gt;Damien Miller (OpenBSD)&lt;/li&gt;
&lt;li&gt;Theo de Raadt (OpenBSD)&lt;/li&gt;
&lt;li&gt;Sony Computer Science Laboratories Inc.&lt;/li&gt;
&lt;li&gt;Bob Beck (OpenBSD)&lt;/li&gt;
&lt;li&gt;Christos Zoulas (NetBSD)&lt;/li&gt;
&lt;li&gt;Markus Friedl (OpenBSD)&lt;/li&gt;
&lt;li&gt;Henning Brauer (OpenBSD)&lt;/li&gt;
&lt;li&gt;Network Associates Technology, Inc. (FreeBSD)&lt;/li&gt;
&lt;li&gt;100s of others&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;OpenSSH seems to be included&lt;/li&gt;
&lt;li&gt;It also seems to contain tcpdump for some reason&lt;/li&gt;
&lt;/ul&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Adam Leventhal -&lt;/h2&gt;

&lt;p&gt;&lt;a href="mailto:adam.leventhal@delphix.com" target="_blank" rel="nofollow noopener"&gt;adam.leventhal@delphix.com&lt;/a&gt; / &lt;br&gt;
&lt;a href="https://twitter.com/ahl" target="_blank" rel="nofollow noopener"&gt;@ahl&lt;/a&gt;&lt;br&gt;
ZFS and DTrace&lt;/p&gt;

&lt;hr&gt;

&lt;h3&gt;Beastie-Bits&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-September/057572.html" target="_blank" rel="nofollow noopener"&gt;isboot, an iSCSI boot driver for FreeBSD 9 and 10&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=144469071208559&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;tame() is now called pledge() &lt;/a&gt;&lt;br&gt;
&lt;a href="http://beastie.pl/deweloperzy-netbsd-7-0-leonardo-taccari/" target="_blank" rel="nofollow noopener"&gt;Interview with NetBSD developer Leoardo &lt;br&gt;
Taccari&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://fuguita.org/index.php?FuguIta" target="_blank" rel="nofollow noopener"&gt;Fuguita releases LiveCD based on OpenBSD 5.8&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/source-changes/2015/09/30/msg069173.html" target="_blank" rel="nofollow noopener"&gt;Dtrace toolkit gets an update and imported into NetBSD&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://www.tecmint.com/how-to-setup-failover-and-load-balancing-in-pfsense/" target="_blank" rel="nofollow noopener"&gt;An older article about how to do failover / load-balancing in pfsense&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s217HyOZ9U" target="_blank" rel="nofollow noopener"&gt; Michael writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2YODjppwX" target="_blank" rel="nofollow noopener"&gt; Possniffer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21xltQ6jd" target="_blank" rel="nofollow noopener"&gt; Erno writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto,</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week Allan is away at a ZFS conference, so it seems</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img <br>
src="/images/1.png" alt="iXsystems - Enterprise <br>
Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud <br>
Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups <br>
for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1854" rel="nofollow">pfsense - 2.3 alpha snapshots available</a></h3>

<ul>
<li><a href="https://doc.pfsense.org/index.php/2.3_New_Features_and_Changes" rel="nofollow">pfsense 2.3 Features and Changes</a></li>
<li>The entire front end has been re-written</li>
<li>Upgrade of base OS to FreeBSD 10-STABLE</li>
<li>The PPTP server component has been removed,</li>
<li>PBIs have been replaced with pkg</li>
<li>PHP upgraded to 5.6</li>
<li>The web interface has been converted to Bootstrap
***</li>
</ul>

<h3><a href="http://bsdmag.org/download/bsd-09-2015/" rel="nofollow">BSDMag October 2015 out</a></h3>

<ul>
<li>A Look at the New PC-BSD 10.2 - Kris Moore</li>
<li>Basis Of The Lumina Desktop Environment 18 - Ken Moore</li>
<li>A Secure Webserver on FreeBSD with Hiawatha - David Carlier</li>
<li>Defeating CryptoLocker Attacks with ZFS - Michael Dexter</li>
<li>Emerging Technology Has Increasingly Been a Force for Both Good and 
Evil - Rob Somerville</li>
<li>Interviews with: Dru Lavigne, Luca Ferrari, Oleksandr Rybalko
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-15-7-14-released/" rel="nofollow">OpnSense 15.7.14 Released</a></h3>

<ul>
<li>Another update to OpnSense has landed!</li>
<li>Some of the notable takeaways this time are that it isn’t a 
security update</li>
<li>Major rework of the firewall rules sections including, rules, 
schedules, virtual ip, nat and aliases pages</li>
<li>Latest BIND and Squid packages</li>
<li>Improved configuration management, including fixes to importing an old 
config file. New location for configuration history / backups. 
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=144327954931983&w=2" rel="nofollow">OpenBSD in Toyota Highlander</a></h3>

<ul>
<li><a href="http://imgur.com/a/SMVdp" rel="nofollow">Images</a></li>
<li>While looking through the ‘Software Information’ screen of a Toyota Highlander, Chad Dougherty of the ACM found a bunch of OpenBSD copyright notices</li>
<li>At least one of which I recognize as OpenCrypto, because of the comment about “transforms”</li>
<li>It is likely that the vehicle is running QNX, which contains various bits of BSD</li>
<li><a href="http://support7.qnx.com/download/download/25111/TPLTL.v2.17.Jul23-13.pdf" rel="nofollow">QNX: Third Party License Terms List version 2.17</a></li>
<li>Some highlights

<ul>
<li>Robert N. M. Watson (FreeBSD)</li>
<li>TrustedBSD Project (FreeBSD)</li>
<li>NetBSD Foundation</li>
<li>NASA Ames Research Center (NetBSD)</li>
<li>Damien Miller (OpenBSD)</li>
<li>Theo de Raadt (OpenBSD)</li>
<li>Sony Computer Science Laboratories Inc.</li>
<li>Bob Beck (OpenBSD)</li>
<li>Christos Zoulas (NetBSD)</li>
<li>Markus Friedl (OpenBSD)</li>
<li>Henning Brauer (OpenBSD)</li>
<li>Network Associates Technology, Inc. (FreeBSD)</li>
<li>100s of others</li>
</ul></li>
<li>OpenSSH seems to be included</li>
<li>It also seems to contain tcpdump for some reason</li>
</ul>

<hr>

<h2>Interview - Adam Leventhal -</h2>

<p><a href="mailto:adam.leventhal@delphix.com" rel="nofollow">adam.leventhal@delphix.com</a> / <br>
<a href="https://twitter.com/ahl" rel="nofollow">@ahl</a><br>
ZFS and DTrace</p>

<hr>

<h3>Beastie-Bits</h3>

<p><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-September/057572.html" rel="nofollow">isboot, an iSCSI boot driver for FreeBSD 9 and 10</a></p>

<p><a href="http://marc.info/?l=openbsd-tech&m=144469071208559&w=2" rel="nofollow">tame() is now called pledge() </a><br>
<a href="http://beastie.pl/deweloperzy-netbsd-7-0-leonardo-taccari/" rel="nofollow">Interview with NetBSD developer Leoardo <br>
Taccari</a></p>

<p><a href="http://fuguita.org/index.php?FuguIta" rel="nofollow">Fuguita releases LiveCD based on OpenBSD 5.8</a></p>

<p><a href="http://mail-index.netbsd.org/source-changes/2015/09/30/msg069173.html" rel="nofollow">Dtrace toolkit gets an update and imported into NetBSD</a></p>

<p><a href="http://www.tecmint.com/how-to-setup-failover-and-load-balancing-in-pfsense/" rel="nofollow">An older article about how to do failover / load-balancing in pfsense</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s217HyOZ9U" rel="nofollow"> Michael writes in</a></li>
<li><a href="http://slexy.org/view/s2YODjppwX" rel="nofollow"> Possniffer writes in</a></li>
<li><a href="http://slexy.org/view/s21xltQ6jd" rel="nofollow"> Erno writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week Allan is away at a ZFS conference, so it seems</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img <br>
src="/images/1.png" alt="iXsystems - Enterprise <br>
Servers and Storage for Open Source" /></a><a <br>
href="http://www.digitalocean.com/" title="DigitalOcean"><img <br>
src="/images/2.png" alt="DigitalOcean - Simple Cloud <br>
Hosting, Built for Developers" /></a><a <br>
href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img <br>
src="/images/3.png" alt="Tarsnap - Online Backups <br>
for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1854" rel="nofollow">pfsense - 2.3 alpha snapshots available</a></h3>

<ul>
<li><a href="https://doc.pfsense.org/index.php/2.3_New_Features_and_Changes" rel="nofollow">pfsense 2.3 Features and Changes</a></li>
<li>The entire front end has been re-written</li>
<li>Upgrade of base OS to FreeBSD 10-STABLE</li>
<li>The PPTP server component has been removed,</li>
<li>PBIs have been replaced with pkg</li>
<li>PHP upgraded to 5.6</li>
<li>The web interface has been converted to Bootstrap
***</li>
</ul>

<h3><a href="http://bsdmag.org/download/bsd-09-2015/" rel="nofollow">BSDMag October 2015 out</a></h3>

<ul>
<li>A Look at the New PC-BSD 10.2 - Kris Moore</li>
<li>Basis Of The Lumina Desktop Environment 18 - Ken Moore</li>
<li>A Secure Webserver on FreeBSD with Hiawatha - David Carlier</li>
<li>Defeating CryptoLocker Attacks with ZFS - Michael Dexter</li>
<li>Emerging Technology Has Increasingly Been a Force for Both Good and 
Evil - Rob Somerville</li>
<li>Interviews with: Dru Lavigne, Luca Ferrari, Oleksandr Rybalko
***</li>
</ul>

<h3><a href="https://opnsense.org/opnsense-15-7-14-released/" rel="nofollow">OpnSense 15.7.14 Released</a></h3>

<ul>
<li>Another update to OpnSense has landed!</li>
<li>Some of the notable takeaways this time are that it isn’t a 
security update</li>
<li>Major rework of the firewall rules sections including, rules, 
schedules, virtual ip, nat and aliases pages</li>
<li>Latest BIND and Squid packages</li>
<li>Improved configuration management, including fixes to importing an old 
config file. New location for configuration history / backups. 
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=144327954931983&w=2" rel="nofollow">OpenBSD in Toyota Highlander</a></h3>

<ul>
<li><a href="http://imgur.com/a/SMVdp" rel="nofollow">Images</a></li>
<li>While looking through the ‘Software Information’ screen of a Toyota Highlander, Chad Dougherty of the ACM found a bunch of OpenBSD copyright notices</li>
<li>At least one of which I recognize as OpenCrypto, because of the comment about “transforms”</li>
<li>It is likely that the vehicle is running QNX, which contains various bits of BSD</li>
<li><a href="http://support7.qnx.com/download/download/25111/TPLTL.v2.17.Jul23-13.pdf" rel="nofollow">QNX: Third Party License Terms List version 2.17</a></li>
<li>Some highlights

<ul>
<li>Robert N. M. Watson (FreeBSD)</li>
<li>TrustedBSD Project (FreeBSD)</li>
<li>NetBSD Foundation</li>
<li>NASA Ames Research Center (NetBSD)</li>
<li>Damien Miller (OpenBSD)</li>
<li>Theo de Raadt (OpenBSD)</li>
<li>Sony Computer Science Laboratories Inc.</li>
<li>Bob Beck (OpenBSD)</li>
<li>Christos Zoulas (NetBSD)</li>
<li>Markus Friedl (OpenBSD)</li>
<li>Henning Brauer (OpenBSD)</li>
<li>Network Associates Technology, Inc. (FreeBSD)</li>
<li>100s of others</li>
</ul></li>
<li>OpenSSH seems to be included</li>
<li>It also seems to contain tcpdump for some reason</li>
</ul>

<hr>

<h2>Interview - Adam Leventhal -</h2>

<p><a href="mailto:adam.leventhal@delphix.com" rel="nofollow">adam.leventhal@delphix.com</a> / <br>
<a href="https://twitter.com/ahl" rel="nofollow">@ahl</a><br>
ZFS and DTrace</p>

<hr>

<h3>Beastie-Bits</h3>

<p><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-September/057572.html" rel="nofollow">isboot, an iSCSI boot driver for FreeBSD 9 and 10</a></p>

<p><a href="http://marc.info/?l=openbsd-tech&m=144469071208559&w=2" rel="nofollow">tame() is now called pledge() </a><br>
<a href="http://beastie.pl/deweloperzy-netbsd-7-0-leonardo-taccari/" rel="nofollow">Interview with NetBSD developer Leoardo <br>
Taccari</a></p>

<p><a href="http://fuguita.org/index.php?FuguIta" rel="nofollow">Fuguita releases LiveCD based on OpenBSD 5.8</a></p>

<p><a href="http://mail-index.netbsd.org/source-changes/2015/09/30/msg069173.html" rel="nofollow">Dtrace toolkit gets an update and imported into NetBSD</a></p>

<p><a href="http://www.tecmint.com/how-to-setup-failover-and-load-balancing-in-pfsense/" rel="nofollow">An older article about how to do failover / load-balancing in pfsense</a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s217HyOZ9U" rel="nofollow"> Michael writes in</a></li>
<li><a href="http://slexy.org/view/s2YODjppwX" rel="nofollow"> Possniffer writes in</a></li>
<li><a href="http://slexy.org/view/s21xltQ6jd" rel="nofollow"> Erno writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>111: Xenocratic Oath</title>
  <link>https://www.bsdnow.tv/111</link>
  <guid isPermaLink="false">f858706f-01c9-4fa1-bca3-07c9fd71554b</guid>
  <pubDate>Wed, 14 Oct 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f858706f-01c9-4fa1-bca3-07c9fd71554b.mp3" length="44653396" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on this weeks episode, we have BSD news, tidbits and articles out the wazoo to share. Also, be sure to stick around for our interview with Brandon Mercer as he tells us about OpenBSD being used in the healthcare industry.</itunes:subtitle>
  <itunes:duration>1:02:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on this weeks episode, we have BSD news, tidbits and articles out the wazoo to share. Also, be sure to stick around for our interview with Brandon Mercer as he tells us about OpenBSD being used in the healthcare industry.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.netbsd.org/releases/formal-7/NetBSD-7.0.html" target="_blank" rel="nofollow noopener"&gt;NetBSD 7.0 Release Announcement&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DRM/KMS support brings accelerated graphics to x86 systems using modern Intel and Radeon devices (Linux 3.15)&lt;/li&gt;
&lt;li&gt;Multiprocessor ARM support.&lt;/li&gt;
&lt;li&gt;Support for many new ARM boards, including the Raspberry Pi 2 and BeagleBone Black&lt;/li&gt;
&lt;li&gt;Major NPF improvements:

&lt;ul&gt;
&lt;li&gt;BPF with just-in-time (JIT) compilation by default&lt;/li&gt;
&lt;li&gt;support for dynamic rules&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;support for static (stateless) NAT&lt;/li&gt;
&lt;li&gt;support for IPv6-to-IPv6 Network Prefix Translation (NPTv6) as per RFC 6296&lt;/li&gt;
&lt;li&gt;support for CDB based tables (uses perfect hashing and guarantees lock-free O(1) lookups)&lt;/li&gt;
&lt;li&gt;Multiprocessor support in the USB subsystem.&lt;/li&gt;
&lt;li&gt;GPT support in sysinst via the extended partitioning menu.&lt;/li&gt;
&lt;li&gt;Lua kernel scripting&lt;/li&gt;
&lt;li&gt;GCC 4.8.4, which brings support for C++11&lt;/li&gt;
&lt;li&gt;Experimental support for SSD TRIM in wd(4) and FFS&lt;/li&gt;
&lt;li&gt;tetris(6): Add colours and a 'down' key, defaulting to 'n'. It moves the block down a line, if it fits. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.cloudflare.com/single-rx-queue-kernel-bypass-with-netmap/" target="_blank" rel="nofollow noopener"&gt;CloudFlare develops interesting new netmap feature &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Normally, when Netmap is enabled on an interface, the kernel is bypassed and all of the packets go to the Netmap consumers&lt;/li&gt;
&lt;li&gt;CloudFlare has developed a feature that allows all but one of the RX queues to remain connected to the kernel, and only a single queue be passed to Netmap&lt;/li&gt;
&lt;li&gt;The change is a simple modification to the nm_open API, allowing the application to open only a specific queue of the NIC, rather than the entire thing&lt;/li&gt;
&lt;li&gt;The RSS or other hashing must be modified to not direct traffic to this queue&lt;/li&gt;
&lt;li&gt;Then specific flows are directed to the netmap application for matching traffic&lt;/li&gt;
&lt;li&gt;For example under Linux:&lt;/li&gt;
&lt;li&gt;ethtool -X eth3 weight 1 1 1 1 0 1 1 1 1 1&lt;/li&gt;
&lt;li&gt;ethtool -K eth3 lro off gro off&lt;/li&gt;
&lt;li&gt;ethtool -N eth3 flow-type udp4 dst-port 53 action 4&lt;/li&gt;
&lt;li&gt;Directs all name server traffic to NIC queue number 4&lt;/li&gt;
&lt;li&gt;Currently there is no tool like ethtool to accomplish this same under FreeBSD&lt;/li&gt;
&lt;li&gt;I wonder if the flows could be identified more specifically using something like ipfw-netmap
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.theregister.co.uk/2015/09/12/feature_last_post_build_mail_server/?mt=1442858572214" target="_blank" rel="nofollow noopener"&gt;Building your own OpenBSD based Mail server!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.theregister.co.uk/2015/09/19/feature_last_post_build_mailserver_part_2/" target="_blank" rel="nofollow noopener"&gt;part 2&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.theregister.co.uk/2015/09/26/feature_last_post_build_mailserver_part_3/" target="_blank" rel="nofollow noopener"&gt;part 3&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The UK Register gives us a great writeup on getting your own mail server setup specifically on OpenBSD 5.7&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.theregister.co.uk/2015/07/24/review_acer_revo_one_rl85_/" target="_blank" rel="nofollow noopener"&gt;In this article they used a MiniPC the Acer Revo One RL85, which is a decently priced little box for a mail server &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;While a bit lengthy in 3 parts, it does provide a good walkthrough of getting OpenBSD setup, PostFix and DoveCot configured and working. In the final installment it also provides details on spam filtering and antivirus scanning. &lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.jasper.la/openbsd-uefi-bootloader-howto/" target="_blank" rel="nofollow noopener"&gt;Getting started with the UEFI bootloader on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've been listening over the past few weeks, you've heard about OpenBSD.s new UEFI boot-loader. We now have a blog post with detailed instructions on how to get setup with this on your own system.&lt;/li&gt;
&lt;li&gt;The initial setup is pretty straightforward, and should only take a few minutes at most. In involves the usual fdisk commands to create a FAT EFI partition, and placing the bootx64.efi file in the correct location.&lt;/li&gt;
&lt;li&gt;As a bonus, we even get instructions on how to enable the frame-buffer driver on systems without native Intel video support (ThinkPad x250 in this example)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.cochard.me/2015/09/receipt-for-building-10mpps-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Recipe for building a 10Mpps FreeBSD based router&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Olivier, (of FreeNAS and BSD Router Project fame) treats us this week to a neat blog post about building your own high-performance 10Mpps FreeBSD router&lt;/li&gt;
&lt;li&gt;As he first mentions, the hardware required will need to be beefy, no $200 miniPC here. In his setup he uses a 8 core Intel Xeon E5-2650, along with a Quad port 10 Gigabit Chelsio TS540-CR.&lt;/li&gt;
&lt;li&gt;He mentions that this doesn't work quite on stock FreeBSD yet, you will need to pull code in from the &lt;a href="https://svnweb.freebsd.org/base/projects/routing/" target="_blank" rel="nofollow noopener"&gt;projects/routing &lt;/a&gt; which fixes an issue with scaling on cores, in this case he is shrinking the NIC queues down to 4 from 8.&lt;/li&gt;
&lt;li&gt;If you don't feel like doing the compiles yourself, he also includes links to experimental BSDRouter project images which he used to do the benchmarks&lt;/li&gt;
&lt;li&gt;Bonus! Nice graphic of the benchmarks from enabling IPFW or PF and what that does to the performance. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brandon Mercer - &lt;a href="mailto:bmercer@openbsd.org" target="_blank" rel="nofollow noopener"&gt;bmercer@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/knowmercymod" target="_blank" rel="nofollow noopener"&gt;@knowmercymod&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD in Healthcare&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sorry about the audio quality degradation. The last 7 or 8 minutes of the interview had to be cut, a problem with the software that captures the audio from skype and adds it to our compositor. My local monitor is analogue and did not experience the issue, so I was unaware of the issue during the recording
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://devtalk.nvidia.com/default/topic/884727/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-358-09-beta-/" target="_blank" rel="nofollow noopener"&gt;Nvidia releases new beta FreeBSD driver along with new kernel module&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Includes a new kernel module, nvidia-modeset.ko&lt;/li&gt;
&lt;li&gt;While this module does NOT have any user-settable features, it works with the existing nvidia.ko to provide kernel-mode setting (KMS) used by the integrated DRM within the kernel. &lt;/li&gt;
&lt;li&gt;The beta adds support for 805A and 960A nvidia cards&lt;/li&gt;
&lt;li&gt;Also fixes a memory leak and some regressions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.midnightbsd.org/pipermail/midnightbsd-users/Week-of-Mon-20150914/003462.html" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 0.7-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We missed this while away at Euro and elsewhere, but MidnightBSD (A desktop-focused FreeBSD 6.1 Fork) has come out with a new 0.7 release&lt;/li&gt;
&lt;li&gt;This release primarily focuses on stability, but also includes important security fixes as well. &lt;/li&gt;
&lt;li&gt;It cherry-picks updates to a variety of FreeBSD base-system updates, and some important ZFS features, such as TRIM and LZ4 compression&lt;/li&gt;
&lt;li&gt;Their custom .mports. system has also gotten a slew of updates, with almost 2000 packages now available, including a WiP of Gnome3. It also brings support for starting / stopping services automatically at pkg install or removal. &lt;/li&gt;
&lt;li&gt;They note that this will most likely be the last i386 release, joining the club of other projects that are going 64bit only. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://media.medfarm.uu.se/play/video/5400" target="_blank" rel="nofollow noopener"&gt;"Open Source as a Career Path"&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD Project held a &lt;a href="http://www.cb.uu.se/%7Ekristina/WomENcourage/2014/2015-09-25_Friday/2015-09-25%20113238.JPG" target="_blank" rel="nofollow noopener"&gt;panel discussion&lt;/a&gt; of why Open Source makes a good career path at the ACM.s womENcourage conference in Uppsala, Sweden, the weekend before EuroBSDCon&lt;/li&gt;
&lt;li&gt;The Panel was lead by Dru Lavigne, and consisted of Deb Goodkin, Benedict Reuschling, Dan Langille, and myself&lt;/li&gt;
&lt;li&gt;We attempted to provide a cross section of experiences, including women in the field, the academic side, the community side, and the business side&lt;/li&gt;
&lt;li&gt;During the question period, Dan gave a &lt;a href="https://gist.github.com/dlangille/e262bccdea08b89b5360" target="_blank" rel="nofollow noopener"&gt;great answer&lt;/a&gt; to the question of .Why do open source projects still use old technologies like mailing lists and IRC.&lt;/li&gt;
&lt;li&gt;The day before, the FreeBSD Foundation also had a booth at the career fair. We were the only open source project that attended. Other exhibitors included: Cisco, Facebook, Intel, Google, and Oracle.&lt;/li&gt;
&lt;li&gt;The following day, Dan also &lt;a href="http://www.cb.uu.se/%7Ekristina/WomENcourage/2014/2015-09-25_Friday/2015-09-25%20113238.JPG" target="_blank" rel="nofollow noopener"&gt;gave a workshop&lt;/a&gt; on how to contribute to an open source project
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Beastie-Bits&lt;/h3&gt;

&lt;p&gt;&lt;a href="http://mail-index.netbsd.org/pkgsrc-users/2015/09/12/msg022186.html" target="_blank" rel="nofollow noopener"&gt;NetBSD 2015PkgSrc Freeze&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/freebsd/freebsd/commits/master/sys/dev/usb/wlan/if_rsu.c" target="_blank" rel="nofollow noopener"&gt;Support for 802.11N for RealTek USB in FreeBSD&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/DragonFlyBSD/DeltaPorts/pull/123" target="_blank" rel="nofollow noopener"&gt;Wayland ported to DragonFlyBSD &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151013161745" target="_blank" rel="nofollow noopener"&gt;OpenSMTPd developer debriefs on audit report &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=289316" target="_blank" rel="nofollow noopener"&gt;FreeBSD fixes issue with pf under Xen with TSO. Errata coming soon &lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="http://slexy.org/view/s2EBjrxQ9M" target="_blank" rel="nofollow noopener"&gt;Xinuos funds the HardenedBSD project &lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21PMmNFIs" target="_blank" rel="nofollow noopener"&gt; Evan&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20qH07ox0" target="_blank" rel="nofollow noopener"&gt; Darin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2d0SFmRlD" target="_blank" rel="nofollow noopener"&gt; Jochen writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on this weeks episode, we have BSD news, tidbits and articles out the wazoo to share. Also, be sure to stick around for our interview with Brandon Mercer as he tells us about OpenBSD being used in the healthcare industry.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.netbsd.org/releases/formal-7/NetBSD-7.0.html" rel="nofollow">NetBSD 7.0 Release Announcement</a></h3>

<ul>
<li>DRM/KMS support brings accelerated graphics to x86 systems using modern Intel and Radeon devices (Linux 3.15)</li>
<li>Multiprocessor ARM support.</li>
<li>Support for many new ARM boards, including the Raspberry Pi 2 and BeagleBone Black</li>
<li>Major NPF improvements:

<ul>
<li>BPF with just-in-time (JIT) compilation by default</li>
<li>support for dynamic rules</li>
</ul></li>
<li>support for static (stateless) NAT</li>
<li>support for IPv6-to-IPv6 Network Prefix Translation (NPTv6) as per RFC 6296</li>
<li>support for CDB based tables (uses perfect hashing and guarantees lock-free O(1) lookups)</li>
<li>Multiprocessor support in the USB subsystem.</li>
<li>GPT support in sysinst via the extended partitioning menu.</li>
<li>Lua kernel scripting</li>
<li>GCC 4.8.4, which brings support for C++11</li>
<li>Experimental support for SSD TRIM in wd(4) and FFS</li>
<li>tetris(6): Add colours and a &#39;down&#39; key, defaulting to &#39;n&#39;. It moves the block down a line, if it fits. 
***</li>
</ul>

<h3><a href="https://blog.cloudflare.com/single-rx-queue-kernel-bypass-with-netmap/" rel="nofollow">CloudFlare develops interesting new netmap feature </a></h3>

<ul>
<li>Normally, when Netmap is enabled on an interface, the kernel is bypassed and all of the packets go to the Netmap consumers</li>
<li>CloudFlare has developed a feature that allows all but one of the RX queues to remain connected to the kernel, and only a single queue be passed to Netmap</li>
<li>The change is a simple modification to the nm_open API, allowing the application to open only a specific queue of the NIC, rather than the entire thing</li>
<li>The RSS or other hashing must be modified to not direct traffic to this queue</li>
<li>Then specific flows are directed to the netmap application for matching traffic</li>
<li>For example under Linux:</li>
<li>ethtool -X eth3 weight 1 1 1 1 0 1 1 1 1 1</li>
<li>ethtool -K eth3 lro off gro off</li>
<li>ethtool -N eth3 flow-type udp4 dst-port 53 action 4</li>
<li>Directs all name server traffic to NIC queue number 4</li>
<li>Currently there is no tool like ethtool to accomplish this same under FreeBSD</li>
<li>I wonder if the flows could be identified more specifically using something like ipfw-netmap
***</li>
</ul>

<h3><a href="http://www.theregister.co.uk/2015/09/12/feature_last_post_build_mail_server/?mt=1442858572214" rel="nofollow">Building your own OpenBSD based Mail server!</a></h3>

<ul>
<li><a href="http://www.theregister.co.uk/2015/09/19/feature_last_post_build_mailserver_part_2/" rel="nofollow">part 2</a> </li>
<li><a href="http://www.theregister.co.uk/2015/09/26/feature_last_post_build_mailserver_part_3/" rel="nofollow">part 3</a></li>
<li>The UK Register gives us a great writeup on getting your own mail server setup specifically on OpenBSD 5.7</li>
<li><a href="http://www.theregister.co.uk/2015/07/24/review_acer_revo_one_rl85_/" rel="nofollow">In this article they used a MiniPC the Acer Revo One RL85, which is a decently priced little box for a mail server </a></li>
<li>While a bit lengthy in 3 parts, it does provide a good walkthrough of getting OpenBSD setup, PostFix and DoveCot configured and working. In the final installment it also provides details on spam filtering and antivirus scanning. </li>
</ul>

<h3><a href="http://blog.jasper.la/openbsd-uefi-bootloader-howto/" rel="nofollow">Getting started with the UEFI bootloader on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve been listening over the past few weeks, you&#39;ve heard about OpenBSD.s new UEFI boot-loader. We now have a blog post with detailed instructions on how to get setup with this on your own system.</li>
<li>The initial setup is pretty straightforward, and should only take a few minutes at most. In involves the usual fdisk commands to create a FAT EFI partition, and placing the bootx64.efi file in the correct location.</li>
<li>As a bonus, we even get instructions on how to enable the frame-buffer driver on systems without native Intel video support (ThinkPad x250 in this example)
***</li>
</ul>

<h3><a href="http://blog.cochard.me/2015/09/receipt-for-building-10mpps-freebsd.html" rel="nofollow">Recipe for building a 10Mpps FreeBSD based router</a></h3>

<ul>
<li>Olivier, (of FreeNAS and BSD Router Project fame) treats us this week to a neat blog post about building your own high-performance 10Mpps FreeBSD router</li>
<li>As he first mentions, the hardware required will need to be beefy, no $200 miniPC here. In his setup he uses a 8 core Intel Xeon E5-2650, along with a Quad port 10 Gigabit Chelsio TS540-CR.</li>
<li>He mentions that this doesn&#39;t work quite on stock FreeBSD yet, you will need to pull code in from the <a href="https://svnweb.freebsd.org/base/projects/routing/" rel="nofollow">projects/routing </a> which fixes an issue with scaling on cores, in this case he is shrinking the NIC queues down to 4 from 8.</li>
<li>If you don&#39;t feel like doing the compiles yourself, he also includes links to experimental BSDRouter project images which he used to do the benchmarks</li>
<li>Bonus! Nice graphic of the benchmarks from enabling IPFW or PF and what that does to the performance. 
***</li>
</ul>

<h2>Interview - Brandon Mercer - <a href="mailto:bmercer@openbsd.org" rel="nofollow">bmercer@openbsd.org</a> / <a href="https://twitter.com/knowmercymod" rel="nofollow">@knowmercymod</a></h2>

<p>OpenBSD in Healthcare</p>

<ul>
<li>Sorry about the audio quality degradation. The last 7 or 8 minutes of the interview had to be cut, a problem with the software that captures the audio from skype and adds it to our compositor. My local monitor is analogue and did not experience the issue, so I was unaware of the issue during the recording
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://devtalk.nvidia.com/default/topic/884727/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-358-09-beta-/" rel="nofollow">Nvidia releases new beta FreeBSD driver along with new kernel module</a></h3>

<ul>
<li>Includes a new kernel module, nvidia-modeset.ko</li>
<li>While this module does NOT have any user-settable features, it works with the existing nvidia.ko to provide kernel-mode setting (KMS) used by the integrated DRM within the kernel. </li>
<li>The beta adds support for 805A and 960A nvidia cards</li>
<li>Also fixes a memory leak and some regressions
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/pipermail/midnightbsd-users/Week-of-Mon-20150914/003462.html" rel="nofollow">MidnightBSD 0.7-RELEASE</a></h3>

<ul>
<li>We missed this while away at Euro and elsewhere, but MidnightBSD (A desktop-focused FreeBSD 6.1 Fork) has come out with a new 0.7 release</li>
<li>This release primarily focuses on stability, but also includes important security fixes as well. </li>
<li>It cherry-picks updates to a variety of FreeBSD base-system updates, and some important ZFS features, such as TRIM and LZ4 compression</li>
<li>Their custom .mports. system has also gotten a slew of updates, with almost 2000 packages now available, including a WiP of Gnome3. It also brings support for starting / stopping services automatically at pkg install or removal. </li>
<li>They note that this will most likely be the last i386 release, joining the club of other projects that are going 64bit only. 
***</li>
</ul>

<h3><a href="http://media.medfarm.uu.se/play/video/5400" rel="nofollow">&quot;Open Source as a Career Path&quot;</a></h3>

<ul>
<li>The FreeBSD Project held a <a href="http://www.cb.uu.se/%7Ekristina/WomENcourage/2014/2015-09-25_Friday/2015-09-25%20113238.JPG" rel="nofollow">panel discussion</a> of why Open Source makes a good career path at the ACM.s womENcourage conference in Uppsala, Sweden, the weekend before EuroBSDCon</li>
<li>The Panel was lead by Dru Lavigne, and consisted of Deb Goodkin, Benedict Reuschling, Dan Langille, and myself</li>
<li>We attempted to provide a cross section of experiences, including women in the field, the academic side, the community side, and the business side</li>
<li>During the question period, Dan gave a <a href="https://gist.github.com/dlangille/e262bccdea08b89b5360" rel="nofollow">great answer</a> to the question of .Why do open source projects still use old technologies like mailing lists and IRC.</li>
<li>The day before, the FreeBSD Foundation also had a booth at the career fair. We were the only open source project that attended. Other exhibitors included: Cisco, Facebook, Intel, Google, and Oracle.</li>
<li>The following day, Dan also <a href="http://www.cb.uu.se/%7Ekristina/WomENcourage/2014/2015-09-25_Friday/2015-09-25%20113238.JPG" rel="nofollow">gave a workshop</a> on how to contribute to an open source project
***</li>
</ul>

<h3>Beastie-Bits</h3>

<p><a href="http://mail-index.netbsd.org/pkgsrc-users/2015/09/12/msg022186.html" rel="nofollow">NetBSD 2015PkgSrc Freeze</a></p>

<p><a href="https://github.com/freebsd/freebsd/commits/master/sys/dev/usb/wlan/if_rsu.c" rel="nofollow">Support for 802.11N for RealTek USB in FreeBSD</a></p>

<p><a href="https://github.com/DragonFlyBSD/DeltaPorts/pull/123" rel="nofollow">Wayland ported to DragonFlyBSD </a></p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20151013161745" rel="nofollow">OpenSMTPd developer debriefs on audit report </a></p>

<p><a href="https://svnweb.freebsd.org/base?view=revision&revision=289316" rel="nofollow">FreeBSD fixes issue with pf under Xen with TSO. Errata coming soon </a></p>

<p><a href="http://slexy.org/view/s2EBjrxQ9M" rel="nofollow">Xinuos funds the HardenedBSD project </a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21PMmNFIs" rel="nofollow"> Evan</a></li>
<li><a href="http://slexy.org/view/s20qH07ox0" rel="nofollow"> Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2d0SFmRlD" rel="nofollow"> Jochen writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on this weeks episode, we have BSD news, tidbits and articles out the wazoo to share. Also, be sure to stick around for our interview with Brandon Mercer as he tells us about OpenBSD being used in the healthcare industry.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.netbsd.org/releases/formal-7/NetBSD-7.0.html" rel="nofollow">NetBSD 7.0 Release Announcement</a></h3>

<ul>
<li>DRM/KMS support brings accelerated graphics to x86 systems using modern Intel and Radeon devices (Linux 3.15)</li>
<li>Multiprocessor ARM support.</li>
<li>Support for many new ARM boards, including the Raspberry Pi 2 and BeagleBone Black</li>
<li>Major NPF improvements:

<ul>
<li>BPF with just-in-time (JIT) compilation by default</li>
<li>support for dynamic rules</li>
</ul></li>
<li>support for static (stateless) NAT</li>
<li>support for IPv6-to-IPv6 Network Prefix Translation (NPTv6) as per RFC 6296</li>
<li>support for CDB based tables (uses perfect hashing and guarantees lock-free O(1) lookups)</li>
<li>Multiprocessor support in the USB subsystem.</li>
<li>GPT support in sysinst via the extended partitioning menu.</li>
<li>Lua kernel scripting</li>
<li>GCC 4.8.4, which brings support for C++11</li>
<li>Experimental support for SSD TRIM in wd(4) and FFS</li>
<li>tetris(6): Add colours and a &#39;down&#39; key, defaulting to &#39;n&#39;. It moves the block down a line, if it fits. 
***</li>
</ul>

<h3><a href="https://blog.cloudflare.com/single-rx-queue-kernel-bypass-with-netmap/" rel="nofollow">CloudFlare develops interesting new netmap feature </a></h3>

<ul>
<li>Normally, when Netmap is enabled on an interface, the kernel is bypassed and all of the packets go to the Netmap consumers</li>
<li>CloudFlare has developed a feature that allows all but one of the RX queues to remain connected to the kernel, and only a single queue be passed to Netmap</li>
<li>The change is a simple modification to the nm_open API, allowing the application to open only a specific queue of the NIC, rather than the entire thing</li>
<li>The RSS or other hashing must be modified to not direct traffic to this queue</li>
<li>Then specific flows are directed to the netmap application for matching traffic</li>
<li>For example under Linux:</li>
<li>ethtool -X eth3 weight 1 1 1 1 0 1 1 1 1 1</li>
<li>ethtool -K eth3 lro off gro off</li>
<li>ethtool -N eth3 flow-type udp4 dst-port 53 action 4</li>
<li>Directs all name server traffic to NIC queue number 4</li>
<li>Currently there is no tool like ethtool to accomplish this same under FreeBSD</li>
<li>I wonder if the flows could be identified more specifically using something like ipfw-netmap
***</li>
</ul>

<h3><a href="http://www.theregister.co.uk/2015/09/12/feature_last_post_build_mail_server/?mt=1442858572214" rel="nofollow">Building your own OpenBSD based Mail server!</a></h3>

<ul>
<li><a href="http://www.theregister.co.uk/2015/09/19/feature_last_post_build_mailserver_part_2/" rel="nofollow">part 2</a> </li>
<li><a href="http://www.theregister.co.uk/2015/09/26/feature_last_post_build_mailserver_part_3/" rel="nofollow">part 3</a></li>
<li>The UK Register gives us a great writeup on getting your own mail server setup specifically on OpenBSD 5.7</li>
<li><a href="http://www.theregister.co.uk/2015/07/24/review_acer_revo_one_rl85_/" rel="nofollow">In this article they used a MiniPC the Acer Revo One RL85, which is a decently priced little box for a mail server </a></li>
<li>While a bit lengthy in 3 parts, it does provide a good walkthrough of getting OpenBSD setup, PostFix and DoveCot configured and working. In the final installment it also provides details on spam filtering and antivirus scanning. </li>
</ul>

<h3><a href="http://blog.jasper.la/openbsd-uefi-bootloader-howto/" rel="nofollow">Getting started with the UEFI bootloader on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve been listening over the past few weeks, you&#39;ve heard about OpenBSD.s new UEFI boot-loader. We now have a blog post with detailed instructions on how to get setup with this on your own system.</li>
<li>The initial setup is pretty straightforward, and should only take a few minutes at most. In involves the usual fdisk commands to create a FAT EFI partition, and placing the bootx64.efi file in the correct location.</li>
<li>As a bonus, we even get instructions on how to enable the frame-buffer driver on systems without native Intel video support (ThinkPad x250 in this example)
***</li>
</ul>

<h3><a href="http://blog.cochard.me/2015/09/receipt-for-building-10mpps-freebsd.html" rel="nofollow">Recipe for building a 10Mpps FreeBSD based router</a></h3>

<ul>
<li>Olivier, (of FreeNAS and BSD Router Project fame) treats us this week to a neat blog post about building your own high-performance 10Mpps FreeBSD router</li>
<li>As he first mentions, the hardware required will need to be beefy, no $200 miniPC here. In his setup he uses a 8 core Intel Xeon E5-2650, along with a Quad port 10 Gigabit Chelsio TS540-CR.</li>
<li>He mentions that this doesn&#39;t work quite on stock FreeBSD yet, you will need to pull code in from the <a href="https://svnweb.freebsd.org/base/projects/routing/" rel="nofollow">projects/routing </a> which fixes an issue with scaling on cores, in this case he is shrinking the NIC queues down to 4 from 8.</li>
<li>If you don&#39;t feel like doing the compiles yourself, he also includes links to experimental BSDRouter project images which he used to do the benchmarks</li>
<li>Bonus! Nice graphic of the benchmarks from enabling IPFW or PF and what that does to the performance. 
***</li>
</ul>

<h2>Interview - Brandon Mercer - <a href="mailto:bmercer@openbsd.org" rel="nofollow">bmercer@openbsd.org</a> / <a href="https://twitter.com/knowmercymod" rel="nofollow">@knowmercymod</a></h2>

<p>OpenBSD in Healthcare</p>

<ul>
<li>Sorry about the audio quality degradation. The last 7 or 8 minutes of the interview had to be cut, a problem with the software that captures the audio from skype and adds it to our compositor. My local monitor is analogue and did not experience the issue, so I was unaware of the issue during the recording
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="https://devtalk.nvidia.com/default/topic/884727/unix-graphics-announcements-and-news/linux-solaris-and-freebsd-driver-358-09-beta-/" rel="nofollow">Nvidia releases new beta FreeBSD driver along with new kernel module</a></h3>

<ul>
<li>Includes a new kernel module, nvidia-modeset.ko</li>
<li>While this module does NOT have any user-settable features, it works with the existing nvidia.ko to provide kernel-mode setting (KMS) used by the integrated DRM within the kernel. </li>
<li>The beta adds support for 805A and 960A nvidia cards</li>
<li>Also fixes a memory leak and some regressions
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/pipermail/midnightbsd-users/Week-of-Mon-20150914/003462.html" rel="nofollow">MidnightBSD 0.7-RELEASE</a></h3>

<ul>
<li>We missed this while away at Euro and elsewhere, but MidnightBSD (A desktop-focused FreeBSD 6.1 Fork) has come out with a new 0.7 release</li>
<li>This release primarily focuses on stability, but also includes important security fixes as well. </li>
<li>It cherry-picks updates to a variety of FreeBSD base-system updates, and some important ZFS features, such as TRIM and LZ4 compression</li>
<li>Their custom .mports. system has also gotten a slew of updates, with almost 2000 packages now available, including a WiP of Gnome3. It also brings support for starting / stopping services automatically at pkg install or removal. </li>
<li>They note that this will most likely be the last i386 release, joining the club of other projects that are going 64bit only. 
***</li>
</ul>

<h3><a href="http://media.medfarm.uu.se/play/video/5400" rel="nofollow">&quot;Open Source as a Career Path&quot;</a></h3>

<ul>
<li>The FreeBSD Project held a <a href="http://www.cb.uu.se/%7Ekristina/WomENcourage/2014/2015-09-25_Friday/2015-09-25%20113238.JPG" rel="nofollow">panel discussion</a> of why Open Source makes a good career path at the ACM.s womENcourage conference in Uppsala, Sweden, the weekend before EuroBSDCon</li>
<li>The Panel was lead by Dru Lavigne, and consisted of Deb Goodkin, Benedict Reuschling, Dan Langille, and myself</li>
<li>We attempted to provide a cross section of experiences, including women in the field, the academic side, the community side, and the business side</li>
<li>During the question period, Dan gave a <a href="https://gist.github.com/dlangille/e262bccdea08b89b5360" rel="nofollow">great answer</a> to the question of .Why do open source projects still use old technologies like mailing lists and IRC.</li>
<li>The day before, the FreeBSD Foundation also had a booth at the career fair. We were the only open source project that attended. Other exhibitors included: Cisco, Facebook, Intel, Google, and Oracle.</li>
<li>The following day, Dan also <a href="http://www.cb.uu.se/%7Ekristina/WomENcourage/2014/2015-09-25_Friday/2015-09-25%20113238.JPG" rel="nofollow">gave a workshop</a> on how to contribute to an open source project
***</li>
</ul>

<h3>Beastie-Bits</h3>

<p><a href="http://mail-index.netbsd.org/pkgsrc-users/2015/09/12/msg022186.html" rel="nofollow">NetBSD 2015PkgSrc Freeze</a></p>

<p><a href="https://github.com/freebsd/freebsd/commits/master/sys/dev/usb/wlan/if_rsu.c" rel="nofollow">Support for 802.11N for RealTek USB in FreeBSD</a></p>

<p><a href="https://github.com/DragonFlyBSD/DeltaPorts/pull/123" rel="nofollow">Wayland ported to DragonFlyBSD </a></p>

<p><a href="http://undeadly.org/cgi?action=article&sid=20151013161745" rel="nofollow">OpenSMTPd developer debriefs on audit report </a></p>

<p><a href="https://svnweb.freebsd.org/base?view=revision&revision=289316" rel="nofollow">FreeBSD fixes issue with pf under Xen with TSO. Errata coming soon </a></p>

<p><a href="http://slexy.org/view/s2EBjrxQ9M" rel="nofollow">Xinuos funds the HardenedBSD project </a></p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21PMmNFIs" rel="nofollow"> Evan</a></li>
<li><a href="http://slexy.org/view/s20qH07ox0" rel="nofollow"> Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2d0SFmRlD" rel="nofollow"> Jochen writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>110: - Firmware Fights</title>
  <link>https://www.bsdnow.tv/110</link>
  <guid isPermaLink="false">42636b74-791c-44c4-b313-75b8ace4844b</guid>
  <pubDate>Wed, 07 Oct 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/42636b74-791c-44c4-b313-75b8ace4844b.mp3" length="69718036" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSDNow, we get to hear all of Allans post EuroBSDCon wrap-up and a great interview with Benno Rice from Isilon. We got to discuss some of the pain of doing major forklift upgrades, and why your business should track -CURRENT.</itunes:subtitle>
  <itunes:duration>1:36:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSDNow, we get to hear all of Allans post EuroBSDCon wrap-up and a great interview with Benno Rice from Isilon. We got to discuss some of the pain of doing major forklift upgrades, and why your business should track -CURRENT.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;EuroBSDCon Videos&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EuroBSDCon has started posting videos of the talks online already.&lt;/li&gt;
&lt;li&gt;The videos posted online are archives of the live stream, so some of the videos contain multiple talks&lt;/li&gt;
&lt;li&gt;Due to a technical complication, some videos only have 1 channel of audio&lt;/li&gt;
&lt;li&gt;&lt;a href="https://2015.eurobsdcon.org/talks-and-schedule/talk-schedule/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon Talk Schedule&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/channel/UCBPvcqZrNuKZuP1LQhlCp-A" target="_blank" rel="nofollow noopener"&gt;Red Room Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/channel/UCJk8Kls9LT-Txu-Jhv7csfw" target="_blank" rel="nofollow noopener"&gt;Yellow Room Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/channel/UC-3DOxIOI5oHXE1H57g3FzQ" target="_blank" rel="nofollow noopener"&gt;Blue Room Videos&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://assets.keltia.net/photos/EuroBSDCon-2015/" target="_blank" rel="nofollow noopener"&gt;Photos of the conference courtersy of Ollivier Robert&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20151005200020" target="_blank" rel="nofollow noopener"&gt;A series of OpenSMTPd patches fix multiple vulnerabilities&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Qualys recently published an &lt;a href="https://www.qualys.com/2015/10/02/opensmtpd-audit-report.txt" target="_blank" rel="nofollow noopener"&gt;audit of the OpenSNMPd source code&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The fixes for these vulnerabilities were released as 5.7.2&lt;/li&gt;
&lt;li&gt;After its release, two &lt;a href="http://www.openwall.com/lists/oss-security/2015/10/04/2" target="_blank" rel="nofollow noopener"&gt;additional vulnerabilities&lt;/a&gt; were found. One, in the portable version, newer code that was added after the audit started&lt;/li&gt;
&lt;li&gt;All users are strongly encouraged to upgrade to 5.7.3&lt;/li&gt;
&lt;li&gt;OpenBSD users should apply the latest errata or upgrade to the newest snapshot
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=288917" target="_blank" rel="nofollow noopener"&gt;FreeBSD updates in -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looks like Xen header support has been bumped in FreeBSD from 4.2 -&amp;gt; 4.6&lt;/li&gt;
&lt;li&gt;It also enables support for ARM&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-October/057691.html" target="_blank" rel="nofollow noopener"&gt;Update to Clang / LLVM  to 3.7.0&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://llvm.org/releases/3.7.0/docs/ReleaseNotes.html" target="_blank" rel="nofollow noopener"&gt;http://llvm.org/releases/3.7.0/docs/ReleaseNotes.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=287745" target="_blank" rel="nofollow noopener"&gt;ZFS gets FRU (field replaceable unit) tracking&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=397198" target="_blank" rel="nofollow noopener"&gt;OpenCL makes it way into the ports tree&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;bhyve has grown UEFI support, plus a CSM module&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2015-October/003832.html" target="_blank" rel="nofollow noopener"&gt;bhyve can now boot Windows &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Currently there is still only a serial console, so the post includes an unattended install .xml file and instructions on how to repack the ISO. Once Windows is installed, you can RDP into the machine&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2015-October/003833.html" target="_blank" rel="nofollow noopener"&gt;bhyve can also now run IllumOS &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=144304997800589&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD Initial Support for Broadwell Graphics&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD joins DragonFly now with initial support for broadwell GPUs landing in their development branch&lt;/li&gt;
&lt;li&gt;This brings Open up to Linux 3.14.52 DRM, and Mark Kettenis mentions that it isn.t perfect yet, and may cause some issues with older hardware, although no major regressions yet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;OpenBSD Slides for &lt;a href="http://www.openbsd.org/papers/tame-fsec2015/" target="_blank" rel="nofollow noopener"&gt;TAME&lt;/a&gt; and &lt;a href="http://www.openbsd.org/papers/libtls-fsec-2015/" target="_blank" rel="nofollow noopener"&gt;libTLS APIs&lt;/a&gt;
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The first set of slides are from a talk Theo de Raadt gave in Croatia, they describe the history and impetus for tame&lt;/li&gt;
&lt;li&gt;Theo specifically avoids comparisons to other sandboxing techniques like capsicum and seccomp, because he is not impartial&lt;/li&gt;
&lt;li&gt;tame() itself is only about 1200 lines of code&lt;/li&gt;
&lt;li&gt;Sandboxing the file(1) command with systrace: 300 lines of code, with tame: 4 lines&lt;/li&gt;
&lt;li&gt;Theo makes the point that .optional security. is irrelevant. If a mitigation feature has a knob to turn it off, some program will break and advise users to turn the feature off. Eventually, no one uses the feature, and it dies&lt;/li&gt;
&lt;li&gt;This has lead to OpenBSD.s policy: .Once working, these features cannot be disabled. Application bugs must be fixed.&lt;/li&gt;
&lt;li&gt;The second talk is by Bob Beck, about LibreSSL&lt;/li&gt;
&lt;li&gt;when LibreSSL was forked from OpenSSL 1.0.1g, it contained 388,000 lines of C code&lt;/li&gt;
&lt;li&gt;30 days in LibreSSL, they had deleted 90,000 lines of C&lt;/li&gt;
&lt;li&gt;OpenSSL 1.0.2d has 432,000 lines of C (728k total), and OpenSSL Current has 411,000 lines of C (over 1 million total)&lt;/li&gt;
&lt;li&gt;LibreSSL today, contains 297,000 lines of C (511k total)&lt;/li&gt;
&lt;li&gt;None of the high risk CVEs against OpenSSL (there have been 5) have affected LibreSSL. It turns out removing old code and unneeded features is good for security.&lt;/li&gt;
&lt;li&gt;The talk focuses on libtls, an alternative to the OpenSSL API, designed to be easier to use and less error prone&lt;/li&gt;
&lt;li&gt;In the libtls api, if -1 is returned, it is always an error. In OpenSSL, it might not be an error, needs additional code to check errno&lt;/li&gt;
&lt;li&gt;In OpenBSD: ftp, nc, ntpd, httpd, spamd, syslog have been converted to the new API&lt;/li&gt;
&lt;li&gt;The OpenBSD Foundation is looking for donations in order to sponsor 2-3 developers to spend 6 months dedicated to LibreSSL
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Benno Rice - &lt;a href="mailto:benno@FreeBSD.org" target="_blank" rel="nofollow noopener"&gt;benno@FreeBSD.org&lt;/a&gt; / &lt;a href="https://twitter.com/jeamland" target="_blank" rel="nofollow noopener"&gt;@jeamland&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Isilon and building products on top of FreeBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/mheily/relaunchd/blob/master/doc/rationale.txt" target="_blank" rel="nofollow noopener"&gt;ReLaunchd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This past week we got a heads up about another init/launchd replacement, this time .Relaunchd.&lt;/li&gt;
&lt;li&gt;The goals of this project appear to be keeping launchd functionality, while being portable enough to run on FreeBSD / Linux, etc. &lt;/li&gt;
&lt;li&gt;It also has aspirations of being .container-aware. with support for jailed services, ala-docker, as well as cluster awareness. &lt;/li&gt;
&lt;li&gt;Written in ruby :(, it also maintains that it wishes to NOT take over PID1 or replace the initial system boot scripts, but extend / leverage them in new ways. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/source-changes/2015/09/24/msg069028.html" target="_blank" rel="nofollow noopener"&gt;Static Intrusion Detection in NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Alistar Crooks has committed a new .sid. utility to NetBSD, which allows intrusion detection by comparing the file-system contents to a database of known good values&lt;/li&gt;
&lt;li&gt;The utility can compare the entire root file system of a modest NetBSD machine in about 15 seconds&lt;/li&gt;
&lt;li&gt;The following parameters of each file can be checked: atime, block count, ctime, file type, flags, group, inode, link target, mtime, number of links, permissions, size, user, crc32c checksum, sha256 checksum, sha512 checksum&lt;/li&gt;
&lt;li&gt;A JSON report is issued at the end, for any detected variances
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;LibreSSL 2.3.0 in PC-BSD&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you.re running PC-BSD 10.2-EDGE or October's -CURRENT image, LibreSSL 2.3.0 is now a thing&lt;/li&gt;
&lt;li&gt;Thanks to the hard work of Bernard Spil and others, we have merged in the latest LibreSSL which actually removes SSL support in favor of TLS&lt;/li&gt;
&lt;li&gt;Quite a number of bugs have been fixed, as well as patches brought over from OpenBSD to fix numerous ports.&lt;/li&gt;
&lt;li&gt;Allan has started a patchset that sets the &lt;a href="http://allanjude.com/bsd/privatessl_2015-10-07.patch" target="_blank" rel="nofollow noopener"&gt;OpenSSL in base to "private"&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This hides the library so that applications and ports cannot find it, so only tools in the base system, like fetch, will be able to use it. This makes OpenSSL no longer part of the base system ABI, meaning the version can be upgraded without breaking the stable ABI promise. This feature may be important in the future as OpenSSL versions now have EoL dates, that may be sooner than the EoL on the FreeBSD stable branches.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.pcbsd.org/pipermail/testing/2015-October/010173.html" target="_blank" rel="nofollow noopener"&gt;PC-BSD and boot-environments without GRUB&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this month.s -CURRENT image of PC-BSD, we began the process of moving back from the GRUB boot-loader, in favor of FreeBSD.s&lt;/li&gt;
&lt;li&gt;A couple of patches have been included, which enables boot-environment support via the 4th menus (Thanks Allan) and support for booting ZFS on root via UEFI&lt;/li&gt;
&lt;li&gt;"beadm" has also been updated to seamlessly support both boot-loaders&lt;/li&gt;
&lt;li&gt;No full-disk encryption support yet (hopefully soon), but GRUB is still available on installer for those who need it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/24a8d46a22f9106b0c1466c41ba73460d7d22262" target="_blank" rel="nofollow noopener"&gt;Import of IWM wireless to DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Matthew Dillon has recently imported the newer if_iwm driver from FreeBSD -&amp;gt; DragonFly&lt;/li&gt;
&lt;li&gt;Across the internet, users with newer Intel chipsets rejoiced!&lt;/li&gt;
&lt;li&gt;Coupled with the latest Broadwell DRM improvements, DragonFly sounds very ready for the latest laptop chipsets&lt;/li&gt;
&lt;li&gt;Also, looks like progress is being made on &lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/cf37dc2040cea9f384bd7d3dcaf24014f441b8a6" target="_blank" rel="nofollow noopener"&gt;i386 removal&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s27ZeOiM4t" target="_blank" rel="nofollow noopener"&gt;Dan writes in about PCBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s219J3ebx5" target="_blank" rel="nofollow noopener"&gt;Matt writes in about ZFS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21uuMAmZb" target="_blank" rel="nofollow noopener"&gt;Anonymous writes in about problems booting&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSDNow, we get to hear all of Allans post EuroBSDCon wrap-up and a great interview with Benno Rice from Isilon. We got to discuss some of the pain of doing major forklift upgrades, and why your business should track -CURRENT.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>EuroBSDCon Videos</h3>

<ul>
<li>EuroBSDCon has started posting videos of the talks online already.</li>
<li>The videos posted online are archives of the live stream, so some of the videos contain multiple talks</li>
<li>Due to a technical complication, some videos only have 1 channel of audio</li>
<li><a href="https://2015.eurobsdcon.org/talks-and-schedule/talk-schedule/" rel="nofollow">EuroBSDCon Talk Schedule</a></li>
<li><a href="https://www.youtube.com/channel/UCBPvcqZrNuKZuP1LQhlCp-A" rel="nofollow">Red Room Videos</a></li>
<li><a href="https://www.youtube.com/channel/UCJk8Kls9LT-Txu-Jhv7csfw" rel="nofollow">Yellow Room Videos</a></li>
<li><a href="https://www.youtube.com/channel/UC-3DOxIOI5oHXE1H57g3FzQ" rel="nofollow">Blue Room Videos</a></li>
<li><a href="https://assets.keltia.net/photos/EuroBSDCon-2015/" rel="nofollow">Photos of the conference courtersy of Ollivier Robert</a>
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151005200020" rel="nofollow">A series of OpenSMTPd patches fix multiple vulnerabilities</a></h3>

<ul>
<li>Qualys recently published an <a href="https://www.qualys.com/2015/10/02/opensmtpd-audit-report.txt" rel="nofollow">audit of the OpenSNMPd source code</a></li>
<li>The fixes for these vulnerabilities were released as 5.7.2</li>
<li>After its release, two <a href="http://www.openwall.com/lists/oss-security/2015/10/04/2" rel="nofollow">additional vulnerabilities</a> were found. One, in the portable version, newer code that was added after the audit started</li>
<li>All users are strongly encouraged to upgrade to 5.7.3</li>
<li>OpenBSD users should apply the latest errata or upgrade to the newest snapshot
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=288917" rel="nofollow">FreeBSD updates in -CURRENT</a></h3>

<ul>
<li>Looks like Xen header support has been bumped in FreeBSD from 4.2 -&gt; 4.6</li>
<li>It also enables support for ARM</li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-October/057691.html" rel="nofollow">Update to Clang / LLVM  to 3.7.0</a></li>
<li><a href="http://llvm.org/releases/3.7.0/docs/ReleaseNotes.html" rel="nofollow">http://llvm.org/releases/3.7.0/docs/ReleaseNotes.html</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=287745" rel="nofollow">ZFS gets FRU (field replaceable unit) tracking</a></li>
<li><a href="https://svnweb.freebsd.org/ports?view=revision&revision=397198" rel="nofollow">OpenCL makes it way into the ports tree</a></li>
<li>bhyve has grown UEFI support, plus a CSM module</li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2015-October/003832.html" rel="nofollow">bhyve can now boot Windows </a></li>
<li>Currently there is still only a serial console, so the post includes an unattended install .xml file and instructions on how to repack the ISO. Once Windows is installed, you can RDP into the machine</li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2015-October/003833.html" rel="nofollow">bhyve can also now run IllumOS </a>
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=144304997800589&w=2" rel="nofollow">OpenBSD Initial Support for Broadwell Graphics</a></h3>

<ul>
<li>OpenBSD joins DragonFly now with initial support for broadwell GPUs landing in their development branch</li>
<li>This brings Open up to Linux 3.14.52 DRM, and Mark Kettenis mentions that it isn.t perfect yet, and may cause some issues with older hardware, although no major regressions yet
***</li>
</ul>

<h3>OpenBSD Slides for <a href="http://www.openbsd.org/papers/tame-fsec2015/" rel="nofollow">TAME</a> and <a href="http://www.openbsd.org/papers/libtls-fsec-2015/" rel="nofollow">libTLS APIs</a></h3>

<ul>
<li>The first set of slides are from a talk Theo de Raadt gave in Croatia, they describe the history and impetus for tame</li>
<li>Theo specifically avoids comparisons to other sandboxing techniques like capsicum and seccomp, because he is not impartial</li>
<li>tame() itself is only about 1200 lines of code</li>
<li>Sandboxing the file(1) command with systrace: 300 lines of code, with tame: 4 lines</li>
<li>Theo makes the point that .optional security. is irrelevant. If a mitigation feature has a knob to turn it off, some program will break and advise users to turn the feature off. Eventually, no one uses the feature, and it dies</li>
<li>This has lead to OpenBSD.s policy: .Once working, these features cannot be disabled. Application bugs must be fixed.</li>
<li>The second talk is by Bob Beck, about LibreSSL</li>
<li>when LibreSSL was forked from OpenSSL 1.0.1g, it contained 388,000 lines of C code</li>
<li>30 days in LibreSSL, they had deleted 90,000 lines of C</li>
<li>OpenSSL 1.0.2d has 432,000 lines of C (728k total), and OpenSSL Current has 411,000 lines of C (over 1 million total)</li>
<li>LibreSSL today, contains 297,000 lines of C (511k total)</li>
<li>None of the high risk CVEs against OpenSSL (there have been 5) have affected LibreSSL. It turns out removing old code and unneeded features is good for security.</li>
<li>The talk focuses on libtls, an alternative to the OpenSSL API, designed to be easier to use and less error prone</li>
<li>In the libtls api, if -1 is returned, it is always an error. In OpenSSL, it might not be an error, needs additional code to check errno</li>
<li>In OpenBSD: ftp, nc, ntpd, httpd, spamd, syslog have been converted to the new API</li>
<li>The OpenBSD Foundation is looking for donations in order to sponsor 2-3 developers to spend 6 months dedicated to LibreSSL
***</li>
</ul>

<h2>Interview - Benno Rice - <a href="mailto:benno@FreeBSD.org" rel="nofollow">benno@FreeBSD.org</a> / <a href="https://twitter.com/jeamland" rel="nofollow">@jeamland</a></h2>

<p>Isilon and building products on top of FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/mheily/relaunchd/blob/master/doc/rationale.txt" rel="nofollow">ReLaunchd</a></h3>

<ul>
<li>This past week we got a heads up about another init/launchd replacement, this time .Relaunchd.</li>
<li>The goals of this project appear to be keeping launchd functionality, while being portable enough to run on FreeBSD / Linux, etc. </li>
<li>It also has aspirations of being .container-aware. with support for jailed services, ala-docker, as well as cluster awareness. </li>
<li>Written in ruby :(, it also maintains that it wishes to NOT take over PID1 or replace the initial system boot scripts, but extend / leverage them in new ways. 
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/source-changes/2015/09/24/msg069028.html" rel="nofollow">Static Intrusion Detection in NetBSD</a></h3>

<ul>
<li>Alistar Crooks has committed a new .sid. utility to NetBSD, which allows intrusion detection by comparing the file-system contents to a database of known good values</li>
<li>The utility can compare the entire root file system of a modest NetBSD machine in about 15 seconds</li>
<li>The following parameters of each file can be checked: atime, block count, ctime, file type, flags, group, inode, link target, mtime, number of links, permissions, size, user, crc32c checksum, sha256 checksum, sha512 checksum</li>
<li>A JSON report is issued at the end, for any detected variances
***</li>
</ul>

<h3>LibreSSL 2.3.0 in PC-BSD</h3>

<ul>
<li>If you.re running PC-BSD 10.2-EDGE or October&#39;s -CURRENT image, LibreSSL 2.3.0 is now a thing</li>
<li>Thanks to the hard work of Bernard Spil and others, we have merged in the latest LibreSSL which actually removes SSL support in favor of TLS</li>
<li>Quite a number of bugs have been fixed, as well as patches brought over from OpenBSD to fix numerous ports.</li>
<li>Allan has started a patchset that sets the <a href="http://allanjude.com/bsd/privatessl_2015-10-07.patch" rel="nofollow">OpenSSL in base to &quot;private&quot;</a></li>
<li>This hides the library so that applications and ports cannot find it, so only tools in the base system, like fetch, will be able to use it. This makes OpenSSL no longer part of the base system ABI, meaning the version can be upgraded without breaking the stable ABI promise. This feature may be important in the future as OpenSSL versions now have EoL dates, that may be sooner than the EoL on the FreeBSD stable branches.
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2015-October/010173.html" rel="nofollow">PC-BSD and boot-environments without GRUB</a></h3>

<ul>
<li>In this month.s -CURRENT image of PC-BSD, we began the process of moving back from the GRUB boot-loader, in favor of FreeBSD.s</li>
<li>A couple of patches have been included, which enables boot-environment support via the 4th menus (Thanks Allan) and support for booting ZFS on root via UEFI</li>
<li>&quot;beadm&quot; has also been updated to seamlessly support both boot-loaders</li>
<li>No full-disk encryption support yet (hopefully soon), but GRUB is still available on installer for those who need it
***</li>
</ul>

<h3><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/24a8d46a22f9106b0c1466c41ba73460d7d22262" rel="nofollow">Import of IWM wireless to DragonFly</a></h3>

<ul>
<li>Matthew Dillon has recently imported the newer if_iwm driver from FreeBSD -&gt; DragonFly</li>
<li>Across the internet, users with newer Intel chipsets rejoiced!</li>
<li>Coupled with the latest Broadwell DRM improvements, DragonFly sounds very ready for the latest laptop chipsets</li>
<li>Also, looks like progress is being made on <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/cf37dc2040cea9f384bd7d3dcaf24014f441b8a6" rel="nofollow">i386 removal</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s27ZeOiM4t" rel="nofollow">Dan writes in about PCBSD</a></li>
<li><a href="http://slexy.org/view/s219J3ebx5" rel="nofollow">Matt writes in about ZFS</a></li>
<li><a href="http://slexy.org/view/s21uuMAmZb" rel="nofollow">Anonymous writes in about problems booting</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSDNow, we get to hear all of Allans post EuroBSDCon wrap-up and a great interview with Benno Rice from Isilon. We got to discuss some of the pain of doing major forklift upgrades, and why your business should track -CURRENT.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3>EuroBSDCon Videos</h3>

<ul>
<li>EuroBSDCon has started posting videos of the talks online already.</li>
<li>The videos posted online are archives of the live stream, so some of the videos contain multiple talks</li>
<li>Due to a technical complication, some videos only have 1 channel of audio</li>
<li><a href="https://2015.eurobsdcon.org/talks-and-schedule/talk-schedule/" rel="nofollow">EuroBSDCon Talk Schedule</a></li>
<li><a href="https://www.youtube.com/channel/UCBPvcqZrNuKZuP1LQhlCp-A" rel="nofollow">Red Room Videos</a></li>
<li><a href="https://www.youtube.com/channel/UCJk8Kls9LT-Txu-Jhv7csfw" rel="nofollow">Yellow Room Videos</a></li>
<li><a href="https://www.youtube.com/channel/UC-3DOxIOI5oHXE1H57g3FzQ" rel="nofollow">Blue Room Videos</a></li>
<li><a href="https://assets.keltia.net/photos/EuroBSDCon-2015/" rel="nofollow">Photos of the conference courtersy of Ollivier Robert</a>
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20151005200020" rel="nofollow">A series of OpenSMTPd patches fix multiple vulnerabilities</a></h3>

<ul>
<li>Qualys recently published an <a href="https://www.qualys.com/2015/10/02/opensmtpd-audit-report.txt" rel="nofollow">audit of the OpenSNMPd source code</a></li>
<li>The fixes for these vulnerabilities were released as 5.7.2</li>
<li>After its release, two <a href="http://www.openwall.com/lists/oss-security/2015/10/04/2" rel="nofollow">additional vulnerabilities</a> were found. One, in the portable version, newer code that was added after the audit started</li>
<li>All users are strongly encouraged to upgrade to 5.7.3</li>
<li>OpenBSD users should apply the latest errata or upgrade to the newest snapshot
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=288917" rel="nofollow">FreeBSD updates in -CURRENT</a></h3>

<ul>
<li>Looks like Xen header support has been bumped in FreeBSD from 4.2 -&gt; 4.6</li>
<li>It also enables support for ARM</li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-October/057691.html" rel="nofollow">Update to Clang / LLVM  to 3.7.0</a></li>
<li><a href="http://llvm.org/releases/3.7.0/docs/ReleaseNotes.html" rel="nofollow">http://llvm.org/releases/3.7.0/docs/ReleaseNotes.html</a></li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=287745" rel="nofollow">ZFS gets FRU (field replaceable unit) tracking</a></li>
<li><a href="https://svnweb.freebsd.org/ports?view=revision&revision=397198" rel="nofollow">OpenCL makes it way into the ports tree</a></li>
<li>bhyve has grown UEFI support, plus a CSM module</li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2015-October/003832.html" rel="nofollow">bhyve can now boot Windows </a></li>
<li>Currently there is still only a serial console, so the post includes an unattended install .xml file and instructions on how to repack the ISO. Once Windows is installed, you can RDP into the machine</li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2015-October/003833.html" rel="nofollow">bhyve can also now run IllumOS </a>
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=144304997800589&w=2" rel="nofollow">OpenBSD Initial Support for Broadwell Graphics</a></h3>

<ul>
<li>OpenBSD joins DragonFly now with initial support for broadwell GPUs landing in their development branch</li>
<li>This brings Open up to Linux 3.14.52 DRM, and Mark Kettenis mentions that it isn.t perfect yet, and may cause some issues with older hardware, although no major regressions yet
***</li>
</ul>

<h3>OpenBSD Slides for <a href="http://www.openbsd.org/papers/tame-fsec2015/" rel="nofollow">TAME</a> and <a href="http://www.openbsd.org/papers/libtls-fsec-2015/" rel="nofollow">libTLS APIs</a></h3>

<ul>
<li>The first set of slides are from a talk Theo de Raadt gave in Croatia, they describe the history and impetus for tame</li>
<li>Theo specifically avoids comparisons to other sandboxing techniques like capsicum and seccomp, because he is not impartial</li>
<li>tame() itself is only about 1200 lines of code</li>
<li>Sandboxing the file(1) command with systrace: 300 lines of code, with tame: 4 lines</li>
<li>Theo makes the point that .optional security. is irrelevant. If a mitigation feature has a knob to turn it off, some program will break and advise users to turn the feature off. Eventually, no one uses the feature, and it dies</li>
<li>This has lead to OpenBSD.s policy: .Once working, these features cannot be disabled. Application bugs must be fixed.</li>
<li>The second talk is by Bob Beck, about LibreSSL</li>
<li>when LibreSSL was forked from OpenSSL 1.0.1g, it contained 388,000 lines of C code</li>
<li>30 days in LibreSSL, they had deleted 90,000 lines of C</li>
<li>OpenSSL 1.0.2d has 432,000 lines of C (728k total), and OpenSSL Current has 411,000 lines of C (over 1 million total)</li>
<li>LibreSSL today, contains 297,000 lines of C (511k total)</li>
<li>None of the high risk CVEs against OpenSSL (there have been 5) have affected LibreSSL. It turns out removing old code and unneeded features is good for security.</li>
<li>The talk focuses on libtls, an alternative to the OpenSSL API, designed to be easier to use and less error prone</li>
<li>In the libtls api, if -1 is returned, it is always an error. In OpenSSL, it might not be an error, needs additional code to check errno</li>
<li>In OpenBSD: ftp, nc, ntpd, httpd, spamd, syslog have been converted to the new API</li>
<li>The OpenBSD Foundation is looking for donations in order to sponsor 2-3 developers to spend 6 months dedicated to LibreSSL
***</li>
</ul>

<h2>Interview - Benno Rice - <a href="mailto:benno@FreeBSD.org" rel="nofollow">benno@FreeBSD.org</a> / <a href="https://twitter.com/jeamland" rel="nofollow">@jeamland</a></h2>

<p>Isilon and building products on top of FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/mheily/relaunchd/blob/master/doc/rationale.txt" rel="nofollow">ReLaunchd</a></h3>

<ul>
<li>This past week we got a heads up about another init/launchd replacement, this time .Relaunchd.</li>
<li>The goals of this project appear to be keeping launchd functionality, while being portable enough to run on FreeBSD / Linux, etc. </li>
<li>It also has aspirations of being .container-aware. with support for jailed services, ala-docker, as well as cluster awareness. </li>
<li>Written in ruby :(, it also maintains that it wishes to NOT take over PID1 or replace the initial system boot scripts, but extend / leverage them in new ways. 
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/source-changes/2015/09/24/msg069028.html" rel="nofollow">Static Intrusion Detection in NetBSD</a></h3>

<ul>
<li>Alistar Crooks has committed a new .sid. utility to NetBSD, which allows intrusion detection by comparing the file-system contents to a database of known good values</li>
<li>The utility can compare the entire root file system of a modest NetBSD machine in about 15 seconds</li>
<li>The following parameters of each file can be checked: atime, block count, ctime, file type, flags, group, inode, link target, mtime, number of links, permissions, size, user, crc32c checksum, sha256 checksum, sha512 checksum</li>
<li>A JSON report is issued at the end, for any detected variances
***</li>
</ul>

<h3>LibreSSL 2.3.0 in PC-BSD</h3>

<ul>
<li>If you.re running PC-BSD 10.2-EDGE or October&#39;s -CURRENT image, LibreSSL 2.3.0 is now a thing</li>
<li>Thanks to the hard work of Bernard Spil and others, we have merged in the latest LibreSSL which actually removes SSL support in favor of TLS</li>
<li>Quite a number of bugs have been fixed, as well as patches brought over from OpenBSD to fix numerous ports.</li>
<li>Allan has started a patchset that sets the <a href="http://allanjude.com/bsd/privatessl_2015-10-07.patch" rel="nofollow">OpenSSL in base to &quot;private&quot;</a></li>
<li>This hides the library so that applications and ports cannot find it, so only tools in the base system, like fetch, will be able to use it. This makes OpenSSL no longer part of the base system ABI, meaning the version can be upgraded without breaking the stable ABI promise. This feature may be important in the future as OpenSSL versions now have EoL dates, that may be sooner than the EoL on the FreeBSD stable branches.
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2015-October/010173.html" rel="nofollow">PC-BSD and boot-environments without GRUB</a></h3>

<ul>
<li>In this month.s -CURRENT image of PC-BSD, we began the process of moving back from the GRUB boot-loader, in favor of FreeBSD.s</li>
<li>A couple of patches have been included, which enables boot-environment support via the 4th menus (Thanks Allan) and support for booting ZFS on root via UEFI</li>
<li>&quot;beadm&quot; has also been updated to seamlessly support both boot-loaders</li>
<li>No full-disk encryption support yet (hopefully soon), but GRUB is still available on installer for those who need it
***</li>
</ul>

<h3><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/24a8d46a22f9106b0c1466c41ba73460d7d22262" rel="nofollow">Import of IWM wireless to DragonFly</a></h3>

<ul>
<li>Matthew Dillon has recently imported the newer if_iwm driver from FreeBSD -&gt; DragonFly</li>
<li>Across the internet, users with newer Intel chipsets rejoiced!</li>
<li>Coupled with the latest Broadwell DRM improvements, DragonFly sounds very ready for the latest laptop chipsets</li>
<li>Also, looks like progress is being made on <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/cf37dc2040cea9f384bd7d3dcaf24014f441b8a6" rel="nofollow">i386 removal</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s27ZeOiM4t" rel="nofollow">Dan writes in about PCBSD</a></li>
<li><a href="http://slexy.org/view/s219J3ebx5" rel="nofollow">Matt writes in about ZFS</a></li>
<li><a href="http://slexy.org/view/s21uuMAmZb" rel="nofollow">Anonymous writes in about problems booting</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>109: Impish BSD</title>
  <link>https://www.bsdnow.tv/109</link>
  <guid isPermaLink="false">a2df1fdd-3669-4b6c-8bad-03ee4f1716d1</guid>
  <pubDate>Wed, 30 Sep 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a2df1fdd-3669-4b6c-8bad-03ee4f1716d1.mp3" length="39751060" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we have a great interview with Warner Losh of the FreeBSD project! We will be discussing everything from automatic kernel module loading, IO scheduling and of course NanoBSD.</itunes:subtitle>
  <itunes:duration>55:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, we have a great interview with Warner Losh of the FreeBSD project! We will be discussing everything from automatic kernel module loading, IO scheduling and of course NanoBSD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Warner Losh - [&lt;a href="mailto:imp@bsdimp.com" target="_blank" rel="nofollow noopener"&gt;imp@bsdimp.com&lt;/a&gt;](&lt;a href="mailto:imp@bsdimp.com" target="_blank" rel="nofollow noopener"&gt;imp@bsdimp.com&lt;/a&gt;) / &lt;a href="https://twitter.com/bsdimp" target="_blank" rel="nofollow noopener"&gt;@bsdimp&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;SSD performance and driver auto-loader&lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we have a great interview with Warner Losh of the FreeBSD project! We will be discussing everything from automatic kernel module loading, IO scheduling and of course NanoBSD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Warner Losh - [<a href="mailto:imp@bsdimp.com" rel="nofollow">imp@bsdimp.com</a>](<a href="mailto:imp@bsdimp.com" rel="nofollow">imp@bsdimp.com</a>) / <a href="https://twitter.com/bsdimp" rel="nofollow">@bsdimp</a></h2>

<p>SSD performance and driver auto-loader</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we have a great interview with Warner Losh of the FreeBSD project! We will be discussing everything from automatic kernel module loading, IO scheduling and of course NanoBSD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Warner Losh - [<a href="mailto:imp@bsdimp.com" rel="nofollow">imp@bsdimp.com</a>](<a href="mailto:imp@bsdimp.com" rel="nofollow">imp@bsdimp.com</a>) / <a href="https://twitter.com/bsdimp" rel="nofollow">@bsdimp</a></h2>

<p>SSD performance and driver auto-loader</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>108: ServeUp BSD</title>
  <link>https://www.bsdnow.tv/108</link>
  <guid isPermaLink="false">a3075d6e-f3f6-46a7-9c4f-402d380237db</guid>
  <pubDate>Wed, 23 Sep 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a3075d6e-f3f6-46a7-9c4f-402d380237db.mp3" length="56182612" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, Allan is heading to Sweden, but we have a great interview with Andrew Pantyukhin to bring you. We will be discussing everything from contributions to FreeBSD, which technologies worked best in the datacenter, config management and more.</itunes:subtitle>
  <itunes:duration>1:18:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, Allan is heading to Sweden, but we have a great interview with Andrew Pantyukhin to bring you. We will be discussing everything from contributions to FreeBSD, which technologies worked best in the datacenter, config management and more.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;p&gt;Allan is away this week, traveling to Sweden for the ACM womENcourage conference followed by EuroBSDCon, but we have an excellent interview for you, so sit back and enjoy the show. Allan will be back on October 5th, so we look forward to bringing you a live show, with all the details about EuroBSD and more!&lt;/p&gt;

&lt;h2&gt;Interview - Andrew Pantyukhin - &lt;a href="mailto:infofarmer@gmail.com" target="_blank" rel="nofollow noopener"&gt;infofarmer@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/infofarmer" target="_blank" rel="nofollow noopener"&gt;@infofarmer&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Building products with FreeBSD&lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, Allan is heading to Sweden, but we have a great interview with Andrew Pantyukhin to bring you. We will be discussing everything from contributions to FreeBSD, which technologies worked best in the datacenter, config management and more.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<p>Allan is away this week, traveling to Sweden for the ACM womENcourage conference followed by EuroBSDCon, but we have an excellent interview for you, so sit back and enjoy the show. Allan will be back on October 5th, so we look forward to bringing you a live show, with all the details about EuroBSD and more!</p>

<h2>Interview - Andrew Pantyukhin - <a href="mailto:infofarmer@gmail.com" rel="nofollow">infofarmer@gmail.com</a> / <a href="https://twitter.com/infofarmer" rel="nofollow">@infofarmer</a></h2>

<p>Building products with FreeBSD</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, Allan is heading to Sweden, but we have a great interview with Andrew Pantyukhin to bring you. We will be discussing everything from contributions to FreeBSD, which technologies worked best in the datacenter, config management and more.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<p>Allan is away this week, traveling to Sweden for the ACM womENcourage conference followed by EuroBSDCon, but we have an excellent interview for you, so sit back and enjoy the show. Allan will be back on October 5th, so we look forward to bringing you a live show, with all the details about EuroBSD and more!</p>

<h2>Interview - Andrew Pantyukhin - <a href="mailto:infofarmer@gmail.com" rel="nofollow">infofarmer@gmail.com</a> / <a href="https://twitter.com/infofarmer" rel="nofollow">@infofarmer</a></h2>

<p>Building products with FreeBSD</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>107: In their midst</title>
  <link>https://www.bsdnow.tv/107</link>
  <guid isPermaLink="false">5bead015-3333-45fa-bfba-838f2d3a8801</guid>
  <pubDate>Wed, 16 Sep 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5bead015-3333-45fa-bfba-838f2d3a8801.mp3" length="62196052" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we are going to be talking with Aaron Poffenberger, who has much to share about his first-hand experience in infiltrating Linux conferences with BSD-goodness.</itunes:subtitle>
  <itunes:duration>1:26:22</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, we are going to be talking with Aaron Poffenberger, who has much to share about his first-hand experience in infiltrating Linux conferences with BSD-goodness.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/changeset/base/r287621" target="_blank" rel="nofollow noopener"&gt;Alexander Motin implements CTL High Availability&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;CTL HA allows two .head. nodes to be connected to the same set of disks, safely&lt;/li&gt;
&lt;li&gt;An HA storage appliance usually consists of 2 totally separate servers, connected to a shared set of disks in separate JBOD sleds&lt;/li&gt;
&lt;li&gt;The problem with this setup is that if both machines try to use the disks at the same time, bad things will happen&lt;/li&gt;
&lt;li&gt;With CTL HA, the two nodes can communicate, in this case over a special TCP protocol, to coordinate and make sure they do not step on each others toes, allowing safe operation&lt;/li&gt;
&lt;li&gt;The CTL HA implementation in FreeBSD can operate in the following four modes:&lt;/li&gt;
&lt;li&gt;Active/Unavailable -- without interlink between nodes

&lt;ul&gt;
&lt;li&gt;Active/Standby -- with the second node handling only basic LUN discovery and
reservation, synchronizing with the first node through the interlink&lt;/li&gt;
&lt;li&gt;Active/Active -- with both nodes processing commands and accessing the
backing storage, synchronizing with the first node through the interlink&lt;/li&gt;
&lt;li&gt;Active/Proxy -- with second node working as proxy, transferring all
commands to the first node for execution through the interlink&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;The custom TCP protocol has no authentication, so it should never be enabled on public interfaces&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=287707" target="_blank" rel="nofollow noopener"&gt;Doc Update&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/d13e957b0d66a395b3736c43f18972c282bbd58a" target="_blank" rel="nofollow noopener"&gt;Panel Self-Refresh support lands in DragonFlyBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In what seems almost weekly improvements being made to the Xorg stack for DragonFly, we now have Panel Self-Refresh landing, thanks to Imre Vadász&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.anandtech.com/show/7208/understanding-panel-self-refresh" target="_blank" rel="nofollow noopener"&gt;Understanding Panel Self-Refresh&lt;/a&gt; and &lt;a href="http://www.hardwaresecrets.com/introducing-the-panel-self-refresh-technology/" target="_blank" rel="nofollow noopener"&gt;More about Panel Self-Refresh&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;In a nutshell, the above articles talks about how in the case of static images on the screen, power-savings can be obtained by refreshing static images from display memory (frame-buffer), disabling the video processing of the CPU/GPU and associated pipeline during the process. &lt;/li&gt;
&lt;li&gt;And just for good measure, Imre also committed some further Intel driver cleanup, &lt;a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/6b231eab9db5ef4d4dc3816487d8e3d48941e0e2" target="_blank" rel="nofollow noopener"&gt;reducing the diff with Linux 3.17&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://bitbucket.org/stevedrake/sluice" target="_blank" rel="nofollow noopener"&gt;Introducing Sluice, a new ZFS snapshot management tool&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new ZFS snapshot management tool written in Python and modeled after Apple.s Time Machine&lt;/li&gt;
&lt;li&gt;Simple command line interface&lt;/li&gt;
&lt;li&gt;No configuration files, settings are stored as ZFS user properties&lt;/li&gt;
&lt;li&gt;Includes simple remote replication support&lt;/li&gt;
&lt;li&gt;Can operate on remote systems with the zfs://user@host/path@snapname url schema&lt;/li&gt;
&lt;li&gt;Future feature list includes .import. command to moved files from non-ZFS storage to ZFS and create a snapshot, and .export. to do the inverse&lt;/li&gt;
&lt;li&gt;Thanks to Dan for tipping us about this new project
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.wired.com/2015/09/whatsapp-serves-900-million-users-50-engineers/" target="_blank" rel="nofollow noopener"&gt;Why WhatsApp only needs 50 engineers for 900 million users&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Wired has a good write-up on the behind-the-scenes work taking place at WhatsApp&lt;/li&gt;
&lt;li&gt;While the article mentions FreeBSD, it spends the bulk of its discussion about Erlang and using its scalable concurrency and deployment of new code to running processes. &lt;/li&gt;
&lt;li&gt;FB messenger uses Haskell to accomplish much the same thing, while Google and Mozilla are currently trying to bring the same level of flexibility to Go and Rust respectively. &lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.youtube.com/watch?v=57Ch2j8U0lk" target="_blank" rel="nofollow noopener"&gt;video&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Thanks to Ed for submitting this news item
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Aaron Poffenberger - &lt;a href="mailto:akp@hypernote.com" target="_blank" rel="nofollow noopener"&gt;email@email&lt;/a&gt; / &lt;a href="https://twitter.com/akpoff" target="_blank" rel="nofollow noopener"&gt;@akpoff&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD in a strange place&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;KM: Go ahead and tell us about yourself and how did you first get involved with BSD?&lt;/li&gt;
&lt;li&gt;AJ: You.ve presented recently at Texas Linux Fest, both on FreeBSD and FreeNAS. What specifically prompted you to do that?&lt;/li&gt;
&lt;li&gt;KM: What would you say are the main selling points when presenting BSD to Linux users and admins? &lt;/li&gt;
&lt;li&gt;AJ: On the flip side of this topic, in what areas to do you think we could improve BSD to present better to Linux users?&lt;/li&gt;
&lt;li&gt;KM: What would you specifically recommend to other BSD users or fans who may also want to help present or teach about BSD? Any things specifically to avoid?&lt;/li&gt;
&lt;li&gt;AJ: What is the typical depth of knowledge you encounter when presenting BSD to a mostly Linux crowd? Any surprises when doing so?&lt;/li&gt;
&lt;li&gt;KM: Since you have done this before, are you mainly writing your own material or borrowing from other talks that have been done on BSD? Do you think there.s a place for some collaboration, maybe having a repository of materials that can be used for other BSD presenters at their local linux conference / LUG?&lt;/li&gt;
&lt;li&gt;AJ: Since you are primarily an OpenBSD user have you thought about doing any talks related to it? Is OpenBSD something on the radar of the typical Linux conference-goer?&lt;/li&gt;
&lt;li&gt;KM: Is there anything else you would like to mention before we wrap up?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://ghostbsd.org/10.1_release_eve" target="_blank" rel="nofollow noopener"&gt;GhostBSD 10.1 released &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;GhostBSD has given us a new release, this time it also includes XFCE as an alternative to the MATE desktop&lt;/li&gt;
&lt;li&gt;The installer has been updated to allow using GRUB, BSD loader, or none at all&lt;/li&gt;
&lt;li&gt;It also includes the new OctoPKG manager, which proves a Qt driven front-end to pkgng&lt;/li&gt;
&lt;li&gt;Thanks to Shawn for submitting this
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.textplain.net/blog/2015/moving-to-freebsd/" target="_blank" rel="nofollow noopener"&gt;Moving to FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this blog post, Randy Westlund takes us through his journey of moving from Gentoo over to FreeBSD&lt;/li&gt;
&lt;li&gt;Inspired in part due to Systemd, he first spent some time on Wikipedia reading about BSD before taking the plunge to grab FreeBSD and give it a whirl in a VM.&lt;/li&gt;
&lt;li&gt;"My first impression was that installation was super easy. Installing Gentoo is done manually and can be a "fun" weekend adventure if you're not sure what you're doing. I can spin up a new FreeBSD VM in five minutes."&lt;/li&gt;
&lt;li&gt;"There's a man page for everything! And they're well-written! Gentoo has the best documentation of any Linux distro I've used, but FreeBSD is on another level. With a copy of the FreeBSD Handbook and the system man pages, I can actually get things done without tabbing over to Google every five minutes."&lt;/li&gt;
&lt;li&gt;He goes on to mention everything from Init system, Jails, Security, Community and License, a well-rounded article. &lt;/li&gt;
&lt;li&gt;Also gives a nice shout-out to PC-BSD as an even easier way to get started on a FreeBSD journey, thanks!&lt;/li&gt;
&lt;li&gt;Shout out to Matt for tipping us to this blog post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=144190275908215&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD Enables GPT by default &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Looks like OpenBSD has taken the plunge and enabled GPT by default now&lt;/li&gt;
&lt;li&gt;Ken Westerback does us the honors, by removing the kernel option for GPT&lt;/li&gt;
&lt;li&gt;Users on -CURRENT should give this a whirl, and of course report issues back upstream&lt;/li&gt;
&lt;li&gt;Credit to Jona for writing in about this one
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/reproducible-builds-are-a-waste-of-time" target="_blank" rel="nofollow noopener"&gt;DISCUSSION: Are reproducible builds worth-while?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this weeks article / rant, Ted takes on the notion of reproducible builds being the end-all be-all for security. &lt;/li&gt;
&lt;li&gt;What about compiler backdoors?&lt;/li&gt;
&lt;li&gt;This does not prevent shellshock, or other bugs in the code itself&lt;/li&gt;
&lt;li&gt;Personally, I.m all in favor, another .Trust but verify. mechanism of the distributed binaries, plus it makes it handy to do source builds and not end up with various checksum changes where no code actually changed. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Q7XjxNH" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QtE6XzJK" target="_blank" rel="nofollow noopener"&gt;Possnfiffer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20uloOljw" target="_blank" rel="nofollow noopener"&gt;Daniel writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we are going to be talking with Aaron Poffenberger, who has much to share about his first-hand experience in infiltrating Linux conferences with BSD-goodness.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/r287621" rel="nofollow">Alexander Motin implements CTL High Availability</a></h3>

<ul>
<li>CTL HA allows two .head. nodes to be connected to the same set of disks, safely</li>
<li>An HA storage appliance usually consists of 2 totally separate servers, connected to a shared set of disks in separate JBOD sleds</li>
<li>The problem with this setup is that if both machines try to use the disks at the same time, bad things will happen</li>
<li>With CTL HA, the two nodes can communicate, in this case over a special TCP protocol, to coordinate and make sure they do not step on each others toes, allowing safe operation</li>
<li>The CTL HA implementation in FreeBSD can operate in the following four modes:</li>
<li>Active/Unavailable -- without interlink between nodes

<ul>
<li>Active/Standby -- with the second node handling only basic LUN discovery and
reservation, synchronizing with the first node through the interlink</li>
<li>Active/Active -- with both nodes processing commands and accessing the
backing storage, synchronizing with the first node through the interlink</li>
<li>Active/Proxy -- with second node working as proxy, transferring all
commands to the first node for execution through the interlink</li>
</ul></li>
<li>The custom TCP protocol has no authentication, so it should never be enabled on public interfaces</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=287707" rel="nofollow">Doc Update</a>
***</li>
</ul>

<h3><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/d13e957b0d66a395b3736c43f18972c282bbd58a" rel="nofollow">Panel Self-Refresh support lands in DragonFlyBSD</a></h3>

<ul>
<li>In what seems almost weekly improvements being made to the Xorg stack for DragonFly, we now have Panel Self-Refresh landing, thanks to Imre Vadász</li>
<li><a href="http://www.anandtech.com/show/7208/understanding-panel-self-refresh" rel="nofollow">Understanding Panel Self-Refresh</a> and <a href="http://www.hardwaresecrets.com/introducing-the-panel-self-refresh-technology/" rel="nofollow">More about Panel Self-Refresh</a></li>
<li>In a nutshell, the above articles talks about how in the case of static images on the screen, power-savings can be obtained by refreshing static images from display memory (frame-buffer), disabling the video processing of the CPU/GPU and associated pipeline during the process. </li>
<li>And just for good measure, Imre also committed some further Intel driver cleanup, <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/6b231eab9db5ef4d4dc3816487d8e3d48941e0e2" rel="nofollow">reducing the diff with Linux 3.17</a>
***</li>
</ul>

<h3><a href="https://bitbucket.org/stevedrake/sluice" rel="nofollow">Introducing Sluice, a new ZFS snapshot management tool</a></h3>

<ul>
<li>A new ZFS snapshot management tool written in Python and modeled after Apple.s Time Machine</li>
<li>Simple command line interface</li>
<li>No configuration files, settings are stored as ZFS user properties</li>
<li>Includes simple remote replication support</li>
<li>Can operate on remote systems with the zfs://user@host/path@snapname url schema</li>
<li>Future feature list includes .import. command to moved files from non-ZFS storage to ZFS and create a snapshot, and .export. to do the inverse</li>
<li>Thanks to Dan for tipping us about this new project
***</li>
</ul>

<h3><a href="http://www.wired.com/2015/09/whatsapp-serves-900-million-users-50-engineers/" rel="nofollow">Why WhatsApp only needs 50 engineers for 900 million users</a></h3>

<ul>
<li>Wired has a good write-up on the behind-the-scenes work taking place at WhatsApp</li>
<li>While the article mentions FreeBSD, it spends the bulk of its discussion about Erlang and using its scalable concurrency and deployment of new code to running processes. </li>
<li>FB messenger uses Haskell to accomplish much the same thing, while Google and Mozilla are currently trying to bring the same level of flexibility to Go and Rust respectively. </li>
<li><a href="https://www.youtube.com/watch?v=57Ch2j8U0lk" rel="nofollow">video</a></li>
<li>Thanks to Ed for submitting this news item
***</li>
</ul>

<h2>Interview - Aaron Poffenberger - <a href="mailto:akp@hypernote.com" rel="nofollow">email@email</a> / <a href="https://twitter.com/akpoff" rel="nofollow">@akpoff</a></h2>

<p>BSD in a strange place</p>

<ul>
<li>KM: Go ahead and tell us about yourself and how did you first get involved with BSD?</li>
<li>AJ: You.ve presented recently at Texas Linux Fest, both on FreeBSD and FreeNAS. What specifically prompted you to do that?</li>
<li>KM: What would you say are the main selling points when presenting BSD to Linux users and admins? </li>
<li>AJ: On the flip side of this topic, in what areas to do you think we could improve BSD to present better to Linux users?</li>
<li>KM: What would you specifically recommend to other BSD users or fans who may also want to help present or teach about BSD? Any things specifically to avoid?</li>
<li>AJ: What is the typical depth of knowledge you encounter when presenting BSD to a mostly Linux crowd? Any surprises when doing so?</li>
<li>KM: Since you have done this before, are you mainly writing your own material or borrowing from other talks that have been done on BSD? Do you think there.s a place for some collaboration, maybe having a repository of materials that can be used for other BSD presenters at their local linux conference / LUG?</li>
<li>AJ: Since you are primarily an OpenBSD user have you thought about doing any talks related to it? Is OpenBSD something on the radar of the typical Linux conference-goer?</li>
<li>KM: Is there anything else you would like to mention before we wrap up?
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ghostbsd.org/10.1_release_eve" rel="nofollow">GhostBSD 10.1 released </a></h3>

<ul>
<li>GhostBSD has given us a new release, this time it also includes XFCE as an alternative to the MATE desktop</li>
<li>The installer has been updated to allow using GRUB, BSD loader, or none at all</li>
<li>It also includes the new OctoPKG manager, which proves a Qt driven front-end to pkgng</li>
<li>Thanks to Shawn for submitting this
***</li>
</ul>

<h3><a href="https://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>In this blog post, Randy Westlund takes us through his journey of moving from Gentoo over to FreeBSD</li>
<li>Inspired in part due to Systemd, he first spent some time on Wikipedia reading about BSD before taking the plunge to grab FreeBSD and give it a whirl in a VM.</li>
<li>&quot;My first impression was that installation was super easy. Installing Gentoo is done manually and can be a &quot;fun&quot; weekend adventure if you&#39;re not sure what you&#39;re doing. I can spin up a new FreeBSD VM in five minutes.&quot;</li>
<li>&quot;There&#39;s a man page for everything! And they&#39;re well-written! Gentoo has the best documentation of any Linux distro I&#39;ve used, but FreeBSD is on another level. With a copy of the FreeBSD Handbook and the system man pages, I can actually get things done without tabbing over to Google every five minutes.&quot;</li>
<li>He goes on to mention everything from Init system, Jails, Security, Community and License, a well-rounded article. </li>
<li>Also gives a nice shout-out to PC-BSD as an even easier way to get started on a FreeBSD journey, thanks!</li>
<li>Shout out to Matt for tipping us to this blog post
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-cvs&m=144190275908215&w=2" rel="nofollow">OpenBSD Enables GPT by default </a></h3>

<ul>
<li>Looks like OpenBSD has taken the plunge and enabled GPT by default now</li>
<li>Ken Westerback does us the honors, by removing the kernel option for GPT</li>
<li>Users on -CURRENT should give this a whirl, and of course report issues back upstream</li>
<li>Credit to Jona for writing in about this one
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/reproducible-builds-are-a-waste-of-time" rel="nofollow">DISCUSSION: Are reproducible builds worth-while?</a></h3>

<ul>
<li>In this weeks article / rant, Ted takes on the notion of reproducible builds being the end-all be-all for security. </li>
<li>What about compiler backdoors?</li>
<li>This does not prevent shellshock, or other bugs in the code itself</li>
<li>Personally, I.m all in favor, another .Trust but verify. mechanism of the distributed binaries, plus it makes it handy to do source builds and not end up with various checksum changes where no code actually changed. 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20Q7XjxNH" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2QtE6XzJK" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s20uloOljw" rel="nofollow">Daniel writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we are going to be talking with Aaron Poffenberger, who has much to share about his first-hand experience in infiltrating Linux conferences with BSD-goodness.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/changeset/base/r287621" rel="nofollow">Alexander Motin implements CTL High Availability</a></h3>

<ul>
<li>CTL HA allows two .head. nodes to be connected to the same set of disks, safely</li>
<li>An HA storage appliance usually consists of 2 totally separate servers, connected to a shared set of disks in separate JBOD sleds</li>
<li>The problem with this setup is that if both machines try to use the disks at the same time, bad things will happen</li>
<li>With CTL HA, the two nodes can communicate, in this case over a special TCP protocol, to coordinate and make sure they do not step on each others toes, allowing safe operation</li>
<li>The CTL HA implementation in FreeBSD can operate in the following four modes:</li>
<li>Active/Unavailable -- without interlink between nodes

<ul>
<li>Active/Standby -- with the second node handling only basic LUN discovery and
reservation, synchronizing with the first node through the interlink</li>
<li>Active/Active -- with both nodes processing commands and accessing the
backing storage, synchronizing with the first node through the interlink</li>
<li>Active/Proxy -- with second node working as proxy, transferring all
commands to the first node for execution through the interlink</li>
</ul></li>
<li>The custom TCP protocol has no authentication, so it should never be enabled on public interfaces</li>
<li><a href="https://svnweb.freebsd.org/base?view=revision&revision=287707" rel="nofollow">Doc Update</a>
***</li>
</ul>

<h3><a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/d13e957b0d66a395b3736c43f18972c282bbd58a" rel="nofollow">Panel Self-Refresh support lands in DragonFlyBSD</a></h3>

<ul>
<li>In what seems almost weekly improvements being made to the Xorg stack for DragonFly, we now have Panel Self-Refresh landing, thanks to Imre Vadász</li>
<li><a href="http://www.anandtech.com/show/7208/understanding-panel-self-refresh" rel="nofollow">Understanding Panel Self-Refresh</a> and <a href="http://www.hardwaresecrets.com/introducing-the-panel-self-refresh-technology/" rel="nofollow">More about Panel Self-Refresh</a></li>
<li>In a nutshell, the above articles talks about how in the case of static images on the screen, power-savings can be obtained by refreshing static images from display memory (frame-buffer), disabling the video processing of the CPU/GPU and associated pipeline during the process. </li>
<li>And just for good measure, Imre also committed some further Intel driver cleanup, <a href="http://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/6b231eab9db5ef4d4dc3816487d8e3d48941e0e2" rel="nofollow">reducing the diff with Linux 3.17</a>
***</li>
</ul>

<h3><a href="https://bitbucket.org/stevedrake/sluice" rel="nofollow">Introducing Sluice, a new ZFS snapshot management tool</a></h3>

<ul>
<li>A new ZFS snapshot management tool written in Python and modeled after Apple.s Time Machine</li>
<li>Simple command line interface</li>
<li>No configuration files, settings are stored as ZFS user properties</li>
<li>Includes simple remote replication support</li>
<li>Can operate on remote systems with the zfs://user@host/path@snapname url schema</li>
<li>Future feature list includes .import. command to moved files from non-ZFS storage to ZFS and create a snapshot, and .export. to do the inverse</li>
<li>Thanks to Dan for tipping us about this new project
***</li>
</ul>

<h3><a href="http://www.wired.com/2015/09/whatsapp-serves-900-million-users-50-engineers/" rel="nofollow">Why WhatsApp only needs 50 engineers for 900 million users</a></h3>

<ul>
<li>Wired has a good write-up on the behind-the-scenes work taking place at WhatsApp</li>
<li>While the article mentions FreeBSD, it spends the bulk of its discussion about Erlang and using its scalable concurrency and deployment of new code to running processes. </li>
<li>FB messenger uses Haskell to accomplish much the same thing, while Google and Mozilla are currently trying to bring the same level of flexibility to Go and Rust respectively. </li>
<li><a href="https://www.youtube.com/watch?v=57Ch2j8U0lk" rel="nofollow">video</a></li>
<li>Thanks to Ed for submitting this news item
***</li>
</ul>

<h2>Interview - Aaron Poffenberger - <a href="mailto:akp@hypernote.com" rel="nofollow">email@email</a> / <a href="https://twitter.com/akpoff" rel="nofollow">@akpoff</a></h2>

<p>BSD in a strange place</p>

<ul>
<li>KM: Go ahead and tell us about yourself and how did you first get involved with BSD?</li>
<li>AJ: You.ve presented recently at Texas Linux Fest, both on FreeBSD and FreeNAS. What specifically prompted you to do that?</li>
<li>KM: What would you say are the main selling points when presenting BSD to Linux users and admins? </li>
<li>AJ: On the flip side of this topic, in what areas to do you think we could improve BSD to present better to Linux users?</li>
<li>KM: What would you specifically recommend to other BSD users or fans who may also want to help present or teach about BSD? Any things specifically to avoid?</li>
<li>AJ: What is the typical depth of knowledge you encounter when presenting BSD to a mostly Linux crowd? Any surprises when doing so?</li>
<li>KM: Since you have done this before, are you mainly writing your own material or borrowing from other talks that have been done on BSD? Do you think there.s a place for some collaboration, maybe having a repository of materials that can be used for other BSD presenters at their local linux conference / LUG?</li>
<li>AJ: Since you are primarily an OpenBSD user have you thought about doing any talks related to it? Is OpenBSD something on the radar of the typical Linux conference-goer?</li>
<li>KM: Is there anything else you would like to mention before we wrap up?
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ghostbsd.org/10.1_release_eve" rel="nofollow">GhostBSD 10.1 released </a></h3>

<ul>
<li>GhostBSD has given us a new release, this time it also includes XFCE as an alternative to the MATE desktop</li>
<li>The installer has been updated to allow using GRUB, BSD loader, or none at all</li>
<li>It also includes the new OctoPKG manager, which proves a Qt driven front-end to pkgng</li>
<li>Thanks to Shawn for submitting this
***</li>
</ul>

<h3><a href="https://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>In this blog post, Randy Westlund takes us through his journey of moving from Gentoo over to FreeBSD</li>
<li>Inspired in part due to Systemd, he first spent some time on Wikipedia reading about BSD before taking the plunge to grab FreeBSD and give it a whirl in a VM.</li>
<li>&quot;My first impression was that installation was super easy. Installing Gentoo is done manually and can be a &quot;fun&quot; weekend adventure if you&#39;re not sure what you&#39;re doing. I can spin up a new FreeBSD VM in five minutes.&quot;</li>
<li>&quot;There&#39;s a man page for everything! And they&#39;re well-written! Gentoo has the best documentation of any Linux distro I&#39;ve used, but FreeBSD is on another level. With a copy of the FreeBSD Handbook and the system man pages, I can actually get things done without tabbing over to Google every five minutes.&quot;</li>
<li>He goes on to mention everything from Init system, Jails, Security, Community and License, a well-rounded article. </li>
<li>Also gives a nice shout-out to PC-BSD as an even easier way to get started on a FreeBSD journey, thanks!</li>
<li>Shout out to Matt for tipping us to this blog post
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-cvs&m=144190275908215&w=2" rel="nofollow">OpenBSD Enables GPT by default </a></h3>

<ul>
<li>Looks like OpenBSD has taken the plunge and enabled GPT by default now</li>
<li>Ken Westerback does us the honors, by removing the kernel option for GPT</li>
<li>Users on -CURRENT should give this a whirl, and of course report issues back upstream</li>
<li>Credit to Jona for writing in about this one
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/reproducible-builds-are-a-waste-of-time" rel="nofollow">DISCUSSION: Are reproducible builds worth-while?</a></h3>

<ul>
<li>In this weeks article / rant, Ted takes on the notion of reproducible builds being the end-all be-all for security. </li>
<li>What about compiler backdoors?</li>
<li>This does not prevent shellshock, or other bugs in the code itself</li>
<li>Personally, I.m all in favor, another .Trust but verify. mechanism of the distributed binaries, plus it makes it handy to do source builds and not end up with various checksum changes where no code actually changed. 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20Q7XjxNH" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2QtE6XzJK" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s20uloOljw" rel="nofollow">Daniel writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>106: Multipath TCP</title>
  <link>https://www.bsdnow.tv/106</link>
  <guid isPermaLink="false">56f32661-ba43-4458-8d3b-9ef39c55be8c</guid>
  <pubDate>Wed, 09 Sep 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/56f32661-ba43-4458-8d3b-9ef39c55be8c.mp3" length="48462196" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we have Nigel Williams here to bring us all sorts of info about Multipath TCP, what it is, how it works and the ongoing effort to bring it into FreeBSD. All that and of course the latest BSD news coming your way, right now!</itunes:subtitle>
  <itunes:duration>1:07:18</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, we have Nigel Williams here to bring us all sorts of info about Multipath TCP, what it is, how it works and the ongoing effort to bring it into FreeBSD. All that and of course the latest BSD news coming your way, right now!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.crashed.org/dont-backout/" target="_blank" rel="nofollow noopener"&gt;Backing out changes doesn.t always pinpoint the problem &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Peter Wemm brings us a fascinating look at debugging an issue which occurred on the FreeBSD build cluster recently. &lt;/li&gt;
&lt;li&gt;Bottom line? Backing out something isn.t necessarily the fix, rather it should be apart of the diagnostic process&lt;/li&gt;
&lt;li&gt;In this particular case, a change to some mmap() functionality ended up exposing a bug in the kernel.s page fault handler which existed since (wait for it.) 1997!&lt;/li&gt;
&lt;li&gt;As Peter mentions at the bottom of the Article, this bug had been showing up for years, but was sporadic and often written off as a networking hiccup. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/ocochard/netbenchs/blob/master/Xeon_E5-2650-8Cores-Chelsio_T540-CR/nXxq10g/results/fbsd11-melifaro.r287531/README.md" target="_blank" rel="nofollow noopener"&gt;BSD Router Project benchmarks new routing changes to FreeBSD &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A project branch of FreeBSD -CURRENT has been created with a number of optimizations to the routing code&lt;/li&gt;
&lt;li&gt;&lt;a href="https://svnweb.freebsd.org/base/projects/routing/?view=log" target="_blank" rel="nofollow noopener"&gt;Alexander V. Chernikov (melifaro@).s routing branch &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The net result is an almost doubling of peak performance in packets per second&lt;/li&gt;
&lt;li&gt;Performance scales well with the number of NIC queues (2 queues is 88% faster than 1 queue, 3 is 270% faster). Unlike the previous code, when the number of queues hits 4, performance is down by only 10%, instead of being cut nearly in half&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://github.com/ocochard/netbenchs" target="_blank" rel="nofollow noopener"&gt;Other Benchmark Results, and the tools to do your own tests &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/the-peculiar-libretunnel-situation" target="_blank" rel="nofollow noopener"&gt;When is SSL not SSL?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy Ted has a good write-up on a weird situation related to licensing of stunnel and LibreSSL&lt;/li&gt;
&lt;li&gt;The problem exists due to stunnel being released with a different license, that is technically incompatible with the GPL, as well as linking against non-OpenSSL versions. &lt;/li&gt;
&lt;li&gt;The author has also decided to create specific named exceptions when the *SSL lib is part of the base operating system, but does not personally consider LibreSSL as a valid linking target on its own&lt;/li&gt;
&lt;li&gt;Ted points out that the LibreSSL team considers LibreSSL == OpenSSL, so this may be a moot concern
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://darknedgy.net/files/systembsd.pdf" target="_blank" rel="nofollow noopener"&gt;Update on systembsd &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We.ve mentioned the GSoC project to create a SystemD shim in OpenBSD before. Now we have the slides from Ian Sutton talking about this project. &lt;/li&gt;
&lt;li&gt;As a refresher, this project is to take DBUS and create daemons emulating various systemd components, such as hostnamed, localed, timedated, and friends. &lt;/li&gt;
&lt;li&gt;Written from scratch in C, it was mainly created in the hopes of becoming a port, allowing Gnome and related tools to function on OpenBSD. &lt;/li&gt;
&lt;li&gt;This is a good read, especially for current or aspiring porters who want to bring over newer versions of applications which now depend upon SystemD. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Nigel Williams - [&lt;a href="mailto:njwilliams@swin.edu.au" target="_blank" rel="nofollow noopener"&gt;njwilliams@swin.edu.au&lt;/a&gt;](&lt;a href="mailto:njwilliams@swin.edu.au" target="_blank" rel="nofollow noopener"&gt;njwilliams@swin.edu.au&lt;/a&gt;)&lt;/h2&gt;

&lt;p&gt;Multipath TCP&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=144115942223734&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD UEFI boot loader&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We.ve mentioned the ongoing work to bring UEFI booting to OpenBSD and it looks like this has now landed in the tree&lt;/li&gt;
&lt;li&gt;The .fdisk. utility has also been updated with a new -b flag, when used  with .-i. will create the special EFI system partition on amd64/i386 . (&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=144139348416071&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;http://marc.info/?l=openbsd-cvs&amp;amp;amp;m=144139348416071&amp;amp;amp;w=2&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/mherrb/status/641004331035193344" target="_blank" rel="nofollow noopener"&gt;Some twitter benchmarks &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/journal/vol2_no4/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal, July/August issue &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The latest issue of the FreeBSD Journal has arrived&lt;/li&gt;
&lt;li&gt;As always, the Journal opens with a letter from the FreeBSD Foundation &lt;/li&gt;
&lt;li&gt;Feature Articles:&lt;/li&gt;
&lt;li&gt;Groupon's Deal on FreeBSD -- How to drive adoption of FreeBSD at your organization, and lessons learned in retraining Linux sysadmins&lt;/li&gt;
&lt;li&gt;FreeBSD: The Isilon Experience -- Mistakes not to make when basing a product on FreeBSD. TL;DR: track head&lt;/li&gt;
&lt;li&gt;Reflections on FreeBSD.org: Packages -- A status update on where we are with binary packages, what issues have been overcome, and which still remain&lt;/li&gt;
&lt;li&gt;Inside the Foundation -- An overview of some of the things you might not be aware that the FreeBSD Foundation is doing to support the project and attract the next generation of committers&lt;/li&gt;
&lt;li&gt;Includes a book review of .The Practise of System and Network Administration.&lt;/li&gt;
&lt;li&gt;As usual, various other reports are included: The Ports Report, SVN Update, A conference report, a report from the Essen hackathon, and the Event Calendar
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/brd/2015/08/25/building-arm-packages-with-poudriere-the-simple-way/" target="_blank" rel="nofollow noopener"&gt;Building ARMv6 packages on FreeBSD, the easy way &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Previously we have discussed how to build ARMv6 packages on FreeBSD&lt;/li&gt;
&lt;li&gt;We also interviewed Sean Bruno about his work in this area&lt;/li&gt;
&lt;li&gt;Thankfully, over time this process has been simplified, and no longer requires a lot of manual configuration, or fussing with the .image activator.&lt;/li&gt;
&lt;li&gt;Now, you can just build packages for your Raspberry Pi or similar device, just as simply as you would build for x86, it just takes longer to build.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/09/new-release-schedule-for-pc-bsd/" target="_blank" rel="nofollow noopener"&gt;New PC-BSD Release Schedule&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PC-BSD Team has announce an updated release schedule for beyond 10.2&lt;/li&gt;
&lt;li&gt;This schedule follows more closely the FreeBSD schedules, with major releases only occurring when FreeBSD does the next point update, or major version bump. &lt;/li&gt;
&lt;li&gt;PC-BSD.s source tree has been split into master(current) and stable as well&lt;/li&gt;
&lt;li&gt;PRODUCTION / EDGE packages will be built from stable, with PRODUCTION updated monthly now. The -CURRENT monthly images will contain the master source builds. 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21cguSv7E" target="_blank" rel="nofollow noopener"&gt;Joris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s217A5NNGg" target="_blank" rel="nofollow noopener"&gt; Anonymous &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20HyiqJV0" target="_blank" rel="nofollow noopener"&gt; Darin &lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, TCP, multipath, tutorial, howto, guide, bsd, interview, ...</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we have Nigel Williams here to bring us all sorts of info about Multipath TCP, what it is, how it works and the ongoing effort to bring it into FreeBSD. All that and of course the latest BSD news coming your way, right now!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.crashed.org/dont-backout/" rel="nofollow">Backing out changes doesn.t always pinpoint the problem </a></h3>

<ul>
<li>Peter Wemm brings us a fascinating look at debugging an issue which occurred on the FreeBSD build cluster recently. </li>
<li>Bottom line? Backing out something isn.t necessarily the fix, rather it should be apart of the diagnostic process</li>
<li>In this particular case, a change to some mmap() functionality ended up exposing a bug in the kernel.s page fault handler which existed since (wait for it.) 1997!</li>
<li>As Peter mentions at the bottom of the Article, this bug had been showing up for years, but was sporadic and often written off as a networking hiccup. 
***</li>
</ul>

<h3><a href="https://github.com/ocochard/netbenchs/blob/master/Xeon_E5-2650-8Cores-Chelsio_T540-CR/nXxq10g/results/fbsd11-melifaro.r287531/README.md" rel="nofollow">BSD Router Project benchmarks new routing changes to FreeBSD </a></h3>

<ul>
<li>A project branch of FreeBSD -CURRENT has been created with a number of optimizations to the routing code</li>
<li><a href="https://svnweb.freebsd.org/base/projects/routing/?view=log" rel="nofollow">Alexander V. Chernikov (melifaro@).s routing branch </a></li>
<li>The net result is an almost doubling of peak performance in packets per second</li>
<li>Performance scales well with the number of NIC queues (2 queues is 88% faster than 1 queue, 3 is 270% faster). Unlike the previous code, when the number of queues hits 4, performance is down by only 10%, instead of being cut nearly in half</li>
<li><a href="https://github.com/ocochard/netbenchs" rel="nofollow">Other Benchmark Results, and the tools to do your own tests </a>
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-peculiar-libretunnel-situation" rel="nofollow">When is SSL not SSL?</a></h3>

<ul>
<li>Our buddy Ted has a good write-up on a weird situation related to licensing of stunnel and LibreSSL</li>
<li>The problem exists due to stunnel being released with a different license, that is technically incompatible with the GPL, as well as linking against non-OpenSSL versions. </li>
<li>The author has also decided to create specific named exceptions when the *SSL lib is part of the base operating system, but does not personally consider LibreSSL as a valid linking target on its own</li>
<li>Ted points out that the LibreSSL team considers LibreSSL == OpenSSL, so this may be a moot concern
***</li>
</ul>

<h3><a href="http://darknedgy.net/files/systembsd.pdf" rel="nofollow">Update on systembsd </a></h3>

<ul>
<li>We.ve mentioned the GSoC project to create a SystemD shim in OpenBSD before. Now we have the slides from Ian Sutton talking about this project. </li>
<li>As a refresher, this project is to take DBUS and create daemons emulating various systemd components, such as hostnamed, localed, timedated, and friends. </li>
<li>Written from scratch in C, it was mainly created in the hopes of becoming a port, allowing Gnome and related tools to function on OpenBSD. </li>
<li>This is a good read, especially for current or aspiring porters who want to bring over newer versions of applications which now depend upon SystemD. 
***</li>
</ul>

<h2>Interview - Nigel Williams - [<a href="mailto:njwilliams@swin.edu.au" rel="nofollow">njwilliams@swin.edu.au</a>](<a href="mailto:njwilliams@swin.edu.au" rel="nofollow">njwilliams@swin.edu.au</a>)</h2>

<p>Multipath TCP</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">OpenBSD UEFI boot loader</a></h3>

<ul>
<li>We.ve mentioned the ongoing work to bring UEFI booting to OpenBSD and it looks like this has now landed in the tree</li>
<li>The .fdisk. utility has also been updated with a new -b flag, when used  with .-i. will create the special EFI system partition on amd64/i386 . (<a href="http://marc.info/?l=openbsd-cvs&m=144139348416071&w=2" rel="nofollow">http://marc.info/?l=openbsd-cvs&amp;m=144139348416071&amp;w=2</a>)</li>
<li><a href="https://twitter.com/mherrb/status/641004331035193344" rel="nofollow">Some twitter benchmarks </a>
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/journal/vol2_no4/" rel="nofollow">FreeBSD Journal, July/August issue </a></h3>

<ul>
<li>The latest issue of the FreeBSD Journal has arrived</li>
<li>As always, the Journal opens with a letter from the FreeBSD Foundation </li>
<li>Feature Articles:</li>
<li>Groupon&#39;s Deal on FreeBSD -- How to drive adoption of FreeBSD at your organization, and lessons learned in retraining Linux sysadmins</li>
<li>FreeBSD: The Isilon Experience -- Mistakes not to make when basing a product on FreeBSD. TL;DR: track head</li>
<li>Reflections on FreeBSD.org: Packages -- A status update on where we are with binary packages, what issues have been overcome, and which still remain</li>
<li>Inside the Foundation -- An overview of some of the things you might not be aware that the FreeBSD Foundation is doing to support the project and attract the next generation of committers</li>
<li>Includes a book review of .The Practise of System and Network Administration.</li>
<li>As usual, various other reports are included: The Ports Report, SVN Update, A conference report, a report from the Essen hackathon, and the Event Calendar
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/brd/2015/08/25/building-arm-packages-with-poudriere-the-simple-way/" rel="nofollow">Building ARMv6 packages on FreeBSD, the easy way </a></h3>

<ul>
<li>Previously we have discussed how to build ARMv6 packages on FreeBSD</li>
<li>We also interviewed Sean Bruno about his work in this area</li>
<li>Thankfully, over time this process has been simplified, and no longer requires a lot of manual configuration, or fussing with the .image activator.</li>
<li>Now, you can just build packages for your Raspberry Pi or similar device, just as simply as you would build for x86, it just takes longer to build.
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/09/new-release-schedule-for-pc-bsd/" rel="nofollow">New PC-BSD Release Schedule</a></h3>

<ul>
<li>The PC-BSD Team has announce an updated release schedule for beyond 10.2</li>
<li>This schedule follows more closely the FreeBSD schedules, with major releases only occurring when FreeBSD does the next point update, or major version bump. </li>
<li>PC-BSD.s source tree has been split into master(current) and stable as well</li>
<li>PRODUCTION / EDGE packages will be built from stable, with PRODUCTION updated monthly now. The -CURRENT monthly images will contain the master source builds. 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21cguSv7E" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s217A5NNGg" rel="nofollow"> Anonymous </a></li>
<li><a href="http://slexy.org/view/s20HyiqJV0" rel="nofollow"> Darin </a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we have Nigel Williams here to bring us all sorts of info about Multipath TCP, what it is, how it works and the ongoing effort to bring it into FreeBSD. All that and of course the latest BSD news coming your way, right now!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.crashed.org/dont-backout/" rel="nofollow">Backing out changes doesn.t always pinpoint the problem </a></h3>

<ul>
<li>Peter Wemm brings us a fascinating look at debugging an issue which occurred on the FreeBSD build cluster recently. </li>
<li>Bottom line? Backing out something isn.t necessarily the fix, rather it should be apart of the diagnostic process</li>
<li>In this particular case, a change to some mmap() functionality ended up exposing a bug in the kernel.s page fault handler which existed since (wait for it.) 1997!</li>
<li>As Peter mentions at the bottom of the Article, this bug had been showing up for years, but was sporadic and often written off as a networking hiccup. 
***</li>
</ul>

<h3><a href="https://github.com/ocochard/netbenchs/blob/master/Xeon_E5-2650-8Cores-Chelsio_T540-CR/nXxq10g/results/fbsd11-melifaro.r287531/README.md" rel="nofollow">BSD Router Project benchmarks new routing changes to FreeBSD </a></h3>

<ul>
<li>A project branch of FreeBSD -CURRENT has been created with a number of optimizations to the routing code</li>
<li><a href="https://svnweb.freebsd.org/base/projects/routing/?view=log" rel="nofollow">Alexander V. Chernikov (melifaro@).s routing branch </a></li>
<li>The net result is an almost doubling of peak performance in packets per second</li>
<li>Performance scales well with the number of NIC queues (2 queues is 88% faster than 1 queue, 3 is 270% faster). Unlike the previous code, when the number of queues hits 4, performance is down by only 10%, instead of being cut nearly in half</li>
<li><a href="https://github.com/ocochard/netbenchs" rel="nofollow">Other Benchmark Results, and the tools to do your own tests </a>
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-peculiar-libretunnel-situation" rel="nofollow">When is SSL not SSL?</a></h3>

<ul>
<li>Our buddy Ted has a good write-up on a weird situation related to licensing of stunnel and LibreSSL</li>
<li>The problem exists due to stunnel being released with a different license, that is technically incompatible with the GPL, as well as linking against non-OpenSSL versions. </li>
<li>The author has also decided to create specific named exceptions when the *SSL lib is part of the base operating system, but does not personally consider LibreSSL as a valid linking target on its own</li>
<li>Ted points out that the LibreSSL team considers LibreSSL == OpenSSL, so this may be a moot concern
***</li>
</ul>

<h3><a href="http://darknedgy.net/files/systembsd.pdf" rel="nofollow">Update on systembsd </a></h3>

<ul>
<li>We.ve mentioned the GSoC project to create a SystemD shim in OpenBSD before. Now we have the slides from Ian Sutton talking about this project. </li>
<li>As a refresher, this project is to take DBUS and create daemons emulating various systemd components, such as hostnamed, localed, timedated, and friends. </li>
<li>Written from scratch in C, it was mainly created in the hopes of becoming a port, allowing Gnome and related tools to function on OpenBSD. </li>
<li>This is a good read, especially for current or aspiring porters who want to bring over newer versions of applications which now depend upon SystemD. 
***</li>
</ul>

<h2>Interview - Nigel Williams - [<a href="mailto:njwilliams@swin.edu.au" rel="nofollow">njwilliams@swin.edu.au</a>](<a href="mailto:njwilliams@swin.edu.au" rel="nofollow">njwilliams@swin.edu.au</a>)</h2>

<p>Multipath TCP</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">OpenBSD UEFI boot loader</a></h3>

<ul>
<li>We.ve mentioned the ongoing work to bring UEFI booting to OpenBSD and it looks like this has now landed in the tree</li>
<li>The .fdisk. utility has also been updated with a new -b flag, when used  with .-i. will create the special EFI system partition on amd64/i386 . (<a href="http://marc.info/?l=openbsd-cvs&m=144139348416071&w=2" rel="nofollow">http://marc.info/?l=openbsd-cvs&amp;m=144139348416071&amp;w=2</a>)</li>
<li><a href="https://twitter.com/mherrb/status/641004331035193344" rel="nofollow">Some twitter benchmarks </a>
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/journal/vol2_no4/" rel="nofollow">FreeBSD Journal, July/August issue </a></h3>

<ul>
<li>The latest issue of the FreeBSD Journal has arrived</li>
<li>As always, the Journal opens with a letter from the FreeBSD Foundation </li>
<li>Feature Articles:</li>
<li>Groupon&#39;s Deal on FreeBSD -- How to drive adoption of FreeBSD at your organization, and lessons learned in retraining Linux sysadmins</li>
<li>FreeBSD: The Isilon Experience -- Mistakes not to make when basing a product on FreeBSD. TL;DR: track head</li>
<li>Reflections on FreeBSD.org: Packages -- A status update on where we are with binary packages, what issues have been overcome, and which still remain</li>
<li>Inside the Foundation -- An overview of some of the things you might not be aware that the FreeBSD Foundation is doing to support the project and attract the next generation of committers</li>
<li>Includes a book review of .The Practise of System and Network Administration.</li>
<li>As usual, various other reports are included: The Ports Report, SVN Update, A conference report, a report from the Essen hackathon, and the Event Calendar
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/brd/2015/08/25/building-arm-packages-with-poudriere-the-simple-way/" rel="nofollow">Building ARMv6 packages on FreeBSD, the easy way </a></h3>

<ul>
<li>Previously we have discussed how to build ARMv6 packages on FreeBSD</li>
<li>We also interviewed Sean Bruno about his work in this area</li>
<li>Thankfully, over time this process has been simplified, and no longer requires a lot of manual configuration, or fussing with the .image activator.</li>
<li>Now, you can just build packages for your Raspberry Pi or similar device, just as simply as you would build for x86, it just takes longer to build.
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/09/new-release-schedule-for-pc-bsd/" rel="nofollow">New PC-BSD Release Schedule</a></h3>

<ul>
<li>The PC-BSD Team has announce an updated release schedule for beyond 10.2</li>
<li>This schedule follows more closely the FreeBSD schedules, with major releases only occurring when FreeBSD does the next point update, or major version bump. </li>
<li>PC-BSD.s source tree has been split into master(current) and stable as well</li>
<li>PRODUCTION / EDGE packages will be built from stable, with PRODUCTION updated monthly now. The -CURRENT monthly images will contain the master source builds. 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21cguSv7E" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s217A5NNGg" rel="nofollow"> Anonymous </a></li>
<li><a href="http://slexy.org/view/s20HyiqJV0" rel="nofollow"> Darin </a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>105: Virginia BSD Assembly</title>
  <link>https://www.bsdnow.tv/105</link>
  <guid isPermaLink="false">09c955b0-1ecf-440f-9aa9-80dc2fb05a49</guid>
  <pubDate>Wed, 02 Sep 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/09c955b0-1ecf-440f-9aa9-80dc2fb05a49.mp3" length="47635924" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's already our two-year anniversary! This time on the show, we'll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year's vBSDCon. What's it have to offer in an already-crowded BSD conference space? We'll find out.</itunes:subtitle>
  <itunes:duration>1:06:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's already our two-year anniversary! This time on the show, we'll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year's vBSDCon. What's it have to offer in an already-crowded BSD conference space? We'll find out.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=144104398132541&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD hypervisor coming soon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy Mike Larkin never rests, and he posted some very tight-lipped &lt;a href="http://pastebin.com/raw.php?i=F2Qbgdde" target="_blank" rel="nofollow noopener"&gt;console output&lt;/a&gt; on Twitter recently&lt;/li&gt;
&lt;li&gt;From what little he revealed &lt;a href="https://twitter.com/mlarkin2012/status/638265767864070144" target="_blank" rel="nofollow noopener"&gt;at the time&lt;/a&gt;, it appeared to be a new &lt;a href="https://en.wikipedia.org/wiki/Hypervisor" target="_blank" rel="nofollow noopener"&gt;hypervisor&lt;/a&gt; (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled "vmm"&lt;/li&gt;
&lt;li&gt;Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is&lt;/li&gt;
&lt;li&gt;Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation&lt;/li&gt;
&lt;li&gt;One thing to note: this &lt;strong&gt;isn't&lt;/strong&gt; just a port of something like Xen or Bhyve; it's all-new code, and Mike explains why he chose to go that route&lt;/li&gt;
&lt;li&gt;He also answered some basic questions about the requirements, when it'll be available, what OSes it can run, what's left to do, how to get involved and so on
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.darknedgy.net/technology/2015/08/26/0/" target="_blank" rel="nofollow noopener"&gt;Why FreeBSD should not adopt launchd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519" target="_blank" rel="nofollow noopener"&gt;Last week&lt;/a&gt; we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD&lt;/li&gt;
&lt;li&gt;One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we've learned)&lt;/li&gt;
&lt;li&gt;In this article, the author talks about why he thinks this is a bad idea&lt;/li&gt;
&lt;li&gt;He doesn't oppose the integration into FreeBSD-&lt;em&gt;derived&lt;/em&gt; projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail&lt;/li&gt;
&lt;li&gt;The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities&lt;/li&gt;
&lt;li&gt;Reddit had &lt;a href="https://www.reddit.com/r/BSD/comments/3ilhpk" target="_blank" rel="nofollow noopener"&gt;quite a bit&lt;/a&gt; &lt;a href="https://www.reddit.com/r/freebsd/comments/3ilj4i" target="_blank" rel="nofollow noopener"&gt;to say&lt;/a&gt; about this one, some in agreement and some not
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html" target="_blank" rel="nofollow noopener"&gt;DragonFly graphics improvements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack&lt;/li&gt;
&lt;li&gt;This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs&lt;/li&gt;
&lt;li&gt;You should also see some power management improvements, longer battery life and various other bug fixes&lt;/li&gt;
&lt;li&gt;If you're running DragonFly, especially on a laptop, you'll want to get this stuff on your machine quick - big improvements all around
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=144070638327053&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD tames the userland&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Last week we mentioned OpenBSD's tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are&lt;/li&gt;
&lt;li&gt;Theo posted a &lt;em&gt;mega diff&lt;/em&gt; of nearly 100 smaller diffs, adding tame support to many areas of the userland tools&lt;/li&gt;
&lt;li&gt;It's still a work-in-progress version; there's still more to be added (including the file path whitelist stuff)&lt;/li&gt;
&lt;li&gt;Some classic utilities are even being reworked to make taming them easier - &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144103945031253&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;the "w" command&lt;/a&gt;, for example&lt;/li&gt;
&lt;li&gt;The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)&lt;/li&gt;
&lt;li&gt;More discussion can be found &lt;a href="https://news.ycombinator.com/item?id=10135901" target="_blank" rel="nofollow noopener"&gt;on HN&lt;/a&gt;, as one might expect&lt;/li&gt;
&lt;li&gt;If you're a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Scott Courtney - &lt;a href="mailto:vbsdcon@verisign.com" target="_blank" rel="nofollow noopener"&gt;vbsdcon@verisign.com&lt;/a&gt; / &lt;a href="https://twitter.com/verisign" target="_blank" rel="nofollow noopener"&gt;@verisign&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://vbsdcon.com/" target="_blank" rel="nofollow noopener"&gt;vBSDCon&lt;/a&gt; 2015&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://opnsense.org/opnsense-beyond-the-fork" target="_blank" rel="nofollow noopener"&gt;OPNsense, beyond the fork&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We first &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;heard about&lt;/a&gt; OPNsense back in January, and they've since released nearly &lt;strong&gt;40&lt;/strong&gt; versions, spanning over &lt;strong&gt;5,000&lt;/strong&gt; commits&lt;/li&gt;
&lt;li&gt;This is their first big status update, covering some of the things that've happened since the project was born&lt;/li&gt;
&lt;li&gt;There's been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150827112006" target="_blank" rel="nofollow noopener"&gt;LibreSSL nukes SSLv3&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With their latest release, LibreSSL began to turn off &lt;a href="http://disablessl3.com" target="_blank" rel="nofollow noopener"&gt;SSLv3&lt;/a&gt; support, starting with the "openssl" command&lt;/li&gt;
&lt;li&gt;At the time, SSLv3 wasn't disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)&lt;/li&gt;
&lt;li&gt;They've now flipped the switch, and the process of complete removal has started&lt;/li&gt;
&lt;li&gt;From the Undeadly summary, "This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!"&lt;/li&gt;
&lt;li&gt;With this change and a few more to follow shortly, Libre*SSL* won't actually &lt;em&gt;support SSL&lt;/em&gt; anymore - time to rename it "LibreTLS"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt" target="_blank" rel="nofollow noopener"&gt;FreeBSD MPTCP updated&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For anyone unaware, &lt;a href="https://en.wikipedia.org/wiki/Multipath_TCP" target="_blank" rel="nofollow noopener"&gt;Multipath TCP&lt;/a&gt; is "an ongoing effort of the Internet Engineering Task Force's (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy."&lt;/li&gt;
&lt;li&gt;There's been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated&lt;/li&gt;
&lt;li&gt;Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements&lt;/li&gt;
&lt;li&gt;Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144092912907778&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;UEFI and GPT in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There hasn't been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently&lt;/li&gt;
&lt;li&gt;Some &lt;a href="https://github.com/yasuoka/openbsd-uefi" target="_blank" rel="nofollow noopener"&gt;support&lt;/a&gt; for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review&lt;/li&gt;
&lt;li&gt;This comes along with a &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143732984925140&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;number&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144088136200753&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;of&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144046793225230&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;other&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144045760723039&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;commits&lt;/a&gt; related to GPT, much of which is being refactored and slowly reintroduced&lt;/li&gt;
&lt;li&gt;Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should "just work" with GPT (once everything's in)&lt;/li&gt;
&lt;li&gt;The UEFI bootloader support &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144115942223734&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;has been committed&lt;/a&gt;, so stay tuned for &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150902074526&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;more updates&lt;/a&gt; as &lt;a href="https://twitter.com/kotatsu_mi/status/638909417761562624" target="_blank" rel="nofollow noopener"&gt;further&lt;/a&gt; &lt;a href="https://twitter.com/yojiro/status/638189353601097728" target="_blank" rel="nofollow noopener"&gt;progress&lt;/a&gt; is made
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2sIWfb3Qh" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Ybrx00KI" target="_blank" rel="nofollow noopener"&gt;Mason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20FpmR7ZW" target="_blank" rel="nofollow noopener"&gt;Earl writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, verisign, vbsdcon, conference, eurobsdcon, bsdcan, meetbsd, asiabsdcon, nextbsd, launchd, darwin, tame, mach, libressl, vmm, hypervisor, bhyve, multipath, tcp</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s already our two-year anniversary! This time on the show, we&#39;ll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year&#39;s vBSDCon. What&#39;s it have to offer in an already-crowded BSD conference space? We&#39;ll find out.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144104398132541&w=2" rel="nofollow">OpenBSD hypervisor coming soon</a></h3>

<ul>
<li>Our buddy Mike Larkin never rests, and he posted some very tight-lipped <a href="http://pastebin.com/raw.php?i=F2Qbgdde" rel="nofollow">console output</a> on Twitter recently</li>
<li>From what little he revealed <a href="https://twitter.com/mlarkin2012/status/638265767864070144" rel="nofollow">at the time</a>, it appeared to be a new <a href="https://en.wikipedia.org/wiki/Hypervisor" rel="nofollow">hypervisor</a> (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled &quot;vmm&quot;</li>
<li>Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is</li>
<li>Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation</li>
<li>One thing to note: this <strong>isn&#39;t</strong> just a port of something like Xen or Bhyve; it&#39;s all-new code, and Mike explains why he chose to go that route</li>
<li>He also answered some basic questions about the requirements, when it&#39;ll be available, what OSes it can run, what&#39;s left to do, how to get involved and so on
***</li>
</ul>

<h3><a href="http://blog.darknedgy.net/technology/2015/08/26/0/" rel="nofollow">Why FreeBSD should not adopt launchd</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519" rel="nofollow">Last week</a> we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD</li>
<li>One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we&#39;ve learned)</li>
<li>In this article, the author talks about why he thinks this is a bad idea</li>
<li>He doesn&#39;t oppose the integration into FreeBSD-<em>derived</em> projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail</li>
<li>The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities</li>
<li>Reddit had <a href="https://www.reddit.com/r/BSD/comments/3ilhpk" rel="nofollow">quite a bit</a> <a href="https://www.reddit.com/r/freebsd/comments/3ilj4i" rel="nofollow">to say</a> about this one, some in agreement and some not
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html" rel="nofollow">DragonFly graphics improvements</a></h3>

<ul>
<li>The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack</li>
<li>This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs</li>
<li>You should also see some power management improvements, longer battery life and various other bug fixes</li>
<li>If you&#39;re running DragonFly, especially on a laptop, you&#39;ll want to get this stuff on your machine quick - big improvements all around
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144070638327053&w=2" rel="nofollow">OpenBSD tames the userland</a></h3>

<ul>
<li>Last week we mentioned OpenBSD&#39;s tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are</li>
<li>Theo posted a <em>mega diff</em> of nearly 100 smaller diffs, adding tame support to many areas of the userland tools</li>
<li>It&#39;s still a work-in-progress version; there&#39;s still more to be added (including the file path whitelist stuff)</li>
<li>Some classic utilities are even being reworked to make taming them easier - <a href="https://www.marc.info/?l=openbsd-cvs&m=144103945031253&w=2" rel="nofollow">the &quot;w&quot; command</a>, for example</li>
<li>The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10135901" rel="nofollow">on HN</a>, as one might expect</li>
<li>If you&#39;re a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***</li>
</ul>

<h2>Interview - Scott Courtney - <a href="mailto:vbsdcon@verisign.com" rel="nofollow">vbsdcon@verisign.com</a> / <a href="https://twitter.com/verisign" rel="nofollow">@verisign</a></h2>

<p><a href="http://vbsdcon.com/" rel="nofollow">vBSDCon</a> 2015</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-beyond-the-fork" rel="nofollow">OPNsense, beyond the fork</a></h3>

<ul>
<li>We first <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">heard about</a> OPNsense back in January, and they&#39;ve since released nearly <strong>40</strong> versions, spanning over <strong>5,000</strong> commits</li>
<li>This is their first big status update, covering some of the things that&#39;ve happened since the project was born</li>
<li>There&#39;s been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150827112006" rel="nofollow">LibreSSL nukes SSLv3</a></h3>

<ul>
<li>With their latest release, LibreSSL began to turn off <a href="http://disablessl3.com" rel="nofollow">SSLv3</a> support, starting with the &quot;openssl&quot; command</li>
<li>At the time, SSLv3 wasn&#39;t disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)</li>
<li>They&#39;ve now flipped the switch, and the process of complete removal has started</li>
<li>From the Undeadly summary, &quot;This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!&quot;</li>
<li>With this change and a few more to follow shortly, Libre*SSL* won&#39;t actually <em>support SSL</em> anymore - time to rename it &quot;LibreTLS&quot;
***</li>
</ul>

<h3><a href="http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt" rel="nofollow">FreeBSD MPTCP updated</a></h3>

<ul>
<li>For anyone unaware, <a href="https://en.wikipedia.org/wiki/Multipath_TCP" rel="nofollow">Multipath TCP</a> is &quot;an ongoing effort of the Internet Engineering Task Force&#39;s (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy.&quot;</li>
<li>There&#39;s been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated</li>
<li>Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements</li>
<li>Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144092912907778&w=2" rel="nofollow">UEFI and GPT in OpenBSD</a></h3>

<ul>
<li>There hasn&#39;t been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently</li>
<li>Some <a href="https://github.com/yasuoka/openbsd-uefi" rel="nofollow">support</a> for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review</li>
<li>This comes along with a <a href="https://www.marc.info/?l=openbsd-cvs&m=143732984925140&w=2" rel="nofollow">number</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144088136200753&w=2" rel="nofollow">of</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144046793225230&w=2" rel="nofollow">other</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144045760723039&w=2" rel="nofollow">commits</a> related to GPT, much of which is being refactored and slowly reintroduced</li>
<li>Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should &quot;just work&quot; with GPT (once everything&#39;s in)</li>
<li>The UEFI bootloader support <a href="https://www.marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">has been committed</a>, so stay tuned for <a href="http://undeadly.org/cgi?action=article&sid=20150902074526&mode=flat" rel="nofollow">more updates</a> as <a href="https://twitter.com/kotatsu_mi/status/638909417761562624" rel="nofollow">further</a> <a href="https://twitter.com/yojiro/status/638189353601097728" rel="nofollow">progress</a> is made
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2sIWfb3Qh" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2Ybrx00KI" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s20FpmR7ZW" rel="nofollow">Earl writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s already our two-year anniversary! This time on the show, we&#39;ll be chatting with Scott Courtney, vice president of infrastructure engineering at Verisign, about this year&#39;s vBSDCon. What&#39;s it have to offer in an already-crowded BSD conference space? We&#39;ll find out.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144104398132541&w=2" rel="nofollow">OpenBSD hypervisor coming soon</a></h3>

<ul>
<li>Our buddy Mike Larkin never rests, and he posted some very tight-lipped <a href="http://pastebin.com/raw.php?i=F2Qbgdde" rel="nofollow">console output</a> on Twitter recently</li>
<li>From what little he revealed <a href="https://twitter.com/mlarkin2012/status/638265767864070144" rel="nofollow">at the time</a>, it appeared to be a new <a href="https://en.wikipedia.org/wiki/Hypervisor" rel="nofollow">hypervisor</a> (that is, X86 hardware virtualization) running on OpenBSD -current, tentatively titled &quot;vmm&quot;</li>
<li>Later on, he provided a much longer explanation on the mailing list, detailing a bit about what the overall plan for the code is</li>
<li>Originally started around the time of the Australia hackathon, the work has since picked up more steam, and has gotten a funding boost from the OpenBSD foundation</li>
<li>One thing to note: this <strong>isn&#39;t</strong> just a port of something like Xen or Bhyve; it&#39;s all-new code, and Mike explains why he chose to go that route</li>
<li>He also answered some basic questions about the requirements, when it&#39;ll be available, what OSes it can run, what&#39;s left to do, how to get involved and so on
***</li>
</ul>

<h3><a href="http://blog.darknedgy.net/technology/2015/08/26/0/" rel="nofollow">Why FreeBSD should not adopt launchd</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2015_08_26-beverly_hills_25519" rel="nofollow">Last week</a> we mentioned a talk Jordan Hubbard gave about integrating various parts of Mac OS X into FreeBSD</li>
<li>One of the changes, perhaps the most controversial item on the list, was the adoption of launchd to replace the init system (replacing init systems seems to cause backlash, we&#39;ve learned)</li>
<li>In this article, the author talks about why he thinks this is a bad idea</li>
<li>He doesn&#39;t oppose the integration into FreeBSD-<em>derived</em> projects, like FreeNAS and PC-BSD, only vanilla FreeBSD itself - this is also explained in more detail</li>
<li>The post includes both high-level descriptions and low-level technical details, and provides an interesting outlook on the situation and possibilities</li>
<li>Reddit had <a href="https://www.reddit.com/r/BSD/comments/3ilhpk" rel="nofollow">quite a bit</a> <a href="https://www.reddit.com/r/freebsd/comments/3ilj4i" rel="nofollow">to say</a> about this one, some in agreement and some not
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-August/458108.html" rel="nofollow">DragonFly graphics improvements</a></h3>

<ul>
<li>The DragonFlyBSD guys are at it again, merging newer support and fixes into their i915 (Intel) graphics stack</li>
<li>This latest update brings them in sync with Linux 3.17, and includes Haswell fixes, DisplayPort fixes, improvements for Broadwell and even Cherryview GPUs</li>
<li>You should also see some power management improvements, longer battery life and various other bug fixes</li>
<li>If you&#39;re running DragonFly, especially on a laptop, you&#39;ll want to get this stuff on your machine quick - big improvements all around
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=144070638327053&w=2" rel="nofollow">OpenBSD tames the userland</a></h3>

<ul>
<li>Last week we mentioned OpenBSD&#39;s tame framework getting support for file whitelists, and said that the userland integration was next - well, now here we are</li>
<li>Theo posted a <em>mega diff</em> of nearly 100 smaller diffs, adding tame support to many areas of the userland tools</li>
<li>It&#39;s still a work-in-progress version; there&#39;s still more to be added (including the file path whitelist stuff)</li>
<li>Some classic utilities are even being reworked to make taming them easier - <a href="https://www.marc.info/?l=openbsd-cvs&m=144103945031253&w=2" rel="nofollow">the &quot;w&quot; command</a>, for example</li>
<li>The diff provides some good insight on exactly how to restrict different types of utilities, as well as how easy it is to actually do so (and en masse)</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10135901" rel="nofollow">on HN</a>, as one might expect</li>
<li>If you&#39;re a software developer, and especially if your software is in ports already, consider adding some more fine-grained tame support in your next release
***</li>
</ul>

<h2>Interview - Scott Courtney - <a href="mailto:vbsdcon@verisign.com" rel="nofollow">vbsdcon@verisign.com</a> / <a href="https://twitter.com/verisign" rel="nofollow">@verisign</a></h2>

<p><a href="http://vbsdcon.com/" rel="nofollow">vBSDCon</a> 2015</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://opnsense.org/opnsense-beyond-the-fork" rel="nofollow">OPNsense, beyond the fork</a></h3>

<ul>
<li>We first <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">heard about</a> OPNsense back in January, and they&#39;ve since released nearly <strong>40</strong> versions, spanning over <strong>5,000</strong> commits</li>
<li>This is their first big status update, covering some of the things that&#39;ve happened since the project was born</li>
<li>There&#39;s been a lot of community growth and participation, mass bug fixing, new features added, experimental builds with ASLR and much more - the report touches on a little of everything
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150827112006" rel="nofollow">LibreSSL nukes SSLv3</a></h3>

<ul>
<li>With their latest release, LibreSSL began to turn off <a href="http://disablessl3.com" rel="nofollow">SSLv3</a> support, starting with the &quot;openssl&quot; command</li>
<li>At the time, SSLv3 wasn&#39;t disabled entirely because of some things in the OpenBSD ports tree requiring it (apache being one odd example)</li>
<li>They&#39;ve now flipped the switch, and the process of complete removal has started</li>
<li>From the Undeadly summary, &quot;This is an important step for the security of the LibreSSL library and, by extension, the ports tree. It does, however, require lots of testing of the resulting packages, as some of the fallout may be at runtime (so not detected during the build). That is part of why this is committed at this point during the release cycle: it gives the community more time to test packages and report issues so that these can be fixed. When these fixes are then pushed upstream, the entire software ecosystem will benefit. In short: you know what to do!&quot;</li>
<li>With this change and a few more to follow shortly, Libre*SSL* won&#39;t actually <em>support SSL</em> anymore - time to rename it &quot;LibreTLS&quot;
***</li>
</ul>

<h3><a href="http://caia.swin.edu.au/urp/newtcp/mptcp/tools/v05/mptcp-readme-v0.5.txt" rel="nofollow">FreeBSD MPTCP updated</a></h3>

<ul>
<li>For anyone unaware, <a href="https://en.wikipedia.org/wiki/Multipath_TCP" rel="nofollow">Multipath TCP</a> is &quot;an ongoing effort of the Internet Engineering Task Force&#39;s (IETF) Multipath TCP working group, that aims at allowing a Transmission Control Protocol (TCP) connection to use multiple paths to maximize resource usage and increase redundancy.&quot;</li>
<li>There&#39;s been work out of an Australian university to add support for it to the FreeBSD kernel, and the patchset was recently updated</li>
<li>Including in this latest version is an overview of the protocol, how to get it compiled in, current features and limitations and some info about the routing requirements</li>
<li>Some big performance gains can be had with MPTCP, but only if both the client and server systems support it - getting it into the FreeBSD kernel would be a good start
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144092912907778&w=2" rel="nofollow">UEFI and GPT in OpenBSD</a></h3>

<ul>
<li>There hasn&#39;t been much fanfare about it yet, but some initial UEFI and GPT-related commits have been creeping into OpenBSD recently</li>
<li>Some <a href="https://github.com/yasuoka/openbsd-uefi" rel="nofollow">support</a> for UEFI booting has landed in the kernel, and more bits are being slowly enabled after review</li>
<li>This comes along with a <a href="https://www.marc.info/?l=openbsd-cvs&m=143732984925140&w=2" rel="nofollow">number</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144088136200753&w=2" rel="nofollow">of</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144046793225230&w=2" rel="nofollow">other</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=144045760723039&w=2" rel="nofollow">commits</a> related to GPT, much of which is being refactored and slowly reintroduced</li>
<li>Currently, you have to do some disklabel wizardry to bypass the MBR limit and access more than 2TB of space on a single drive, but it should &quot;just work&quot; with GPT (once everything&#39;s in)</li>
<li>The UEFI bootloader support <a href="https://www.marc.info/?l=openbsd-cvs&m=144115942223734&w=2" rel="nofollow">has been committed</a>, so stay tuned for <a href="http://undeadly.org/cgi?action=article&sid=20150902074526&mode=flat" rel="nofollow">more updates</a> as <a href="https://twitter.com/kotatsu_mi/status/638909417761562624" rel="nofollow">further</a> <a href="https://twitter.com/yojiro/status/638189353601097728" rel="nofollow">progress</a> is made
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2sIWfb3Qh" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2Ybrx00KI" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s20FpmR7ZW" rel="nofollow">Earl writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>104: Beverly Hills 25519</title>
  <link>https://www.bsdnow.tv/104</link>
  <guid isPermaLink="false">0bc0c068-36fe-429f-b7f4-38ac01fb7f19</guid>
  <pubDate>Wed, 26 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0bc0c068-36fe-429f-b7f4-38ac01fb7f19.mp3" length="58136116" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</itunes:subtitle>
  <itunes:duration>1:20:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show, we'll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" target="_blank" rel="nofollow noopener"&gt;EdgeRouter Lite, meet OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it &lt;/li&gt;
&lt;li&gt;We've covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)&lt;/li&gt;
&lt;li&gt;Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it&lt;/li&gt;
&lt;li&gt;He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware&lt;/li&gt;
&lt;li&gt;More discussion can be found &lt;a href="https://news.ycombinator.com/item?id=10079210" target="_blank" rel="nofollow noopener"&gt;on Hacker News&lt;/a&gt; and &lt;a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" target="_blank" rel="nofollow noopener"&gt;various&lt;/a&gt; &lt;a href="https://www.marc.info/?t=143974140500001&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;other&lt;/a&gt; &lt;a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" target="_blank" rel="nofollow noopener"&gt;places&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;One thing to &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143991822827285&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;note&lt;/a&gt; about these devices: because of their MIPS64 processor, they'll have weaker ASLR than X86 CPUs (and no W&lt;sup&gt;X&lt;/sup&gt; at all)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.infoq.com/articles/freebsd-design-implementation-review" target="_blank" rel="nofollow noopener"&gt;Design and Implementation of the FreeBSD Operating System interview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For those who don't know, the "Design and Implementation of the FreeBSD Operating System" is a semi-recently-revived technical reference book for FreeBSD development&lt;/li&gt;
&lt;li&gt;InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors&lt;/li&gt;
&lt;li&gt;"The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points."&lt;/li&gt;
&lt;li&gt;Aside from detailing a few of the chapters, the interview covers who the book's target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144027474117290&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Path list parameter in OpenBSD tame&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've mentioned OpenBSD's relatively new "&lt;a href="https://marc.info/?l=openbsd-tech&amp;amp;m=143725996614627&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;tame&lt;/a&gt;" subsystem a couple times before: it's an easy-to-implement "self-containment" framework, allowing programs to have a reduced feature set mode with even less privileges&lt;/li&gt;
&lt;li&gt;One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between&lt;/li&gt;
&lt;li&gt;Now there's the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers&lt;/li&gt;
&lt;li&gt;The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9&lt;/li&gt;
&lt;li&gt;More discussion can be found &lt;a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" target="_blank" rel="nofollow noopener"&gt;on Reddit&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=10104886" target="_blank" rel="nofollow noopener"&gt;and Hacker News&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/10.2R/announce.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD &amp;amp; PC-BSD 10.2-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out&lt;/li&gt;
&lt;li&gt;The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13&lt;/li&gt;
&lt;li&gt;New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to&lt;/li&gt;
&lt;li&gt;A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet&lt;/li&gt;
&lt;li&gt;The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions&lt;/li&gt;
&lt;li&gt;ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards&lt;/li&gt;
&lt;li&gt;The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups&lt;/li&gt;
&lt;li&gt;In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail&lt;/li&gt;
&lt;li&gt;Check the &lt;a href="https://www.freebsd.org/releases/10.2R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;full release notes&lt;/a&gt; for the rest of the details and changes&lt;/li&gt;
&lt;li&gt;PC-BSD also followed with &lt;a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" target="_blank" rel="nofollow noopener"&gt;their 10.2-RELEASE&lt;/a&gt;, sporting a few more additional features
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Damien Miller - &lt;a href="mailto:djm@openbsd.org" target="_blank" rel="nofollow noopener"&gt;djm@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/damienmiller" target="_blank" rel="nofollow noopener"&gt;@damienmiller&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenSSH: phasing out broken crypto, default cipher changes&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference Shimane&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We weren't the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another&lt;/li&gt;
&lt;li&gt;This time they had NetBSD running on some Sony NWS devices (MIPS-based)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/JavaStation" target="_blank" rel="nofollow noopener"&gt;JavaStations&lt;/a&gt; were also on display - something we haven't ever seen before (made between 1996-2000)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=-XF20nitI90" target="_blank" rel="nofollow noopener"&gt;BAFUG videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Bay Area FreeBSD users group has been uploading some videos of their recent meetings&lt;/li&gt;
&lt;li&gt;Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works&lt;/li&gt;
&lt;li&gt;Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts&lt;/li&gt;
&lt;li&gt;In &lt;a href="https://www.youtube.com/watch?v=49sPYHh473U" target="_blank" rel="nofollow noopener"&gt;a second video&lt;/a&gt;, Jordan Hubbard and Kip Macy introduce "NeXTBSD aka FreeBSD X"&lt;/li&gt;
&lt;li&gt;In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)&lt;/li&gt;
&lt;li&gt;People should record presentations at their BSD users groups and send them to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" target="_blank" rel="nofollow noopener"&gt;L2TP over IPSEC on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well&lt;/li&gt;
&lt;li&gt;Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic&lt;/li&gt;
&lt;li&gt;This guide specifically covers L2TP, using npppd and pre-shared keys&lt;/li&gt;
&lt;li&gt;Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" target="_blank" rel="nofollow noopener"&gt;Reliable bare metal with TrueOS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Imagine a server version of PC-BSD with some useful utilities preinstalled - that's basically TrueOS&lt;/li&gt;
&lt;li&gt;This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution&lt;/li&gt;
&lt;li&gt;Most importantly, he also covers how to keep everything redundant and deal with hard drives failing&lt;/li&gt;
&lt;li&gt;The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he'd like&lt;/li&gt;
&lt;li&gt;Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=144047868127049&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Kernel W&lt;sup&gt;X&lt;/sup&gt; on i386&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned some big W&lt;sup&gt;X&lt;/sup&gt; kernel changes in OpenBSD &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;a while back&lt;/a&gt;, but the work was mainly for x86_64 CPU architecture (which makes sense; that's what most people run now)&lt;/li&gt;
&lt;li&gt;Mike Larkin is back again, and isn't leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well&lt;/li&gt;
&lt;li&gt;Check out &lt;a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" target="_blank" rel="nofollow noopener"&gt;our interview with Mike&lt;/a&gt; for some more background info on memory protections like W&lt;sup&gt;X&lt;/sup&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iGoeYMyb" target="_blank" rel="nofollow noopener"&gt;Markus writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21bIFfmUS" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Hjm8Tsa" target="_blank" rel="nofollow noopener"&gt;Theo writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssh, openssl, chacha20, chacha20-poly1305, aes, md5, hmac, cbc, gcm, cryptography, ed25519, curve25519, erl, edgerouter lite, tame, bafug</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking with Damien Miller of the OpenSSH team. Their 7.0 release has some major changes, including phasing out older crypto and changing one of the defaults that might surprise you.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-ERL" rel="nofollow">EdgeRouter Lite, meet OpenBSD</a></h3>

<ul>
<li>The ERL, much like the Raspberry Pi and a bunch of other cheap boards, is getting more and more popular as more things get ported to run on it </li>
<li>We&#39;ve covered installing NetBSD and FreeBSD on them before, but OpenBSD has gotten a lot better support for them as well now (including the onboard storage in 5.8)</li>
<li>Ted Unangst got a hold of one recently and kindly wrote up some notes about installing and using OpenBSD on it</li>
<li>He covers doing a network install, getting the (slightly strange) bootloader working with u-boot and some final notes about the hardware</li>
<li>More discussion can be found <a href="https://news.ycombinator.com/item?id=10079210" rel="nofollow">on Hacker News</a> and <a href="https://www.reddit.com/r/openbsd/comments/3hgf2c" rel="nofollow">various</a> <a href="https://www.marc.info/?t=143974140500001&r=1&w=2" rel="nofollow">other</a> <a href="https://lobste.rs/s/acz9bu/openbsd_on_edgerouter_lite" rel="nofollow">places</a></li>
<li>One thing to <a href="https://www.marc.info/?l=openbsd-misc&m=143991822827285&w=2" rel="nofollow">note</a> about these devices: because of their MIPS64 processor, they&#39;ll have weaker ASLR than X86 CPUs (and no W<sup>X</sup> at all)
***</li>
</ul>

<h3><a href="http://www.infoq.com/articles/freebsd-design-implementation-review" rel="nofollow">Design and Implementation of the FreeBSD Operating System interview</a></h3>

<ul>
<li>For those who don&#39;t know, the &quot;Design and Implementation of the FreeBSD Operating System&quot; is a semi-recently-revived technical reference book for FreeBSD development</li>
<li>InfoQ has a review of the book up for anyone who might be interested, but they also have an interview the authors</li>
<li>&quot;The book takes an approach to FreeBSD from inside out, starting with kernel services, then moving to process and memory management, I/O and devices, filesystems, IPC and network protocols, and finally system startup and shutdown. The book provides dense, technical information in a clear way, with lots of pseudo-code, diagrams, and tables to illustrate the main points.&quot;</li>
<li>Aside from detailing a few of the chapters, the interview covers who the book&#39;s target audience is, some history of the project, long-term support, some of the newer features and some general OS development topics
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144027474117290&w=2" rel="nofollow">Path list parameter in OpenBSD tame</a></h3>

<ul>
<li>We&#39;ve mentioned OpenBSD&#39;s relatively new &quot;<a href="https://marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">tame</a>&quot; subsystem a couple times before: it&#39;s an easy-to-implement &quot;self-containment&quot; framework, allowing programs to have a reduced feature set mode with even less privileges</li>
<li>One of the early concerns from users of other process containment tools was that tame was too broad in the way it separated disk access - you could either read/write files or not, nothing in between</li>
<li>Now there&#39;s the option to create a whitelist of specific files and directories that your binary is allowed to access, giving a much finer-grained set of controls to developers</li>
<li>The next step is to add tame restraints to the OpenBSD userland utilities, which should probably be done by 5.9</li>
<li>More discussion can be found <a href="https://www.reddit.com/r/openbsd/comments/3i2lk7" rel="nofollow">on Reddit</a> <a href="https://news.ycombinator.com/item?id=10104886" rel="nofollow">and Hacker News</a>
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.2R/announce.html" rel="nofollow">FreeBSD &amp; PC-BSD 10.2-RELEASE</a></h3>

<ul>
<li>The FreeBSD team has released the second minor version bump to the 10.x branch, including all the fixes from 10-STABLE since 10.1 came out</li>
<li>The Linux compatibility layer has been updated to support CentOS 6, rather than the much older Fedora Core base used previously, and the DRM graphics code has been updated to match Linux 3.8.13</li>
<li>New installations (and newly-upgraded systems) will use the quarterly binary package set, rather than the rolling release model that most people are used to</li>
<li>A VXLAN driver was added, allowing you to create virtual LANs by encapsulating the ethernet frame in a UDP packet</li>
<li>The bhyve codebase is much newer, enabling support for AMD CPUs with SVM and AMD-V extensions</li>
<li>ARM and ARM64 code saw some fixes and improvements, including SMP support on a few specific boards and support for a few new boards</li>
<li>The bootloader now supports entering your GELI passphrase before loading the kernel in full disk encryption setups</li>
<li>In addition to assorted userland fixes and driver improvements, various third party tools in the base system were updated: resolvconf, ISC NTPd, netcat, file, unbound, OpenSSL, sendmail</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.2R/relnotes.html" rel="nofollow">full release notes</a> for the rest of the details and changes</li>
<li>PC-BSD also followed with <a href="http://blog.pcbsd.org/2015/08/pc-bsd-10-2-release-now-available" rel="nofollow">their 10.2-RELEASE</a>, sporting a few more additional features
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>OpenSSH: phasing out broken crypto, default cipher changes</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/22/msg000692.html" rel="nofollow">NetBSD at Open Source Conference Shimane</a></h3>

<ul>
<li>We weren&#39;t the only ones away at conferences last week - the Japanese NetBSD guys are always raiding one event or another</li>
<li>This time they had NetBSD running on some Sony NWS devices (MIPS-based)</li>
<li><a href="https://en.wikipedia.org/wiki/JavaStation" rel="nofollow">JavaStations</a> were also on display - something we haven&#39;t ever seen before (made between 1996-2000)
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=-XF20nitI90" rel="nofollow">BAFUG videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos of their recent meetings</li>
<li>Devin Teske hosts the first one, discussing adding GELI support to the bootloader, including some video demonstrations of how it works</li>
<li>Shortly after beginning, Adrian Chadd takes over the conversation and they discuss various problems (and solutions) related to the bootloader - for example, how can we type encryption passwords with non-US keyboard layouts</li>
<li>In <a href="https://www.youtube.com/watch?v=49sPYHh473U" rel="nofollow">a second video</a>, Jordan Hubbard and Kip Macy introduce &quot;NeXTBSD aka FreeBSD X&quot;</li>
<li>In it, they discuss their ideas of merging more Mac OS X features into FreeBSD (launchd to replace the init system, some APIs, etc)</li>
<li>People should record presentations at their BSD users groups and send them to us
***</li>
</ul>

<h3><a href="http://frankgroeneveld.nl/2015/08/16/configuring-l2tp-over-ipsec-on-openbsd-for-mac-os-x-clients" rel="nofollow">L2TP over IPSEC on OpenBSD</a></h3>

<ul>
<li>If you&#39;ve got an OpenBSD box and some Mac OS X clients that need secure communications, surprise: they can work together pretty well</li>
<li>Using only the base tools in both operating systems, you can build a nice IPSEC setup for tunneling all your traffic</li>
<li>This guide specifically covers L2TP, using npppd and pre-shared keys</li>
<li>Server setup, client setup, firewall configuration and routing-related settings are all covered in detail
***</li>
</ul>

<h3><a href="http://www.tubsta.com/2015/08/reliable-bare-metal-server-using-trueosfreebsd" rel="nofollow">Reliable bare metal with TrueOS</a></h3>

<ul>
<li>Imagine a server version of PC-BSD with some useful utilities preinstalled - that&#39;s basically TrueOS</li>
<li>This article walks you through setting up a FreeBSD -CURRENT server (using TrueOS) to create a pretty solid backup solution</li>
<li>Most importantly, he also covers how to keep everything redundant and deal with hard drives failing</li>
<li>The author chose to go with the -CURRENT branch because of the delay between regular releases, and newer features not making their way to users as fast as he&#39;d like</li>
<li>Another factor is that there are no binary snapshots of FreeBSD -CURRENT that can be easily used for in-place upgrades, but with TrueOS (and some other BSDs) there are
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=144047868127049&w=2" rel="nofollow">Kernel W<sup>X</sup> on i386</a></h3>

<ul>
<li>We mentioned some big W<sup>X</sup> kernel changes in OpenBSD <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">a while back</a>, but the work was mainly for x86_64 CPU architecture (which makes sense; that&#39;s what most people run now)</li>
<li>Mike Larkin is back again, and isn&#39;t leaving the people with older hardware out, committing similar kernel work into the i386 platform now as well</li>
<li>Check out <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">our interview with Mike</a> for some more background info on memory protections like W<sup>X</sup>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iGoeYMyb" rel="nofollow">Markus writes in</a></li>
<li><a href="http://slexy.org/view/s21bIFfmUS" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21Hjm8Tsa" rel="nofollow">Theo writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>103: Ubuntu Slaughters Kittens</title>
  <link>https://www.bsdnow.tv/103</link>
  <guid isPermaLink="false">227b2929-398f-4d82-b29d-80981ddcc4d7</guid>
  <pubDate>Wed, 19 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/227b2929-398f-4d82-b29d-80981ddcc4d7.mp3" length="86734228" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Allan's away at BSDCam this week, but we've still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</itunes:subtitle>
  <itunes:duration>2:00:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Allan's away at BSDCam this week, but we've still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Bryan Cantrill - &lt;a href="mailto:bryan@joyent.com" target="_blank" rel="nofollow noopener"&gt;bryan@joyent.com&lt;/a&gt; / &lt;a href="https://twitter.com/bcantrill" target="_blank" rel="nofollow noopener"&gt;@bcantrill&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2b6dA7fAr" target="_blank" rel="nofollow noopener"&gt;Randy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2vABMHiok" target="_blank" rel="nofollow noopener"&gt;Jared writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2194ADVUL" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, multipath, tcp, performance, dtrace, zfs, illumos, opensolaris, solaris, joyent, pkgsrc, omnios</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Allan&#39;s away at BSDCam this week, but we&#39;ve still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:bryan@joyent.com" rel="nofollow">bryan@joyent.com</a> / <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b6dA7fAr" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2vABMHiok" rel="nofollow">Jared writes in</a></li>
<li><a href="http://slexy.org/view/s2194ADVUL" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Allan&#39;s away at BSDCam this week, but we&#39;ve still got an exciting episode for you. We sat down with Bryan Cantrill, CTO of Joyent, to talk about a wide variety of topics: dtrace, ZFS, pkgsrc, containers and much more. This is easily our longest interview to date!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Bryan Cantrill - <a href="mailto:bryan@joyent.com" rel="nofollow">bryan@joyent.com</a> / <a href="https://twitter.com/bcantrill" rel="nofollow">@bcantrill</a></h2>

<p>BSD and Solaris history, illumos, dtrace, Joyent, pkgsrc, various topics (and rants)</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b6dA7fAr" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2vABMHiok" rel="nofollow">Jared writes in</a></li>
<li><a href="http://slexy.org/view/s2194ADVUL" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>102: May Contain ZFS</title>
  <link>https://www.bsdnow.tv/102</link>
  <guid isPermaLink="false">e0de53ca-3dcf-4df7-a556-faa52c7788a7</guid>
  <pubDate>Wed, 12 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0de53ca-3dcf-4df7-a556-faa52c7788a7.mp3" length="48985492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.</itunes:subtitle>
  <itunes:duration>1:08:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be talking with Peter Toth. He's got a jail management system called "iocage" that's been getting pretty popular recently. Have we finally found a replacement for ezjail? We'll see how it stacks up.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" target="_blank" rel="nofollow noopener"&gt;FreeBSD on Olimex RT5350F-OLinuXino&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you haven't heard of the RT5350F-OLinuXino-EVB, you're not alone (actually, we probably couldn't even remember the name if we did know about it)&lt;/li&gt;
&lt;li&gt;It's a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM&lt;/li&gt;
&lt;li&gt;This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment&lt;/li&gt;
&lt;li&gt;In &lt;a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" target="_blank" rel="nofollow noopener"&gt;part two of the series&lt;/a&gt;, he talks about the GPIO and how you can configure it&lt;/li&gt;
&lt;li&gt;Part three is still in the works, so check the site later on for further progress and info
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" target="_blank" rel="nofollow noopener"&gt;The modern OpenBSD home router&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In a new series of blog posts, one guy takes you through the process of building an &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;OpenBSD-based gateway&lt;/a&gt; for his home network&lt;/li&gt;
&lt;li&gt;"It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst"&lt;/li&gt;
&lt;li&gt;Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless&lt;/li&gt;
&lt;li&gt;This guide also covers PPP and IPv6, in case you have those requirements&lt;/li&gt;
&lt;li&gt;In a &lt;a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" target="_blank" rel="nofollow noopener"&gt;similar but unrelated series&lt;/a&gt;, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge&lt;/li&gt;
&lt;li&gt;He also has &lt;a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" target="_blank" rel="nofollow noopener"&gt;a separate post&lt;/a&gt; for setting up an IPSEC VPN on the router
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference 2015 Kansai&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference&lt;/li&gt;
&lt;li&gt;They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event&lt;/li&gt;
&lt;li&gt;Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k&lt;/li&gt;
&lt;li&gt;They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it&lt;/li&gt;
&lt;li&gt;And what conference would be complete without an LED-powered towel
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 7.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code&lt;/li&gt;
&lt;li&gt;SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled&lt;/li&gt;
&lt;li&gt;The syntax for permitting root logins has been changed, and is now called "prohibit-password" instead of "without-password" (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now&lt;/li&gt;
&lt;li&gt;If you're using an older configuration file, the "without-password" option still works, so no change is required&lt;/li&gt;
&lt;li&gt;You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications&lt;/li&gt;
&lt;li&gt;Various bug fixes and documentation improvements are also included&lt;/li&gt;
&lt;li&gt;Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users&lt;/li&gt;
&lt;li&gt;In the &lt;em&gt;next release&lt;/em&gt;, even more deprecation is planned: RSA keys will be refused if they're under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Peter Toth - &lt;a href="mailto:peter.toth198@gmail.com" target="_blank" rel="nofollow noopener"&gt;peter.toth198@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/pannonp" target="_blank" rel="nofollow noopener"&gt;@pannonp&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Containment with &lt;a href="https://github.com/iocage/iocage" target="_blank" rel="nofollow noopener"&gt;iocage&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150809105132" target="_blank" rel="nofollow noopener"&gt;More c2k15 reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few more hackathon reports from c2k15 in Calgary are still slowly trickling in&lt;/li&gt;
&lt;li&gt;Alexander Bluhm's up first, and he continued improving OpenBSD's regression test suite (this ensures that no changes accidentally break existing things)&lt;/li&gt;
&lt;li&gt;He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging&lt;/li&gt;
&lt;li&gt;Renato Westphal &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150811171006" target="_blank" rel="nofollow noopener"&gt;sent in a report&lt;/a&gt; of his very first hackathon&lt;/li&gt;
&lt;li&gt;He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network&lt;/li&gt;
&lt;li&gt;Philip Guenther &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150809165912" target="_blank" rel="nofollow noopener"&gt;also wrote in&lt;/a&gt;, getting some very technical and low-level stuff done at the hackathon&lt;/li&gt;
&lt;li&gt;His report opens with "First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking." - not exactly beginner stuff&lt;/li&gt;
&lt;li&gt;There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://clinta.github.io/freebsd-jails-the-hard-way" target="_blank" rel="nofollow noopener"&gt;FreeBSD jails, the hard way&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As you learned from our interview this week, there's quite a selection of tools available to manage your jails&lt;/li&gt;
&lt;li&gt;This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf&lt;/li&gt;
&lt;li&gt;Unlike with iocage, ZFS isn't actually a requirement for this method&lt;/li&gt;
&lt;li&gt;If you are using it, though, you can make use of snapshots for making template jails
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tancsa.com/mdtblog/?p=73" target="_blank" rel="nofollow noopener"&gt;OpenSSH hardware tokens&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client &lt;em&gt;and&lt;/em&gt; server?&lt;/li&gt;
&lt;li&gt;This blog post will show you how to use a hardware token as a second authentication factor, for the "something you know, something you have" security model&lt;/li&gt;
&lt;li&gt;It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd&lt;/li&gt;
&lt;li&gt;Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" target="_blank" rel="nofollow noopener"&gt;LibreSSL 2.2.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes&lt;/li&gt;
&lt;li&gt;At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don't want in a crypto tool...) and much more&lt;/li&gt;
&lt;li&gt;SSLv3 support was removed from the "openssl" command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it'll be removed completely&lt;/li&gt;
&lt;li&gt;Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc&lt;/li&gt;
&lt;li&gt;It'll be in 5.8 (due out earlier than usual) and it's in the FreeBSD ports tree as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216lrsVVd" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20uGUHWLr" target="_blank" rel="nofollow noopener"&gt;Stuart writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, jails, iocage, bhyve, containers, lxc, docker, ezjail, router, gateway, ipsec, vpn, libressl, authentication, uefi, jails</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Peter Toth. He&#39;s got a jail management system called &quot;iocage&quot; that&#39;s been getting pretty popular recently. Have we finally found a replacement for ezjail? We&#39;ll see how it stacks up.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bidouilliste.com/blog/2015/07/22/FreeBSD-on-Olimex-RT5350F-OLinuXino" rel="nofollow">FreeBSD on Olimex RT5350F-OLinuXino</a></h3>

<ul>
<li>If you haven&#39;t heard of the RT5350F-OLinuXino-EVB, you&#39;re not alone (actually, we probably couldn&#39;t even remember the name if we did know about it)</li>
<li>It&#39;s a small board with a MIPS CPU, two ethernet ports, wireless support and... 32MB of RAM</li>
<li>This blog series documents installing FreeBSD on the device, but it is quite a DIY setup at the moment</li>
<li>In <a href="https://www.bidouilliste.com/blog/2015/07/24/FreeBSD-on-Olimex-RT5350F-OLinuXino-Part-2" rel="nofollow">part two of the series</a>, he talks about the GPIO and how you can configure it</li>
<li>Part three is still in the works, so check the site later on for further progress and info
***</li>
</ul>

<h3><a href="https://www.azabani.com/2015/08/06/modern-openbsd-home-router.html" rel="nofollow">The modern OpenBSD home router</a></h3>

<ul>
<li>In a new series of blog posts, one guy takes you through the process of building an <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD-based gateway</a> for his home network</li>
<li>&quot;It’s no secret that most consumer routers ship with software that’s flaky at best, and prohibitively insecure at worst&quot;</li>
<li>Armed with a 600MHz Pentium III CPU, he shows the process of setting up basic NAT, firewalling and even getting hostap mode working for wireless</li>
<li>This guide also covers PPP and IPv6, in case you have those requirements</li>
<li>In a <a href="http://jaytongarnett.blogspot.com/2015/07/openbsd-router-bt-home-hub-5-replacement.html" rel="nofollow">similar but unrelated series</a>, another user does a similar thing - his post also includes details on reusing your consumer router as a wireless bridge</li>
<li>He also has <a href="http://jaytongarnett.blogspot.com/2015/08/openbsd-l2tpipsec-vpn-works-with.html" rel="nofollow">a separate post</a> for setting up an IPSEC VPN on the router
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/08/10/msg000691.html" rel="nofollow">NetBSD at Open Source Conference 2015 Kansai</a></h3>

<ul>
<li>The Japanese NetBSD users group has teamed up with the Kansai BSD users group and Nagoya BSD users group to invade another conference</li>
<li>They had NetBSD running on all the usual (unusual?) devices, but some of the other BSDs also got a chance to shine at the event</li>
<li>Last time they mostly had ARM devices, but this time the centerpiece was an OMRON LUNA88k</li>
<li>They had at least one FreeBSD and OpenBSD device, and at least one NetBSD device even had Adobe Flash running on it</li>
<li>And what conference would be complete without an LED-powered towel
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-August/034289.html" rel="nofollow">OpenSSH 7.0 released</a></h3>

<ul>
<li>The OpenSSH team has just finished up the 7.0 release, and the focus this time is deprecating legacy code</li>
<li>SSHv1 support is disabled, 1024 bit diffie-hellman-group1-sha1 KEX is disabled and the v00 cert format authentication is disabled</li>
<li>The syntax for permitting root logins has been changed, and is now called &quot;prohibit-password&quot; instead of &quot;without-password&quot; (this makes it so root can login, but only with keys) - all interactive authentication methods for root are also disabled by default now</li>
<li>If you&#39;re using an older configuration file, the &quot;without-password&quot; option still works, so no change is required</li>
<li>You can now control which public key types are available for authentication, as well as control which public key types are offered for host authentications</li>
<li>Various bug fixes and documentation improvements are also included</li>
<li>Aside from the keyboard-interactive and PAM-related bugs, this release includes one minor security fix: TTY permissions were too open, so users could write messages to other logged in users</li>
<li>In the <em>next release</em>, even more deprecation is planned: RSA keys will be refused if they&#39;re under 1024 bits, CBC-based ciphers will be disabled and the MD5 HMAC will also be disabled
***</li>
</ul>

<h2>Interview - Peter Toth - <a href="mailto:peter.toth198@gmail.com" rel="nofollow">peter.toth198@gmail.com</a> / <a href="https://twitter.com/pannonp" rel="nofollow">@pannonp</a></h2>

<p>Containment with <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150809105132" rel="nofollow">More c2k15 reports</a></h3>

<ul>
<li>A few more hackathon reports from c2k15 in Calgary are still slowly trickling in</li>
<li>Alexander Bluhm&#39;s up first, and he continued improving OpenBSD&#39;s regression test suite (this ensures that no changes accidentally break existing things)</li>
<li>He also worked on syslogd, completing the TCP input code - the syslogd in 5.8 will have TLS support for secure remote logging</li>
<li>Renato Westphal <a href="http://undeadly.org/cgi?action=article&sid=20150811171006" rel="nofollow">sent in a report</a> of his very first hackathon</li>
<li>He finished up the VPLS implementation and worked on EIGRP (which is explained in the report) - the end result is that OpenBSD will be more easily deployable in a Cisco-heavy network</li>
<li>Philip Guenther <a href="http://undeadly.org/cgi?action=article&sid=20150809165912" rel="nofollow">also wrote in</a>, getting some very technical and low-level stuff done at the hackathon</li>
<li>His report opens with &quot;First came a diff to move the grabbing of the kernel lock for soft-interrupts from the ASM stubs to the C routine so that mere mortals can actually push it around further to reduce locking.&quot; - not exactly beginner stuff</li>
<li>There were also some C-state, suspend/resume and general ACPI improvements committed, and he gives a long list of random other bits he worked on as well
***</li>
</ul>

<h3><a href="https://clinta.github.io/freebsd-jails-the-hard-way" rel="nofollow">FreeBSD jails, the hard way</a></h3>

<ul>
<li>As you learned from our interview this week, there&#39;s quite a selection of tools available to manage your jails</li>
<li>This article takes the opposite approach, using only the tools in the base system: ZFS, nullfs and jail.conf</li>
<li>Unlike with iocage, ZFS isn&#39;t actually a requirement for this method</li>
<li>If you are using it, though, you can make use of snapshots for making template jails
***</li>
</ul>

<h3><a href="http://www.tancsa.com/mdtblog/?p=73" rel="nofollow">OpenSSH hardware tokens</a></h3>

<ul>
<li>We&#39;ve talked about a number of ways to do two-factor authentication with SSH, but what if you want it on both the client <em>and</em> server?</li>
<li>This blog post will show you how to use a hardware token as a second authentication factor, for the &quot;something you know, something you have&quot; security model</li>
<li>It takes you through from start to finish: formatting the token, generating keys, getting it integrated with sshd</li>
<li>Most of this will apply to any OS that can run ssh, and the token used in the example can be found online for pretty cheap too
***</li>
</ul>

<h3><a href="http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.2.2-relnotes.txt" rel="nofollow">LibreSSL 2.2.2 released</a></h3>

<ul>
<li>The LibreSSL team has released version 2.2.2, which signals the end of the 5.8 development cycle and includes many fixes</li>
<li>At the c2k15 hackathon, developers uncovered dozens of problems in the OpenSSL codebase with the Coverity code scanner, and this release incorporates all those: dead code, memory leaks, logic errors (which, by the way, you really don&#39;t want in a crypto tool...) and much more</li>
<li>SSLv3 support was removed from the &quot;openssl&quot; command, and only a few other SSLv3 bits remain - once workarounds are found for ports that specifically depend on it, it&#39;ll be removed completely</li>
<li>Various other small improvements were made: DH params are now 2048 bits by default, more old workarounds removed, cmake support added, etc</li>
<li>It&#39;ll be in 5.8 (due out earlier than usual) and it&#39;s in the FreeBSD ports tree as well
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216lrsVVd" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20uGUHWLr" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>101: I'll Fix Everything</title>
  <link>https://www.bsdnow.tv/101</link>
  <guid isPermaLink="false">b0fef23d-9748-4e29-9419-eb23bd948f84</guid>
  <pubDate>Wed, 05 Aug 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0fef23d-9748-4e29-9419-eb23bd948f84.mp3" length="67071892" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like "what would you like to see in FreeBSD?" and hundreds of responses, well, we've got a lot to cover...</itunes:subtitle>
  <itunes:duration>1:33:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like "what would you like to see in FreeBSD?" and hundreds of responses, well, we've got a lot to cover...&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" target="_blank" rel="nofollow noopener"&gt;OpenBSD, from distribution to project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through&lt;/li&gt;
&lt;li&gt;It's the third part of his &lt;a href="http://www.openbsd.org/papers/pruning.html" target="_blank" rel="nofollow noopener"&gt;ongoing&lt;/a&gt; &lt;a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" target="_blank" rel="nofollow noopener"&gt;series&lt;/a&gt; of posts about OpenBSD removing large bits of code in favor of smaller replacements&lt;/li&gt;
&lt;li&gt;In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)&lt;/li&gt;
&lt;li&gt;After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported&lt;/li&gt;
&lt;li&gt;When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed&lt;/li&gt;
&lt;li&gt;In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons&lt;/li&gt;
&lt;li&gt;More discussion &lt;a href="https://news.ycombinator.com/item?id=9980373" target="_blank" rel="nofollow noopener"&gt;on HN&lt;/a&gt; &lt;a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" target="_blank" rel="nofollow noopener"&gt;and reddit&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/hughobrien/zfs-remote-mirror" target="_blank" rel="nofollow noopener"&gt;Remote ZFS mirrors, the hard way&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Backups to "the cloud" have become a hot topic in recent years, but most of them require trade-offs between convenience and security&lt;/li&gt;
&lt;li&gt;You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren't without some compromise&lt;/li&gt;
&lt;li&gt;As the author puts it: "We don't need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we'll-deletes, or any of the noise that comes with using someone else's infrastructure."&lt;/li&gt;
&lt;li&gt;This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself&lt;/li&gt;
&lt;li&gt;The end result is an automatic system for incremental backups that's backed (pun intended) by ZFS&lt;/li&gt;
&lt;li&gt;If you're serious about keeping your important data safe and sound, you'll want to give this one a read - lots of detailed instructions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" target="_blank" rel="nofollow noopener"&gt;Various DragonFlyBSD updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree&lt;/li&gt;
&lt;li&gt;Intel ValleyView graphics support was finally committed to the main repository&lt;/li&gt;
&lt;li&gt;While on the topic of graphics, they've also issued &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" target="_blank" rel="nofollow noopener"&gt;a call for testing&lt;/a&gt; for a DRM update (matching Linux 3.16's and including some more Broadwell fixes)&lt;/li&gt;
&lt;li&gt;Their base GCC compiler is also now &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" target="_blank" rel="nofollow noopener"&gt;upgraded to version 5.2&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;If your hardware supports it, DragonFly will now &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" target="_blank" rel="nofollow noopener"&gt;use an accelerated console by default&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://youtu.be/mOv62lBdlXU?t=292" target="_blank" rel="nofollow noopener"&gt;QuakeCon runs on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/QuakeCon" target="_blank" rel="nofollow noopener"&gt;QuakeCon&lt;/a&gt;, everyone's favorite event full of rocket launchers, recently gave a mini-tour of their network setup&lt;/li&gt;
&lt;li&gt;For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF&lt;/li&gt;
&lt;li&gt;In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more&lt;/li&gt;
&lt;li&gt;He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution&lt;/li&gt;
&lt;li&gt;There's also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff&lt;/li&gt;
&lt;li&gt;Follow-up questions can be asked in &lt;a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" target="_blank" rel="nofollow noopener"&gt;this reddit thread&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The host doesn't seem to be that familiar with the topics at hand, mentioning "OpenPF" multiple times among other things, so our listeners should get a kick out of it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Adrian Chadd - &lt;a href="mailto:adrian@freebsd.org" target="_blank" rel="nofollow noopener"&gt;adrian@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/erikarn" target="_blank" rel="nofollow noopener"&gt;@erikarn&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Rethinking &lt;a href="https://www.reddit.com/r/freebsd/comments/3d80vt" target="_blank" rel="nofollow noopener"&gt;ways to improve FreeBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150804161939" target="_blank" rel="nofollow noopener"&gt;CII contributes to OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you recall back to &lt;a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" target="_blank" rel="nofollow noopener"&gt;when we talked to the OpenBSD foundation&lt;/a&gt;, one of the things Ken mentioned was the &lt;a href="https://www.coreinfrastructure.org" target="_blank" rel="nofollow noopener"&gt;Core Infrastructure Initiative&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;In &lt;a href="https://www.coreinfrastructure.org/faq" target="_blank" rel="nofollow noopener"&gt;a nutshell&lt;/a&gt;, it's an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet&lt;/li&gt;
&lt;li&gt;The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) &lt;/li&gt;
&lt;li&gt;To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they've just made a large donation to the foundation - this makes them &lt;a href="http://www.openbsdfoundation.org/contributors.html" target="_blank" rel="nofollow noopener"&gt;the first&lt;/a&gt; "platinum" level donor as well&lt;/li&gt;
&lt;li&gt;While the exact amount wasn't disclosed, it was somewhere between $50,000 and $100,000&lt;/li&gt;
&lt;li&gt;The donation comes less than a month after &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150708134520" target="_blank" rel="nofollow noopener"&gt;Microsoft's big donation&lt;/a&gt;, so it's good to see these large organizations helping out important open source projects that we depend on every day
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" target="_blank" rel="nofollow noopener"&gt;Another BSDCan report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon&lt;/li&gt;
&lt;li&gt;In his report, he mainly covers the devsummit and some discussion with the portmgr team&lt;/li&gt;
&lt;li&gt;One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well&lt;/li&gt;
&lt;li&gt;He also gives his thoughts on using &lt;a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" target="_blank" rel="nofollow noopener"&gt;QEMU for cross-compiling packages&lt;/a&gt; and network performance testing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" target="_blank" rel="nofollow noopener"&gt;Lumina 0.8.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PC-BSD team has released another version of &lt;a href="http://www.lumina-desktop.org/" target="_blank" rel="nofollow noopener"&gt;Lumina&lt;/a&gt;, their BSD-licensed desktop environment&lt;/li&gt;
&lt;li&gt;This is mainly a bugfix and performance improvement release, rather than one with lots of new features&lt;/li&gt;
&lt;li&gt;The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)&lt;/li&gt;
&lt;li&gt;Lots of non-English translation updates and assorted fixes are included as well&lt;/li&gt;
&lt;li&gt;If you haven't given it a try yet, or maybe you're looking for a new window manager, Lumina runs on all the BSDs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150730180506" target="_blank" rel="nofollow noopener"&gt;More c2k15 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Even more reports from OpenBSD's latest hackathon are starting to pour in&lt;/li&gt;
&lt;li&gt;The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)&lt;/li&gt;
&lt;li&gt;He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD&lt;/li&gt;
&lt;li&gt;Second up &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150731191156&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;is Andrew Fresh&lt;/a&gt;, who went without any specific plans, but still ended up getting some UTF8 work done&lt;/li&gt;
&lt;li&gt;On the topic of ARMv7, "I did enjoy being there when things weren't working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn't much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon."&lt;/li&gt;
&lt;li&gt;Florian Obser sent in a report that includes &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150805151453" target="_blank" rel="nofollow noopener"&gt;a little bit of everything&lt;/a&gt;: setting up the hackathon's network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food&lt;/li&gt;
&lt;li&gt;Paul Irofti &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150801100002&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;wrote in as well&lt;/a&gt; about his activities, which were mainly focused on the Octeon CPU architecture&lt;/li&gt;
&lt;li&gt;He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification&lt;/li&gt;
&lt;li&gt;This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s205kqTEIj" target="_blank" rel="nofollow noopener"&gt;Hamza writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ogIP6cEf" target="_blank" rel="nofollow noopener"&gt;Florian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s214xE9ulK" target="_blank" rel="nofollow noopener"&gt;Dominik writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, quakecon, pf, firewall, gateway, server, reddit, c2k15, hackathon, octeon, zfs, backups, offsite, valleyview, bsdcan, cii</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like &quot;what would you like to see in FreeBSD?&quot; and hundreds of responses, well, we&#39;ve got a lot to cover...</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" rel="nofollow">OpenBSD, from distribution to project</a></h3>

<ul>
<li>Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through</li>
<li>It&#39;s the third part of his <a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">ongoing</a> <a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">series</a> of posts about OpenBSD removing large bits of code in favor of smaller replacements</li>
<li>In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)</li>
<li>After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported</li>
<li>When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed</li>
<li>In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons</li>
<li>More discussion <a href="https://news.ycombinator.com/item?id=9980373" rel="nofollow">on HN</a> <a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" rel="nofollow">and reddit</a>
***</li>
</ul>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">Remote ZFS mirrors, the hard way</a></h3>

<ul>
<li>Backups to &quot;the cloud&quot; have become a hot topic in recent years, but most of them require trade-offs between convenience and security</li>
<li>You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren&#39;t without some compromise</li>
<li>As the author puts it: &quot;We don&#39;t need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we&#39;ll-deletes, or any of the noise that comes with using someone else&#39;s infrastructure.&quot;</li>
<li>This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself</li>
<li>The end result is an automatic system for incremental backups that&#39;s backed (pun intended) by ZFS</li>
<li>If you&#39;re serious about keeping your important data safe and sound, you&#39;ll want to give this one a read - lots of detailed instructions
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" rel="nofollow">Various DragonFlyBSD updates</a></h3>

<ul>
<li>The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree</li>
<li>Intel ValleyView graphics support was finally committed to the main repository</li>
<li>While on the topic of graphics, they&#39;ve also issued <a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" rel="nofollow">a call for testing</a> for a DRM update (matching Linux 3.16&#39;s and including some more Broadwell fixes)</li>
<li>Their base GCC compiler is also now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" rel="nofollow">upgraded to version 5.2</a></li>
<li>If your hardware supports it, DragonFly will now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" rel="nofollow">use an accelerated console by default</a>
***</li>
</ul>

<h3><a href="https://youtu.be/mOv62lBdlXU?t=292" rel="nofollow">QuakeCon runs on OpenBSD</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/QuakeCon" rel="nofollow">QuakeCon</a>, everyone&#39;s favorite event full of rocket launchers, recently gave a mini-tour of their network setup</li>
<li>For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF</li>
<li>In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more</li>
<li>He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution</li>
<li>There&#39;s also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff</li>
<li>Follow-up questions can be asked in <a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" rel="nofollow">this reddit thread</a></li>
<li>The host doesn&#39;t seem to be that familiar with the topics at hand, mentioning &quot;OpenPF&quot; multiple times among other things, so our listeners should get a kick out of it
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>Rethinking <a href="https://www.reddit.com/r/freebsd/comments/3d80vt" rel="nofollow">ways to improve FreeBSD</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150804161939" rel="nofollow">CII contributes to OpenBSD</a></h3>

<ul>
<li>If you recall back to <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">when we talked to the OpenBSD foundation</a>, one of the things Ken mentioned was the <a href="https://www.coreinfrastructure.org" rel="nofollow">Core Infrastructure Initiative</a></li>
<li>In <a href="https://www.coreinfrastructure.org/faq" rel="nofollow">a nutshell</a>, it&#39;s an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet</li>
<li>The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) </li>
<li>To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they&#39;ve just made a large donation to the foundation - this makes them <a href="http://www.openbsdfoundation.org/contributors.html" rel="nofollow">the first</a> &quot;platinum&quot; level donor as well</li>
<li>While the exact amount wasn&#39;t disclosed, it was somewhere between $50,000 and $100,000</li>
<li>The donation comes less than a month after <a href="http://undeadly.org/cgi?action=article&sid=20150708134520" rel="nofollow">Microsoft&#39;s big donation</a>, so it&#39;s good to see these large organizations helping out important open source projects that we depend on every day
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" rel="nofollow">Another BSDCan report</a></h3>

<ul>
<li>The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon</li>
<li>In his report, he mainly covers the devsummit and some discussion with the portmgr team</li>
<li>One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well</li>
<li>He also gives his thoughts on using <a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" rel="nofollow">QEMU for cross-compiling packages</a> and network performance testing
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" rel="nofollow">Lumina 0.8.6 released</a></h3>

<ul>
<li>The PC-BSD team has released another version of <a href="http://www.lumina-desktop.org/" rel="nofollow">Lumina</a>, their BSD-licensed desktop environment</li>
<li>This is mainly a bugfix and performance improvement release, rather than one with lots of new features</li>
<li>The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)</li>
<li>Lots of non-English translation updates and assorted fixes are included as well</li>
<li>If you haven&#39;t given it a try yet, or maybe you&#39;re looking for a new window manager, Lumina runs on all the BSDs
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150730180506" rel="nofollow">More c2k15 hackathon reports</a></h3>

<ul>
<li>Even more reports from OpenBSD&#39;s latest hackathon are starting to pour in</li>
<li>The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)</li>
<li>He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD</li>
<li>Second up <a href="http://undeadly.org/cgi?action=article&sid=20150731191156&mode=flat" rel="nofollow">is Andrew Fresh</a>, who went without any specific plans, but still ended up getting some UTF8 work done</li>
<li>On the topic of ARMv7, &quot;I did enjoy being there when things weren&#39;t working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn&#39;t much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon.&quot;</li>
<li>Florian Obser sent in a report that includes <a href="http://undeadly.org/cgi?action=article&sid=20150805151453" rel="nofollow">a little bit of everything</a>: setting up the hackathon&#39;s network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food</li>
<li>Paul Irofti <a href="http://undeadly.org/cgi?action=article&sid=20150801100002&mode=flat" rel="nofollow">wrote in as well</a> about his activities, which were mainly focused on the Octeon CPU architecture</li>
<li>He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification</li>
<li>This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205kqTEIj" rel="nofollow">Hamza writes in</a></li>
<li><a href="http://slexy.org/view/s2ogIP6cEf" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s214xE9ulK" rel="nofollow">Dominik writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about an infamous reddit thread he made. With a title like &quot;what would you like to see in FreeBSD?&quot; and hundreds of responses, well, we&#39;ve got a lot to cover...</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/from-distribution-to-project" rel="nofollow">OpenBSD, from distribution to project</a></h3>

<ul>
<li>Ted Unangst has yet another interesting blog post up, this time covering a bit of BSD history and some different phases OpenBSD has been through</li>
<li>It&#39;s the third part of his <a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">ongoing</a> <a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">series</a> of posts about OpenBSD removing large bits of code in favor of smaller replacements</li>
<li>In the earliest days, OpenBSD collected and maintained code from lots of other projects (Apache, lynx, perl..)</li>
<li>After importing new updates every release cycle, they eventually hit a transitional phase - things were updated, but nothing new was imported</li>
<li>When the need arose, instead of importing a known tool to do the job, homemade replacements (OpenNTPD, OpenBGPD, etc) were slowly developed</li>
<li>In more recent times, a lot of the imported code has been completely removed in favor of the homegrown daemons</li>
<li>More discussion <a href="https://news.ycombinator.com/item?id=9980373" rel="nofollow">on HN</a> <a href="https://www.reddit.com/r/openbsd/comments/3f9o19/from_distribution_to_project/" rel="nofollow">and reddit</a>
***</li>
</ul>

<h3><a href="https://github.com/hughobrien/zfs-remote-mirror" rel="nofollow">Remote ZFS mirrors, the hard way</a></h3>

<ul>
<li>Backups to &quot;the cloud&quot; have become a hot topic in recent years, but most of them require trade-offs between convenience and security</li>
<li>You have to trust (some of) the providers not to snoop on your data, but even the ones who allow you to locally encrypt files aren&#39;t without some compromise</li>
<li>As the author puts it: &quot;We don&#39;t need live synchronisation, cloud scaling, SLAs, NSAs, terms of service, lock-ins, buy-outs, up-sells, shut-downs, DoSs, fail whales, pay-us-or-we&#39;ll-deletes, or any of the noise that comes with using someone else&#39;s infrastructure.&quot;</li>
<li>This guide walks you through setting up a FreeBSD server with ZFS to do secure offsite backups yourself</li>
<li>The end result is an automatic system for incremental backups that&#39;s backed (pun intended) by ZFS</li>
<li>If you&#39;re serious about keeping your important data safe and sound, you&#39;ll want to give this one a read - lots of detailed instructions
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419064.html" rel="nofollow">Various DragonFlyBSD updates</a></h3>

<ul>
<li>The DragonFly guys have been quite busy this week, making an assortment of improvements throughout the tree</li>
<li>Intel ValleyView graphics support was finally committed to the main repository</li>
<li>While on the topic of graphics, they&#39;ve also issued <a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207923.html" rel="nofollow">a call for testing</a> for a DRM update (matching Linux 3.16&#39;s and including some more Broadwell fixes)</li>
<li>Their base GCC compiler is also now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419045.html" rel="nofollow">upgraded to version 5.2</a></li>
<li>If your hardware supports it, DragonFly will now <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-July/419070.html" rel="nofollow">use an accelerated console by default</a>
***</li>
</ul>

<h3><a href="https://youtu.be/mOv62lBdlXU?t=292" rel="nofollow">QuakeCon runs on OpenBSD</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/QuakeCon" rel="nofollow">QuakeCon</a>, everyone&#39;s favorite event full of rocket launchers, recently gave a mini-tour of their network setup</li>
<li>For such a crazy network, unsurprisingly, they seem to be big fans of OpenBSD and PF</li>
<li>In this video interview, one of the sysadmins discusses why he chose OpenBSD, what he likes about it, different packet queueing systems, how their firewalls and servers are laid out and much more</li>
<li>He also talks about why they went with vanilla PF, writing their ruleset from the ground up rather than relying on a prebuilt solution</li>
<li>There&#39;s also some general networking talk about nginx, reverse proxies, caching, fiber links and all that good stuff</li>
<li>Follow-up questions can be asked in <a href="https://www.reddit.com/r/BSD/comments/3f43fh/bsd_runs_quakecon/" rel="nofollow">this reddit thread</a></li>
<li>The host doesn&#39;t seem to be that familiar with the topics at hand, mentioning &quot;OpenPF&quot; multiple times among other things, so our listeners should get a kick out of it
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>Rethinking <a href="https://www.reddit.com/r/freebsd/comments/3d80vt" rel="nofollow">ways to improve FreeBSD</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150804161939" rel="nofollow">CII contributes to OpenBSD</a></h3>

<ul>
<li>If you recall back to <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">when we talked to the OpenBSD foundation</a>, one of the things Ken mentioned was the <a href="https://www.coreinfrastructure.org" rel="nofollow">Core Infrastructure Initiative</a></li>
<li>In <a href="https://www.coreinfrastructure.org/faq" rel="nofollow">a nutshell</a>, it&#39;s an organization of security experts that helps facilitate (with money, in most cases) the advancement of the more critical open source components of the internet</li>
<li>The group is organized by the Linux foundation, and gets its multi-million dollar backing from various big companies in the technology space (and donations from volunteers) </li>
<li>To ensure that OpenBSD and its related projects (OpenSSH, LibreSSL and PF likely being the main ones here) remain healthy, they&#39;ve just made a large donation to the foundation - this makes them <a href="http://www.openbsdfoundation.org/contributors.html" rel="nofollow">the first</a> &quot;platinum&quot; level donor as well</li>
<li>While the exact amount wasn&#39;t disclosed, it was somewhere between $50,000 and $100,000</li>
<li>The donation comes less than a month after <a href="http://undeadly.org/cgi?action=article&sid=20150708134520" rel="nofollow">Microsoft&#39;s big donation</a>, so it&#39;s good to see these large organizations helping out important open source projects that we depend on every day
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-mark-linimon.html" rel="nofollow">Another BSDCan report</a></h3>

<ul>
<li>The FreeBSD foundation is still getting trip reports from BSDCan, and this one comes from Mark Linimon</li>
<li>In his report, he mainly covers the devsummit and some discussion with the portmgr team</li>
<li>One notable change for the upcoming 10.2 release is that the default binary repository is now the quarterly branch - Mark talks a bit about this as well</li>
<li>He also gives his thoughts on using <a href="http://www.bsdnow.tv/episodes/2015_03_04-just_add_qemu" rel="nofollow">QEMU for cross-compiling packages</a> and network performance testing
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/08/lumina-desktop-0-8-6-released/" rel="nofollow">Lumina 0.8.6 released</a></h3>

<ul>
<li>The PC-BSD team has released another version of <a href="http://www.lumina-desktop.org/" rel="nofollow">Lumina</a>, their BSD-licensed desktop environment</li>
<li>This is mainly a bugfix and performance improvement release, rather than one with lots of new features</li>
<li>The on-screen display widget should be much faster now, and the configuration now allows for easier selection of default applications (which browser, which terminal, etc)</li>
<li>Lots of non-English translation updates and assorted fixes are included as well</li>
<li>If you haven&#39;t given it a try yet, or maybe you&#39;re looking for a new window manager, Lumina runs on all the BSDs
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150730180506" rel="nofollow">More c2k15 hackathon reports</a></h3>

<ul>
<li>Even more reports from OpenBSD&#39;s latest hackathon are starting to pour in</li>
<li>The first one is from Alexandr Nedvedicky, one of their brand new developers (the guy from Oracle)</li>
<li>He talks about his experience going to a hackathon for the first time, and lays out some of the plans for integrating their (very large) SMP PF patch into OpenBSD</li>
<li>Second up <a href="http://undeadly.org/cgi?action=article&sid=20150731191156&mode=flat" rel="nofollow">is Andrew Fresh</a>, who went without any specific plans, but still ended up getting some UTF8 work done</li>
<li>On the topic of ARMv7, &quot;I did enjoy being there when things weren&#39;t working so [Brandon Mercer] could futilely try to explain the problem to me (I wasn&#39;t much help with kernel memory layouts). Fortunately others overheard and provided words of encouragement and some help which was one of my favorite parts of attending this hackathon.&quot;</li>
<li>Florian Obser sent in a report that includes <a href="http://undeadly.org/cgi?action=article&sid=20150805151453" rel="nofollow">a little bit of everything</a>: setting up the hackathon&#39;s network, relayd and httpd work, bidirectional forwarding detection, airplane stories and even lots of food</li>
<li>Paul Irofti <a href="http://undeadly.org/cgi?action=article&sid=20150801100002&mode=flat" rel="nofollow">wrote in as well</a> about his activities, which were mainly focused on the Octeon CPU architecture</li>
<li>He wrote a new driver for the onboard flash of a DSR-500 machine, which was built following the Common Flash Interface specification</li>
<li>This means that, going forward, OpenBSD will have out-of-the-box support for any flash memory device (often the case for MIPS and ARM-based embedded devices)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205kqTEIj" rel="nofollow">Hamza writes in</a></li>
<li><a href="http://slexy.org/view/s2ogIP6cEf" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s214xE9ulK" rel="nofollow">Dominik writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>100: Straight from the Src</title>
  <link>https://www.bsdnow.tv/100</link>
  <guid isPermaLink="false">06d71c41-6630-4fa3-8cd3-46e35a9a535c</guid>
  <pubDate>Wed, 29 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/06d71c41-6630-4fa3-8cd3-46e35a9a535c.mp3" length="53030452" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</itunes:subtitle>
  <itunes:duration>1:13:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We've finally reached a hundred episodes, and this week we'll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" target="_blank" rel="nofollow noopener"&gt;Remote DoS in the TCP stack&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing &lt;em&gt;remote&lt;/em&gt; attackers to exhaust the resources of a system with nothing more than TCP connections&lt;/li&gt;
&lt;li&gt;While in the LAST_ACK state, which is one of the final stages of a connection's lifetime, the connection can get stuck and hang there indefinitely&lt;/li&gt;
&lt;li&gt;This problem has a slightly confusing history that involves different fixes at different points in time from different people&lt;/li&gt;
&lt;li&gt;Juniper originally discovered the bug and &lt;a href="https://kb.juniper.net/InfoCenter/index?page=content&amp;amp;id=JSA10686" target="_blank" rel="nofollow noopener"&gt;announced a fix&lt;/a&gt; for their proprietary networking gear on June 8th&lt;/li&gt;
&lt;li&gt;On June 29th, FreeBSD caught wind of it and fixed the bug &lt;a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=284941&amp;amp;r2=284940&amp;amp;pathrev=284941" target="_blank" rel="nofollow noopener"&gt;in their -current branch&lt;/a&gt;, but did not issue a security notice or MFC the fix back to the -stable branches&lt;/li&gt;
&lt;li&gt;On July 13th, two weeks later, OpenBSD &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143682919807388&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;fixed the issue&lt;/a&gt; in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found&lt;/li&gt;
&lt;li&gt;Immediately afterwards, they merged it back to -stable and issued &lt;a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" target="_blank" rel="nofollow noopener"&gt;an errata notice&lt;/a&gt; for 5.7 and 5.6&lt;/li&gt;
&lt;li&gt;On July 21st, three weeks after their original fix, FreeBSD committed &lt;a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&amp;amp;r1=285777&amp;amp;r2=285776&amp;amp;pathrev=285777" target="_blank" rel="nofollow noopener"&gt;yet another slightly different fix&lt;/a&gt; and issued &lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" target="_blank" rel="nofollow noopener"&gt;a security notice&lt;/a&gt; for the problem (which didn't include the first fix)&lt;/li&gt;
&lt;li&gt;After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way&lt;/li&gt;
&lt;li&gt;NetBSD confirmed they were vulnerable too, and &lt;a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&amp;amp;r2=1.184&amp;amp;only_with_tag=MAIN" target="_blank" rel="nofollow noopener"&gt;applied another completely different fix&lt;/a&gt; to -current on July 24th, but haven't released a security notice yet&lt;/li&gt;
&lt;li&gt;DragonFly is also investigating the issue now to see if they're affected as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150721180312&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;c2k15 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Reports from OpenBSD's latest &lt;a href="http://www.openbsd.org/hackathons.html" target="_blank" rel="nofollow noopener"&gt;hackathon&lt;/a&gt;, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)&lt;/li&gt;
&lt;li&gt;The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event&lt;/li&gt;
&lt;li&gt;He writes, "Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the "command" built-in command - and had to step through dozens of false positives with the less '/' and 'n' search keys before you finally found the actual definition?"&lt;/li&gt;
&lt;li&gt;With mandoc's new internal jump targets, this is a problem of the past now&lt;/li&gt;
&lt;li&gt;Jasper &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150723124332&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;also sent in a report&lt;/a&gt;, doing his usual work with Puppet (and specifically "Facter," a tool used by Puppet to gather various bits of system information)&lt;/li&gt;
&lt;li&gt;Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an "-i" flag for sed (hooray!)&lt;/li&gt;
&lt;li&gt;Antoine Jacoutot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150722205349&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;gave a report&lt;/a&gt; on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)&lt;/li&gt;
&lt;li&gt;It now has an "ls" subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this "the poor man's service monitoring tool")&lt;/li&gt;
&lt;li&gt;He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)&lt;/li&gt;
&lt;li&gt;His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades&lt;/li&gt;
&lt;li&gt;Foundation director Ken Westerback &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150722105658&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;was also there&lt;/a&gt;, getting some disk-related and laptop work done&lt;/li&gt;
&lt;li&gt;He cleaned up and committed the 4k sector softraid code that he'd been working on, as well as fixing some trackpad issues&lt;/li&gt;
&lt;li&gt;Stefan Sperling, OpenBSD's token "wireless guy," had &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150722182236&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;a lot to say&lt;/a&gt; about the hackathon and what he did there (and even sent in his write-up before he got home)&lt;/li&gt;
&lt;li&gt;He taught tcpdump about some new things, including 802.11n metadata beacons (there's a lot more specific detail about this one in the report)&lt;/li&gt;
&lt;li&gt;Bringing &lt;em&gt;a bag full of USB wireless devices&lt;/em&gt; with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work&lt;/li&gt;
&lt;li&gt;One quote from Stefan's report that a lot of people seem to be talking about: "Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We'll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year."&lt;/li&gt;
&lt;li&gt;Jeremy Evans &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150725180527&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;wrote in&lt;/a&gt; to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem&lt;/li&gt;
&lt;li&gt;While he's mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon&lt;/li&gt;
&lt;li&gt;Rafael Zalamena, who got commit access at the event, &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150725183439&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;gives his very first report&lt;/a&gt; on his networking-related hackathon activities&lt;/li&gt;
&lt;li&gt;With Rafael's diffs and help from a couple other developers, OpenBSD now has support for &lt;a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" target="_blank" rel="nofollow noopener"&gt;VPLS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jonathan Gray &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150728184743&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;got a lot done&lt;/a&gt; in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code&lt;/li&gt;
&lt;li&gt;As he's become somewhat known for, Jonathan was also busy running three things in the background: clang's fuzzer, cppcheck and AFL (looking for any potential crashes to fix)&lt;/li&gt;
&lt;li&gt;Martin Pieuchot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150724183210&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;gave an write-up&lt;/a&gt; on his experience: "I always though that hackathons were the best place to write code, but what's even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that's what I did."&lt;/li&gt;
&lt;li&gt;He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack&lt;/li&gt;
&lt;li&gt;Unfortunately, most of Martin's secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle&lt;/li&gt;
&lt;li&gt;We're still eagerly awaiting a report from one of OpenBSD's &lt;a href="https://twitter.com/phessler/status/623291827878137856" target="_blank" rel="nofollow noopener"&gt;newest developers&lt;/a&gt;, Alexandr Nedvedicky (the Oracle guy who's working on SMP PF and some other PF fixes)&lt;/li&gt;
&lt;li&gt;OpenBSD 5.8's "beta" status was recently &lt;strong&gt;reverted&lt;/strong&gt;, with the message "&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143766883514831&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;take that as a hint&lt;/a&gt;," so that may mean more big changes are still to come...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD quarterly status report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far&lt;/li&gt;
&lt;li&gt;It's broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others&lt;/li&gt;
&lt;li&gt;Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just "svn.freebsd.org") are now using GeoGNS with official SSL certs and general redundancy was increased&lt;/li&gt;
&lt;li&gt;In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages&lt;/li&gt;
&lt;li&gt;The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon&lt;/li&gt;
&lt;li&gt;Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)&lt;/li&gt;
&lt;li&gt;The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support&lt;/li&gt;
&lt;li&gt;Multipath TCP was also a hot topic, and there's a brief summary of the current status on that patch (it will be available publicly soon)&lt;/li&gt;
&lt;li&gt;ZFSguru, a project we haven't talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August&lt;/li&gt;
&lt;li&gt;PCIe hotplug support is also mentioned, though it's still in the development stages (basic hot-swap functions are working though)&lt;/li&gt;
&lt;li&gt;The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling&lt;/li&gt;
&lt;li&gt;Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report&lt;/li&gt;
&lt;li&gt;Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot&lt;/li&gt;
&lt;li&gt;Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" target="_blank" rel="nofollow noopener"&gt;The OpenSSH bug that wasn't&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There's been a lot of &lt;a href="https://www.marc.info/?t=143766048000005&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; about &lt;a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" target="_blank" rel="nofollow noopener"&gt;a supposed flaw&lt;/a&gt; in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)&lt;/li&gt;
&lt;li&gt;There's no actual &lt;em&gt;exploit&lt;/em&gt; to speak of; this bug would only help someone get more bruteforce tries in with a &lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" target="_blank" rel="nofollow noopener"&gt;fewer number of connections&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FreeBSD in its default configuration, with &lt;a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" target="_blank" rel="nofollow noopener"&gt;PAM&lt;/a&gt; and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143767296016252&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;not upstream OpenSSH&lt;/a&gt;, nor any of the other BSDs, and not even the majority of Linux distros&lt;/li&gt;
&lt;li&gt;If you disable all forms of authentication except public keys, &lt;a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" target="_blank" rel="nofollow noopener"&gt;like you're supposed to&lt;/a&gt;, then this is also not a big deal for FreeBSD systems&lt;/li&gt;
&lt;li&gt;Realistically speaking, it's more of &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143782167322500&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;a PAM bug&lt;/a&gt; than anything else&lt;/li&gt;
&lt;li&gt;OpenSSH &lt;a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" target="_blank" rel="nofollow noopener"&gt;added an additional check&lt;/a&gt; for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can &lt;a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" target="_blank" rel="nofollow noopener"&gt;run freebsd-update&lt;/a&gt;)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Sebastian Wiedenroth - &lt;a href="mailto:wiedi@netbsd.org" target="_blank" rel="nofollow noopener"&gt;wiedi@netbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/wied0r" target="_blank" rel="nofollow noopener"&gt;@wied0r&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://en.wikipedia.org/wiki/Pkgsrc" target="_blank" rel="nofollow noopener"&gt;pkgsrc&lt;/a&gt; and &lt;a href="http://pkgsrc.org/pkgsrcCon/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://tribaal.io/this-now-served-by-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Now served by OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it&lt;/li&gt;
&lt;li&gt;The use case for the author was for a webserver, so he decided to try out the httpd in base&lt;/li&gt;
&lt;li&gt;Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting&lt;/li&gt;
&lt;li&gt;TLS 1.2 by default, strong ciphers with LibreSSL and &lt;a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" target="_blank" rel="nofollow noopener"&gt;HSTS&lt;/a&gt; combined give you a pretty secure web server
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/sean-/freebsd-laptops" target="_blank" rel="nofollow noopener"&gt;FreeBSD laptop playbooks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named "freebsd-laptops"&lt;/li&gt;
&lt;li&gt;It's based on ansible, and uses the playbook format for automatic set up and configuration&lt;/li&gt;
&lt;li&gt;Right now, it's only working on a single Lenovo laptop, but the plan is to add instructions for many more models&lt;/li&gt;
&lt;li&gt;Check the Github page for instructions on how to get started, and maybe get involved if you're running FreeBSD on a laptop
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" target="_blank" rel="nofollow noopener"&gt;NetBSD on the NVIDIA Jetson TK1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've never heard of the &lt;a href="https://developer.nvidia.com/jetson-tk1" target="_blank" rel="nofollow noopener"&gt;Jetson TK1&lt;/a&gt;, we can go ahead and spoil the secret here: NetBSD runs on it&lt;/li&gt;
&lt;li&gt;As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE&lt;/li&gt;
&lt;li&gt;This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)&lt;/li&gt;
&lt;li&gt;You can even run X11 on it, pretty sweet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" target="_blank" rel="nofollow noopener"&gt;DragonFly power mangement options&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly developer Sepherosa, who we've had on the show, has been doing some ACPI work over there&lt;/li&gt;
&lt;li&gt;In this email, he presents some of DragonFly's different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well&lt;/li&gt;
&lt;li&gt;He also did some testing with each of them and gave his findings about power saving&lt;/li&gt;
&lt;li&gt;If you've been thinking about running DragonFly on a laptop, this would be a good one to read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" target="_blank" rel="nofollow noopener"&gt;OpenBSD router under FreeBSD bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If one BSD just isn't enough for you, and you've only got one machine, why not run two at once&lt;/li&gt;
&lt;li&gt;This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it&lt;/li&gt;
&lt;li&gt;If you've been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware&lt;/li&gt;
&lt;li&gt;The author also includes a little bit of history on how he got into both operating systems&lt;/li&gt;
&lt;li&gt;There are lots of mixed opinions about virtualizing core network components, so we'll leave it up to you to do your research&lt;/li&gt;
&lt;li&gt;Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yPVV5Wyp" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21zcz9rut" target="_blank" rel="nofollow noopener"&gt;Logan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21CRmiPwK" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s211zfIXff" target="_blank" rel="nofollow noopener"&gt;Randy writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, pkgsrccon, portability, illumos, solaris, openindiana, opensolaris, zfs, openzfs, tcp, dos, c2k15, hackathon, openssh, pam, exploit, smartos, omnios, joyent, delphix</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve finally reached a hundred episodes, and this week we&#39;ll be talking to Sebastian Wiedenroth about pkgsrc. Though originally a NetBSD project, now it runs pretty much everywhere, and he even runs a conference about it!</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.team-cymru.org/2015/07/another-day-another-patch/" rel="nofollow">Remote DoS in the TCP stack</a></h3>

<ul>
<li>A pretty devious bug in the BSD network stack has been making its rounds for a while now, allowing <em>remote</em> attackers to exhaust the resources of a system with nothing more than TCP connections</li>
<li>While in the LAST_ACK state, which is one of the final stages of a connection&#39;s lifetime, the connection can get stuck and hang there indefinitely</li>
<li>This problem has a slightly confusing history that involves different fixes at different points in time from different people</li>
<li>Juniper originally discovered the bug and <a href="https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10686" rel="nofollow">announced a fix</a> for their proprietary networking gear on June 8th</li>
<li>On June 29th, FreeBSD caught wind of it and fixed the bug <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=284941&r2=284940&pathrev=284941" rel="nofollow">in their -current branch</a>, but did not issue a security notice or MFC the fix back to the -stable branches</li>
<li>On July 13th, two weeks later, OpenBSD <a href="https://www.marc.info/?l=openbsd-cvs&m=143682919807388&w=2" rel="nofollow">fixed the issue</a> in their -current branch with a slightly different patch, citing the FreeBSD revision from which the problem was found</li>
<li>Immediately afterwards, they merged it back to -stable and issued <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.7/common/010_tcp_persist.patch.sig" rel="nofollow">an errata notice</a> for 5.7 and 5.6</li>
<li>On July 21st, three weeks after their original fix, FreeBSD committed <a href="https://svnweb.freebsd.org/base/head/sys/netinet/tcp_output.c?view=patch&r1=285777&r2=285776&pathrev=285777" rel="nofollow">yet another slightly different fix</a> and issued <a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-July/001655.html" rel="nofollow">a security notice</a> for the problem (which didn&#39;t include the first fix)</li>
<li>After the second fix from FreeBSD, OpenBSD gave them both another look and found their single fix to be sufficient, covering the timer issue in a more general way</li>
<li>NetBSD confirmed they were vulnerable too, and <a href="http://cvsweb.netbsd.org/bsdweb.cgi/src/sys/netinet/tcp_output.c.diff?r1=1.183&r2=1.184&only_with_tag=MAIN" rel="nofollow">applied another completely different fix</a> to -current on July 24th, but haven&#39;t released a security notice yet</li>
<li>DragonFly is also investigating the issue now to see if they&#39;re affected as well
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150721180312&mode=flat" rel="nofollow">c2k15 hackathon reports</a></h3>

<ul>
<li>Reports from OpenBSD&#39;s latest <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a>, held in Calgary this time, are starting to roll in (there were over 40 devs there, so we might see a lot more of these)</li>
<li>The first one, from Ingo Schwarze, talks about some of the mandoc work he did at the event</li>
<li>He writes, &quot;Did you ever look at a huge page in man, wanted to jump to the definition of a specific term - say, in ksh, to the definition of the &quot;command&quot; built-in command - and had to step through dozens of false positives with the less &#39;/&#39; and &#39;n&#39; search keys before you finally found the actual definition?&quot;</li>
<li>With mandoc&#39;s new internal jump targets, this is a problem of the past now</li>
<li>Jasper <a href="http://undeadly.org/cgi?action=article&sid=20150723124332&mode=flat" rel="nofollow">also sent in a report</a>, doing his usual work with Puppet (and specifically &quot;Facter,&quot; a tool used by Puppet to gather various bits of system information)</li>
<li>Aside from that and various ports-related work, Jasper worked on adding tame support to some userland tools, fixing some Octeon stuff and introduced something that OpenBSD has oddly lacked until now: an &quot;-i&quot; flag for sed (hooray!)</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20150722205349&mode=flat" rel="nofollow">gave a report</a> on what he did at the hackathon as well, including improvements to the rcctl tool (for configuring startup services)</li>
<li>It now has an &quot;ls&quot; subcommand with status parsing, allowing you to list running services, stopped services or even ones that failed to start or are supposed to be running (he calls this &quot;the poor man&#39;s service monitoring tool&quot;)</li>
<li>He also reworked some of the rc.d system to allow smoother operation of multiple instances of the same daemon to run (using tor with different config files as an example)</li>
<li>His list also included updating ports, updating ports documentation, updating the hotplug daemon and laying out some plans for automatic sysmerge for future upgrades</li>
<li>Foundation director Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150722105658&mode=flat" rel="nofollow">was also there</a>, getting some disk-related and laptop work done</li>
<li>He cleaned up and committed the 4k sector softraid code that he&#39;d been working on, as well as fixing some trackpad issues</li>
<li>Stefan Sperling, OpenBSD&#39;s token &quot;wireless guy,&quot; had <a href="http://undeadly.org/cgi?action=article&sid=20150722182236&mode=flat" rel="nofollow">a lot to say</a> about the hackathon and what he did there (and even sent in his write-up before he got home)</li>
<li>He taught tcpdump about some new things, including 802.11n metadata beacons (there&#39;s a lot more specific detail about this one in the report)</li>
<li>Bringing <em>a bag full of USB wireless devices</em> with him, he set out to get the unsupported ones working, as well as fix some driver bugs in the ones that already did work</li>
<li>One quote from Stefan&#39;s report that a lot of people seem to be talking about: &quot;Partway through the hackathon tedu proposed an old diff of his to make our base ls utility display multi-byte characters. This led to a long discussion about how to expand UTF-8 support in base. The conclusion so far indicates that single-byte locales (such as ISO-8859-1 and KOI-8) will be removed from the base OS after the 5.8 release is cut. This simplifies things because the whole system only has to care about a single character encoding. We&#39;ll then have a full release cycle to bring UTF-8 support to more base system utilities such as vi, ksh, and mg. To help with this plan, I started organizing a UTF-8-focused hackathon for some time later this year.&quot;</li>
<li>Jeremy Evans <a href="http://undeadly.org/cgi?action=article&sid=20150725180527&mode=flat" rel="nofollow">wrote in</a> to talk about updating lots of ports, moving the ruby ports up to the latest version and also creating perl and ruby wrappers for the new tame subsystem</li>
<li>While he&#39;s mainly a ports guy, he got to commit fixes to ports, the base system and even the kernel during the hackathon</li>
<li>Rafael Zalamena, who got commit access at the event, <a href="http://undeadly.org/cgi?action=article&sid=20150725183439&mode=flat" rel="nofollow">gives his very first report</a> on his networking-related hackathon activities</li>
<li>With Rafael&#39;s diffs and help from a couple other developers, OpenBSD now has support for <a href="https://en.wikipedia.org/wiki/Virtual_Private_LAN_Service" rel="nofollow">VPLS</a></li>
<li>Jonathan Gray <a href="http://undeadly.org/cgi?action=article&sid=20150728184743&mode=flat" rel="nofollow">got a lot done</a> in the area of graphics, working on OpenGL and Mesa, updating libdrm and even working with upstream projects to remove some GNU-specific code</li>
<li>As he&#39;s become somewhat known for, Jonathan was also busy running three things in the background: clang&#39;s fuzzer, cppcheck and AFL (looking for any potential crashes to fix)</li>
<li>Martin Pieuchot <a href="http://undeadly.org/cgi?action=article&sid=20150724183210&mode=flat" rel="nofollow">gave an write-up</a> on his experience: &quot;I always though that hackathons were the best place to write code, but what&#39;s even more important is that they are the best (well actually only) moment where one can discuss and coordinate projects with other developers IRL. And that&#39;s what I did.&quot;</li>
<li>He laid out some plans for the wireless stack, discussed future plans for PF, made some routing table improvements and did various other bits to the network stack</li>
<li>Unfortunately, most of Martin&#39;s secret plans seem to have been left intentionally vague, and will start to take form in the next release cycle</li>
<li>We&#39;re still eagerly awaiting a report from one of OpenBSD&#39;s <a href="https://twitter.com/phessler/status/623291827878137856" rel="nofollow">newest developers</a>, Alexandr Nedvedicky (the Oracle guy who&#39;s working on SMP PF and some other PF fixes)</li>
<li>OpenBSD 5.8&#39;s &quot;beta&quot; status was recently <strong>reverted</strong>, with the message &quot;<a href="https://www.marc.info/?l=openbsd-cvs&m=143766883514831&w=2" rel="nofollow">take that as a hint</a>,&quot; so that may mean more big changes are still to come...
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2015-04-2015-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has published their quarterly status report for the months of April to June, citing it to be the largest one so far</li>
<li>It&#39;s broken down into a number of sections: team reports, projects, kernel, architectures, userland programs, ports, documentation, Google Summer of Code and miscellaneous others</li>
<li>Starting off with the cluster admin, some machines were moved to the datacenter at New York Internet, email services are now more resilient to failure, the svn mirrors (now just &quot;svn.freebsd.org&quot;) are now using GeoGNS with official SSL certs and general redundancy was increased</li>
<li>In the release engineering space, ARM and ARM64 work continues to improve on the Cavium ThunderX, more focus is being put into cloud platforms and the 10.2-RELEASE cycle is reaching its final stages</li>
<li>The core team has been working on phabricator, the fancy review system, and is considering to integrate oauth support soon</li>
<li>Work also continues on bhyve, and more operating systems are slowly gaining support (including the much-rumored Windows Server 2012)</li>
<li>The report also covers recent developments in the Linux emulation layer, and encourages people using 11-CURRENT to help test out the 64bit support</li>
<li>Multipath TCP was also a hot topic, and there&#39;s a brief summary of the current status on that patch (it will be available publicly soon)</li>
<li>ZFSguru, a project we haven&#39;t talked about a lot, also gets some attention in the report - version 0.3 is set to be completed in early August</li>
<li>PCIe hotplug support is also mentioned, though it&#39;s still in the development stages (basic hot-swap functions are working though)</li>
<li>The official binary packages are now built more frequently than before with the help of additional hardware, so AMD64 and i386 users will have fresher ports without the need for compiling</li>
<li>Various other small updates on specific areas of ports (KDE, XFCE, X11...) are also included in the report</li>
<li>Documentation is a strong focus as always, a number of new documentation committers were added and some of the translations have been improved a lot</li>
<li>Many other topics were covered, including foundation updates, conference plans, pkgsrc support in pkgng, ZFS support for UEFI boot and much more
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2015/07/the-openssh-bug-that-wasnt.html" rel="nofollow">The OpenSSH bug that wasn&#39;t</a></h3>

<ul>
<li>There&#39;s been a lot of <a href="https://www.marc.info/?t=143766048000005&r=1&w=2" rel="nofollow">discussion</a> about <a href="https://kingcope.wordpress.com/2015/07/16/openssh-keyboard-interactive-authentication-brute-force-vulnerability-maxauthtries-bypass/" rel="nofollow">a supposed flaw</a> in OpenSSH, allowing attackers to substantially amplify the number of password attempts they can try per session (without leaving any abnormal log traces, even)</li>
<li>There&#39;s no actual <em>exploit</em> to speak of; this bug would only help someone get more bruteforce tries in with a <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-July/034209.html" rel="nofollow">fewer number of connections</a></li>
<li>FreeBSD in its default configuration, with <a href="https://en.wikipedia.org/wiki/Pluggable_authentication_module" rel="nofollow">PAM</a> and ChallengeResponseAuthentication enabled, was the only one vulnerable to the problem - <a href="https://www.marc.info/?l=openbsd-misc&m=143767296016252&w=2" rel="nofollow">not upstream OpenSSH</a>, nor any of the other BSDs, and not even the majority of Linux distros</li>
<li>If you disable all forms of authentication except public keys, <a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">like you&#39;re supposed to</a>, then this is also not a big deal for FreeBSD systems</li>
<li>Realistically speaking, it&#39;s more of <a href="https://www.marc.info/?l=openbsd-misc&m=143782167322500&w=2" rel="nofollow">a PAM bug</a> than anything else</li>
<li>OpenSSH <a href="https://anongit.mindrot.org/openssh.git/patch/?id=5b64f85bb811246c59ebab" rel="nofollow">added an additional check</a> for this type of setup that will be in 7.0, but simply changing your sshd_config is enough to mitigate the issue for now on FreeBSD (or you can <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-July/000248.html" rel="nofollow">run freebsd-update</a>)
***</li>
</ul>

<h2>Interview - Sebastian Wiedenroth - <a href="mailto:wiedi@netbsd.org" rel="nofollow">wiedi@netbsd.org</a> / <a href="https://twitter.com/wied0r" rel="nofollow">@wied0r</a></h2>

<p><a href="https://en.wikipedia.org/wiki/Pkgsrc" rel="nofollow">pkgsrc</a> and <a href="http://pkgsrc.org/pkgsrcCon/" rel="nofollow">pkgsrcCon</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://tribaal.io/this-now-served-by-openbsd.html" rel="nofollow">Now served by OpenBSD</a></h3>

<ul>
<li>We&#39;ve mentioned that you can also install OpenBSD on DO droplets, and this blog post is about someone who actually did it</li>
<li>The use case for the author was for a webserver, so he decided to try out the httpd in base</li>
<li>Configuration is ridiculously simple, and the config file in his example provides an HTTPS-only webserver, with plaintext requests automatically redirecting</li>
<li>TLS 1.2 by default, strong ciphers with LibreSSL and <a href="https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security" rel="nofollow">HSTS</a> combined give you a pretty secure web server
***</li>
</ul>

<h3><a href="https://github.com/sean-/freebsd-laptops" rel="nofollow">FreeBSD laptop playbooks</a></h3>

<ul>
<li>A new project has started up on Github for configuring FreeBSD on various laptops, unsurprisingly named &quot;freebsd-laptops&quot;</li>
<li>It&#39;s based on ansible, and uses the playbook format for automatic set up and configuration</li>
<li>Right now, it&#39;s only working on a single Lenovo laptop, but the plan is to add instructions for many more models</li>
<li>Check the Github page for instructions on how to get started, and maybe get involved if you&#39;re running FreeBSD on a laptop
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_on_the_nvidia_jetson" rel="nofollow">NetBSD on the NVIDIA Jetson TK1</a></h3>

<ul>
<li>If you&#39;ve never heard of the <a href="https://developer.nvidia.com/jetson-tk1" rel="nofollow">Jetson TK1</a>, we can go ahead and spoil the secret here: NetBSD runs on it</li>
<li>As for the specs, it has a quad-core ARMv7 CPU at 2.3GHz, 2 gigs of RAM, gigabit ethernet, SATA, HDMI and mini-PCIE</li>
<li>This blog post shows which parts of the board are working with NetBSD -current (which seems to be almost everything)</li>
<li>You can even run X11 on it, pretty sweet
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207911.html" rel="nofollow">DragonFly power mangement options</a></h3>

<ul>
<li>DragonFly developer Sepherosa, who we&#39;ve had on the show, has been doing some ACPI work over there</li>
<li>In this email, he presents some of DragonFly&#39;s different power management options: ACPI P-states, C-states, mwait C-states and some Intel-specific bits as well</li>
<li>He also did some testing with each of them and gave his findings about power saving</li>
<li>If you&#39;ve been thinking about running DragonFly on a laptop, this would be a good one to read
***</li>
</ul>

<h3><a href="https://www.quernus.co.uk/2015/07/27/openbsd-as-freebsd-router/" rel="nofollow">OpenBSD router under FreeBSD bhyve</a></h3>

<ul>
<li>If one BSD just isn&#39;t enough for you, and you&#39;ve only got one machine, why not run two at once</li>
<li>This article talks about taking a FreeBSD server running bhyve and making a virtualized OpenBSD router with it</li>
<li>If you&#39;ve been considering switching over your router at home or the office, doing it in a virtual machine is a good way to test the waters before committing to real hardware</li>
<li>The author also includes a little bit of history on how he got into both operating systems</li>
<li>There are lots of mixed opinions about virtualizing core network components, so we&#39;ll leave it up to you to do your research</li>
<li>Of course, the next logical step is to put that bhyve host under Xen on NetBSD...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2yPVV5Wyp" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s21zcz9rut" rel="nofollow">Logan writes in</a></li>
<li><a href="http://slexy.org/view/s21CRmiPwK" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s211zfIXff" rel="nofollow">Randy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>99: BSD Gnow</title>
  <link>https://www.bsdnow.tv/99</link>
  <guid isPermaLink="false">c234f2ea-9f17-4c25-bd28-db41586b32de</guid>
  <pubDate>Wed, 22 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c234f2ea-9f17-4c25-bd28-db41586b32de.mp3" length="57071380" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we'll hear about how the recent porting efforts have been since.</itunes:subtitle>
  <itunes:duration>1:19:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we'll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we'll hear about how the recent porting efforts have been since.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143725996614627&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD presents tame&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Theo de Raadt sent out an email detailing OpenBSD's new "tame" subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can't do&lt;/li&gt;
&lt;li&gt;When using tame, programs will switch to a "restricted-service operating mode," limiting them to only the things they actually need to do&lt;/li&gt;
&lt;li&gt;As for the background: "Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program 'initialization' versus 'main servicing loop.' systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops."&lt;/li&gt;
&lt;li&gt;Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking&lt;/li&gt;
&lt;li&gt;Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)&lt;/li&gt;
&lt;li&gt;Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)&lt;/li&gt;
&lt;li&gt;Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.&lt;/li&gt;
&lt;li&gt;This is an initial work-in-progress version of tame, so there may be more improvements or &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143740834710502&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;further&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143741052411159&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;control&lt;/a&gt; options added before it hits a release (very specific access policies can &lt;a href="https://forums.grsecurity.net/viewtopic.php?f=7&amp;amp;t=2522" target="_blank" rel="nofollow noopener"&gt;sometimes backfire&lt;/a&gt;, however)&lt;/li&gt;
&lt;li&gt;The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to &lt;em&gt;actually use it&lt;/em&gt;)&lt;/li&gt;
&lt;li&gt;Kernel bits are &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143727335416513&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;in the tree now&lt;/a&gt;, with userland changes starting to trickle in too&lt;/li&gt;
&lt;li&gt;Combined with a &lt;a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" target="_blank" rel="nofollow noopener"&gt;myriad of memory protections&lt;/a&gt;, tight privilege separation and (above &lt;a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" target="_blank" rel="nofollow noopener"&gt;all else&lt;/a&gt;) good coding practices, tame should further harden the OpenBSD security fortress&lt;/li&gt;
&lt;li&gt;Further &lt;a href="https://news.ycombinator.com/item?id=9928221" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; &lt;a href="https://www.reddit.com/r/programming/comments/3dsr0t" target="_blank" rel="nofollow noopener"&gt;can&lt;/a&gt; &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150719000800&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;be&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=9909429" target="_blank" rel="nofollow noopener"&gt;found&lt;/a&gt; &lt;a href="https://www.reddit.com/r/linux/comments/3ds66o" target="_blank" rel="nofollow noopener"&gt;in&lt;/a&gt; &lt;a href="https://lobste.rs/s/tbbtfs" target="_blank" rel="nofollow noopener"&gt;the&lt;/a&gt; &lt;a href="https://www.reddit.com/r/openbsd/comments/3ds64c" target="_blank" rel="nofollow noopener"&gt;usual&lt;/a&gt; &lt;a href="https://www.reddit.com/r/BSD/comments/3ds681" target="_blank" rel="nofollow noopener"&gt;places&lt;/a&gt; you'd expect
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/Docker" target="_blank" rel="nofollow noopener"&gt;Using Docker on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up&lt;/li&gt;
&lt;li&gt;This docker is "the real thing," and isn’t using a virtual machine as the backend - as such, it has some limitations&lt;/li&gt;
&lt;li&gt;The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations&lt;/li&gt;
&lt;li&gt;When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we're recording this, is where all the action is for 64bit support)&lt;/li&gt;
&lt;li&gt;For users on 10.X, there's also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)&lt;/li&gt;
&lt;li&gt;Give it a try, let us know how you find it to be compared to other solutions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/doas" target="_blank" rel="nofollow noopener"&gt;OpenBSD imports doas, removes sudo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has included the ubiquitous "sudo" utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev&lt;/li&gt;
&lt;li&gt;The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code&lt;/li&gt;
&lt;li&gt;Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)&lt;/li&gt;
&lt;li&gt;Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed "do as," with the aim of being more simple and compact&lt;/li&gt;
&lt;li&gt;There were concerns that sudo was too big and too complicated, and a quick 'n' dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?&lt;/li&gt;
&lt;li&gt;After the initial import, a number of developers began reviewing and improving various bits here and there&lt;/li&gt;
&lt;li&gt;You can &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" target="_blank" rel="nofollow noopener"&gt;check out the code&lt;/a&gt; now if you're interested&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" target="_blank" rel="nofollow noopener"&gt;Command usage&lt;/a&gt; and &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" target="_blank" rel="nofollow noopener"&gt;config syntax&lt;/a&gt; seem pretty straightforward&lt;/li&gt;
&lt;li&gt;More &lt;a href="https://news.ycombinator.com/item?id=9914693" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; on HN
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" target="_blank" rel="nofollow noopener"&gt;What would you like to see in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they'd like to see&lt;/li&gt;
&lt;li&gt;There are over &lt;strong&gt;200&lt;/strong&gt; comments that span a wide range of topics, so we'll just cover a few of the more popular requests - check the very long thread if you're interested in more&lt;/li&gt;
&lt;li&gt;The top comment says things don't "just work," citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable&lt;/li&gt;
&lt;li&gt;Another common one was that there are &lt;em&gt;three&lt;/em&gt; firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?&lt;/li&gt;
&lt;li&gt;Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well&lt;/li&gt;
&lt;li&gt;Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more&lt;/li&gt;
&lt;li&gt;At least one user suggested better "marketing" for FreeBSD, with more advocacy and (hopefully) more business adoption&lt;/li&gt;
&lt;li&gt;That one really applies to all the BSDs, and regular users (that's you listening to this) can help make it happen for whichever ones you use &lt;em&gt;right now&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Maybe Adrian can singlehandedly do all the work and make all the users happy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ryan Lortie &amp;amp; Baptiste Daroussin&lt;/h2&gt;

&lt;p&gt;Porting the latest GNOME code to FreeBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://stable.rcesoftware.com/resflash/" target="_blank" rel="nofollow noopener"&gt;Introducing resflash&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you haven't heard of resflash before, it's "a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way"&lt;/li&gt;
&lt;li&gt;One of the major benefits to images like this is the read-only filesystem, so there's no possibility of filesystem corruption if power is lost&lt;/li&gt;
&lt;li&gt;There's an optional read-write partition as well, used for any persistent changes you want to make&lt;/li&gt;
&lt;li&gt;You can check out the source code &lt;a href="https://github.com/bconway/resflash" target="_blank" rel="nofollow noopener"&gt;on Github&lt;/a&gt; or read the main site for more info
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pid1.com/posts/post10.html" target="_blank" rel="nofollow noopener"&gt;Jails with iocage&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others&lt;/li&gt;
&lt;li&gt;After looking at all the different choices, the author of this blog post eventually settled on &lt;a href="https://github.com/iocage/iocage" target="_blank" rel="nofollow noopener"&gt;iocage&lt;/a&gt; for the job&lt;/li&gt;
&lt;li&gt;The post walks you through the basic configuration and usage of iocage for creating managing jails&lt;/li&gt;
&lt;li&gt;If you've been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" target="_blank" rel="nofollow noopener"&gt;DragonFly GPU improvements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD continues to up their graphics game, this time with Intel's ValleyView series of CPUs&lt;/li&gt;
&lt;li&gt;These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones&lt;/li&gt;
&lt;li&gt;A git branch was created to hold the fixes for now while the last remaining bugs get fixed&lt;/li&gt;
&lt;li&gt;Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/branchless-development" target="_blank" rel="nofollow noopener"&gt;Branchless development&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them&lt;/li&gt;
&lt;li&gt;He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once&lt;/li&gt;
&lt;li&gt;"For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else."&lt;/li&gt;
&lt;li&gt;The solution, according to him, is bringing all the code the developers are using closer together&lt;/li&gt;
&lt;li&gt;One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21yQtBCCK" target="_blank" rel="nofollow noopener"&gt;Matthew writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21oFA80kY" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JYvTlJlm" target="_blank" rel="nofollow noopener"&gt;Anonymous writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21LXvk53z" target="_blank" rel="nofollow noopener"&gt;Bill writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, gnome, gnome shell, gnome3, puns i will regret forever, doas, sudo, resflash, flashrd, nanobsd, tame, capsicum, iocage, ezjail, docker</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we&#39;ll hear about how the recent porting efforts have been since.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">OpenBSD presents tame</a></h3>

<ul>
<li>Theo de Raadt sent out an email detailing OpenBSD&#39;s new &quot;tame&quot; subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can&#39;t do</li>
<li>When using tame, programs will switch to a &quot;restricted-service operating mode,&quot; limiting them to only the things they actually need to do</li>
<li>As for the background: &quot;Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program &#39;initialization&#39; versus &#39;main servicing loop.&#39; systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops.&quot;</li>
<li>Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking</li>
<li>Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)</li>
<li>Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)</li>
<li>Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.</li>
<li>This is an initial work-in-progress version of tame, so there may be more improvements or <a href="https://www.marc.info/?l=openbsd-tech&m=143740834710502&w=2" rel="nofollow">further</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143741052411159&w=2" rel="nofollow">control</a> options added before it hits a release (very specific access policies can <a href="https://forums.grsecurity.net/viewtopic.php?f=7&t=2522" rel="nofollow">sometimes backfire</a>, however)</li>
<li>The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to <em>actually use it</em>)</li>
<li>Kernel bits are <a href="https://www.marc.info/?l=openbsd-cvs&m=143727335416513&w=2" rel="nofollow">in the tree now</a>, with userland changes starting to trickle in too</li>
<li>Combined with a <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">myriad of memory protections</a>, tight privilege separation and (above <a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" rel="nofollow">all else</a>) good coding practices, tame should further harden the OpenBSD security fortress</li>
<li>Further <a href="https://news.ycombinator.com/item?id=9928221" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/programming/comments/3dsr0t" rel="nofollow">can</a> <a href="http://undeadly.org/cgi?action=article&sid=20150719000800&mode=flat" rel="nofollow">be</a> <a href="https://news.ycombinator.com/item?id=9909429" rel="nofollow">found</a> <a href="https://www.reddit.com/r/linux/comments/3ds66o" rel="nofollow">in</a> <a href="https://lobste.rs/s/tbbtfs" rel="nofollow">the</a> <a href="https://www.reddit.com/r/openbsd/comments/3ds64c" rel="nofollow">usual</a> <a href="https://www.reddit.com/r/BSD/comments/3ds681" rel="nofollow">places</a> you&#39;d expect
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Docker" rel="nofollow">Using Docker on FreeBSD</a></h3>

<ul>
<li>With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up</li>
<li>This docker is &quot;the real thing,&quot; and isn’t using a virtual machine as the backend - as such, it has some limitations</li>
<li>The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations</li>
<li>When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we&#39;re recording this, is where all the action is for 64bit support)</li>
<li>For users on 10.X, there&#39;s also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)</li>
<li>Give it a try, let us know how you find it to be compared to other solutions
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas" rel="nofollow">OpenBSD imports doas, removes sudo</a></h3>

<ul>
<li>OpenBSD has included the ubiquitous &quot;sudo&quot; utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev</li>
<li>The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code</li>
<li>Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)</li>
<li>Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed &quot;do as,&quot; with the aim of being more simple and compact</li>
<li>There were concerns that sudo was too big and too complicated, and a quick &#39;n&#39; dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?</li>
<li>After the initial import, a number of developers began reviewing and improving various bits here and there</li>
<li>You can <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" rel="nofollow">check out the code</a> now if you&#39;re interested</li>
<li><a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" rel="nofollow">Command usage</a> and <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" rel="nofollow">config syntax</a> seem pretty straightforward</li>
<li>More <a href="https://news.ycombinator.com/item?id=9914693" rel="nofollow">discussion</a> on HN
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" rel="nofollow">What would you like to see in FreeBSD</a></h3>

<ul>
<li>Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they&#39;d like to see</li>
<li>There are over <strong>200</strong> comments that span a wide range of topics, so we&#39;ll just cover a few of the more popular requests - check the very long thread if you&#39;re interested in more</li>
<li>The top comment says things don&#39;t &quot;just work,&quot; citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable</li>
<li>Another common one was that there are <em>three</em> firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?</li>
<li>Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well</li>
<li>Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more</li>
<li>At least one user suggested better &quot;marketing&quot; for FreeBSD, with more advocacy and (hopefully) more business adoption</li>
<li>That one really applies to all the BSDs, and regular users (that&#39;s you listening to this) can help make it happen for whichever ones you use <em>right now</em></li>
<li>Maybe Adrian can singlehandedly do all the work and make all the users happy
***</li>
</ul>

<h2>Interview - Ryan Lortie &amp; Baptiste Daroussin</h2>

<p>Porting the latest GNOME code to FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://stable.rcesoftware.com/resflash/" rel="nofollow">Introducing resflash</a></h3>

<ul>
<li>If you haven&#39;t heard of resflash before, it&#39;s &quot;a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way&quot;</li>
<li>One of the major benefits to images like this is the read-only filesystem, so there&#39;s no possibility of filesystem corruption if power is lost</li>
<li>There&#39;s an optional read-write partition as well, used for any persistent changes you want to make</li>
<li>You can check out the source code <a href="https://github.com/bconway/resflash" rel="nofollow">on Github</a> or read the main site for more info
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post10.html" rel="nofollow">Jails with iocage</a></h3>

<ul>
<li>There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others</li>
<li>After looking at all the different choices, the author of this blog post eventually settled on <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a> for the job</li>
<li>The post walks you through the basic configuration and usage of iocage for creating managing jails</li>
<li>If you&#39;ve been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" rel="nofollow">DragonFly GPU improvements</a></h3>

<ul>
<li>DragonFlyBSD continues to up their graphics game, this time with Intel&#39;s ValleyView series of CPUs</li>
<li>These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones</li>
<li>A git branch was created to hold the fixes for now while the last remaining bugs get fixed</li>
<li>Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/branchless-development" rel="nofollow">Branchless development</a></h3>

<ul>
<li>Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them</li>
<li>He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once</li>
<li>&quot;For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else.&quot;</li>
<li>The solution, according to him, is bringing all the code the developers are using closer together</li>
<li>One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21yQtBCCK" rel="nofollow">Matthew writes in</a></li>
<li><a href="http://slexy.org/view/s21oFA80kY" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2JYvTlJlm" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s21LXvk53z" rel="nofollow">Bill writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking with Ryan Lortie and Baptiste Daroussin about GNOME on BSD. Upstream development is finally treating the BSDs as a first class citizen, so we&#39;ll hear about how the recent porting efforts have been since.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143725996614627&w=2" rel="nofollow">OpenBSD presents tame</a></h3>

<ul>
<li>Theo de Raadt sent out an email detailing OpenBSD&#39;s new &quot;tame&quot; subsystem, written by Nicholas Marriott and himself, for restricting what processes can and can&#39;t do</li>
<li>When using tame, programs will switch to a &quot;restricted-service operating mode,&quot; limiting them to only the things they actually need to do</li>
<li>As for the background: &quot;Generally there are two models of operation. The first model requires a major rewrite of application software for effective use (ie. capsicum). The other model in common use lacks granularity, and allows or denies an operation throughout the entire lifetime of a process. As a result, they lack differentiation between program &#39;initialization&#39; versus &#39;main servicing loop.&#39; systrace had the same problem. My observation is that programs need a large variety of calls during initialization, but few in their main loops.&quot;</li>
<li>Some initial categories of operation include: computation, memory management, read-write operations on file descriptors, opening of files and, of course, networking</li>
<li>Restrictions can also be stacked further into the lifespan of the process, but removed abilities can never be regained (obviously)</li>
<li>Anything that tries to access resources outside of its in-place limits gets terminated with a SIGKILL or, optionally, a SIGABRT (which can produce useful core dumps for investigation)</li>
<li>Also included are 29 examples of userland programs that get additional protection with very minimal changes to the source - only 2 or 3 lines needing changed in the case of binaries like cat, ps, dmesg, etc.</li>
<li>This is an initial work-in-progress version of tame, so there may be more improvements or <a href="https://www.marc.info/?l=openbsd-tech&m=143740834710502&w=2" rel="nofollow">further</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143741052411159&w=2" rel="nofollow">control</a> options added before it hits a release (very specific access policies can <a href="https://forums.grsecurity.net/viewtopic.php?f=7&t=2522" rel="nofollow">sometimes backfire</a>, however)</li>
<li>The man page, also included in the mail, provides some specifics about how to integrate tame properly into your code (which, by design, was made very easy to do - making it simple means third party programs are more likely to <em>actually use it</em>)</li>
<li>Kernel bits are <a href="https://www.marc.info/?l=openbsd-cvs&m=143727335416513&w=2" rel="nofollow">in the tree now</a>, with userland changes starting to trickle in too</li>
<li>Combined with a <a href="http://www.bsdnow.tv/episodes/2015_05_13-exclusive_disjunction" rel="nofollow">myriad of memory protections</a>, tight privilege separation and (above <a href="https://en.wikipedia.org/wiki/OpenBSD_security_features" rel="nofollow">all else</a>) good coding practices, tame should further harden the OpenBSD security fortress</li>
<li>Further <a href="https://news.ycombinator.com/item?id=9928221" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/programming/comments/3dsr0t" rel="nofollow">can</a> <a href="http://undeadly.org/cgi?action=article&sid=20150719000800&mode=flat" rel="nofollow">be</a> <a href="https://news.ycombinator.com/item?id=9909429" rel="nofollow">found</a> <a href="https://www.reddit.com/r/linux/comments/3ds66o" rel="nofollow">in</a> <a href="https://lobste.rs/s/tbbtfs" rel="nofollow">the</a> <a href="https://www.reddit.com/r/openbsd/comments/3ds64c" rel="nofollow">usual</a> <a href="https://www.reddit.com/r/BSD/comments/3ds681" rel="nofollow">places</a> you&#39;d expect
***</li>
</ul>

<h3><a href="https://wiki.freebsd.org/Docker" rel="nofollow">Using Docker on FreeBSD</a></h3>

<ul>
<li>With the experimental Docker port landing in FreeBSD a few weeks ago, some initial docs are starting to show up</li>
<li>This docker is &quot;the real thing,&quot; and isn’t using a virtual machine as the backend - as such, it has some limitations</li>
<li>The FreeBSD wiki has a page detailing how it works in general, as well as more info about those limitations</li>
<li>When running Linux containers, it will only work as well as the Linux ABI compat layer for your version of FreeBSD (11.0, or -CURRENT when we&#39;re recording this, is where all the action is for 64bit support)</li>
<li>For users on 10.X, there&#39;s also a FreeBSD container available, which allows you to use Docker as a fancy jail manager (it uses the jail subsystem internally)</li>
<li>Give it a try, let us know how you find it to be compared to other solutions
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/doas" rel="nofollow">OpenBSD imports doas, removes sudo</a></h3>

<ul>
<li>OpenBSD has included the ubiquitous &quot;sudo&quot; utility for many years now, and the current maintainer of sudo (Todd C. Miller) is also a long-time OpenBSD dev</li>
<li>The version included in the base system was much smaller than the latest current version used elsewhere, but was based on older code</li>
<li>Some internal discussion lead to the decision that sudo should probably be moved to ports now, where it can be updated easily and offer all the extra features that were missing in base (LDAP and whatnot)</li>
<li>Ted Unangst conjured up with a rewritten utility to replace it in the base system, dubbed &quot;do as,&quot; with the aim of being more simple and compact</li>
<li>There were concerns that sudo was too big and too complicated, and a quick &#39;n&#39; dirty check reveals that doas is around 350 lines of code, while sudo is around 10,000 - which would you rather have as a setuid root binary?</li>
<li>After the initial import, a number of developers began reviewing and improving various bits here and there</li>
<li>You can <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/doas/" rel="nofollow">check out the code</a> now if you&#39;re interested</li>
<li><a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man1/doas.1" rel="nofollow">Command usage</a> and <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/doas.conf.5" rel="nofollow">config syntax</a> seem pretty straightforward</li>
<li>More <a href="https://news.ycombinator.com/item?id=9914693" rel="nofollow">discussion</a> on HN
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/3d80vt/what_would_you_like_to_see_in_freebsd/" rel="nofollow">What would you like to see in FreeBSD</a></h3>

<ul>
<li>Adrian Chadd started a reddit thread about areas in which FreeBSD could be improved, asking the community what they&#39;d like to see</li>
<li>There are over <strong>200</strong> comments that span a wide range of topics, so we&#39;ll just cover a few of the more popular requests - check the very long thread if you&#39;re interested in more</li>
<li>The top comment says things don&#39;t &quot;just work,&quot; citing failover link aggregation of LACP laggs, PPPoE issues, disorganized jail configuration options, unclear CARP configuration and userland dtrace being unstable</li>
<li>Another common one was that there are <em>three</em> firewalls in the base system, with ipfilter and pf being kinda dead now - should they be removed, and more focus put into ipfw?</li>
<li>Video drivers also came up frequently, with users hoping for better OpenGL support and support for newer graphics cards from Intel and AMD - similar comments were made about wireless chipsets as well</li>
<li>Some other replies included more clarity with pkgng output, paying more attention to security issues, updating PF to match the one in OpenBSD, improved laptop support, a graphical installer, LibreSSL in base, more focus on embedded MIPS devices, binary packages with different config options, steam support and lots more</li>
<li>At least one user suggested better &quot;marketing&quot; for FreeBSD, with more advocacy and (hopefully) more business adoption</li>
<li>That one really applies to all the BSDs, and regular users (that&#39;s you listening to this) can help make it happen for whichever ones you use <em>right now</em></li>
<li>Maybe Adrian can singlehandedly do all the work and make all the users happy
***</li>
</ul>

<h2>Interview - Ryan Lortie &amp; Baptiste Daroussin</h2>

<p>Porting the latest GNOME code to FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://stable.rcesoftware.com/resflash/" rel="nofollow">Introducing resflash</a></h3>

<ul>
<li>If you haven&#39;t heard of resflash before, it&#39;s &quot;a tool for building OpenBSD images for embedded and cloud environments in a programmatic, reproducible way&quot;</li>
<li>One of the major benefits to images like this is the read-only filesystem, so there&#39;s no possibility of filesystem corruption if power is lost</li>
<li>There&#39;s an optional read-write partition as well, used for any persistent changes you want to make</li>
<li>You can check out the source code <a href="https://github.com/bconway/resflash" rel="nofollow">on Github</a> or read the main site for more info
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post10.html" rel="nofollow">Jails with iocage</a></h3>

<ul>
<li>There are a growing number of FreeBSD jail management utilities: ezjail, cbsd, warden and a few others</li>
<li>After looking at all the different choices, the author of this blog post eventually settled on <a href="https://github.com/iocage/iocage" rel="nofollow">iocage</a> for the job</li>
<li>The post walks you through the basic configuration and usage of iocage for creating managing jails</li>
<li>If you&#39;ve been unhappy with ezjail or some of the others, iocage might be worth giving a try instead (it also has really good ZFS integration)
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-July/207892.html" rel="nofollow">DragonFly GPU improvements</a></h3>

<ul>
<li>DragonFlyBSD continues to up their graphics game, this time with Intel&#39;s ValleyView series of CPUs</li>
<li>These GPUs are primarily used in the newer Atom CPUs and offer much better performance than the older ones</li>
<li>A git branch was created to hold the fixes for now while the last remaining bugs get fixed</li>
<li>Fully-accelerated Broadwell support and an update to newer DRM code are also available in the git branch, and will be merged to the main tree after some testing
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/branchless-development" rel="nofollow">Branchless development</a></h3>

<ul>
<li>Ted Unangst has a new blog post up, talking about software branches and the effects of having (or not having) them</li>
<li>He covers integrating and merging code, and the versioning problems that can happen with multiple people contributing at once</li>
<li>&quot;For an open source project, branching is counter intuitively antisocial. For instance, I usually tell people I’m running OpenBSD, but that’s kind of a lie. I’m actually running teduBSD, which is like OpenBSD but has some changes to make it even better. Of course, you can’t have teduBSD because I’m selfish. I’m also lazy, and only inclined to make my changes work for me, not everyone else.&quot;</li>
<li>The solution, according to him, is bringing all the code the developers are using closer together</li>
<li>One big benefit is that WIP code gets tested much faster (and bugs get fixed early on)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21yQtBCCK" rel="nofollow">Matthew writes in</a></li>
<li><a href="http://slexy.org/view/s21oFA80kY" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2JYvTlJlm" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s21LXvk53z" rel="nofollow">Bill writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>98: Our Code is Your Code</title>
  <link>https://www.bsdnow.tv/98</link>
  <guid isPermaLink="false">ed9812b6-0041-42fd-804b-8cf3e5bba0fc</guid>
  <pubDate>Wed, 15 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ed9812b6-0041-42fd-804b-8cf3e5bba0fc.mp3" length="53150260" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.</itunes:subtitle>
  <itunes:duration>1:13:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://community.arm.com/groups/processors/blog/2015/07/07/enabling-freebsd-on-aarch64" target="_blank" rel="nofollow noopener"&gt;Enabling FreeBSD on AArch64&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the things the FreeBSD foundation has been dumping money into lately is ARM64 support, but we haven't heard too much about it - this article should change that&lt;/li&gt;
&lt;li&gt;Since it's on a mainstream ARM site, the article begins with a bit of FreeBSD history, leading up to the current work on ARM64&lt;/li&gt;
&lt;li&gt;There's also a summary of some of the ARM work done at this year's BSDCan, including details about running it on the Cavium ThunderX platform (which has 48 cores)&lt;/li&gt;
&lt;li&gt;As of just a couple months ago, dtrace is even working on this new architecture&lt;/li&gt;
&lt;li&gt;Come 11.0-RELEASE, the plan is for ARM64 to get the same "tier 1" treatment as X86, which would imply binary updates for base and ports - something Raspberry Pi users often complain about not having
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=8kR-tW1kyDc#t=8" target="_blank" rel="nofollow noopener"&gt;OpenBSD's tcpdump detailed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Most people are probably familiar with &lt;a href="https://en.wikipedia.org/wiki/Tcpdump" target="_blank" rel="nofollow noopener"&gt;tcpdump&lt;/a&gt;, a very useful packet sniffing and capturing utility that's included in all the main BSD base systems&lt;/li&gt;
&lt;li&gt;This video guide is specifically about the version in OpenBSD, which has gone through some major changes (it's pretty much a fork with no version number anymore)&lt;/li&gt;
&lt;li&gt;Unlike on the other platforms, OpenBSD's tcpdump will always run in a chroot as an unprivileged user - this has saved it from a number of high-profile exploits&lt;/li&gt;
&lt;li&gt;It also has support for the "pf.os" system, allowing you to filter out operating system fingerprints in the packet captures&lt;/li&gt;
&lt;li&gt;There's also PF (and pflog) integration, letting you see which line in your ruleset triggered a specific match&lt;/li&gt;
&lt;li&gt;Being able to run tcpdump directly &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;on your router&lt;/a&gt; is pretty awesome for troubleshooting
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-kamil-czekirda.html" target="_blank" rel="nofollow noopener"&gt;More FreeBSD foundation at BSDCan&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has another round of trip reports from this year's BSDCan&lt;/li&gt;
&lt;li&gt;First up is Kamil Czekirda, who gives a good summary of some of the devsummit, FreeBSD-related presentations, some tutorials, getting freebsd-update bugs fixed and of course eating cake&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-christian.html" target="_blank" rel="nofollow noopener"&gt;second post&lt;/a&gt; from Christian Brueffer, who cleverly planned ahead to avoid jetlag, details how he got some things done during the FreeBSD devsummit&lt;/li&gt;
&lt;li&gt;Their &lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-warren-block.html" target="_blank" rel="nofollow noopener"&gt;third report&lt;/a&gt; is from our buddy Warren Block, who (unsurprisingly) worked on a lot of documentation-related things, including getting more people involved with writing them&lt;/li&gt;
&lt;li&gt;In true doc team style, his report is the most well-written of the bunch, including lots of links and a clear separation of topics (doc lounge, contributing to the wiki, presentations...)&lt;/li&gt;
&lt;li&gt;Finally, the &lt;a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-shonali.html" target="_blank" rel="nofollow noopener"&gt;fourth one&lt;/a&gt; comes to us from Shonali Balakrishna, who also gives an outline of some of the talks&lt;/li&gt;
&lt;li&gt;"Not only does a BSD conference have way too many very smart people in one room, but also some of the nicest."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2015/07/08/16391.html" target="_blank" rel="nofollow noopener"&gt;DragonFly on the Chromebook C720&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got one of the Chromebook laptops and weren't happy with the included OS, DragonFlyBSD might be worth a go&lt;/li&gt;
&lt;li&gt;This article is a "mini-report" on how DragonFly functions on the device as a desktop, and &lt;/li&gt;
&lt;li&gt;While the 2GB of RAM proved to be a bit limiting, most of the hardware is well-supported&lt;/li&gt;
&lt;li&gt;DragonFly's wiki has &lt;a href="http://www.dragonflybsd.org/docs/newhandbook/ConfigChromebook/" target="_blank" rel="nofollow noopener"&gt;a full guide&lt;/a&gt; on getting set up on one of these devices as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - David Meyer - &lt;a href="mailto:info@xinuos.com" target="_blank" rel="nofollow noopener"&gt;info@xinuos.com&lt;/a&gt; / &lt;a href="https://twitter.com/xinuos" target="_blank" rel="nofollow noopener"&gt;@xinuos&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Xinuos, BSD license model vs. others, community interaction&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/sergev/LiteBSD" target="_blank" rel="nofollow noopener"&gt;Introducing LiteBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We definitely don't talk about 4.4BSD a lot on the show&lt;/li&gt;
&lt;li&gt;LiteBSD is "a variant of [the] 4.4BSD operating system adapted for microcontrollers"&lt;/li&gt;
&lt;li&gt;If you've got really, really old hardware (or are working in the embedded space) then this might be an interesting hobby project to look info
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-aslr-completion" target="_blank" rel="nofollow noopener"&gt;HardenedBSD announces ASLR completion&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;HardenedBSD, now officially &lt;a href="http://hardenedbsd.org/content/about" target="_blank" rel="nofollow noopener"&gt;a full-on fork of FreeBSD&lt;/a&gt;, has declared their ASLR patchset to be complete&lt;/li&gt;
&lt;li&gt;The latest and last addition to the work was VDSO (Virtual Dynamic Shared Object) randomization, which is now configurable with a sysctl&lt;/li&gt;
&lt;li&gt;This post gives a summary of the six main features they've added since &lt;a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" target="_blank" rel="nofollow noopener"&gt;the beginning&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Only a few small things are left to do - man page cleanups, possibly shared object load order improvements
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143636371501474&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Unlock the reaper&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In the ongoing quest to make more of OpenBSD SMP-friendly, a new patch was posted that unlocks the reaper in the kernel&lt;/li&gt;
&lt;li&gt;When there's a &lt;a href="https://en.wikipedia.org/wiki/Zombie_process" target="_blank" rel="nofollow noopener"&gt;zombie process&lt;/a&gt; causing a resource leak, it's the &lt;a href="https://en.wikipedia.org/wiki/Wait_%28system_call%29" target="_blank" rel="nofollow noopener"&gt;reaper's job&lt;/a&gt; to deallocate their resources (and yes we're still talking about computers, not horror movies)&lt;/li&gt;
&lt;li&gt;Initial testing has yielded &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143642748717836&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;positive&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143639356810690&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;results&lt;/a&gt; and &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143638955809675&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;no regressions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They're looking for testers, so you can install a -current snapshot and get it automatically&lt;/li&gt;
&lt;li&gt;An updated version of the patch is &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143643025118637&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;coming soon&lt;/a&gt; too&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openbsd.org/images/hackathons/c2k15-s.gif" target="_blank" rel="nofollow noopener"&gt;A hackathon&lt;/a&gt; is going on &lt;em&gt;right now&lt;/em&gt;, so you can expect more SMP improvements in the near future
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2015/07/the-importance-of-mentoring-or-how-i.html" target="_blank" rel="nofollow noopener"&gt;The importance of mentoring&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd has a blog post up about mentoring new users, and it tells the story of how he originally got into FreeBSD&lt;/li&gt;
&lt;li&gt;He tells the story of, at age 11, meeting someone else who knew about making crystal sets that became his role model&lt;/li&gt;
&lt;li&gt;Eventually we get to his first FreeBSD 1.1 installation (which he temporarily abandoned for Linux, since it didn't have a color "ls" command) and how he started using the OS&lt;/li&gt;
&lt;li&gt;Nowadays, there's a formal mentoring system in FreeBSD&lt;/li&gt;
&lt;li&gt;While he talks about FreeBSD in the post, a lot of the concepts apply to all the BSDs (or even just life in general)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s29LpvIxDD" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21I1MZsDl" target="_blank" rel="nofollow noopener"&gt;Herminio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20kk3ilM6" target="_blank" rel="nofollow noopener"&gt;Stuart writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2pL5xA80B" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, xinuos, business, bsd license, gpl, mit, copyright, copyleft, copyfree, bsdcan, chromebook, c720, tcpdump, arm64, aarch64, litebsd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://community.arm.com/groups/processors/blog/2015/07/07/enabling-freebsd-on-aarch64" rel="nofollow">Enabling FreeBSD on AArch64</a></h3>

<ul>
<li>One of the things the FreeBSD foundation has been dumping money into lately is ARM64 support, but we haven&#39;t heard too much about it - this article should change that</li>
<li>Since it&#39;s on a mainstream ARM site, the article begins with a bit of FreeBSD history, leading up to the current work on ARM64</li>
<li>There&#39;s also a summary of some of the ARM work done at this year&#39;s BSDCan, including details about running it on the Cavium ThunderX platform (which has 48 cores)</li>
<li>As of just a couple months ago, dtrace is even working on this new architecture</li>
<li>Come 11.0-RELEASE, the plan is for ARM64 to get the same &quot;tier 1&quot; treatment as X86, which would imply binary updates for base and ports - something Raspberry Pi users often complain about not having
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=8kR-tW1kyDc#t=8" rel="nofollow">OpenBSD&#39;s tcpdump detailed</a></h3>

<ul>
<li>Most people are probably familiar with <a href="https://en.wikipedia.org/wiki/Tcpdump" rel="nofollow">tcpdump</a>, a very useful packet sniffing and capturing utility that&#39;s included in all the main BSD base systems</li>
<li>This video guide is specifically about the version in OpenBSD, which has gone through some major changes (it&#39;s pretty much a fork with no version number anymore)</li>
<li>Unlike on the other platforms, OpenBSD&#39;s tcpdump will always run in a chroot as an unprivileged user - this has saved it from a number of high-profile exploits</li>
<li>It also has support for the &quot;pf.os&quot; system, allowing you to filter out operating system fingerprints in the packet captures</li>
<li>There&#39;s also PF (and pflog) integration, letting you see which line in your ruleset triggered a specific match</li>
<li>Being able to run tcpdump directly <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">on your router</a> is pretty awesome for troubleshooting
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-kamil-czekirda.html" rel="nofollow">More FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has another round of trip reports from this year&#39;s BSDCan</li>
<li>First up is Kamil Czekirda, who gives a good summary of some of the devsummit, FreeBSD-related presentations, some tutorials, getting freebsd-update bugs fixed and of course eating cake</li>
<li>A <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-christian.html" rel="nofollow">second post</a> from Christian Brueffer, who cleverly planned ahead to avoid jetlag, details how he got some things done during the FreeBSD devsummit</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-warren-block.html" rel="nofollow">third report</a> is from our buddy Warren Block, who (unsurprisingly) worked on a lot of documentation-related things, including getting more people involved with writing them</li>
<li>In true doc team style, his report is the most well-written of the bunch, including lots of links and a clear separation of topics (doc lounge, contributing to the wiki, presentations...)</li>
<li>Finally, the <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-shonali.html" rel="nofollow">fourth one</a> comes to us from Shonali Balakrishna, who also gives an outline of some of the talks</li>
<li>&quot;Not only does a BSD conference have way too many very smart people in one room, but also some of the nicest.&quot;
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/07/08/16391.html" rel="nofollow">DragonFly on the Chromebook C720</a></h3>

<ul>
<li>If you&#39;ve got one of the Chromebook laptops and weren&#39;t happy with the included OS, DragonFlyBSD might be worth a go</li>
<li>This article is a &quot;mini-report&quot; on how DragonFly functions on the device as a desktop, and </li>
<li>While the 2GB of RAM proved to be a bit limiting, most of the hardware is well-supported</li>
<li>DragonFly&#39;s wiki has <a href="http://www.dragonflybsd.org/docs/newhandbook/ConfigChromebook/" rel="nofollow">a full guide</a> on getting set up on one of these devices as well
***</li>
</ul>

<h2>Interview - David Meyer - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a> / <a href="https://twitter.com/xinuos" rel="nofollow">@xinuos</a></h2>

<p>Xinuos, BSD license model vs. others, community interaction</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/sergev/LiteBSD" rel="nofollow">Introducing LiteBSD</a></h3>

<ul>
<li>We definitely don&#39;t talk about 4.4BSD a lot on the show</li>
<li>LiteBSD is &quot;a variant of [the] 4.4BSD operating system adapted for microcontrollers&quot;</li>
<li>If you&#39;ve got really, really old hardware (or are working in the embedded space) then this might be an interesting hobby project to look info
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-aslr-completion" rel="nofollow">HardenedBSD announces ASLR completion</a></h3>

<ul>
<li>HardenedBSD, now officially <a href="http://hardenedbsd.org/content/about" rel="nofollow">a full-on fork of FreeBSD</a>, has declared their ASLR patchset to be complete</li>
<li>The latest and last addition to the work was VDSO (Virtual Dynamic Shared Object) randomization, which is now configurable with a sysctl</li>
<li>This post gives a summary of the six main features they&#39;ve added since <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">the beginning</a></li>
<li>Only a few small things are left to do - man page cleanups, possibly shared object load order improvements
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143636371501474&w=2" rel="nofollow">Unlock the reaper</a></h3>

<ul>
<li>In the ongoing quest to make more of OpenBSD SMP-friendly, a new patch was posted that unlocks the reaper in the kernel</li>
<li>When there&#39;s a <a href="https://en.wikipedia.org/wiki/Zombie_process" rel="nofollow">zombie process</a> causing a resource leak, it&#39;s the <a href="https://en.wikipedia.org/wiki/Wait_%28system_call%29" rel="nofollow">reaper&#39;s job</a> to deallocate their resources (and yes we&#39;re still talking about computers, not horror movies)</li>
<li>Initial testing has yielded <a href="https://www.marc.info/?l=openbsd-tech&m=143642748717836&w=2" rel="nofollow">positive</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143639356810690&w=2" rel="nofollow">results</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=143638955809675&w=2" rel="nofollow">no regressions</a></li>
<li>They&#39;re looking for testers, so you can install a -current snapshot and get it automatically</li>
<li>An updated version of the patch is <a href="https://www.marc.info/?l=openbsd-tech&m=143643025118637&w=2" rel="nofollow">coming soon</a> too</li>
<li><a href="http://www.openbsd.org/images/hackathons/c2k15-s.gif" rel="nofollow">A hackathon</a> is going on <em>right now</em>, so you can expect more SMP improvements in the near future
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2015/07/the-importance-of-mentoring-or-how-i.html" rel="nofollow">The importance of mentoring</a></h3>

<ul>
<li>Adrian Chadd has a blog post up about mentoring new users, and it tells the story of how he originally got into FreeBSD</li>
<li>He tells the story of, at age 11, meeting someone else who knew about making crystal sets that became his role model</li>
<li>Eventually we get to his first FreeBSD 1.1 installation (which he temporarily abandoned for Linux, since it didn&#39;t have a color &quot;ls&quot; command) and how he started using the OS</li>
<li>Nowadays, there&#39;s a formal mentoring system in FreeBSD</li>
<li>While he talks about FreeBSD in the post, a lot of the concepts apply to all the BSDs (or even just life in general)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29LpvIxDD" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21I1MZsDl" rel="nofollow">Herminio writes in</a></li>
<li><a href="http://slexy.org/view/s20kk3ilM6" rel="nofollow">Stuart writes in</a></li>
<li><a href="http://slexy.org/view/s2pL5xA80B" rel="nofollow">Richard writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking with the CTO of Xinuos, David Meyer, about their adoption of FreeBSD. We also discuss the BSD license model for businesses and the benefits of contributing changes back.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://community.arm.com/groups/processors/blog/2015/07/07/enabling-freebsd-on-aarch64" rel="nofollow">Enabling FreeBSD on AArch64</a></h3>

<ul>
<li>One of the things the FreeBSD foundation has been dumping money into lately is ARM64 support, but we haven&#39;t heard too much about it - this article should change that</li>
<li>Since it&#39;s on a mainstream ARM site, the article begins with a bit of FreeBSD history, leading up to the current work on ARM64</li>
<li>There&#39;s also a summary of some of the ARM work done at this year&#39;s BSDCan, including details about running it on the Cavium ThunderX platform (which has 48 cores)</li>
<li>As of just a couple months ago, dtrace is even working on this new architecture</li>
<li>Come 11.0-RELEASE, the plan is for ARM64 to get the same &quot;tier 1&quot; treatment as X86, which would imply binary updates for base and ports - something Raspberry Pi users often complain about not having
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=8kR-tW1kyDc#t=8" rel="nofollow">OpenBSD&#39;s tcpdump detailed</a></h3>

<ul>
<li>Most people are probably familiar with <a href="https://en.wikipedia.org/wiki/Tcpdump" rel="nofollow">tcpdump</a>, a very useful packet sniffing and capturing utility that&#39;s included in all the main BSD base systems</li>
<li>This video guide is specifically about the version in OpenBSD, which has gone through some major changes (it&#39;s pretty much a fork with no version number anymore)</li>
<li>Unlike on the other platforms, OpenBSD&#39;s tcpdump will always run in a chroot as an unprivileged user - this has saved it from a number of high-profile exploits</li>
<li>It also has support for the &quot;pf.os&quot; system, allowing you to filter out operating system fingerprints in the packet captures</li>
<li>There&#39;s also PF (and pflog) integration, letting you see which line in your ruleset triggered a specific match</li>
<li>Being able to run tcpdump directly <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">on your router</a> is pretty awesome for troubleshooting
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-kamil-czekirda.html" rel="nofollow">More FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has another round of trip reports from this year&#39;s BSDCan</li>
<li>First up is Kamil Czekirda, who gives a good summary of some of the devsummit, FreeBSD-related presentations, some tutorials, getting freebsd-update bugs fixed and of course eating cake</li>
<li>A <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-christian.html" rel="nofollow">second post</a> from Christian Brueffer, who cleverly planned ahead to avoid jetlag, details how he got some things done during the FreeBSD devsummit</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-warren-block.html" rel="nofollow">third report</a> is from our buddy Warren Block, who (unsurprisingly) worked on a lot of documentation-related things, including getting more people involved with writing them</li>
<li>In true doc team style, his report is the most well-written of the bunch, including lots of links and a clear separation of topics (doc lounge, contributing to the wiki, presentations...)</li>
<li>Finally, the <a href="http://freebsdfoundation.blogspot.com/2015/07/bsdcan-2015-trip-report-shonali.html" rel="nofollow">fourth one</a> comes to us from Shonali Balakrishna, who also gives an outline of some of the talks</li>
<li>&quot;Not only does a BSD conference have way too many very smart people in one room, but also some of the nicest.&quot;
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/07/08/16391.html" rel="nofollow">DragonFly on the Chromebook C720</a></h3>

<ul>
<li>If you&#39;ve got one of the Chromebook laptops and weren&#39;t happy with the included OS, DragonFlyBSD might be worth a go</li>
<li>This article is a &quot;mini-report&quot; on how DragonFly functions on the device as a desktop, and </li>
<li>While the 2GB of RAM proved to be a bit limiting, most of the hardware is well-supported</li>
<li>DragonFly&#39;s wiki has <a href="http://www.dragonflybsd.org/docs/newhandbook/ConfigChromebook/" rel="nofollow">a full guide</a> on getting set up on one of these devices as well
***</li>
</ul>

<h2>Interview - David Meyer - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a> / <a href="https://twitter.com/xinuos" rel="nofollow">@xinuos</a></h2>

<p>Xinuos, BSD license model vs. others, community interaction</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/sergev/LiteBSD" rel="nofollow">Introducing LiteBSD</a></h3>

<ul>
<li>We definitely don&#39;t talk about 4.4BSD a lot on the show</li>
<li>LiteBSD is &quot;a variant of [the] 4.4BSD operating system adapted for microcontrollers&quot;</li>
<li>If you&#39;ve got really, really old hardware (or are working in the embedded space) then this might be an interesting hobby project to look info
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-07-06/announcing-aslr-completion" rel="nofollow">HardenedBSD announces ASLR completion</a></h3>

<ul>
<li>HardenedBSD, now officially <a href="http://hardenedbsd.org/content/about" rel="nofollow">a full-on fork of FreeBSD</a>, has declared their ASLR patchset to be complete</li>
<li>The latest and last addition to the work was VDSO (Virtual Dynamic Shared Object) randomization, which is now configurable with a sysctl</li>
<li>This post gives a summary of the six main features they&#39;ve added since <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">the beginning</a></li>
<li>Only a few small things are left to do - man page cleanups, possibly shared object load order improvements
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143636371501474&w=2" rel="nofollow">Unlock the reaper</a></h3>

<ul>
<li>In the ongoing quest to make more of OpenBSD SMP-friendly, a new patch was posted that unlocks the reaper in the kernel</li>
<li>When there&#39;s a <a href="https://en.wikipedia.org/wiki/Zombie_process" rel="nofollow">zombie process</a> causing a resource leak, it&#39;s the <a href="https://en.wikipedia.org/wiki/Wait_%28system_call%29" rel="nofollow">reaper&#39;s job</a> to deallocate their resources (and yes we&#39;re still talking about computers, not horror movies)</li>
<li>Initial testing has yielded <a href="https://www.marc.info/?l=openbsd-tech&m=143642748717836&w=2" rel="nofollow">positive</a> <a href="https://www.marc.info/?l=openbsd-tech&m=143639356810690&w=2" rel="nofollow">results</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=143638955809675&w=2" rel="nofollow">no regressions</a></li>
<li>They&#39;re looking for testers, so you can install a -current snapshot and get it automatically</li>
<li>An updated version of the patch is <a href="https://www.marc.info/?l=openbsd-tech&m=143643025118637&w=2" rel="nofollow">coming soon</a> too</li>
<li><a href="http://www.openbsd.org/images/hackathons/c2k15-s.gif" rel="nofollow">A hackathon</a> is going on <em>right now</em>, so you can expect more SMP improvements in the near future
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2015/07/the-importance-of-mentoring-or-how-i.html" rel="nofollow">The importance of mentoring</a></h3>

<ul>
<li>Adrian Chadd has a blog post up about mentoring new users, and it tells the story of how he originally got into FreeBSD</li>
<li>He tells the story of, at age 11, meeting someone else who knew about making crystal sets that became his role model</li>
<li>Eventually we get to his first FreeBSD 1.1 installation (which he temporarily abandoned for Linux, since it didn&#39;t have a color &quot;ls&quot; command) and how he started using the OS</li>
<li>Nowadays, there&#39;s a formal mentoring system in FreeBSD</li>
<li>While he talks about FreeBSD in the post, a lot of the concepts apply to all the BSDs (or even just life in general)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29LpvIxDD" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21I1MZsDl" rel="nofollow">Herminio writes in</a></li>
<li><a href="http://slexy.org/view/s20kk3ilM6" rel="nofollow">Stuart writes in</a></li>
<li><a href="http://slexy.org/view/s2pL5xA80B" rel="nofollow">Richard writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>97: Big Network, SmallWall</title>
  <link>https://www.bsdnow.tv/97</link>
  <guid isPermaLink="false">8ae01f5e-8be5-4cbc-bb95-094f2d536681</guid>
  <pubDate>Wed, 08 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8ae01f5e-8be5-4cbc-bb95-094f2d536681.mp3" length="56408980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be chatting with Lee Sharp. He's recently revived the m0n0wall codebase, now known as SmallWall, and we'll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be chatting with Lee Sharp. He's recently revived the m0n0wall codebase, now known as SmallWall, and we'll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" target="_blank" rel="nofollow noopener"&gt;BSDCan and pkgsrcCon videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Even more BSDCan 2015 videos are slowly but surely making their way to the internet&lt;/li&gt;
&lt;li&gt;Nigel Williams, &lt;a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" target="_blank" rel="nofollow noopener"&gt;Multipath TCP for FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Stephen Bourne, &lt;a href="https://www.youtube.com/watch?v=2kEJoWfobpA" target="_blank" rel="nofollow noopener"&gt;Early days of Unix and design of sh&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;John Criswell, &lt;a href="https://www.youtube.com/watch?v=hRIC_aF_u24" target="_blank" rel="nofollow noopener"&gt;Protecting FreeBSD with Secure Virtual Architecture&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Shany Michaely, &lt;a href="https://www.youtube.com/watch?v=stsaeKvF3no" target="_blank" rel="nofollow noopener"&gt;Expanding RDMA capability over Ethernet in FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;John-Mark Gurney, &lt;a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" target="_blank" rel="nofollow noopener"&gt;Adding AES-ICM and AES-GCM to OpenCrypto&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Sevan Janiyan, &lt;a href="https://www.youtube.com/watch?v=-HMXyzybgdM" target="_blank" rel="nofollow noopener"&gt;Adventures in building&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" target="_blank" rel="nofollow noopener"&gt;open source software&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;And finally, &lt;a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" target="_blank" rel="nofollow noopener"&gt;the BSDCan 2015 closing&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Some &lt;a href="https://vimeo.com/channels/pkgsrccon/videos" target="_blank" rel="nofollow noopener"&gt;videos&lt;/a&gt; from this year's &lt;a href="http://pkgsrc.org/pkgsrcCon/2015/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon&lt;/a&gt; are also starting to appear online&lt;/li&gt;
&lt;li&gt;Sevan Janiyan, &lt;a href="https://vimeo.com/channels/pkgsrccon/132767946" target="_blank" rel="nofollow noopener"&gt;A year of pkgsrc 2014 - 2015&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Pierre Pronchery, &lt;a href="https://vimeo.com/channels/pkgsrccon/132766052" target="_blank" rel="nofollow noopener"&gt;pkgsrc meets pkg-ng&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jonathan Perkin, &lt;a href="https://vimeo.com/channels/pkgsrccon/132760863" target="_blank" rel="nofollow noopener"&gt;pkgsrc at Joyent&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jörg Sonnenberger, &lt;a href="https://vimeo.com/channels/pkgsrccon/132757658" target="_blank" rel="nofollow noopener"&gt;pkg_install script framework&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Benny Siegert, &lt;a href="https://vimeo.com/channels/pkgsrccon/132751897" target="_blank" rel="nofollow noopener"&gt;New Features in BulkTracker&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This is the first time we've ever seen recordings from the conference - hopefully they continue this trend
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=839.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.7 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OPNsense team has released version 15.7, almost exactly six months after &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;their initial debut&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server&lt;/li&gt;
&lt;li&gt;Taking a note from upstream PF's playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140419151959" target="_blank" rel="nofollow noopener"&gt;completely removed&lt;/a&gt; just over a year ago)&lt;/li&gt;
&lt;li&gt;The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed&lt;/li&gt;
&lt;li&gt;Various third party ports have also been bumped up to their latest versions to keep things fresh, and there's the usual round of bug fixes included&lt;/li&gt;
&lt;li&gt;Shortly afterwards, &lt;a href="https://forum.opnsense.org/index.php?topic=915.0" target="_blank" rel="nofollow noopener"&gt;15.7.1&lt;/a&gt; was released with a few more small fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference 2015 Okinawa&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you liked &lt;a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" target="_blank" rel="nofollow noopener"&gt;last week's episode&lt;/a&gt; then you'll probably know what to expect with this one&lt;/li&gt;
&lt;li&gt;The NetBSD users group of Japan hit another open source conference, this time in Okinawa&lt;/li&gt;
&lt;li&gt;This time, they had a few interesting NetBSD machines on display that we didn't get to see in the interview last week&lt;/li&gt;
&lt;li&gt;We'd love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://firstyear.id.au/entry/21" target="_blank" rel="nofollow noopener"&gt;OpenBSD BGP and VRFs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"&lt;a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" target="_blank" rel="nofollow noopener"&gt;VRFs&lt;/a&gt;, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic"&lt;/li&gt;
&lt;li&gt;This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness&lt;/li&gt;
&lt;li&gt;With multiple rdomains, it's also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them&lt;/li&gt;
&lt;li&gt;The idea of a "guest network" can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues&lt;/li&gt;
&lt;li&gt;Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" target="_blank" rel="nofollow noopener"&gt;BSDCan talk on rdomains&lt;/a&gt; expands on the subject a bit more if you haven't seen it, as well as a few &lt;a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" target="_blank" rel="nofollow noopener"&gt;related&lt;/a&gt; &lt;a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" target="_blank" rel="nofollow noopener"&gt;posts&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Lee Sharp - &lt;a href="mailto:lee@smallwall.org" target="_blank" rel="nofollow noopener"&gt;lee@smallwall.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://smallwall.org" target="_blank" rel="nofollow noopener"&gt;SmallWall&lt;/a&gt;, a continuation of m0n0wall&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" target="_blank" rel="nofollow noopener"&gt;Solaris adopts more BSD goodies&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD's PF firewall to their next version, even contributing back patches for SMP and other bug fixes&lt;/li&gt;
&lt;li&gt;They recently published an article about PF, talking about what's different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls&lt;/li&gt;
&lt;li&gt;Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a &lt;a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" target="_blank" rel="nofollow noopener"&gt;second blog post&lt;/a&gt; up about their "SunSSH" fork&lt;/li&gt;
&lt;li&gt;Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that&lt;/li&gt;
&lt;li&gt;The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two&lt;/li&gt;
&lt;li&gt;In &lt;a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" target="_blank" rel="nofollow noopener"&gt;a third blog post&lt;/a&gt;, they talk about a new system call they're borrowing from OpenBSD, &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" target="_blank" rel="nofollow noopener"&gt;getentropy(2)&lt;/a&gt;, as well as the addition of &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" target="_blank" rel="nofollow noopener"&gt;arc4random&lt;/a&gt; to their libc&lt;/li&gt;
&lt;li&gt;With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming &lt;em&gt;better than us&lt;/em&gt;?&lt;/li&gt;
&lt;li&gt;Look forward to the upcoming "Solaris Now" podcast &lt;sub&gt;(not really)&lt;/sub&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://2015.eurobsdcon.org/talks/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2015 talks and tutorials&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published&lt;/li&gt;
&lt;li&gt;The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us&lt;/li&gt;
&lt;li&gt;It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course&lt;/li&gt;
&lt;li&gt;There are also &lt;a href="https://2015.eurobsdcon.org/tutorials/" target="_blank" rel="nofollow noopener"&gt;a few tutorials&lt;/a&gt; planned for the event, some you've probably seen already and some you haven't&lt;/li&gt;
&lt;li&gt;Registration for the event will be opening very soon (likely this week or next)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" target="_blank" rel="nofollow noopener"&gt;Using ZFS replication to improve offsite backups&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you take backups seriously, you're probably using ZFS and probably keeping an offsite copy of the data&lt;/li&gt;
&lt;li&gt;This article covers doing just that, but with a focus on making use of the replication capability&lt;/li&gt;
&lt;li&gt;It'll walk you through taking a snapshot of your pool and then replicating it to another remote system, using "zfs send" and SSH - this has the benefit of only transferring the files that have changed since the last time you did it&lt;/li&gt;
&lt;li&gt;Steps are also taken to allow a regular user to take and manage snapshots, so you don't need to be root for the SSH transfer&lt;/li&gt;
&lt;li&gt;Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don't skip out on any of them&lt;/li&gt;
&lt;li&gt;One thing the author didn't mention in his post: having an &lt;strong&gt;offline&lt;/strong&gt; copy of the data, ideally sealed in a safe place, is also important
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" target="_blank" rel="nofollow noopener"&gt;Block encryption in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;covered&lt;/a&gt; ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data&lt;/li&gt;
&lt;li&gt;This blog post takes you through the process of creating encrypted &lt;em&gt;containers&lt;/em&gt; in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem&lt;/li&gt;
&lt;li&gt;It goes through creating a file that looks like random data, pointing &lt;strong&gt;vnconfig&lt;/strong&gt; at it, setting up the crypto and finally using it as a fake storage device&lt;/li&gt;
&lt;li&gt;The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=391421" target="_blank" rel="nofollow noopener"&gt;Docker hits FreeBSD ports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The inevitable has happened, and an early FreeBSD port of docker is finally here &lt;/li&gt;
&lt;li&gt;Some &lt;a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" target="_blank" rel="nofollow noopener"&gt;details and directions&lt;/a&gt; are available to read if you'd like to give it a try, as well as a list of which features work and which don't&lt;/li&gt;
&lt;li&gt;There was also some &lt;a href="https://news.ycombinator.com/item?id=9840025" target="_blank" rel="nofollow noopener"&gt;Hacker News discussion&lt;/a&gt; on the topic
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150708134520&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;Microsoft donates to OpenSSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it's Microsoft's turn&lt;/li&gt;
&lt;li&gt;With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor&lt;/li&gt;
&lt;li&gt;They've also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we're always glad to see this
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2NqbhwOoH" target="_blank" rel="nofollow noopener"&gt;Joe writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2T3NEia98" target="_blank" rel="nofollow noopener"&gt;Mike writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20RlTK6Ha" target="_blank" rel="nofollow noopener"&gt;Randy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2rjCd0bGX" target="_blank" rel="nofollow noopener"&gt;Tony writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21PfSIyG5" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, smallwall, m0n0wall, opnsense, pfsense, router, mini-itx, apu, alix, soekris, pcengines, edgerouter, lite, encryption, containers, zfs, replication, docker</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Lee Sharp. He&#39;s recently revived the m0n0wall codebase, now known as SmallWall, and we&#39;ll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" rel="nofollow">BSDCan and pkgsrcCon videos</a></h3>

<ul>
<li>Even more BSDCan 2015 videos are slowly but surely making their way to the internet</li>
<li>Nigel Williams, <a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" rel="nofollow">Multipath TCP for FreeBSD</a></li>
<li>Stephen Bourne, <a href="https://www.youtube.com/watch?v=2kEJoWfobpA" rel="nofollow">Early days of Unix and design of sh</a></li>
<li>John Criswell, <a href="https://www.youtube.com/watch?v=hRIC_aF_u24" rel="nofollow">Protecting FreeBSD with Secure Virtual Architecture</a></li>
<li>Shany Michaely, <a href="https://www.youtube.com/watch?v=stsaeKvF3no" rel="nofollow">Expanding RDMA capability over Ethernet in FreeBSD</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" rel="nofollow">Adding AES-ICM and AES-GCM to OpenCrypto</a></li>
<li>Sevan Janiyan, <a href="https://www.youtube.com/watch?v=-HMXyzybgdM" rel="nofollow">Adventures in building</a> <a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" rel="nofollow">open source software</a></li>
<li>And finally, <a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" rel="nofollow">the BSDCan 2015 closing</a></li>
<li>Some <a href="https://vimeo.com/channels/pkgsrccon/videos" rel="nofollow">videos</a> from this year&#39;s <a href="http://pkgsrc.org/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon</a> are also starting to appear online</li>
<li>Sevan Janiyan, <a href="https://vimeo.com/channels/pkgsrccon/132767946" rel="nofollow">A year of pkgsrc 2014 - 2015</a></li>
<li>Pierre Pronchery, <a href="https://vimeo.com/channels/pkgsrccon/132766052" rel="nofollow">pkgsrc meets pkg-ng</a></li>
<li>Jonathan Perkin, <a href="https://vimeo.com/channels/pkgsrccon/132760863" rel="nofollow">pkgsrc at Joyent</a></li>
<li>Jörg Sonnenberger, <a href="https://vimeo.com/channels/pkgsrccon/132757658" rel="nofollow">pkg_install script framework</a></li>
<li>Benny Siegert, <a href="https://vimeo.com/channels/pkgsrccon/132751897" rel="nofollow">New Features in BulkTracker</a></li>
<li>This is the first time we&#39;ve ever seen recordings from the conference - hopefully they continue this trend
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=839.0" rel="nofollow">OPNsense 15.7 released</a></h3>

<ul>
<li>The OPNsense team has released version 15.7, almost exactly six months after <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">their initial debut</a></li>
<li>In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server</li>
<li>Taking a note from upstream PF&#39;s playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was <a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">completely removed</a> just over a year ago)</li>
<li>The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed</li>
<li>Various third party ports have also been bumped up to their latest versions to keep things fresh, and there&#39;s the usual round of bug fixes included</li>
<li>Shortly afterwards, <a href="https://forum.opnsense.org/index.php?topic=915.0" rel="nofollow">15.7.1</a> was released with a few more small fixes
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" rel="nofollow">NetBSD at Open Source Conference 2015 Okinawa</a></h3>

<ul>
<li>If you liked <a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" rel="nofollow">last week&#39;s episode</a> then you&#39;ll probably know what to expect with this one</li>
<li>The NetBSD users group of Japan hit another open source conference, this time in Okinawa</li>
<li>This time, they had a few interesting NetBSD machines on display that we didn&#39;t get to see in the interview last week</li>
<li>We&#39;d love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***</li>
</ul>

<h3><a href="http://firstyear.id.au/entry/21" rel="nofollow">OpenBSD BGP and VRFs</a></h3>

<ul>
<li>&quot;<a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" rel="nofollow">VRFs</a>, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic&quot;</li>
<li>This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness</li>
<li>With multiple rdomains, it&#39;s also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them</li>
<li>The idea of a &quot;guest network&quot; can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues</li>
<li>Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here</li>
<li>The <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">BSDCan talk on rdomains</a> expands on the subject a bit more if you haven&#39;t seen it, as well as a few <a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" rel="nofollow">related</a> <a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" rel="nofollow">posts</a>
***</li>
</ul>

<h2>Interview - Lee Sharp - <a href="mailto:lee@smallwall.org" rel="nofollow">lee@smallwall.org</a></h2>

<p><a href="http://smallwall.org" rel="nofollow">SmallWall</a>, a continuation of m0n0wall</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" rel="nofollow">Solaris adopts more BSD goodies</a></h3>

<ul>
<li>We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD&#39;s PF firewall to their next version, even contributing back patches for SMP and other bug fixes</li>
<li>They recently published an article about PF, talking about what&#39;s different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls</li>
<li>Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a <a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" rel="nofollow">second blog post</a> up about their &quot;SunSSH&quot; fork</li>
<li>Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that</li>
<li>The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two</li>
<li>In <a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" rel="nofollow">a third blog post</a>, they talk about a new system call they&#39;re borrowing from OpenBSD, <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" rel="nofollow">getentropy(2)</a>, as well as the addition of <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" rel="nofollow">arc4random</a> to their libc</li>
<li>With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming <em>better than us</em>?</li>
<li>Look forward to the upcoming &quot;Solaris Now&quot; podcast <sub>(not really)</sub>
***</li>
</ul>

<h3><a href="https://2015.eurobsdcon.org/talks/" rel="nofollow">EuroBSDCon 2015 talks and tutorials</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published</li>
<li>The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us</li>
<li>It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course</li>
<li>There are also <a href="https://2015.eurobsdcon.org/tutorials/" rel="nofollow">a few tutorials</a> planned for the event, some you&#39;ve probably seen already and some you haven&#39;t</li>
<li>Registration for the event will be opening very soon (likely this week or next)
***</li>
</ul>

<h3><a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" rel="nofollow">Using ZFS replication to improve offsite backups</a></h3>

<ul>
<li>If you take backups seriously, you&#39;re probably using ZFS and probably keeping an offsite copy of the data</li>
<li>This article covers doing just that, but with a focus on making use of the replication capability</li>
<li>It&#39;ll walk you through taking a snapshot of your pool and then replicating it to another remote system, using &quot;zfs send&quot; and SSH - this has the benefit of only transferring the files that have changed since the last time you did it</li>
<li>Steps are also taken to allow a regular user to take and manage snapshots, so you don&#39;t need to be root for the SSH transfer</li>
<li>Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don&#39;t skip out on any of them</li>
<li>One thing the author didn&#39;t mention in his post: having an <strong>offline</strong> copy of the data, ideally sealed in a safe place, is also important
***</li>
</ul>

<h3><a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" rel="nofollow">Block encryption in OpenBSD</a></h3>

<ul>
<li>We&#39;ve <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">covered</a> ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data</li>
<li>This blog post takes you through the process of creating encrypted <em>containers</em> in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem</li>
<li>It goes through creating a file that looks like random data, pointing <strong>vnconfig</strong> at it, setting up the crypto and finally using it as a fake storage device</li>
<li>The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=391421" rel="nofollow">Docker hits FreeBSD ports</a></h3>

<ul>
<li>The inevitable has happened, and an early FreeBSD port of docker is finally here </li>
<li>Some <a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" rel="nofollow">details and directions</a> are available to read if you&#39;d like to give it a try, as well as a list of which features work and which don&#39;t</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9840025" rel="nofollow">Hacker News discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150708134520&mode=flat" rel="nofollow">Microsoft donates to OpenSSH</a></h3>

<ul>
<li>We&#39;ve talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it&#39;s Microsoft&#39;s turn</li>
<li>With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor</li>
<li>They&#39;ve also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we&#39;re always glad to see this
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NqbhwOoH" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2T3NEia98" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s20RlTK6Ha" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2rjCd0bGX" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s21PfSIyG5" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Lee Sharp. He&#39;s recently revived the m0n0wall codebase, now known as SmallWall, and we&#39;ll find out what the future holds for this new addition to the BSD family. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCAEx6zhR2sD2pAGKezasAjA/videos" rel="nofollow">BSDCan and pkgsrcCon videos</a></h3>

<ul>
<li>Even more BSDCan 2015 videos are slowly but surely making their way to the internet</li>
<li>Nigel Williams, <a href="https://www.youtube.com/watch?v=P3vB_FWtyIs" rel="nofollow">Multipath TCP for FreeBSD</a></li>
<li>Stephen Bourne, <a href="https://www.youtube.com/watch?v=2kEJoWfobpA" rel="nofollow">Early days of Unix and design of sh</a></li>
<li>John Criswell, <a href="https://www.youtube.com/watch?v=hRIC_aF_u24" rel="nofollow">Protecting FreeBSD with Secure Virtual Architecture</a></li>
<li>Shany Michaely, <a href="https://www.youtube.com/watch?v=stsaeKvF3no" rel="nofollow">Expanding RDMA capability over Ethernet in FreeBSD</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=JaufZ7yCrLU" rel="nofollow">Adding AES-ICM and AES-GCM to OpenCrypto</a></li>
<li>Sevan Janiyan, <a href="https://www.youtube.com/watch?v=-HMXyzybgdM" rel="nofollow">Adventures in building</a> <a href="https://www.youtube.com/watch?v=Xof-uKnQ6cY" rel="nofollow">open source software</a></li>
<li>And finally, <a href="https://www.youtube.com/watch?v=Ynm0bGnYdfY" rel="nofollow">the BSDCan 2015 closing</a></li>
<li>Some <a href="https://vimeo.com/channels/pkgsrccon/videos" rel="nofollow">videos</a> from this year&#39;s <a href="http://pkgsrc.org/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon</a> are also starting to appear online</li>
<li>Sevan Janiyan, <a href="https://vimeo.com/channels/pkgsrccon/132767946" rel="nofollow">A year of pkgsrc 2014 - 2015</a></li>
<li>Pierre Pronchery, <a href="https://vimeo.com/channels/pkgsrccon/132766052" rel="nofollow">pkgsrc meets pkg-ng</a></li>
<li>Jonathan Perkin, <a href="https://vimeo.com/channels/pkgsrccon/132760863" rel="nofollow">pkgsrc at Joyent</a></li>
<li>Jörg Sonnenberger, <a href="https://vimeo.com/channels/pkgsrccon/132757658" rel="nofollow">pkg_install script framework</a></li>
<li>Benny Siegert, <a href="https://vimeo.com/channels/pkgsrccon/132751897" rel="nofollow">New Features in BulkTracker</a></li>
<li>This is the first time we&#39;ve ever seen recordings from the conference - hopefully they continue this trend
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=839.0" rel="nofollow">OPNsense 15.7 released</a></h3>

<ul>
<li>The OPNsense team has released version 15.7, almost exactly six months after <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">their initial debut</a></li>
<li>In addition to pulling in the latest security fixes from upstream FreeBSD, 15.7 also includes new integration of an intrusion detection system (and new GUI for it) as well as new blacklisting options for the proxy server</li>
<li>Taking a note from upstream PF&#39;s playbook, ALTQ traffic shaping support has finally been retired as of this release (it was deprecated from OpenBSD a few years ago, and the code was <a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">completely removed</a> just over a year ago)</li>
<li>The LibreSSL flavor has been promoted to production-ready, and users can easily migrate over from OpenSSL via the GUI - switching between the two is simple; no commitment needed</li>
<li>Various third party ports have also been bumped up to their latest versions to keep things fresh, and there&#39;s the usual round of bug fixes included</li>
<li>Shortly afterwards, <a href="https://forum.opnsense.org/index.php?topic=915.0" rel="nofollow">15.7.1</a> was released with a few more small fixes
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/07/04/msg000688.html" rel="nofollow">NetBSD at Open Source Conference 2015 Okinawa</a></h3>

<ul>
<li>If you liked <a href="http://www.bsdnow.tv/episodes/2015_07_01-lost_technology" rel="nofollow">last week&#39;s episode</a> then you&#39;ll probably know what to expect with this one</li>
<li>The NetBSD users group of Japan hit another open source conference, this time in Okinawa</li>
<li>This time, they had a few interesting NetBSD machines on display that we didn&#39;t get to see in the interview last week</li>
<li>We&#39;d love to see something like this in North America or Europe too - anyone up for installing BSD on some interesting devices and showing them off at a Linux con?
***</li>
</ul>

<h3><a href="http://firstyear.id.au/entry/21" rel="nofollow">OpenBSD BGP and VRFs</a></h3>

<ul>
<li>&quot;<a href="https://en.wikipedia.org/wiki/Virtual_routing_and_forwarding" rel="nofollow">VRFs</a>, or in OpenBSD rdomains, are a simple, yet powerful (and sometimes confusing) topic&quot;</li>
<li>This article aims to explain both BGP and rdomains, using network diagrams, for some network isolation goodness</li>
<li>With multiple rdomains, it&#39;s also possible to have two upstream internet connections, but lock different groups of your internal network to just one of them</li>
<li>The idea of a &quot;guest network&quot; can greatly benefit from this separation as well, even allowing for the same IP ranges to be used without issues</li>
<li>Combining rdomains with the BGP protocol allows for some very selective and precise blocking/passing of traffic between networks, which is also covered in detail here</li>
<li>The <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">BSDCan talk on rdomains</a> expands on the subject a bit more if you haven&#39;t seen it, as well as a few <a href="https://www.packetmischief.ca/2011/09/20/virtualizing-the-openbsd-routing-table/" rel="nofollow">related</a> <a href="http://cybermashup.com/2013/05/21/complex-routing-with-openbsd/" rel="nofollow">posts</a>
***</li>
</ul>

<h2>Interview - Lee Sharp - <a href="mailto:lee@smallwall.org" rel="nofollow">lee@smallwall.org</a></h2>

<p><a href="http://smallwall.org" rel="nofollow">SmallWall</a>, a continuation of m0n0wall</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blogs.oracle.com/solarisfw/entry/pf_for_solaris" rel="nofollow">Solaris adopts more BSD goodies</a></h3>

<ul>
<li>We mentioned a while back that Oracle developers have begun porting a current version of OpenBSD&#39;s PF firewall to their next version, even contributing back patches for SMP and other bug fixes</li>
<li>They recently published an article about PF, talking about what&#39;s different about it on their platform compared to others - not especially useful for BSD users, but interesting to read if you like firewalls</li>
<li>Darren Moffat, who was part of originally getting an SSH implementation into Solaris, has a <a href="https://blogs.oracle.com/darren/entry/openssh_in_solaris_11_3" rel="nofollow">second blog post</a> up about their &quot;SunSSH&quot; fork</li>
<li>Going forward, their next version is going to offer a completely vanilla OpenSSH option as well, with the plan being to phase out SunSSH after that</li>
<li>The article talks a bit about the history of getting SSH into the OS, forking the code and also lists some of the differences between the two</li>
<li>In <a href="https://blogs.oracle.com/darren/entry/solaris_new_system_calls_getentropy" rel="nofollow">a third blog post</a>, they talk about a new system call they&#39;re borrowing from OpenBSD, <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man2/getentropy.2" rel="nofollow">getentropy(2)</a>, as well as the addition of <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man3/arc4random.3" rel="nofollow">arc4random</a> to their libc</li>
<li>With an up-to-date and SMP-capable PF, ZFS with native encryption, jail-like Zones, unaltered OpenSSH and secure entropy calls… is Solaris becoming <em>better than us</em>?</li>
<li>Look forward to the upcoming &quot;Solaris Now&quot; podcast <sub>(not really)</sub>
***</li>
</ul>

<h3><a href="https://2015.eurobsdcon.org/talks/" rel="nofollow">EuroBSDCon 2015 talks and tutorials</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon is set to be held in Sweden at the beginning of October, and the preliminary list of accepted presentations has been published</li>
<li>The list looks pretty well-balanced between the different BSDs, something Paul would be happy to see if he was still with us</li>
<li>It even includes an interesting DragonFly talk and a couple talks from NetBSD developers, in addition to plenty of FreeBSD and OpenBSD of course</li>
<li>There are also <a href="https://2015.eurobsdcon.org/tutorials/" rel="nofollow">a few tutorials</a> planned for the event, some you&#39;ve probably seen already and some you haven&#39;t</li>
<li>Registration for the event will be opening very soon (likely this week or next)
***</li>
</ul>

<h3><a href="https://www.iceflatline.com/2015/07/using-zfs-replication-features-in-freebsd-to-improve-my-offsite-backups/" rel="nofollow">Using ZFS replication to improve offsite backups</a></h3>

<ul>
<li>If you take backups seriously, you&#39;re probably using ZFS and probably keeping an offsite copy of the data</li>
<li>This article covers doing just that, but with a focus on making use of the replication capability</li>
<li>It&#39;ll walk you through taking a snapshot of your pool and then replicating it to another remote system, using &quot;zfs send&quot; and SSH - this has the benefit of only transferring the files that have changed since the last time you did it</li>
<li>Steps are also taken to allow a regular user to take and manage snapshots, so you don&#39;t need to be root for the SSH transfer</li>
<li>Data integrity is a long process - filesystem-level checksums, resistance to hardware failure, ECC memory, multiple copies in different locations... they all play a role in keeping your files secure; don&#39;t skip out on any of them</li>
<li>One thing the author didn&#39;t mention in his post: having an <strong>offline</strong> copy of the data, ideally sealed in a safe place, is also important
***</li>
</ul>

<h3><a href="http://anadoxin.org/blog/blog/20150705/block-encryption-in-openbsd/" rel="nofollow">Block encryption in OpenBSD</a></h3>

<ul>
<li>We&#39;ve <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">covered</a> ways to do fully-encrypted installations of OpenBSD (and FreeBSD) before, but that requires dedicating a whole drive or partition to the sensitive data</li>
<li>This blog post takes you through the process of creating encrypted <em>containers</em> in OpenBSD, à la TrueCrypt - that is, a file-backed virtual device with an encrypted filesystem</li>
<li>It goes through creating a file that looks like random data, pointing <strong>vnconfig</strong> at it, setting up the crypto and finally using it as a fake storage device</li>
<li>The encrypted container method offers the advantage of being a bit more portable across installations than other ways
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=391421" rel="nofollow">Docker hits FreeBSD ports</a></h3>

<ul>
<li>The inevitable has happened, and an early FreeBSD port of docker is finally here </li>
<li>Some <a href="https://github.com/kvasdopil/docker/blob/freebsd-compat/FREEBSD-PORTING.md" rel="nofollow">details and directions</a> are available to read if you&#39;d like to give it a try, as well as a list of which features work and which don&#39;t</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9840025" rel="nofollow">Hacker News discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150708134520&mode=flat" rel="nofollow">Microsoft donates to OpenSSH</a></h3>

<ul>
<li>We&#39;ve talked about big businesses using BSD and contributing back before, even mentioning a few other large public donations - now it&#39;s Microsoft&#39;s turn</li>
<li>With their recent decision to integrate OpenSSH into an upcoming Windows release, Microsoft has donated a large sum of money to the OpenBSD foundation, making them a gold-level sponsor</li>
<li>They&#39;ve also posted some contract work offers on the OpenSSH mailing list, and say that their changes will be upstreamed if appropriate - we&#39;re always glad to see this
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NqbhwOoH" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2T3NEia98" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s20RlTK6Ha" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2rjCd0bGX" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s21PfSIyG5" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>96: Lost Technology</title>
  <link>https://www.bsdnow.tv/96</link>
  <guid isPermaLink="false">a1813e16-466a-4617-9bb0-24dbdc1cb5f2</guid>
  <pubDate>Wed, 01 Jul 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a1813e16-466a-4617-9bb0-24dbdc1cb5f2.mp3" length="52701844" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He'll tell us what makes these old (and often forgotten) machines so interesting. As usual, we've also got answers to your emails and all this week's news on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He'll tell us what makes these old (and often forgotten) machines so interesting. As usual, we've also got answers to your emails and all this week's news on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" target="_blank" rel="nofollow noopener"&gt;Out with the old, in with the less&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend Ted Unangst has a new article up, talking about "various OpenBSD replacements and reductions"&lt;/li&gt;
&lt;li&gt;"Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs."&lt;/li&gt;
&lt;li&gt;In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure&lt;/li&gt;
&lt;li&gt;It starts off with a lesser-known SCSI driver that "tried to do too much" being replaced with three separate drivers&lt;/li&gt;
&lt;li&gt;"Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver."&lt;/li&gt;
&lt;li&gt;In contrast to that example, he goes on to cite mandoc as taking a very non "unixy" direction, but at the same time being smaller and simpler than all the tools it replaced&lt;/li&gt;
&lt;li&gt;The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)&lt;/li&gt;
&lt;li&gt;He also talks about the rewritten "file" utility: "Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it."&lt;/li&gt;
&lt;li&gt;Finally, sudo in OpenBSD's base system is moving to ports soon, and the article briefly describes a new tool that &lt;a href="https://marc.info/?l=openbsd-ports&amp;amp;m=143481227122523&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;may or may not replace it&lt;/a&gt;, called "doas"&lt;/li&gt;
&lt;li&gt;There's also a nice wrap-up of all the examples at the end, and the "&lt;a href="http://www.openbsd.org/papers/pruning.html" target="_blank" rel="nofollow noopener"&gt;Pruning and Polishing&lt;/a&gt;" talk is good complementary reading material
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos" target="_blank" rel="nofollow noopener"&gt;More OpenZFS and BSDCan videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned &lt;a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" target="_blank" rel="nofollow noopener"&gt;last week&lt;/a&gt; that some of the videos from the second OpenZFS conference in Europe were being uploaded - here's some more&lt;/li&gt;
&lt;li&gt;Matt Ahrens did &lt;a href="https://www.youtube.com/watch?v=I6fXZ_6OT5c" target="_blank" rel="nofollow noopener"&gt;a Q&amp;amp;A session&lt;/a&gt; and talked about ZFS &lt;a href="https://www.youtube.com/watch?v=iY44jPMvxog" target="_blank" rel="nofollow noopener"&gt;send and receive&lt;/a&gt;, as well as giving an &lt;a href="https://www.youtube.com/watch?v=RQlMDmnty80" target="_blank" rel="nofollow noopener"&gt;overview of OpenZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;George Wilson talked about a &lt;a href="https://www.youtube.com/watch?v=KBI6rRGUv4E" target="_blank" rel="nofollow noopener"&gt;performance retrospective&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=sSi47-k78IM" target="_blank" rel="nofollow noopener"&gt;Toshiba&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=Hhje5KEF5cE" target="_blank" rel="nofollow noopener"&gt;Syneto&lt;/a&gt; and &lt;a href="https://www.youtube.com/watch?v=aKgxXipss8k" target="_blank" rel="nofollow noopener"&gt;HGST&lt;/a&gt; also gave some talks about their companies and how they're using ZFS&lt;/li&gt;
&lt;li&gt;As for BSDCan, more of their BSD presentations have been uploaded too...&lt;/li&gt;
&lt;li&gt;Ryan Stone, &lt;a href="https://www.youtube.com/watch?v=INeMd-i5jzM" target="_blank" rel="nofollow noopener"&gt;PCI SR-IOV on FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;George Neville-Neil, &lt;a href="https://www.youtube.com/watch?v=LE4wMsP7zeA" target="_blank" rel="nofollow noopener"&gt;Measure Twice, Code Once&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Kris Moore, &lt;a href="https://www.youtube.com/watch?v=qNYXqpJiFN0" target="_blank" rel="nofollow noopener"&gt;Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Warner Losh, &lt;a href="https://www.youtube.com/watch?v=3WqOLolj5EU" target="_blank" rel="nofollow noopener"&gt;I/O Scheduling in CAM&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Kirk McKusick, &lt;a href="https://www.youtube.com/watch?v=l-RCLgLxuSc" target="_blank" rel="nofollow noopener"&gt;An Introduction to the Implementation of ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Midori Kato, &lt;a href="https://www.youtube.com/watch?v=zZXvjhWcg_4" target="_blank" rel="nofollow noopener"&gt;Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Baptiste Daroussin, &lt;a href="https://www.youtube.com/watch?v=Br6izhH5P1I" target="_blank" rel="nofollow noopener"&gt;Packaging FreeBSD's&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=v7px6ktoDAI" target="_blank" rel="nofollow noopener"&gt;base system&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matt Ahrens, &lt;a href="https://www.youtube.com/watch?v=UOX7WDAjqso" target="_blank" rel="nofollow noopener"&gt;New OpenZFS features supporting remote replication&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ed Schouten, &lt;a href="https://www.youtube.com/watch?v=SVdF84x1EdA" target="_blank" rel="nofollow noopener"&gt;CloudABI Cloud computing meets fine-grained capabilities&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The audio of Ingo Schwarze's talk "mandoc: becoming the main BSD manual toolbox" got messed up, but there's an alternate recording &lt;a href="http://www.bsdcan.org/2015/audio/mandoc.mp3" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;, and the slides are &lt;a href="http://www.openbsd.org/papers/bsdcan15-mandoc.pdf" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143526329006942&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;SMP steroids for PF&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;An Oracle employee that's been porting OpenBSD's PF to an upcoming Solaris release has sent in an interesting patch for review&lt;/li&gt;
&lt;li&gt;Attached to the mail was what may be the beginnings of making native PF SMP-aware&lt;/li&gt;
&lt;li&gt;Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143532243322281&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;initial response&lt;/a&gt; has been quite positive though, with some &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143532963824548&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;back and forth&lt;/a&gt; between developers and the submitter&lt;/li&gt;
&lt;li&gt;For now, let's be patient and see what happens
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/release42/" target="_blank" rel="nofollow noopener"&gt;DragonFly 4.2.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes&lt;/li&gt;
&lt;li&gt;i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release&lt;/li&gt;
&lt;li&gt;Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there's &lt;a href="http://www.dragonflybsd.com/docs/docs/newhandbook/mta/" target="_blank" rel="nofollow noopener"&gt;a wiki page&lt;/a&gt; about configuring it&lt;/li&gt;
&lt;li&gt;They've also switched the default compiler to GCC 5, though why they've gone in that direction instead of embracing Clang is a mystery&lt;/li&gt;
&lt;li&gt;The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools&lt;/li&gt;
&lt;li&gt;Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement&lt;/li&gt;
&lt;li&gt;There was also some &lt;a href="https://news.ycombinator.com/item?id=9797932" target="_blank" rel="nofollow noopener"&gt;hacker news discussion&lt;/a&gt; you can check out, as well as &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html" target="_blank" rel="nofollow noopener"&gt;upgrade instructions&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://opensmtpd.org/announces/release-5.7.1.txt" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD 5.7.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently&lt;/li&gt;
&lt;li&gt;Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default&lt;/li&gt;
&lt;li&gt;The long-awaited filter API is now enabled by default, though still considered slightly experimental&lt;/li&gt;
&lt;li&gt;Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)&lt;/li&gt;
&lt;li&gt;Many more small additions and bugfixes were made, so check the changelog for the full list&lt;/li&gt;
&lt;li&gt;Starting with 5.7.1, releases are now &lt;a href="https://twitter.com/OpenSMTPD/status/613257722574839808" target="_blank" rel="nofollow noopener"&gt;cryptographically&lt;/a&gt; &lt;a href="https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig" target="_blank" rel="nofollow noopener"&gt;signed&lt;/a&gt; to ensure integrity&lt;/li&gt;
&lt;li&gt;This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to &lt;a href="https://twitter.com/OpenSMTPD/status/608399272447471616" target="_blank" rel="nofollow noopener"&gt;flood a test server&lt;/a&gt; with thousands of emails per second, even &lt;a href="https://twitter.com/OpenSMTPD/status/608235180839567360" target="_blank" rel="nofollow noopener"&gt;offering prizes&lt;/a&gt; to whoever can DDoS them the hardest&lt;/li&gt;
&lt;li&gt;OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately&lt;/li&gt;
&lt;li&gt;Let's all &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;encourage&lt;/a&gt; Kris to stop procrastinating on switching from Postfix
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jun Ebihara (蛯原純) - &lt;a href="mailto:jun@netbsd.org" target="_blank" rel="nofollow noopener"&gt;jun@netbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/ebijun" target="_blank" rel="nofollow noopener"&gt;@ebijun&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Lesser-known CPU architectures, embedded NetBSD devices&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation at BSDCan&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has posted a few BSDCan summaries on their blog&lt;/li&gt;
&lt;li&gt;The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: "Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people."&lt;/li&gt;
&lt;li&gt;He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily&lt;/li&gt;
&lt;li&gt;Their &lt;a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html" target="_blank" rel="nofollow noopener"&gt;second&lt;/a&gt; trip report is from Ahmed Kamal, who flew in all the way from Egypt&lt;/li&gt;
&lt;li&gt;A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum's about MINIX and NetBSD&lt;/li&gt;
&lt;li&gt;There are also two more wrap-ups from &lt;a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html" target="_blank" rel="nofollow noopener"&gt;Zbigniew Bodek&lt;/a&gt; and &lt;a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html" target="_blank" rel="nofollow noopener"&gt;Vsevolod Stakhov&lt;/a&gt;, so you've got plenty to read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD from a veteran Linux user perspective&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time&lt;/li&gt;
&lt;li&gt;"For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an 'old-school' Linux admin, and I've felt out of place with the latest changes on the system administration."&lt;/li&gt;
&lt;li&gt;The post is a collection of his thoughts about what's different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags&lt;/li&gt;
&lt;li&gt;One of the things that surprised him (in a positive way) was the documentation: "OpenBSD's man pages are so nice that RTFMing somebody on the internet is not condescending but selfless."&lt;/li&gt;
&lt;li&gt;He also goes through some of the basics, installing and updating software, following different branches&lt;/li&gt;
&lt;li&gt;It concludes with "If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD on the desktop, am I crazy&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop&lt;/li&gt;
&lt;li&gt;He begins with a bit of forewarning for potential Linux switchers: "It certainly wasn't an easy journey, and I'm tempted to say do not try this at home to anybody who isn't going to leverage any of FreeBSD's strong points. Definitely don't try FreeBSD on the desktop if you haven't used it on servers or virtual machines before. It's got less in common with Linux than you might think."&lt;/li&gt;
&lt;li&gt;With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd&lt;/li&gt;
&lt;li&gt;The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash&lt;/li&gt;
&lt;li&gt;Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well&lt;/li&gt;
&lt;li&gt;In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/" target="_blank" rel="nofollow noopener"&gt;OpenIKED and Cisco CSR 1000v IPSEC&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED&lt;/li&gt;
&lt;li&gt;What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud&lt;/li&gt;
&lt;li&gt;There are lots of details (and example configuration files) for using IKEv2 and OpenBSD's built-in IKE daemon&lt;/li&gt;
&lt;li&gt;It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that's afraid to try them… don't be
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8" target="_blank" rel="nofollow noopener"&gt;HardenedBSD improves stack randomization&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area&lt;/li&gt;
&lt;li&gt;In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well&lt;/li&gt;
&lt;li&gt;They're now stacking the new on top of the old as well, with the goal being even more entropy&lt;/li&gt;
&lt;li&gt;This change triggered an ABI and API incompatibility, so their major version has been bumped
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.9 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes&lt;/li&gt;
&lt;li&gt;There are a couple new things though - the "AuthorizedKeysCommand" config option now takes custom arguments&lt;/li&gt;
&lt;li&gt;One very notable change is that &lt;strong&gt;the default cipher has changed&lt;/strong&gt; as of this release&lt;/li&gt;
&lt;li&gt;The traditional pairing of AES128 in counter mode with MD5 HMAC has been &lt;em&gt;replaced&lt;/em&gt; by the ever-trendy ChaCha20-Poly1305 combo&lt;/li&gt;
&lt;li&gt;Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to "no" by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they're under 1024 bits&lt;/li&gt;
&lt;li&gt;Many small bugs fixes and improvements were also made, so check the announcement for everything else&lt;/li&gt;
&lt;li&gt;The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Ws6Y2rZy" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21GvZ5xbs" target="_blank" rel="nofollow noopener"&gt;Mason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s209TrPK4e" target="_blank" rel="nofollow noopener"&gt;Jochen writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21TQjUjxv" target="_blank" rel="nofollow noopener"&gt;Simon writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, osc, embedded, japanese, users group, pf, smp, multithreading, file, solaris, httpd, leap second, openzfs, zfs, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He&#39;ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we&#39;ve also got answers to your emails and all this week&#39;s news on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">Out with the old, in with the less</a></h3>

<ul>
<li>Our friend Ted Unangst has a new article up, talking about &quot;various OpenBSD replacements and reductions&quot;</li>
<li>&quot;Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs.&quot;</li>
<li>In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure</li>
<li>It starts off with a lesser-known SCSI driver that &quot;tried to do too much&quot; being replaced with three separate drivers</li>
<li>&quot;Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver.&quot;</li>
<li>In contrast to that example, he goes on to cite mandoc as taking a very non &quot;unixy&quot; direction, but at the same time being smaller and simpler than all the tools it replaced</li>
<li>The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)</li>
<li>He also talks about the rewritten &quot;file&quot; utility: &quot;Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it.&quot;</li>
<li>Finally, sudo in OpenBSD&#39;s base system is moving to ports soon, and the article briefly describes a new tool that <a href="https://marc.info/?l=openbsd-ports&m=143481227122523&w=2" rel="nofollow">may or may not replace it</a>, called &quot;doas&quot;</li>
<li>There&#39;s also a nice wrap-up of all the examples at the end, and the &quot;<a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">Pruning and Polishing</a>&quot; talk is good complementary reading material
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos" rel="nofollow">More OpenZFS and BSDCan videos</a></h3>

<ul>
<li>We mentioned <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">last week</a> that some of the videos from the second OpenZFS conference in Europe were being uploaded - here&#39;s some more</li>
<li>Matt Ahrens did <a href="https://www.youtube.com/watch?v=I6fXZ_6OT5c" rel="nofollow">a Q&amp;A session</a> and talked about ZFS <a href="https://www.youtube.com/watch?v=iY44jPMvxog" rel="nofollow">send and receive</a>, as well as giving an <a href="https://www.youtube.com/watch?v=RQlMDmnty80" rel="nofollow">overview of OpenZFS</a></li>
<li>George Wilson talked about a <a href="https://www.youtube.com/watch?v=KBI6rRGUv4E" rel="nofollow">performance retrospective</a></li>
<li><a href="https://www.youtube.com/watch?v=sSi47-k78IM" rel="nofollow">Toshiba</a>, <a href="https://www.youtube.com/watch?v=Hhje5KEF5cE" rel="nofollow">Syneto</a> and <a href="https://www.youtube.com/watch?v=aKgxXipss8k" rel="nofollow">HGST</a> also gave some talks about their companies and how they&#39;re using ZFS</li>
<li>As for BSDCan, more of their BSD presentations have been uploaded too...</li>
<li>Ryan Stone, <a href="https://www.youtube.com/watch?v=INeMd-i5jzM" rel="nofollow">PCI SR-IOV on FreeBSD</a></li>
<li>George Neville-Neil, <a href="https://www.youtube.com/watch?v=LE4wMsP7zeA" rel="nofollow">Measure Twice, Code Once</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=qNYXqpJiFN0" rel="nofollow">Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=3WqOLolj5EU" rel="nofollow">I/O Scheduling in CAM</a></li>
<li>Kirk McKusick, <a href="https://www.youtube.com/watch?v=l-RCLgLxuSc" rel="nofollow">An Introduction to the Implementation of ZFS</a></li>
<li>Midori Kato, <a href="https://www.youtube.com/watch?v=zZXvjhWcg_4" rel="nofollow">Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support</a></li>
<li>Baptiste Daroussin, <a href="https://www.youtube.com/watch?v=Br6izhH5P1I" rel="nofollow">Packaging FreeBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=v7px6ktoDAI" rel="nofollow">base system</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=UOX7WDAjqso" rel="nofollow">New OpenZFS features supporting remote replication</a></li>
<li>Ed Schouten, <a href="https://www.youtube.com/watch?v=SVdF84x1EdA" rel="nofollow">CloudABI Cloud computing meets fine-grained capabilities</a></li>
<li>The audio of Ingo Schwarze&#39;s talk &quot;mandoc: becoming the main BSD manual toolbox&quot; got messed up, but there&#39;s an alternate recording <a href="http://www.bsdcan.org/2015/audio/mandoc.mp3" rel="nofollow">here</a>, and the slides are <a href="http://www.openbsd.org/papers/bsdcan15-mandoc.pdf" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143526329006942&w=2" rel="nofollow">SMP steroids for PF</a></h3>

<ul>
<li>An Oracle employee that&#39;s been porting OpenBSD&#39;s PF to an upcoming Solaris release has sent in an interesting patch for review</li>
<li>Attached to the mail was what may be the beginnings of making native PF SMP-aware</li>
<li>Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle</li>
<li>The <a href="https://www.marc.info/?l=openbsd-tech&m=143532243322281&w=2" rel="nofollow">initial response</a> has been quite positive though, with some <a href="https://www.marc.info/?l=openbsd-tech&m=143532963824548&w=2" rel="nofollow">back and forth</a> between developers and the submitter</li>
<li>For now, let&#39;s be patient and see what happens
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release42/" rel="nofollow">DragonFly 4.2.0 released</a></h3>

<ul>
<li>DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes</li>
<li>i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release</li>
<li>Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there&#39;s <a href="http://www.dragonflybsd.com/docs/docs/newhandbook/mta/" rel="nofollow">a wiki page</a> about configuring it</li>
<li>They&#39;ve also switched the default compiler to GCC 5, though why they&#39;ve gone in that direction instead of embracing Clang is a mystery</li>
<li>The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools</li>
<li>Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9797932" rel="nofollow">hacker news discussion</a> you can check out, as well as <a href="http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html" rel="nofollow">upgrade instructions</a>
***</li>
</ul>

<h3><a href="https://opensmtpd.org/announces/release-5.7.1.txt" rel="nofollow">OpenSMTPD 5.7.1 released</a></h3>

<ul>
<li>The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently</li>
<li>Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default</li>
<li>The long-awaited filter API is now enabled by default, though still considered slightly experimental</li>
<li>Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)</li>
<li>Many more small additions and bugfixes were made, so check the changelog for the full list</li>
<li>Starting with 5.7.1, releases are now <a href="https://twitter.com/OpenSMTPD/status/613257722574839808" rel="nofollow">cryptographically</a> <a href="https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig" rel="nofollow">signed</a> to ensure integrity</li>
<li>This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to <a href="https://twitter.com/OpenSMTPD/status/608399272447471616" rel="nofollow">flood a test server</a> with thousands of emails per second, even <a href="https://twitter.com/OpenSMTPD/status/608235180839567360" rel="nofollow">offering prizes</a> to whoever can DDoS them the hardest</li>
<li>OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately</li>
<li>Let&#39;s all <a href="mailto:feedback@bsdnow.tv" rel="nofollow">encourage</a> Kris to stop procrastinating on switching from Postfix
***</li>
</ul>

<h2>Interview - Jun Ebihara (蛯原純) - <a href="mailto:jun@netbsd.org" rel="nofollow">jun@netbsd.org</a> / <a href="https://twitter.com/ebijun" rel="nofollow">@ebijun</a></h2>

<p>Lesser-known CPU architectures, embedded NetBSD devices</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html" rel="nofollow">FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has posted a few BSDCan summaries on their blog</li>
<li>The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: &quot;Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people.&quot;</li>
<li>He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html" rel="nofollow">second</a> trip report is from Ahmed Kamal, who flew in all the way from Egypt</li>
<li>A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum&#39;s about MINIX and NetBSD</li>
<li>There are also two more wrap-ups from <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html" rel="nofollow">Zbigniew Bodek</a> and <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html" rel="nofollow">Vsevolod Stakhov</a>, so you&#39;ve got plenty to read
***</li>
</ul>

<h3><a href="http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html" rel="nofollow">OpenBSD from a veteran Linux user perspective</a></h3>

<ul>
<li>In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time</li>
<li>&quot;For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an &#39;old-school&#39; Linux admin, and I&#39;ve felt out of place with the latest changes on the system administration.&quot;</li>
<li>The post is a collection of his thoughts about what&#39;s different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags</li>
<li>One of the things that surprised him (in a positive way) was the documentation: &quot;OpenBSD&#39;s man pages are so nice that RTFMing somebody on the internet is not condescending but selfless.&quot;</li>
<li>He also goes through some of the basics, installing and updating software, following different branches</li>
<li>It concludes with &quot;If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern.&quot;
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html" rel="nofollow">FreeBSD on the desktop, am I crazy</a></h3>

<ul>
<li>Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop</li>
<li>He begins with a bit of forewarning for potential Linux switchers: &quot;It certainly wasn&#39;t an easy journey, and I&#39;m tempted to say do not try this at home to anybody who isn&#39;t going to leverage any of FreeBSD&#39;s strong points. Definitely don&#39;t try FreeBSD on the desktop if you haven&#39;t used it on servers or virtual machines before. It&#39;s got less in common with Linux than you might think.&quot;</li>
<li>With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd</li>
<li>The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash</li>
<li>Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well</li>
<li>In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***</li>
</ul>

<h3><a href="https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/" rel="nofollow">OpenIKED and Cisco CSR 1000v IPSEC</a></h3>

<ul>
<li>This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED</li>
<li>What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud</li>
<li>There are lots of details (and example configuration files) for using IKEv2 and OpenBSD&#39;s built-in IKE daemon</li>
<li>It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that&#39;s afraid to try them… don&#39;t be
***</li>
</ul>

<h3><a href="https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8" rel="nofollow">HardenedBSD improves stack randomization</a></h3>

<ul>
<li>The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area</li>
<li>In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well</li>
<li>They&#39;re now stacking the new on top of the old as well, with the goal being even more entropy</li>
<li>This change triggered an ABI and API incompatibility, so their major version has been bumped
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html" rel="nofollow">OpenSSH 6.9 released</a></h3>

<ul>
<li>The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes</li>
<li>There are a couple new things though - the &quot;AuthorizedKeysCommand&quot; config option now takes custom arguments</li>
<li>One very notable change is that <strong>the default cipher has changed</strong> as of this release</li>
<li>The traditional pairing of AES128 in counter mode with MD5 HMAC has been <em>replaced</em> by the ever-trendy ChaCha20-Poly1305 combo</li>
<li>Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to &quot;no&quot; by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they&#39;re under 1024 bits</li>
<li>Many small bugs fixes and improvements were also made, so check the announcement for everything else</li>
<li>The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Ws6Y2rZy" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21GvZ5xbs" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s209TrPK4e" rel="nofollow">Jochen writes in</a></li>
<li><a href="http://slexy.org/view/s21TQjUjxv" rel="nofollow">Simon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Jun Ebihara about some lesser-known CPU architectures in NetBSD. He&#39;ll tell us what makes these old (and often forgotten) machines so interesting. As usual, we&#39;ve also got answers to your emails and all this week&#39;s news on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/out-with-the-old-in-with-the-less" rel="nofollow">Out with the old, in with the less</a></h3>

<ul>
<li>Our friend Ted Unangst has a new article up, talking about &quot;various OpenBSD replacements and reductions&quot;</li>
<li>&quot;Instead of trying to fix known bugs, we’re trying to fix unknown bugs. It’s not based on the current buggy state of the code, but the anticipated future buggy state of the code. Past bugs are a bigger factor than current bugs.&quot;</li>
<li>In the post, he goes through some of the bigger (and smaller) examples of OpenBSD rewriting tools to be simpler and more secure</li>
<li>It starts off with a lesser-known SCSI driver that &quot;tried to do too much&quot; being replaced with three separate drivers</li>
<li>&quot;Each driver can now be modified in isolation without unintentional side effects on other hardware, or the need to consider if and where further special cases need to be added. Despite the fact that these three drivers duplicate all the common boilerplate code, combined they only amount to about half as much code as the old driver.&quot;</li>
<li>In contrast to that example, he goes on to cite mandoc as taking a very non &quot;unixy&quot; direction, but at the same time being smaller and simpler than all the tools it replaced</li>
<li>The next case is the new http daemon, and he talks a bit about the recently-added rewrite support being done in a simple and secure way (as opposed to regex and its craziness)</li>
<li>He also talks about the rewritten &quot;file&quot; utility: &quot;Almost by definition, its sole input will be untrusted input. Perversely, people will then trust what file tells them and then go about using that input, as if file somehow sanitized it.&quot;</li>
<li>Finally, sudo in OpenBSD&#39;s base system is moving to ports soon, and the article briefly describes a new tool that <a href="https://marc.info/?l=openbsd-ports&m=143481227122523&w=2" rel="nofollow">may or may not replace it</a>, called &quot;doas&quot;</li>
<li>There&#39;s also a nice wrap-up of all the examples at the end, and the &quot;<a href="http://www.openbsd.org/papers/pruning.html" rel="nofollow">Pruning and Polishing</a>&quot; talk is good complementary reading material
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UC0IK6Y4Go2KtRueHDiQcxow/videos" rel="nofollow">More OpenZFS and BSDCan videos</a></h3>

<ul>
<li>We mentioned <a href="http://www.bsdnow.tv/episodes/2015_06_24-bitrot_group_therapy" rel="nofollow">last week</a> that some of the videos from the second OpenZFS conference in Europe were being uploaded - here&#39;s some more</li>
<li>Matt Ahrens did <a href="https://www.youtube.com/watch?v=I6fXZ_6OT5c" rel="nofollow">a Q&amp;A session</a> and talked about ZFS <a href="https://www.youtube.com/watch?v=iY44jPMvxog" rel="nofollow">send and receive</a>, as well as giving an <a href="https://www.youtube.com/watch?v=RQlMDmnty80" rel="nofollow">overview of OpenZFS</a></li>
<li>George Wilson talked about a <a href="https://www.youtube.com/watch?v=KBI6rRGUv4E" rel="nofollow">performance retrospective</a></li>
<li><a href="https://www.youtube.com/watch?v=sSi47-k78IM" rel="nofollow">Toshiba</a>, <a href="https://www.youtube.com/watch?v=Hhje5KEF5cE" rel="nofollow">Syneto</a> and <a href="https://www.youtube.com/watch?v=aKgxXipss8k" rel="nofollow">HGST</a> also gave some talks about their companies and how they&#39;re using ZFS</li>
<li>As for BSDCan, more of their BSD presentations have been uploaded too...</li>
<li>Ryan Stone, <a href="https://www.youtube.com/watch?v=INeMd-i5jzM" rel="nofollow">PCI SR-IOV on FreeBSD</a></li>
<li>George Neville-Neil, <a href="https://www.youtube.com/watch?v=LE4wMsP7zeA" rel="nofollow">Measure Twice, Code Once</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=qNYXqpJiFN0" rel="nofollow">Unifying jail and package management for PC-BSD, FreeNAS and FreeBSD</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=3WqOLolj5EU" rel="nofollow">I/O Scheduling in CAM</a></li>
<li>Kirk McKusick, <a href="https://www.youtube.com/watch?v=l-RCLgLxuSc" rel="nofollow">An Introduction to the Implementation of ZFS</a></li>
<li>Midori Kato, <a href="https://www.youtube.com/watch?v=zZXvjhWcg_4" rel="nofollow">Extensions to FreeBSD Datacenter TCP for Incremental Deployment Support</a></li>
<li>Baptiste Daroussin, <a href="https://www.youtube.com/watch?v=Br6izhH5P1I" rel="nofollow">Packaging FreeBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=v7px6ktoDAI" rel="nofollow">base system</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=UOX7WDAjqso" rel="nofollow">New OpenZFS features supporting remote replication</a></li>
<li>Ed Schouten, <a href="https://www.youtube.com/watch?v=SVdF84x1EdA" rel="nofollow">CloudABI Cloud computing meets fine-grained capabilities</a></li>
<li>The audio of Ingo Schwarze&#39;s talk &quot;mandoc: becoming the main BSD manual toolbox&quot; got messed up, but there&#39;s an alternate recording <a href="http://www.bsdcan.org/2015/audio/mandoc.mp3" rel="nofollow">here</a>, and the slides are <a href="http://www.openbsd.org/papers/bsdcan15-mandoc.pdf" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143526329006942&w=2" rel="nofollow">SMP steroids for PF</a></h3>

<ul>
<li>An Oracle employee that&#39;s been porting OpenBSD&#39;s PF to an upcoming Solaris release has sent in an interesting patch for review</li>
<li>Attached to the mail was what may be the beginnings of making native PF SMP-aware</li>
<li>Before you start partying, the road to SMP (specifically, giant lock removal) is a long and very complicated one, requiring every relevant bit of the stack to be written with it in mind - this is just one piece of the puzzle</li>
<li>The <a href="https://www.marc.info/?l=openbsd-tech&m=143532243322281&w=2" rel="nofollow">initial response</a> has been quite positive though, with some <a href="https://www.marc.info/?l=openbsd-tech&m=143532963824548&w=2" rel="nofollow">back and forth</a> between developers and the submitter</li>
<li>For now, let&#39;s be patient and see what happens
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release42/" rel="nofollow">DragonFly 4.2.0 released</a></h3>

<ul>
<li>DragonFlyBSD has released the next big update of their 4.x branch, complete with a decent amount of new features and fixes</li>
<li>i915 and Radeon graphics have been updated, and DragonFly can claim the title of first BSD with Broadwell support in a release</li>
<li>Sendmail in the base system has been replaced with their homegrown DragonFly Mail Agent, and there&#39;s <a href="http://www.dragonflybsd.com/docs/docs/newhandbook/mta/" rel="nofollow">a wiki page</a> about configuring it</li>
<li>They&#39;ve also switched the default compiler to GCC 5, though why they&#39;ve gone in that direction instead of embracing Clang is a mystery</li>
<li>The announcement page also contains a list of kernel changes, details on the audio and graphics updates, removal of the SCTP protocol, improvements to the temperature sensors, various userland utility fixes and a list of updates to third party tools</li>
<li>Work is continuing on the second generation HAMMER filesystem, and Matt Dillon provides a status update in the release announcement</li>
<li>There was also some <a href="https://news.ycombinator.com/item?id=9797932" rel="nofollow">hacker news discussion</a> you can check out, as well as <a href="http://lists.dragonflybsd.org/pipermail/users/2015-June/207801.html" rel="nofollow">upgrade instructions</a>
***</li>
</ul>

<h3><a href="https://opensmtpd.org/announces/release-5.7.1.txt" rel="nofollow">OpenSMTPD 5.7.1 released</a></h3>

<ul>
<li>The OpenSMTPD guys have just released version 5.7.1, a major milestone version that we mentioned recently</li>
<li>Crypto-related bits have been vastly improved: the RSA engine is now privilege-separated, TLS errors are handled more gracefully, ciphers and curve preferences can now be specified, the PKI interface has been reworked to allow custom CAs, SNI and certificate verification have been simplified and the DH parameters are now 2048 bit by default</li>
<li>The long-awaited filter API is now enabled by default, though still considered slightly experimental</li>
<li>Documentation has been improved quite a bit, with more examples and common use cases (as well as exotic ones)</li>
<li>Many more small additions and bugfixes were made, so check the changelog for the full list</li>
<li>Starting with 5.7.1, releases are now <a href="https://twitter.com/OpenSMTPD/status/613257722574839808" rel="nofollow">cryptographically</a> <a href="https://www.opensmtpd.org/archives/opensmtpd-5.7.1.sum.sig" rel="nofollow">signed</a> to ensure integrity</li>
<li>This release has gone through some major stress testing to ensure stability - Gilles regularly asks their Twitter followers to <a href="https://twitter.com/OpenSMTPD/status/608399272447471616" rel="nofollow">flood a test server</a> with thousands of emails per second, even <a href="https://twitter.com/OpenSMTPD/status/608235180839567360" rel="nofollow">offering prizes</a> to whoever can DDoS them the hardest</li>
<li>OpenSMTPD runs on all the BSDs of course, and seems to be getting pretty popular lately</li>
<li>Let&#39;s all <a href="mailto:feedback@bsdnow.tv" rel="nofollow">encourage</a> Kris to stop procrastinating on switching from Postfix
***</li>
</ul>

<h2>Interview - Jun Ebihara (蛯原純) - <a href="mailto:jun@netbsd.org" rel="nofollow">jun@netbsd.org</a> / <a href="https://twitter.com/ebijun" rel="nofollow">@ebijun</a></h2>

<p>Lesser-known CPU architectures, embedded NetBSD devices</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-steven-douglas.html" rel="nofollow">FreeBSD foundation at BSDCan</a></h3>

<ul>
<li>The FreeBSD foundation has posted a few BSDCan summaries on their blog</li>
<li>The first, from Steven Douglas, begins with a sentiment a lot of us can probably identify with: &quot;Where I live, there are only a handful of people that even know what BSD is, let alone can talk at a high level about it. That was one of my favorite things, being around like minded people.&quot;</li>
<li>He got to meet a lot of the people working on big-name projects, and enjoyed being able to ask them questions so easily</li>
<li>Their <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-ahmed-kamal.html" rel="nofollow">second</a> trip report is from Ahmed Kamal, who flew in all the way from Egypt</li>
<li>A bit starstruck, he seems to have enjoyed all the talks, particularly Andrew Tanenbaum&#39;s about MINIX and NetBSD</li>
<li>There are also two more wrap-ups from <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-zbigniew-bodek.html" rel="nofollow">Zbigniew Bodek</a> and <a href="http://freebsdfoundation.blogspot.com/2015/06/bsdcan-2015-trip-report-vsevolod-stakhov.html" rel="nofollow">Vsevolod Stakhov</a>, so you&#39;ve got plenty to read
***</li>
</ul>

<h3><a href="http://cfenollosa.com/blog/openbsd-from-a-veteran-linux-user-perspective.html" rel="nofollow">OpenBSD from a veteran Linux user perspective</a></h3>

<ul>
<li>In a new series of blog posts, a self-proclaimed veteran Linux user is giving OpenBSD a try for the first time</li>
<li>&quot;For the first time I installed a BSD box on a machine I control. The experience has been eye-opening, especially since I consider myself an &#39;old-school&#39; Linux admin, and I&#39;ve felt out of place with the latest changes on the system administration.&quot;</li>
<li>The post is a collection of his thoughts about what&#39;s different between Linux and BSD, what surprised him as a beginner - admittedly, a lot of his knowledge carried over, and there were just minor differences in command flags</li>
<li>One of the things that surprised him (in a positive way) was the documentation: &quot;OpenBSD&#39;s man pages are so nice that RTFMing somebody on the internet is not condescending but selfless.&quot;</li>
<li>He also goes through some of the basics, installing and updating software, following different branches</li>
<li>It concludes with &quot;If you like UNIX, it will open your eyes to the fact that there is more than one way to do things, and that system administration can still be simple while modern.&quot;
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/freebsd-on-the-desktop-am-i-crazy.html" rel="nofollow">FreeBSD on the desktop, am I crazy</a></h3>

<ul>
<li>Similar to the previous article, the guy that wrote the SSH two factor authentication post we covered last week has another new article up - this time about FreeBSD on the desktop</li>
<li>He begins with a bit of forewarning for potential Linux switchers: &quot;It certainly wasn&#39;t an easy journey, and I&#39;m tempted to say do not try this at home to anybody who isn&#39;t going to leverage any of FreeBSD&#39;s strong points. Definitely don&#39;t try FreeBSD on the desktop if you haven&#39;t used it on servers or virtual machines before. It&#39;s got less in common with Linux than you might think.&quot;</li>
<li>With that out of the way, the list of positives is pretty large: a tidy base system, separation between base and ports, having the option to choose binary packages or ports, ZFS, jails, licensing and of course the lack of systemd</li>
<li>The rest of the post talks about some of the hurdles he had to overcome, namely with graphics and the infamous Adobe Flash</li>
<li>Also worth noting is that he found jails to be not only good for isolating daemons on a server, but pretty useful for desktop applications as well</li>
<li>In the end, he says it was worth all the trouble, and is even planning on converting his laptop to FreeBSD soon too
***</li>
</ul>

<h3><a href="https://www.netflask.net/ipsec-ikev2-cisco-csr1000v-openiked/" rel="nofollow">OpenIKED and Cisco CSR 1000v IPSEC</a></h3>

<ul>
<li>This article covers setting up a site-to-site IPSEC tunnel between a Cisco CSR 1000v router and an OpenBSD gateway running OpenIKED</li>
<li>What kind of networking blog post would be complete without a diagram where the internet is represented by a big cloud</li>
<li>There are lots of details (and example configuration files) for using IKEv2 and OpenBSD&#39;s built-in IKE daemon</li>
<li>It also goes to show that the BSDs generally play well with existing network infrastructure, so if you were a business that&#39;s afraid to try them… don&#39;t be
***</li>
</ul>

<h3><a href="https://github.com/HardenedBSD/hardenedBSD/commit/bd5cecb4dc7947a5e214fc100834399b4bffdee8" rel="nofollow">HardenedBSD improves stack randomization</a></h3>

<ul>
<li>The HardenedBSD guys have improved their FreeBSD ASLR patchset, specifically in the stack randomization area</li>
<li>In their initial implementation, the stack randomization was a random gap - this update makes the base address randomized as well</li>
<li>They&#39;re now stacking the new on top of the old as well, with the goal being even more entropy</li>
<li>This change triggered an ABI and API incompatibility, so their major version has been bumped
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2015-July/000121.html" rel="nofollow">OpenSSH 6.9 released</a></h3>

<ul>
<li>The OpenSSH team has announced the release of a new version which, following their tick/tock major/minor release cycle, is focused mainly on bug fixes</li>
<li>There are a couple new things though - the &quot;AuthorizedKeysCommand&quot; config option now takes custom arguments</li>
<li>One very notable change is that <strong>the default cipher has changed</strong> as of this release</li>
<li>The traditional pairing of AES128 in counter mode with MD5 HMAC has been <em>replaced</em> by the ever-trendy ChaCha20-Poly1305 combo</li>
<li>Their next release, 7.0, is set to get rid a number of legacy items: PermitRootLogin will be switched to &quot;no&quot; by default, SSHv1 support will be totally disabled, the 1024bit diffie-hellman-group1-sha1 KEX will be disabled, old ssh-dss and v00 certs will be removed, a number of weak ciphers will be disabled by default (including all CBC ones) and RSA keys will be refused if they&#39;re under 1024 bits</li>
<li>Many small bugs fixes and improvements were also made, so check the announcement for everything else</li>
<li>The native version is in OpenBSD -current, and an update to the portable version should be hitting a ports or pkgsrc tree near you soon
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2Ws6Y2rZy" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21GvZ5xbs" rel="nofollow">Mason writes in</a></li>
<li><a href="http://slexy.org/view/s209TrPK4e" rel="nofollow">Jochen writes in</a></li>
<li><a href="http://slexy.org/view/s21TQjUjxv" rel="nofollow">Simon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>95: Bitrot Group Therapy</title>
  <link>https://www.bsdnow.tv/95</link>
  <guid isPermaLink="false">e712bc93-a45f-45ce-9d3a-e58ee627200c</guid>
  <pubDate>Wed, 24 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e712bc93-a45f-45ce-9d3a-e58ee627200c.mp3" length="54443956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking some ZFS with Sean Chittenden. He's been using it on FreeBSD at Groupon, and has some interesting stories about how it's saved his data. Answers to your emails and all of this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:36</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking some ZFS with Sean Chittenden. He's been using it on FreeBSD at Groupon, and has some interesting stories about how it's saved his data. Answers to your emails and all of this week's headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2015/schedule/" target="_blank" rel="nofollow noopener"&gt;More BSDCan 2015 videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded&lt;/li&gt;
&lt;li&gt;Alexander Motin, &lt;a href="https://www.youtube.com/watch?v=lBE4BfxVDQc" target="_blank" rel="nofollow noopener"&gt;Feature-rich and fast SCSI target with CTL and ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Daichi Goto, &lt;a href="https://www.youtube.com/watch?v=r2BoQ70bwK4" target="_blank" rel="nofollow noopener"&gt;FreeBSD for High Density Servers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ken Moore, &lt;a href="https://www.youtube.com/watch?v=Qh_YK9y4_Os" target="_blank" rel="nofollow noopener"&gt;Lumina-DE&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Kevin Bowling, &lt;a href="https://www.youtube.com/watch?v=4l2rlRjkGhk" target="_blank" rel="nofollow noopener"&gt;FreeBSD Operations at&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=K1-ZyiY5z48" target="_blank" rel="nofollow noopener"&gt;Limelight Networks&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Maciej Pasternacki, &lt;a href="https://www.youtube.com/watch?v=8phbsAhJ-9w" target="_blank" rel="nofollow noopener"&gt;Jetpack, a container&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=kJ74mgkzLxc" target="_blank" rel="nofollow noopener"&gt;runtime for FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ray Percival, &lt;a href="https://www.youtube.com/watch?v=gx5FILdSp2w" target="_blank" rel="nofollow noopener"&gt;Networking with OpenBSD in a virtualized environment&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Reyk Floeter, &lt;a href="https://www.youtube.com/watch?v=DV1-EfdIp8I" target="_blank" rel="nofollow noopener"&gt;Introducing OpenBSD's&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=_v0lI6qDWFs" target="_blank" rel="nofollow noopener"&gt;new httpd&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Still more to come, hopefully
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143480475721221&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD httpd rewrite support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the most-requested features of OpenBSD's new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support&lt;/li&gt;
&lt;li&gt;There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out&lt;/li&gt;
&lt;li&gt;Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings&lt;/li&gt;
&lt;li&gt;In the mailing list post, he shows an example of how to use it for redirects and provides &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143489473103114&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;the diff&lt;/a&gt; if you'd like to give it a try now&lt;/li&gt;
&lt;li&gt;It's since &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143507301715409&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;been committed&lt;/a&gt; to -current, so you can try it out with a snapshot too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sysconfig.org.uk/two-factor-authentication-with-ssh.html" target="_blank" rel="nofollow noopener"&gt;SSH 2FA on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication&lt;/li&gt;
&lt;li&gt;This article serves as a sort of "roundup" on different methods to set up two-factor authentication on FreeBSD&lt;/li&gt;
&lt;li&gt;It touches on key pairs with a server-side password, google authenticator and a few other variations&lt;/li&gt;
&lt;li&gt;While the article is focused on FreeBSD, a lot of it can be easily applied to the others too&lt;/li&gt;
&lt;li&gt;OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries" target="_blank" rel="nofollow noopener"&gt;NetBSD 7.0-RC1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (&lt;a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" target="_blank" rel="nofollow noopener"&gt;11 months ago&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1&lt;/li&gt;
&lt;li&gt;They're looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Sean Chittenden - &lt;a href="mailto:seanc@freebsd.org" target="_blank" rel="nofollow noopener"&gt;seanc@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/seanchittenden" target="_blank" rel="nofollow noopener"&gt;@seanchittenden&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD at Groupon, ZFS&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD and Dovecot&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last&lt;/li&gt;
&lt;li&gt;This blog post about it has something not mentioned before: virtual domains and virtual users&lt;/li&gt;
&lt;li&gt;This means you can easily have "&lt;a href="mailto:user1@domain.com" target="_blank" rel="nofollow noopener"&gt;user1@domain.com&lt;/a&gt;" and "&lt;a href="mailto:user2@otherdomain.com" target="_blank" rel="nofollow noopener"&gt;user2@otherdomain.com&lt;/a&gt;" both go to a local user on the box (or a different third address)&lt;/li&gt;
&lt;li&gt;It also covers SSL certificates, blocking spam and setting up IMAP access, the usual&lt;/li&gt;
&lt;li&gt;Now might also be a good time to test out OpenSMTPD &lt;a href="https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html" target="_blank" rel="nofollow noopener"&gt;5.7.1-rc1&lt;/a&gt;, which we'll cover in more detail when it's released...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/aarnt/octopkg" target="_blank" rel="nofollow noopener"&gt;OctoPkg, a QT frontend to pkgng&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A PC-BSD user has begun porting over a graphical package management utility from Arch linux called &lt;a href="https://octopiproject.wordpress.com/about/" target="_blank" rel="nofollow noopener"&gt;Octopi&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Obviously, it needed to be rewritten to use FreeBSD's pkg system instead of pacman&lt;/li&gt;
&lt;li&gt;There are some basic instructions on how to get it built and running on the github page&lt;/li&gt;
&lt;li&gt;After some testing, it'll likely make its way to the FreeBSD ports tree&lt;/li&gt;
&lt;li&gt;Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150619071929" target="_blank" rel="nofollow noopener"&gt;AFL vs. mandoc, a quantitative analysis&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL&lt;/li&gt;
&lt;li&gt;It's meant to be accompanying material to his BSDCan talk, which already covered nine topics&lt;/li&gt;
&lt;li&gt;mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input&lt;/li&gt;
&lt;li&gt;The article breaks down the 45 different bugs that were found, based on their root cause&lt;/li&gt;
&lt;li&gt;If you're interested in secure coding practices, this'll be a great one to read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks" target="_blank" rel="nofollow noopener"&gt;OpenZFS conference videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Videos from the second OpenZFS conference have just started to show up&lt;/li&gt;
&lt;li&gt;The first talk is by, you guessed it, Matt Ahrens&lt;/li&gt;
&lt;li&gt;In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on&lt;/li&gt;
&lt;li&gt;There are also videos &lt;a href="https://www.youtube.com/watch?v=5ciV4z7WWmo" target="_blank" rel="nofollow noopener"&gt;from Nexenta&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=a2lnMxMUxyc" target="_blank" rel="nofollow noopener"&gt;and HGST&lt;/a&gt;, talking about how they use and contribute to OpenZFS
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2FqJfmeK3" target="_blank" rel="nofollow noopener"&gt;Bryson writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20erRHahQ" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, fuzzing, mandoc, httpd, 7.0, opensmtpd, dovecot, bsdcan 2015, pkgng, groupon, ecommerce, zfs, bitrot, zpool, afl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking some ZFS with Sean Chittenden. He&#39;s been using it on FreeBSD at Groupon, and has some interesting stories about how it&#39;s saved his data. Answers to your emails and all of this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">More BSDCan 2015 videos</a></h3>

<ul>
<li>Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded</li>
<li>Alexander Motin, <a href="https://www.youtube.com/watch?v=lBE4BfxVDQc" rel="nofollow">Feature-rich and fast SCSI target with CTL and ZFS</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=r2BoQ70bwK4" rel="nofollow">FreeBSD for High Density Servers</a></li>
<li>Ken Moore, <a href="https://www.youtube.com/watch?v=Qh_YK9y4_Os" rel="nofollow">Lumina-DE</a></li>
<li>Kevin Bowling, <a href="https://www.youtube.com/watch?v=4l2rlRjkGhk" rel="nofollow">FreeBSD Operations at</a> <a href="https://www.youtube.com/watch?v=K1-ZyiY5z48" rel="nofollow">Limelight Networks</a></li>
<li>Maciej Pasternacki, <a href="https://www.youtube.com/watch?v=8phbsAhJ-9w" rel="nofollow">Jetpack, a container</a> <a href="https://www.youtube.com/watch?v=kJ74mgkzLxc" rel="nofollow">runtime for FreeBSD</a></li>
<li>Ray Percival, <a href="https://www.youtube.com/watch?v=gx5FILdSp2w" rel="nofollow">Networking with OpenBSD in a virtualized environment</a></li>
<li>Reyk Floeter, <a href="https://www.youtube.com/watch?v=DV1-EfdIp8I" rel="nofollow">Introducing OpenBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=_v0lI6qDWFs" rel="nofollow">new httpd</a></li>
<li>Still more to come, hopefully
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143480475721221&w=2" rel="nofollow">OpenBSD httpd rewrite support</a></h3>

<ul>
<li>One of the most-requested features of OpenBSD&#39;s new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support</li>
<li>There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out</li>
<li>Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings</li>
<li>In the mailing list post, he shows an example of how to use it for redirects and provides <a href="https://www.marc.info/?l=openbsd-tech&m=143489473103114&w=2" rel="nofollow">the diff</a> if you&#39;d like to give it a try now</li>
<li>It&#39;s since <a href="https://www.marc.info/?l=openbsd-cvs&m=143507301715409&w=2" rel="nofollow">been committed</a> to -current, so you can try it out with a snapshot too
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/two-factor-authentication-with-ssh.html" rel="nofollow">SSH 2FA on FreeBSD</a></h3>

<ul>
<li>We&#39;ve discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication</li>
<li>This article serves as a sort of &quot;roundup&quot; on different methods to set up two-factor authentication on FreeBSD</li>
<li>It touches on key pairs with a server-side password, google authenticator and a few other variations</li>
<li>While the article is focused on FreeBSD, a lot of it can be easily applied to the others too</li>
<li>OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries" rel="nofollow">NetBSD 7.0-RC1 released</a></h3>

<ul>
<li>NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (<a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">11 months ago</a>)</li>
<li>Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1</li>
<li>They&#39;re looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***</li>
</ul>

<h2>Interview - Sean Chittenden - <a href="mailto:seanc@freebsd.org" rel="nofollow">seanc@freebsd.org</a> / <a href="https://twitter.com/seanchittenden" rel="nofollow">@seanchittenden</a></h2>

<p>FreeBSD at Groupon, ZFS</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/" rel="nofollow">OpenSMTPD and Dovecot</a></h3>

<ul>
<li>We&#39;ve covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last</li>
<li>This blog post about it has something not mentioned before: virtual domains and virtual users</li>
<li>This means you can easily have &quot;<a href="mailto:user1@domain.com" rel="nofollow">user1@domain.com</a>&quot; and &quot;<a href="mailto:user2@otherdomain.com" rel="nofollow">user2@otherdomain.com</a>&quot; both go to a local user on the box (or a different third address)</li>
<li>It also covers SSL certificates, blocking spam and setting up IMAP access, the usual</li>
<li>Now might also be a good time to test out OpenSMTPD <a href="https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html" rel="nofollow">5.7.1-rc1</a>, which we&#39;ll cover in more detail when it&#39;s released...
***</li>
</ul>

<h3><a href="https://github.com/aarnt/octopkg" rel="nofollow">OctoPkg, a QT frontend to pkgng</a></h3>

<ul>
<li>A PC-BSD user has begun porting over a graphical package management utility from Arch linux called <a href="https://octopiproject.wordpress.com/about/" rel="nofollow">Octopi</a></li>
<li>Obviously, it needed to be rewritten to use FreeBSD&#39;s pkg system instead of pacman</li>
<li>There are some basic instructions on how to get it built and running on the github page</li>
<li>After some testing, it&#39;ll likely make its way to the FreeBSD ports tree</li>
<li>Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150619071929" rel="nofollow">AFL vs. mandoc, a quantitative analysis</a></h3>

<ul>
<li>Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL</li>
<li>It&#39;s meant to be accompanying material to his BSDCan talk, which already covered nine topics</li>
<li>mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input</li>
<li>The article breaks down the 45 different bugs that were found, based on their root cause</li>
<li>If you&#39;re interested in secure coding practices, this&#39;ll be a great one to read
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks" rel="nofollow">OpenZFS conference videos</a></h3>

<ul>
<li>Videos from the second OpenZFS conference have just started to show up</li>
<li>The first talk is by, you guessed it, Matt Ahrens</li>
<li>In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on</li>
<li>There are also videos <a href="https://www.youtube.com/watch?v=5ciV4z7WWmo" rel="nofollow">from Nexenta</a> <a href="https://www.youtube.com/watch?v=a2lnMxMUxyc" rel="nofollow">and HGST</a>, talking about how they use and contribute to OpenZFS
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2FqJfmeK3" rel="nofollow">Bryson writes in</a></li>
<li><a href="http://slexy.org/view/s20erRHahQ" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking some ZFS with Sean Chittenden. He&#39;s been using it on FreeBSD at Groupon, and has some interesting stories about how it&#39;s saved his data. Answers to your emails and all of this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">More BSDCan 2015 videos</a></h3>

<ul>
<li>Almost as if we said it would happen last week, more BSD-related presentation videos have been uploaded</li>
<li>Alexander Motin, <a href="https://www.youtube.com/watch?v=lBE4BfxVDQc" rel="nofollow">Feature-rich and fast SCSI target with CTL and ZFS</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=r2BoQ70bwK4" rel="nofollow">FreeBSD for High Density Servers</a></li>
<li>Ken Moore, <a href="https://www.youtube.com/watch?v=Qh_YK9y4_Os" rel="nofollow">Lumina-DE</a></li>
<li>Kevin Bowling, <a href="https://www.youtube.com/watch?v=4l2rlRjkGhk" rel="nofollow">FreeBSD Operations at</a> <a href="https://www.youtube.com/watch?v=K1-ZyiY5z48" rel="nofollow">Limelight Networks</a></li>
<li>Maciej Pasternacki, <a href="https://www.youtube.com/watch?v=8phbsAhJ-9w" rel="nofollow">Jetpack, a container</a> <a href="https://www.youtube.com/watch?v=kJ74mgkzLxc" rel="nofollow">runtime for FreeBSD</a></li>
<li>Ray Percival, <a href="https://www.youtube.com/watch?v=gx5FILdSp2w" rel="nofollow">Networking with OpenBSD in a virtualized environment</a></li>
<li>Reyk Floeter, <a href="https://www.youtube.com/watch?v=DV1-EfdIp8I" rel="nofollow">Introducing OpenBSD&#39;s</a> <a href="https://www.youtube.com/watch?v=_v0lI6qDWFs" rel="nofollow">new httpd</a></li>
<li>Still more to come, hopefully
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143480475721221&w=2" rel="nofollow">OpenBSD httpd rewrite support</a></h3>

<ul>
<li>One of the most-requested features of OpenBSD&#39;s new HTTP daemon (in fact, you can hear someone asking about it in the video just above) is rewrite support</li>
<li>There were concerns about regex code being too complicated and potentially allowing another attack surface, so that was out</li>
<li>Instead, Reyk ported over an implementation of lua pattern matching while on the flight back from BSDCan, turning it into a C API without the lua bindings</li>
<li>In the mailing list post, he shows an example of how to use it for redirects and provides <a href="https://www.marc.info/?l=openbsd-tech&m=143489473103114&w=2" rel="nofollow">the diff</a> if you&#39;d like to give it a try now</li>
<li>It&#39;s since <a href="https://www.marc.info/?l=openbsd-cvs&m=143507301715409&w=2" rel="nofollow">been committed</a> to -current, so you can try it out with a snapshot too
***</li>
</ul>

<h3><a href="http://sysconfig.org.uk/two-factor-authentication-with-ssh.html" rel="nofollow">SSH 2FA on FreeBSD</a></h3>

<ul>
<li>We&#39;ve discussed different ways to lock down SSH access to your BSD boxes before - use keys instead of passwords, whitelist IPs, or even use two-factor authentication</li>
<li>This article serves as a sort of &quot;roundup&quot; on different methods to set up two-factor authentication on FreeBSD</li>
<li>It touches on key pairs with a server-side password, google authenticator and a few other variations</li>
<li>While the article is focused on FreeBSD, a lot of it can be easily applied to the others too</li>
<li>OpenSSH has a great security record, but two-factor authentication is always a good thing to have for the most important systems
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_7_0_rc1_binaries" rel="nofollow">NetBSD 7.0-RC1 released</a></h3>

<ul>
<li>NetBSD has just announced the first release candidate for the 7.0 branch, after a long delay since the initial beta (<a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">11 months ago</a>)</li>
<li>Some of the standout features include: improved KMS/DRM with support for modern GPUs, SMP support on ARM, lots of new ARM boards officially supported, GPT support in the installer, Lua kernel scripting, a multiprocessor USB stack, improvements to NPF (their firewall) and, optionally, Clang 3.6.1</li>
<li>They&#39;re looking for as much testing as possible, so give it a try and report your findings to the release engineering team
***</li>
</ul>

<h2>Interview - Sean Chittenden - <a href="mailto:seanc@freebsd.org" rel="nofollow">seanc@freebsd.org</a> / <a href="https://twitter.com/seanchittenden" rel="nofollow">@seanchittenden</a></h2>

<p>FreeBSD at Groupon, ZFS</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tumfatig.net/20150620/opensmtpd-and-dovecot-on-openbsd-5-7/" rel="nofollow">OpenSMTPD and Dovecot</a></h3>

<ul>
<li>We&#39;ve covered a number of OpenSMTPD mail server guides on the show, each with just a little something different to offer than the last</li>
<li>This blog post about it has something not mentioned before: virtual domains and virtual users</li>
<li>This means you can easily have &quot;<a href="mailto:user1@domain.com" rel="nofollow">user1@domain.com</a>&quot; and &quot;<a href="mailto:user2@otherdomain.com" rel="nofollow">user2@otherdomain.com</a>&quot; both go to a local user on the box (or a different third address)</li>
<li>It also covers SSL certificates, blocking spam and setting up IMAP access, the usual</li>
<li>Now might also be a good time to test out OpenSMTPD <a href="https://www.mail-archive.com/misc@opensmtpd.org/msg02177.html" rel="nofollow">5.7.1-rc1</a>, which we&#39;ll cover in more detail when it&#39;s released...
***</li>
</ul>

<h3><a href="https://github.com/aarnt/octopkg" rel="nofollow">OctoPkg, a QT frontend to pkgng</a></h3>

<ul>
<li>A PC-BSD user has begun porting over a graphical package management utility from Arch linux called <a href="https://octopiproject.wordpress.com/about/" rel="nofollow">Octopi</a></li>
<li>Obviously, it needed to be rewritten to use FreeBSD&#39;s pkg system instead of pacman</li>
<li>There are some basic instructions on how to get it built and running on the github page</li>
<li>After some testing, it&#39;ll likely make its way to the FreeBSD ports tree</li>
<li>Tools like this might make it easier for desktop users (who are used to similar things in Ubuntu or related distros) to switch over
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150619071929" rel="nofollow">AFL vs. mandoc, a quantitative analysis</a></h3>

<ul>
<li>Ingo Schwarze has written a pretty detailed article about how he and other OpenBSD developers have been fuzzing mandoc with AFL</li>
<li>It&#39;s meant to be accompanying material to his BSDCan talk, which already covered nine topics</li>
<li>mandoc is an interesting example to stress test with fuzzing, since its main job is to take and parse some highly varying input</li>
<li>The article breaks down the 45 different bugs that were found, based on their root cause</li>
<li>If you&#39;re interested in secure coding practices, this&#39;ll be a great one to read
***</li>
</ul>

<h3><a href="https://www.youtube.com/playlist?list=PLaUVvul17xScvtic0SPoks2MlQleyejks" rel="nofollow">OpenZFS conference videos</a></h3>

<ul>
<li>Videos from the second OpenZFS conference have just started to show up</li>
<li>The first talk is by, you guessed it, Matt Ahrens</li>
<li>In it, he covers some ZFS history, the Oracle takeover, the birth of illumos and OpenZFS, some administration basics and also some upcoming features that are being worked on</li>
<li>There are also videos <a href="https://www.youtube.com/watch?v=5ciV4z7WWmo" rel="nofollow">from Nexenta</a> <a href="https://www.youtube.com/watch?v=a2lnMxMUxyc" rel="nofollow">and HGST</a>, talking about how they use and contribute to OpenZFS
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2FqJfmeK3" rel="nofollow">Bryson writes in</a></li>
<li><a href="http://slexy.org/view/s20erRHahQ" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>94: Builder's Insurance</title>
  <link>https://www.bsdnow.tv/94</link>
  <guid isPermaLink="false">62d29419-94fa-4252-89a9-581546c7e61d</guid>
  <pubDate>Wed, 17 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/62d29419-94fa-4252-89a9-581546c7e61d.mp3" length="61384180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be chatting with Marc Espie. He's recently added some additional security measures to dpb, OpenBSD's package building tool, and we'll find out why they're so important. We've also got all this week's news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:25:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be chatting with Marc Espie. He's recently added some additional security measures to dpb, OpenBSD's package building tool, and we'll find out why they're so important. We've also got all this week's news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2015/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2015 videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan just ended last week, but some of the BSD-related presentation videos are already online&lt;/li&gt;
&lt;li&gt;Allan Jude, &lt;a href="https://www.youtube.com/watch?v=8l6bhKIDecg" target="_blank" rel="nofollow noopener"&gt;UCL for FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Andrew Cagney, &lt;a href="https://www.youtube.com/watch?v=XDIcD4LR5HE" target="_blank" rel="nofollow noopener"&gt;What happens when a dwarf and a daemon start dancing by the light of the silvery moon?&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Andy Tanenbaum, &lt;a href="https://www.youtube.com/watch?v=0pebP891V0c" target="_blank" rel="nofollow noopener"&gt;A reimplementation of NetBSD&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=Bu1JuwVfYTc" target="_blank" rel="nofollow noopener"&gt;using a MicroKernel&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Brooks Davis, &lt;a href="https://www.youtube.com/watch?v=DwCg-51vFAs" target="_blank" rel="nofollow noopener"&gt;CheriBSD: A research fork of FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Giuseppe Lettieri, &lt;a href="https://www.youtube.com/watch?v=Lo6wDCapo4k" target="_blank" rel="nofollow noopener"&gt;Even faster VM networking with virtual passthrough&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Joseph Mingrone, &lt;a href="https://www.youtube.com/watch?v=K2pnf1YcMTY" target="_blank" rel="nofollow noopener"&gt;Molecular Evolution, Genomic Analysis and FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Olivier Cochard-Labbe, &lt;a href="https://www.youtube.com/watch?v=6jhSvdnu4k0" target="_blank" rel="nofollow noopener"&gt;Large-scale plug&amp;amp;play x86 network appliance deployment over Internet&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Peter Hessler, &lt;a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" target="_blank" rel="nofollow noopener"&gt;Using routing domains / routing tables in a production network&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ryan Lortie, &lt;a href="https://www.youtube.com/watch?v=YSVFnM3_2Ik" target="_blank" rel="nofollow noopener"&gt;a stitch in time: jhbuild&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ted Unangst, &lt;a href="https://www.youtube.com/watch?v=9R5s3l-0wh0" target="_blank" rel="nofollow noopener"&gt;signify: Securing OpenBSD From Us To You&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Many more still to come...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pid1.com/posts/post1.html" target="_blank" rel="nofollow noopener"&gt;Documenting my BSD experience&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Increasingly common scenario: a long-time Linux user (since the mid-90s) decides it's finally time to give BSD a try&lt;/li&gt;
&lt;li&gt;"That night I came home, I had been trying to find out everything I could about BSD and I watched many videos, read forums, etc. One of the shows I found was BSD Now. I saw that they helped people and answered questions, so I decided to write in."&lt;/li&gt;
&lt;li&gt;In this ongoing series of blog posts, a user named Michael writes about his initial experiences with trying different BSDs for some different tasks&lt;/li&gt;
&lt;li&gt;The first post covers ZFS on FreeBSD, used to build a file server for his house (and of course he lists the hardware, if you're into that)&lt;/li&gt;
&lt;li&gt;You get a glimpse of a brand new user trying things out, learning how great ZFS-based RAID arrays are and even some of the initial hurdles someone could run into&lt;/li&gt;
&lt;li&gt;He's also looking to venture into the realm of replacing some of his VMs with jails and bhyve soon&lt;/li&gt;
&lt;li&gt;His &lt;a href="http://pid1.com/posts/post2.html" target="_blank" rel="nofollow noopener"&gt;second post&lt;/a&gt; explores replacing the firewall on his self-described "over complicated home network" with an OpenBSD box&lt;/li&gt;
&lt;li&gt;After going from ipfwadmin to ipchains to iptables, not even making it to nftables, he found the simple PF syntax to be really refreshing&lt;/li&gt;
&lt;li&gt;All the tools for his networking needs, the majority of which are in the base system, worked quickly and were easy to understand&lt;/li&gt;
&lt;li&gt;Getting to hear experiences like this are very important - they show areas where all the BSD developers' hard work has paid off, but can also let us know where we need to improve
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/pcbsd/hardenedBSD-stable" target="_blank" rel="nofollow noopener"&gt;PC-BSD tries HardenedBSD builds&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PC-BSD team has created a new branch of their git repo with the HardenedBSD ASLR patches integrated&lt;/li&gt;
&lt;li&gt;They're not the first major FreeBSD-based project to offer an alternate build - OPNsense &lt;a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" target="_blank" rel="nofollow noopener"&gt;did that&lt;/a&gt; a few weeks ago - but this might open the door for more projects to give it a try as well&lt;/li&gt;
&lt;li&gt;With Personacrypt, OpenNTPD, LibreSSL and recent Tor integration through the tools, these additional memory protections will offer PC-BSD users even more security that a default FreeBSD install won't have&lt;/li&gt;
&lt;li&gt;Time will tell if more projects and products like FreeNAS might be interested too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143423172522625&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;C-states in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;People who run BSD on their notebooks, you'll want to pay attention to this one&lt;/li&gt;
&lt;li&gt;OpenBSD has recently committed some ACPI improvements for &lt;a href="http://www.hardwaresecrets.com/article/Everything-You-Need-to-Know-About-the-CPU-C-States-Power-Saving-Modes/611" target="_blank" rel="nofollow noopener"&gt;deep C-states&lt;/a&gt;, enabling the processor to enter a low-power mode&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/StevenUniq/status/610586711358316545" target="_blank" rel="nofollow noopener"&gt;According&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143430996602802&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;to a&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143429914700826&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;few users&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143425943026225&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;so far&lt;/a&gt;, the change has resulted in dramatically lower CPU temperatures on their laptops, as well as much better battery life&lt;/li&gt;
&lt;li&gt;If you're running OpenBSD -current on a laptop, try out the latest snapshot and &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=143423391222952&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;report back&lt;/a&gt; with your findings
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/06/13/msg000687.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference 2015 Hokkaido&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Japanese NetBSD users group never sleeps, and they've hit yet another open source conference&lt;/li&gt;
&lt;li&gt;As is usually the case, lots of strange machines on display were running none other than NetBSD (though it was mostly ARM this time)&lt;/li&gt;
&lt;li&gt;We'll be having one of these guys on the show next week to discuss some of the lesser-known NetBSD platforms
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Marc Espie - &lt;a href="mailto:espie@openbsd.org" target="_blank" rel="nofollow noopener"&gt;espie@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/espie_openbsd" target="_blank" rel="nofollow noopener"&gt;@espie_openbsd&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.marc.info/?l=openbsd-ports&amp;amp;m=143051151521627&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Recent&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-ports&amp;amp;m=143151777209226&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;improvements&lt;/a&gt; to OpenBSD's &lt;a href="http://www.bsdnow.tv/tutorials/dpb" target="_blank" rel="nofollow noopener"&gt;dpb&lt;/a&gt; tool&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/mist64/xhyve/blob/master/README.md" target="_blank" rel="nofollow noopener"&gt;Introducing xhyve, bhyve on OS X&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about FreeBSD's "bhyve" hypervisor a lot on the show, and now it's been ported to another OS&lt;/li&gt;
&lt;li&gt;As the name "xhyve" might imply, it's a port of bhyve to Mac OS X &lt;/li&gt;
&lt;li&gt;Currently it only has support for virtualizing a few Linux distributions, but more guest systems can be added in the future&lt;/li&gt;
&lt;li&gt;It runs entirely in userspace, and has no extra requirements beyond OS X 10.10 or newer&lt;/li&gt;
&lt;li&gt;There are also &lt;a href="http://www.pagetable.com/?p=831" target="_blank" rel="nofollow noopener"&gt;a few examples&lt;/a&gt; on how to use it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/4KDisplays/" target="_blank" rel="nofollow noopener"&gt;4K displays on DragonFlyBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've been using DragonFly as a desktop, maybe with those nice Broadwell graphics, you'll be pleased to know that 4K displays work just fine&lt;/li&gt;
&lt;li&gt;Matthew Dillon wrote up a wiki page about some of the specifics, including a couple gotchas&lt;/li&gt;
&lt;li&gt;Some GUI applications might look weird on such a huge resolution, &lt;/li&gt;
&lt;li&gt;HDMI ports are mostly limited to a 30Hz refresh rate, and there are slightly steeper hardware requirements for a smooth experience
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://coderinaworldofcode.blogspot.com/2015/06/chrooting-mumble-server-on-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Sandboxing port daemons on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We talked about different containment methods last week, and mentioned that a lot of the daemons in OpenBSD's base as chrooted by default - things from ports or packages don't always get the same treatment&lt;/li&gt;
&lt;li&gt;This blog post uses a mumble server as an example, but you can apply it to &lt;em&gt;any&lt;/em&gt; service from ports that doesn't chroot by default&lt;/li&gt;
&lt;li&gt;It goes through the process of manually building a sandbox with all the libraries you'll need to run the daemon, and this setup will even wipe and refresh the chroot every time you restart it&lt;/li&gt;
&lt;li&gt;With a few small changes, similar tricks could be done on the other BSDs as well - everybody has chroots
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://smallwall.freeforums.net/thread/44/version-1-8-2-released" target="_blank" rel="nofollow noopener"&gt;SmallWall 1.8.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;SmallWall is a relatively new BSD-based project that we've never covered before&lt;/li&gt;
&lt;li&gt;It's an attempt to keep the old m0n0wall codebase going, and appears to have started around the time m0n0wall called it quits&lt;/li&gt;
&lt;li&gt;They've just released &lt;a href="http://www.smallwall.org/download.html" target="_blank" rel="nofollow noopener"&gt;the first official version&lt;/a&gt;, so you can give it a try now&lt;/li&gt;
&lt;li&gt;If you're interested in learning more about SmallWall, the lead developer just might be on the show in a few weeks...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gRTNnk7" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2DdiMvELg" target="_blank" rel="nofollow noopener"&gt;Brian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2h4ZS6SMd" target="_blank" rel="nofollow noopener"&gt;Dan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20kA1jeXY" target="_blank" rel="nofollow noopener"&gt;Joel writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2wJ9HP1bs" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, poudriere, pbulk, packages, ports, distributed, bsdcan, pf, zfs, opnsense, pfsense, hardenedbsd, aslr, smallwall, m0n0wall, xhyve, bhyve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Marc Espie. He&#39;s recently added some additional security measures to dpb, OpenBSD&#39;s package building tool, and we&#39;ll find out why they&#39;re so important. We&#39;ve also got all this week&#39;s news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 videos</a></h3>

<ul>
<li>BSDCan just ended last week, but some of the BSD-related presentation videos are already online</li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=8l6bhKIDecg" rel="nofollow">UCL for FreeBSD</a></li>
<li>Andrew Cagney, <a href="https://www.youtube.com/watch?v=XDIcD4LR5HE" rel="nofollow">What happens when a dwarf and a daemon start dancing by the light of the silvery moon?</a></li>
<li>Andy Tanenbaum, <a href="https://www.youtube.com/watch?v=0pebP891V0c" rel="nofollow">A reimplementation of NetBSD</a> <a href="https://www.youtube.com/watch?v=Bu1JuwVfYTc" rel="nofollow">using a MicroKernel</a></li>
<li>Brooks Davis, <a href="https://www.youtube.com/watch?v=DwCg-51vFAs" rel="nofollow">CheriBSD: A research fork of FreeBSD</a></li>
<li>Giuseppe Lettieri, <a href="https://www.youtube.com/watch?v=Lo6wDCapo4k" rel="nofollow">Even faster VM networking with virtual passthrough</a></li>
<li>Joseph Mingrone, <a href="https://www.youtube.com/watch?v=K2pnf1YcMTY" rel="nofollow">Molecular Evolution, Genomic Analysis and FreeBSD</a></li>
<li>Olivier Cochard-Labbe, <a href="https://www.youtube.com/watch?v=6jhSvdnu4k0" rel="nofollow">Large-scale plug&amp;play x86 network appliance deployment over Internet</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">Using routing domains / routing tables in a production network</a></li>
<li>Ryan Lortie, <a href="https://www.youtube.com/watch?v=YSVFnM3_2Ik" rel="nofollow">a stitch in time: jhbuild</a></li>
<li>Ted Unangst, <a href="https://www.youtube.com/watch?v=9R5s3l-0wh0" rel="nofollow">signify: Securing OpenBSD From Us To You</a></li>
<li>Many more still to come...
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post1.html" rel="nofollow">Documenting my BSD experience</a></h3>

<ul>
<li>Increasingly common scenario: a long-time Linux user (since the mid-90s) decides it&#39;s finally time to give BSD a try</li>
<li>&quot;That night I came home, I had been trying to find out everything I could about BSD and I watched many videos, read forums, etc. One of the shows I found was BSD Now. I saw that they helped people and answered questions, so I decided to write in.&quot;</li>
<li>In this ongoing series of blog posts, a user named Michael writes about his initial experiences with trying different BSDs for some different tasks</li>
<li>The first post covers ZFS on FreeBSD, used to build a file server for his house (and of course he lists the hardware, if you&#39;re into that)</li>
<li>You get a glimpse of a brand new user trying things out, learning how great ZFS-based RAID arrays are and even some of the initial hurdles someone could run into</li>
<li>He&#39;s also looking to venture into the realm of replacing some of his VMs with jails and bhyve soon</li>
<li>His <a href="http://pid1.com/posts/post2.html" rel="nofollow">second post</a> explores replacing the firewall on his self-described &quot;over complicated home network&quot; with an OpenBSD box</li>
<li>After going from ipfwadmin to ipchains to iptables, not even making it to nftables, he found the simple PF syntax to be really refreshing</li>
<li>All the tools for his networking needs, the majority of which are in the base system, worked quickly and were easy to understand</li>
<li>Getting to hear experiences like this are very important - they show areas where all the BSD developers&#39; hard work has paid off, but can also let us know where we need to improve
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/hardenedBSD-stable" rel="nofollow">PC-BSD tries HardenedBSD builds</a></h3>

<ul>
<li>The PC-BSD team has created a new branch of their git repo with the HardenedBSD ASLR patches integrated</li>
<li>They&#39;re not the first major FreeBSD-based project to offer an alternate build - OPNsense <a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">did that</a> a few weeks ago - but this might open the door for more projects to give it a try as well</li>
<li>With Personacrypt, OpenNTPD, LibreSSL and recent Tor integration through the tools, these additional memory protections will offer PC-BSD users even more security that a default FreeBSD install won&#39;t have</li>
<li>Time will tell if more projects and products like FreeNAS might be interested too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143423172522625&w=2" rel="nofollow">C-states in OpenBSD</a></h3>

<ul>
<li>People who run BSD on their notebooks, you&#39;ll want to pay attention to this one</li>
<li>OpenBSD has recently committed some ACPI improvements for <a href="http://www.hardwaresecrets.com/article/Everything-You-Need-to-Know-About-the-CPU-C-States-Power-Saving-Modes/611" rel="nofollow">deep C-states</a>, enabling the processor to enter a low-power mode</li>
<li><a href="https://twitter.com/StevenUniq/status/610586711358316545" rel="nofollow">According</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143430996602802&w=2" rel="nofollow">to a</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143429914700826&w=2" rel="nofollow">few users</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143425943026225&w=2" rel="nofollow">so far</a>, the change has resulted in dramatically lower CPU temperatures on their laptops, as well as much better battery life</li>
<li>If you&#39;re running OpenBSD -current on a laptop, try out the latest snapshot and <a href="https://www.marc.info/?l=openbsd-misc&m=143423391222952&w=2" rel="nofollow">report back</a> with your findings
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/06/13/msg000687.html" rel="nofollow">NetBSD at Open Source Conference 2015 Hokkaido</a></h3>

<ul>
<li>The Japanese NetBSD users group never sleeps, and they&#39;ve hit yet another open source conference</li>
<li>As is usually the case, lots of strange machines on display were running none other than NetBSD (though it was mostly ARM this time)</li>
<li>We&#39;ll be having one of these guys on the show next week to discuss some of the lesser-known NetBSD platforms
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p><a href="https://www.marc.info/?l=openbsd-ports&m=143051151521627&w=2" rel="nofollow">Recent</a> <a href="https://www.marc.info/?l=openbsd-ports&m=143151777209226&w=2" rel="nofollow">improvements</a> to OpenBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a> tool</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/mist64/xhyve/blob/master/README.md" rel="nofollow">Introducing xhyve, bhyve on OS X</a></h3>

<ul>
<li>We&#39;ve talked about FreeBSD&#39;s &quot;bhyve&quot; hypervisor a lot on the show, and now it&#39;s been ported to another OS</li>
<li>As the name &quot;xhyve&quot; might imply, it&#39;s a port of bhyve to Mac OS X </li>
<li>Currently it only has support for virtualizing a few Linux distributions, but more guest systems can be added in the future</li>
<li>It runs entirely in userspace, and has no extra requirements beyond OS X 10.10 or newer</li>
<li>There are also <a href="http://www.pagetable.com/?p=831" rel="nofollow">a few examples</a> on how to use it
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/4KDisplays/" rel="nofollow">4K displays on DragonFlyBSD</a></h3>

<ul>
<li>If you&#39;ve been using DragonFly as a desktop, maybe with those nice Broadwell graphics, you&#39;ll be pleased to know that 4K displays work just fine</li>
<li>Matthew Dillon wrote up a wiki page about some of the specifics, including a couple gotchas</li>
<li>Some GUI applications might look weird on such a huge resolution, </li>
<li>HDMI ports are mostly limited to a 30Hz refresh rate, and there are slightly steeper hardware requirements for a smooth experience
***</li>
</ul>

<h3><a href="http://coderinaworldofcode.blogspot.com/2015/06/chrooting-mumble-server-on-openbsd.html" rel="nofollow">Sandboxing port daemons on OpenBSD</a></h3>

<ul>
<li>We talked about different containment methods last week, and mentioned that a lot of the daemons in OpenBSD&#39;s base as chrooted by default - things from ports or packages don&#39;t always get the same treatment</li>
<li>This blog post uses a mumble server as an example, but you can apply it to <em>any</em> service from ports that doesn&#39;t chroot by default</li>
<li>It goes through the process of manually building a sandbox with all the libraries you&#39;ll need to run the daemon, and this setup will even wipe and refresh the chroot every time you restart it</li>
<li>With a few small changes, similar tricks could be done on the other BSDs as well - everybody has chroots
***</li>
</ul>

<h3><a href="http://smallwall.freeforums.net/thread/44/version-1-8-2-released" rel="nofollow">SmallWall 1.8.2 released</a></h3>

<ul>
<li>SmallWall is a relatively new BSD-based project that we&#39;ve never covered before</li>
<li>It&#39;s an attempt to keep the old m0n0wall codebase going, and appears to have started around the time m0n0wall called it quits</li>
<li>They&#39;ve just released <a href="http://www.smallwall.org/download.html" rel="nofollow">the first official version</a>, so you can give it a try now</li>
<li>If you&#39;re interested in learning more about SmallWall, the lead developer just might be on the show in a few weeks...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21gRTNnk7" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DdiMvELg" rel="nofollow">Brian writes in</a></li>
<li><a href="http://slexy.org/view/s2h4ZS6SMd" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20kA1jeXY" rel="nofollow">Joel writes in</a></li>
<li><a href="http://slexy.org/view/s2wJ9HP1bs" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Marc Espie. He&#39;s recently added some additional security measures to dpb, OpenBSD&#39;s package building tool, and we&#39;ll find out why they&#39;re so important. We&#39;ve also got all this week&#39;s news, answers to your emails and even a BSDCan wrap-up, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 videos</a></h3>

<ul>
<li>BSDCan just ended last week, but some of the BSD-related presentation videos are already online</li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=8l6bhKIDecg" rel="nofollow">UCL for FreeBSD</a></li>
<li>Andrew Cagney, <a href="https://www.youtube.com/watch?v=XDIcD4LR5HE" rel="nofollow">What happens when a dwarf and a daemon start dancing by the light of the silvery moon?</a></li>
<li>Andy Tanenbaum, <a href="https://www.youtube.com/watch?v=0pebP891V0c" rel="nofollow">A reimplementation of NetBSD</a> <a href="https://www.youtube.com/watch?v=Bu1JuwVfYTc" rel="nofollow">using a MicroKernel</a></li>
<li>Brooks Davis, <a href="https://www.youtube.com/watch?v=DwCg-51vFAs" rel="nofollow">CheriBSD: A research fork of FreeBSD</a></li>
<li>Giuseppe Lettieri, <a href="https://www.youtube.com/watch?v=Lo6wDCapo4k" rel="nofollow">Even faster VM networking with virtual passthrough</a></li>
<li>Joseph Mingrone, <a href="https://www.youtube.com/watch?v=K2pnf1YcMTY" rel="nofollow">Molecular Evolution, Genomic Analysis and FreeBSD</a></li>
<li>Olivier Cochard-Labbe, <a href="https://www.youtube.com/watch?v=6jhSvdnu4k0" rel="nofollow">Large-scale plug&amp;play x86 network appliance deployment over Internet</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=BizrC8Zr-YY" rel="nofollow">Using routing domains / routing tables in a production network</a></li>
<li>Ryan Lortie, <a href="https://www.youtube.com/watch?v=YSVFnM3_2Ik" rel="nofollow">a stitch in time: jhbuild</a></li>
<li>Ted Unangst, <a href="https://www.youtube.com/watch?v=9R5s3l-0wh0" rel="nofollow">signify: Securing OpenBSD From Us To You</a></li>
<li>Many more still to come...
***</li>
</ul>

<h3><a href="http://pid1.com/posts/post1.html" rel="nofollow">Documenting my BSD experience</a></h3>

<ul>
<li>Increasingly common scenario: a long-time Linux user (since the mid-90s) decides it&#39;s finally time to give BSD a try</li>
<li>&quot;That night I came home, I had been trying to find out everything I could about BSD and I watched many videos, read forums, etc. One of the shows I found was BSD Now. I saw that they helped people and answered questions, so I decided to write in.&quot;</li>
<li>In this ongoing series of blog posts, a user named Michael writes about his initial experiences with trying different BSDs for some different tasks</li>
<li>The first post covers ZFS on FreeBSD, used to build a file server for his house (and of course he lists the hardware, if you&#39;re into that)</li>
<li>You get a glimpse of a brand new user trying things out, learning how great ZFS-based RAID arrays are and even some of the initial hurdles someone could run into</li>
<li>He&#39;s also looking to venture into the realm of replacing some of his VMs with jails and bhyve soon</li>
<li>His <a href="http://pid1.com/posts/post2.html" rel="nofollow">second post</a> explores replacing the firewall on his self-described &quot;over complicated home network&quot; with an OpenBSD box</li>
<li>After going from ipfwadmin to ipchains to iptables, not even making it to nftables, he found the simple PF syntax to be really refreshing</li>
<li>All the tools for his networking needs, the majority of which are in the base system, worked quickly and were easy to understand</li>
<li>Getting to hear experiences like this are very important - they show areas where all the BSD developers&#39; hard work has paid off, but can also let us know where we need to improve
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/hardenedBSD-stable" rel="nofollow">PC-BSD tries HardenedBSD builds</a></h3>

<ul>
<li>The PC-BSD team has created a new branch of their git repo with the HardenedBSD ASLR patches integrated</li>
<li>They&#39;re not the first major FreeBSD-based project to offer an alternate build - OPNsense <a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">did that</a> a few weeks ago - but this might open the door for more projects to give it a try as well</li>
<li>With Personacrypt, OpenNTPD, LibreSSL and recent Tor integration through the tools, these additional memory protections will offer PC-BSD users even more security that a default FreeBSD install won&#39;t have</li>
<li>Time will tell if more projects and products like FreeNAS might be interested too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143423172522625&w=2" rel="nofollow">C-states in OpenBSD</a></h3>

<ul>
<li>People who run BSD on their notebooks, you&#39;ll want to pay attention to this one</li>
<li>OpenBSD has recently committed some ACPI improvements for <a href="http://www.hardwaresecrets.com/article/Everything-You-Need-to-Know-About-the-CPU-C-States-Power-Saving-Modes/611" rel="nofollow">deep C-states</a>, enabling the processor to enter a low-power mode</li>
<li><a href="https://twitter.com/StevenUniq/status/610586711358316545" rel="nofollow">According</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143430996602802&w=2" rel="nofollow">to a</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143429914700826&w=2" rel="nofollow">few users</a> <a href="https://www.marc.info/?l=openbsd-misc&m=143425943026225&w=2" rel="nofollow">so far</a>, the change has resulted in dramatically lower CPU temperatures on their laptops, as well as much better battery life</li>
<li>If you&#39;re running OpenBSD -current on a laptop, try out the latest snapshot and <a href="https://www.marc.info/?l=openbsd-misc&m=143423391222952&w=2" rel="nofollow">report back</a> with your findings
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/06/13/msg000687.html" rel="nofollow">NetBSD at Open Source Conference 2015 Hokkaido</a></h3>

<ul>
<li>The Japanese NetBSD users group never sleeps, and they&#39;ve hit yet another open source conference</li>
<li>As is usually the case, lots of strange machines on display were running none other than NetBSD (though it was mostly ARM this time)</li>
<li>We&#39;ll be having one of these guys on the show next week to discuss some of the lesser-known NetBSD platforms
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p><a href="https://www.marc.info/?l=openbsd-ports&m=143051151521627&w=2" rel="nofollow">Recent</a> <a href="https://www.marc.info/?l=openbsd-ports&m=143151777209226&w=2" rel="nofollow">improvements</a> to OpenBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a> tool</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/mist64/xhyve/blob/master/README.md" rel="nofollow">Introducing xhyve, bhyve on OS X</a></h3>

<ul>
<li>We&#39;ve talked about FreeBSD&#39;s &quot;bhyve&quot; hypervisor a lot on the show, and now it&#39;s been ported to another OS</li>
<li>As the name &quot;xhyve&quot; might imply, it&#39;s a port of bhyve to Mac OS X </li>
<li>Currently it only has support for virtualizing a few Linux distributions, but more guest systems can be added in the future</li>
<li>It runs entirely in userspace, and has no extra requirements beyond OS X 10.10 or newer</li>
<li>There are also <a href="http://www.pagetable.com/?p=831" rel="nofollow">a few examples</a> on how to use it
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/4KDisplays/" rel="nofollow">4K displays on DragonFlyBSD</a></h3>

<ul>
<li>If you&#39;ve been using DragonFly as a desktop, maybe with those nice Broadwell graphics, you&#39;ll be pleased to know that 4K displays work just fine</li>
<li>Matthew Dillon wrote up a wiki page about some of the specifics, including a couple gotchas</li>
<li>Some GUI applications might look weird on such a huge resolution, </li>
<li>HDMI ports are mostly limited to a 30Hz refresh rate, and there are slightly steeper hardware requirements for a smooth experience
***</li>
</ul>

<h3><a href="http://coderinaworldofcode.blogspot.com/2015/06/chrooting-mumble-server-on-openbsd.html" rel="nofollow">Sandboxing port daemons on OpenBSD</a></h3>

<ul>
<li>We talked about different containment methods last week, and mentioned that a lot of the daemons in OpenBSD&#39;s base as chrooted by default - things from ports or packages don&#39;t always get the same treatment</li>
<li>This blog post uses a mumble server as an example, but you can apply it to <em>any</em> service from ports that doesn&#39;t chroot by default</li>
<li>It goes through the process of manually building a sandbox with all the libraries you&#39;ll need to run the daemon, and this setup will even wipe and refresh the chroot every time you restart it</li>
<li>With a few small changes, similar tricks could be done on the other BSDs as well - everybody has chroots
***</li>
</ul>

<h3><a href="http://smallwall.freeforums.net/thread/44/version-1-8-2-released" rel="nofollow">SmallWall 1.8.2 released</a></h3>

<ul>
<li>SmallWall is a relatively new BSD-based project that we&#39;ve never covered before</li>
<li>It&#39;s an attempt to keep the old m0n0wall codebase going, and appears to have started around the time m0n0wall called it quits</li>
<li>They&#39;ve just released <a href="http://www.smallwall.org/download.html" rel="nofollow">the first official version</a>, so you can give it a try now</li>
<li>If you&#39;re interested in learning more about SmallWall, the lead developer just might be on the show in a few weeks...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21gRTNnk7" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DdiMvELg" rel="nofollow">Brian writes in</a></li>
<li><a href="http://slexy.org/view/s2h4ZS6SMd" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20kA1jeXY" rel="nofollow">Joel writes in</a></li>
<li><a href="http://slexy.org/view/s2wJ9HP1bs" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>93: Stacked in Our Favor</title>
  <link>https://www.bsdnow.tv/93</link>
  <guid isPermaLink="false">68a32090-b775-42f2-a1e5-50b8189800fa</guid>
  <pubDate>Wed, 10 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/68a32090-b775-42f2-a1e5-50b8189800fa.mp3" length="49138996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're at BSDCan this week, but fear not! We've got a great interview with Sepherosa Ziehau, a DragonFly developer, about their network stack. After that, we'll be discussing different methods of containment and privilege separation. Assuming no polar bears eat us, we'll be back next week with more BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're at BSDCan this week, but fear not! We've got a great interview with Sepherosa Ziehau, a DragonFly developer, about their network stack. After that, we'll be discussing different methods of containment and privilege separation. Assuming no polar bears eat us, we'll be back next week with more BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Sepherosa Ziehau - &lt;a href="mailto:sephe@dragonflybsd.org" target="_blank" rel="nofollow noopener"&gt;sephe@dragonflybsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Features of DragonFlyBSD's network stack&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Discussion&lt;/h2&gt;

&lt;h3&gt;Comparing containment methods and privilege separation&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;chroot, jails, systrace, capsicum, filesystem permissions, separating users
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2GjCsGPef" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21jj3QgTj" target="_blank" rel="nofollow noopener"&gt;Anonymous writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2irrhYfPT" target="_blank" rel="nofollow noopener"&gt;Benjamin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21gtuqXAe" target="_blank" rel="nofollow noopener"&gt;Jeroen writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, network stack, bsdcan, systrace, capsicum, chroot, jails, privsep, casper, containers, docker, performance</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re at BSDCan this week, but fear not! We&#39;ve got a great interview with Sepherosa Ziehau, a DragonFly developer, about their network stack. After that, we&#39;ll be discussing different methods of containment and privilege separation. Assuming no polar bears eat us, we&#39;ll be back next week with more BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Sepherosa Ziehau - <a href="mailto:sephe@dragonflybsd.org" rel="nofollow">sephe@dragonflybsd.org</a></h2>

<p>Features of DragonFlyBSD&#39;s network stack</p>

<hr>

<h2>Discussion</h2>

<h3>Comparing containment methods and privilege separation</h3>

<ul>
<li>chroot, jails, systrace, capsicum, filesystem permissions, separating users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2GjCsGPef" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21jj3QgTj" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s2irrhYfPT" rel="nofollow">Benjamin writes in</a></li>
<li><a href="http://slexy.org/view/s21gtuqXAe" rel="nofollow">Jeroen writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re at BSDCan this week, but fear not! We&#39;ve got a great interview with Sepherosa Ziehau, a DragonFly developer, about their network stack. After that, we&#39;ll be discussing different methods of containment and privilege separation. Assuming no polar bears eat us, we&#39;ll be back next week with more BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Interview - Sepherosa Ziehau - <a href="mailto:sephe@dragonflybsd.org" rel="nofollow">sephe@dragonflybsd.org</a></h2>

<p>Features of DragonFlyBSD&#39;s network stack</p>

<hr>

<h2>Discussion</h2>

<h3>Comparing containment methods and privilege separation</h3>

<ul>
<li>chroot, jails, systrace, capsicum, filesystem permissions, separating users
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2GjCsGPef" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21jj3QgTj" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s2irrhYfPT" rel="nofollow">Benjamin writes in</a></li>
<li><a href="http://slexy.org/view/s21gtuqXAe" rel="nofollow">Jeroen writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>92: BSD After Midnight</title>
  <link>https://www.bsdnow.tv/92</link>
  <guid isPermaLink="false">9d0d8811-2914-45e0-a34f-9638d2c4e761</guid>
  <pubDate>Wed, 03 Jun 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9d0d8811-2914-45e0-a34f-9638d2c4e761.mp3" length="48412372" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be chatting with Lucas Holt, founder of MidnightBSD. It's a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We'll find out what's different about it and why it was created. Answers to your emails and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Zocker, it's like docker on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they're working on native FreeBSD support at the moment&lt;/li&gt;
&lt;li&gt;This blog post is about a docker-&lt;em&gt;like&lt;/em&gt; script, mainly for ease-of-use, that uses only jails and ZFS in the base system&lt;/li&gt;
&lt;li&gt;In total, it's &lt;a href="https://github.com/toddnni/zocker" target="_blank" rel="nofollow noopener"&gt;1,500 lines of shell script&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration&lt;/li&gt;
&lt;li&gt;In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143285964216970&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;Patrol Read in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has recently imported some new code to support the &lt;a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" target="_blank" rel="nofollow noopener"&gt;Patrol Read&lt;/a&gt; function of some RAID controllers&lt;/li&gt;
&lt;li&gt;In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool "scrub" operation&lt;/li&gt;
&lt;li&gt;The goal is to protect file integrity by detecting drive failures before they can damage your data&lt;/li&gt;
&lt;li&gt;It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" target="_blank" rel="nofollow noopener"&gt;HAMMER 2 improvements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly BSD has been working on the second generation HAMMER FS&lt;/li&gt;
&lt;li&gt;It now uses LZ4 compression by default, which we've been big fans of in ZFS&lt;/li&gt;
&lt;li&gt;They've also switched to a &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" target="_blank" rel="nofollow noopener"&gt;faster CRC&lt;/a&gt; algorithm, further improving HAMMER's performance, &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" target="_blank" rel="nofollow noopener"&gt;especially&lt;/a&gt; when using iSCSI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation May update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has published another update newsletter, detailing some of the things they've been up to lately&lt;/li&gt;
&lt;li&gt;In it, you'll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation&lt;/li&gt;
&lt;li&gt;Some improvements were also made to FreeBSD's release building process for non-X86 architectures&lt;/li&gt;
&lt;li&gt;There's also an AsiaBSDCon recap that covers some of the presentations and the dev events&lt;/li&gt;
&lt;li&gt;They also have an accompanying &lt;a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" target="_blank" rel="nofollow noopener"&gt;blog post&lt;/a&gt; where Glen Barber talks about more sysadmin and clusteradm work at NYI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Lucas Holt - &lt;a href="mailto:questions@midnightbsd.org" target="_blank" rel="nofollow noopener"&gt;questions@midnightbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/midnightbsd" target="_blank" rel="nofollow noopener"&gt;@midnightbsd&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;MidnightBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" target="_blank" rel="nofollow noopener"&gt;The launchd on train is never coming&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Replacement of init systems has been quite controversial in the last few years&lt;/li&gt;
&lt;li&gt;Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port &lt;a href="https://en.wikipedia.org/wiki/Launchd" target="_blank" rel="nofollow noopener"&gt;launchd from OS X&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This blog post details the author's opinion on why he thinks we're never going to have launchd in any of the BSDs&lt;/li&gt;
&lt;li&gt;Email us your thoughts on the matter
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" target="_blank" rel="nofollow noopener"&gt;Native SSH comes to… Windows&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In what may be the first (and last) mention of Microsoft on BSD Now...&lt;/li&gt;
&lt;li&gt;They've just recently announced that PowerShell will get native SSH support in the near future&lt;/li&gt;
&lt;li&gt;It's not based on the commercial SSH either, it's the same one from OpenBSD that we already use everywhere&lt;/li&gt;
&lt;li&gt;Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions&lt;/li&gt;
&lt;li&gt;The announcement also promises that they'll be working with the OpenSSH community, so we'll see how many Microsoft-submitted patches make it upstream (or how many &lt;a href="http://www.openbsdfoundation.org/index.html" target="_blank" rel="nofollow noopener"&gt;donations&lt;/a&gt; they make)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" target="_blank" rel="nofollow noopener"&gt;Moving to FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This blog post describes a long-time Linux user's first BSD switching experience&lt;/li&gt;
&lt;li&gt;The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd&lt;/li&gt;
&lt;li&gt;After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is&lt;/li&gt;
&lt;li&gt;He also plans to write about his experience with other BSDs, and is writing some tutorials too - we'll check in with him again later on
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s29hS2cI05" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20VRZYBsw" target="_blank" rel="nofollow noopener"&gt;Dan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20bumJ5u9" target="_blank" rel="nofollow noopener"&gt;Ivan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21BU6Pnka" target="_blank" rel="nofollow noopener"&gt;Josh writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, midnightbsd, ghostbsd, zocker, docker, hammerfs, powershell, patrol read, openssh, launchd, bsdcan</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Lucas Holt, founder of MidnightBSD. It&#39;s a slightly lesser-known fork of FreeBSD, with a focus on easy desktop use. We&#39;ll find out what&#39;s different about it and why it was created. Answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://toni.yweb.fi/2015/05/zocker-diy-docker-on-freebsd.html" rel="nofollow">Zocker, it&#39;s like docker on FreeBSD</a></h3>

<ul>
<li>Containment is always a hot topic, and docker has gotten a lot of hype in Linux land in the last couple years - they&#39;re working on native FreeBSD support at the moment</li>
<li>This blog post is about a docker-<em>like</em> script, mainly for ease-of-use, that uses only jails and ZFS in the base system</li>
<li>In total, it&#39;s <a href="https://github.com/toddnni/zocker" rel="nofollow">1,500 lines of shell script</a></li>
<li>The post goes through the process of using the tool, showing off all the subcommands and explaining the configuration</li>
<li>In contrast to something like ezjail, Zocker utilizes the jail.conf system in the 10.x branch
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143285964216970&w=4" rel="nofollow">Patrol Read in OpenBSD</a></h3>

<ul>
<li>OpenBSD has recently imported some new code to support the <a href="http://www.intel.com/support/motherboards/server/sb/CS-028742.htm" rel="nofollow">Patrol Read</a> function of some RAID controllers</li>
<li>In a nutshell, Patrol Read is a function that lets you check the health of your drives in the background, similar to a zpool &quot;scrub&quot; operation</li>
<li>The goal is to protect file integrity by detecting drive failures before they can damage your data</li>
<li>It detects bad blocks and prevents silent data corruption, while marking any bad sectors it finds
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418653.html" rel="nofollow">HAMMER 2 improvements</a></h3>

<ul>
<li>DragonFly BSD has been working on the second generation HAMMER FS</li>
<li>It now uses LZ4 compression by default, which we&#39;ve been big fans of in ZFS</li>
<li>They&#39;ve also switched to a <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418652.html" rel="nofollow">faster CRC</a> algorithm, further improving HAMMER&#39;s performance, <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-May/418651.html" rel="nofollow">especially</a> when using iSCSI
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015mayupdate.pdf" rel="nofollow">FreeBSD foundation May update</a></h3>

<ul>
<li>The FreeBSD foundation has published another update newsletter, detailing some of the things they&#39;ve been up to lately</li>
<li>In it, you&#39;ll find some development status updates: notably more ARM64 work and the addition of 64 bit Linux emulation</li>
<li>Some improvements were also made to FreeBSD&#39;s release building process for non-X86 architectures</li>
<li>There&#39;s also an AsiaBSDCon recap that covers some of the presentations and the dev events</li>
<li>They also have an accompanying <a href="http://freebsdfoundation.blogspot.com/2015/05/another-data-center-site-visit-nyi.html" rel="nofollow">blog post</a> where Glen Barber talks about more sysadmin and clusteradm work at NYI
***</li>
</ul>

<h2>Interview - Lucas Holt - <a href="mailto:questions@midnightbsd.org" rel="nofollow">questions@midnightbsd.org</a> / <a href="https://twitter.com/midnightbsd" rel="nofollow">@midnightbsd</a></h2>

<p>MidnightBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homepage.ntlworld.com/jonathan.deboynepollard/FGA/launchd-on-bsd.html" rel="nofollow">The launchd on train is never coming</a></h3>

<ul>
<li>Replacement of init systems has been quite controversial in the last few years</li>
<li>Fortunately, the BSDs have avoided most of that conflict thus far, but there have been a few efforts made to port <a href="https://en.wikipedia.org/wiki/Launchd" rel="nofollow">launchd from OS X</a></li>
<li>This blog post details the author&#39;s opinion on why he thinks we&#39;re never going to have launchd in any of the BSDs</li>
<li>Email us your thoughts on the matter
***</li>
</ul>

<h3><a href="http://blogs.msdn.com/b/looking_forward_microsoft__support_for_secure_shell_ssh1/archive/2015/06/02/managing-looking-forward-microsoft-support-for-secure-shell-ssh.aspx" rel="nofollow">Native SSH comes to… Windows</a></h3>

<ul>
<li>In what may be the first (and last) mention of Microsoft on BSD Now...</li>
<li>They&#39;ve just recently announced that PowerShell will get native SSH support in the near future</li>
<li>It&#39;s not based on the commercial SSH either, it&#39;s the same one from OpenBSD that we already use everywhere</li>
<li>Up until now, interacting between BSD and Windows has required something like PuTTY, WinSCP, FileZilla or Cygwin - most of which are based on really outdated versions</li>
<li>The announcement also promises that they&#39;ll be working with the OpenSSH community, so we&#39;ll see how many Microsoft-submitted patches make it upstream (or how many <a href="http://www.openbsdfoundation.org/index.html" rel="nofollow">donations</a> they make)
***</li>
</ul>

<h3><a href="http://www.textplain.net/blog/2015/moving-to-freebsd/" rel="nofollow">Moving to FreeBSD</a></h3>

<ul>
<li>This blog post describes a long-time Linux user&#39;s first BSD switching experience</li>
<li>The author first talks about his Linux journey, eventually coming to love the more customization-friendly systems, but the journey ended with systemd</li>
<li>After doing a bit of research, he gave FreeBSD a try and ended up liking it - the rest of the post mostly covers why that is</li>
<li>He also plans to write about his experience with other BSDs, and is writing some tutorials too - we&#39;ll check in with him again later on
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s29hS2cI05" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s20VRZYBsw" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s20bumJ5u9" rel="nofollow">Ivan writes in</a></li>
<li><a href="http://slexy.org/view/s21BU6Pnka" rel="nofollow">Josh writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>91: Vox Populi</title>
  <link>https://www.bsdnow.tv/91</link>
  <guid isPermaLink="false">fb5f8b6c-3786-48ec-b8ed-0e2d4d62f539</guid>
  <pubDate>Wed, 27 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/fb5f8b6c-3786-48ec-b8ed-0e2d4d62f539.mp3" length="52090996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we've got something pretty different. We went to a Linux convention and asked various people if they've ever tried BSD and what they know about it. Stay tuned for that, all this week's news and, of course, answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:12:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we've got something pretty different. We went to a Linux convention and asked various people if they've ever tried BSD and what they know about it. Stay tuned for that, all this week's news and, of course, answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=143247114716771&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LUKS in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Last week, we were surprised to find out that DragonFlyBSD &lt;a href="http://leaf.dragonflybsd.org/cgi/web-man?command=cryptsetup&amp;amp;section=8" target="_blank" rel="nofollow noopener"&gt;has support&lt;/a&gt; for &lt;a href="https://en.wikipedia.org/wiki/Dm-crypt" target="_blank" rel="nofollow noopener"&gt;dm-crypt&lt;/a&gt;, sometimes referred to as LUKS (&lt;a href="https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup" target="_blank" rel="nofollow noopener"&gt;Linux Unified Key Setup&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;It looks like they might not be the only BSD with support for it for much longer, as OpenBSD is currently reviewing a patch for it as well&lt;/li&gt;
&lt;li&gt;LUKS would presumably be an additional option in OpenBSD's &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" target="_blank" rel="nofollow noopener"&gt;softraid&lt;/a&gt; system, which already provides native disk encryption&lt;/li&gt;
&lt;li&gt;Support hasn't been officially committed yet, it's still going through testing, but the code is there if you want to try it out and report your findings&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;If enabled&lt;/strong&gt;, this might pave the way for the first (semi-)cross platform encryption scheme since the demise of TrueCrypt (and maybe other BSDs will get it too in time)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-May/072255.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD gets 64bit Linux emulation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For those who might be unfamiliar, FreeBSD has an &lt;a href="https://www.freebsd.org/doc/handbook/linuxemu.html" target="_blank" rel="nofollow noopener"&gt;emulation layer&lt;/a&gt; to run Linux-only binaries (as rare as they may be)&lt;/li&gt;
&lt;li&gt;The most common use case is for desktop users, enabling them to run proprietary applications like Adobe Flash or Skype&lt;/li&gt;
&lt;li&gt;Similar systems can also be found &lt;a href="https://www.netbsd.org/docs/guide/en/chap-linux.html" target="_blank" rel="nofollow noopener"&gt;in NetBSD&lt;/a&gt; &lt;a href="http://www.openbsd.org/faq/faq9.html#Interact" target="_blank" rel="nofollow noopener"&gt;and OpenBSD&lt;/a&gt; (though disabled by default on the latter)&lt;/li&gt;
&lt;li&gt;However, until now, it's only supported binaries compiled for the i386 architecture&lt;/li&gt;
&lt;li&gt;This new update, already committed to -CURRENT, will open some new possibilities that weren't previously possible&lt;/li&gt;
&lt;li&gt;Meanwhile, HardenedBSD considers &lt;a href="https://hardenedbsd.org/content/poll-linuxulator-removal" target="_blank" rel="nofollow noopener"&gt;removing the emulation layer&lt;/a&gt; entirely
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/05/23/msg000686.html" target="_blank" rel="nofollow noopener"&gt;BSD at Open Source Conference 2015 Nagoya&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered the Japanese NetBSD users group setting up lots of machines at various conferences in the past, but now they're expanding&lt;/li&gt;
&lt;li&gt;Their latest report includes many of the NetBSD things you'd expect, but also a couple OpenBSD machines&lt;/li&gt;
&lt;li&gt;Some of the NetBSD ones included a Power Mac G4, SHARP NetWalker, Cubieboard2 and the not-so-foreign Raspberry Pi&lt;/li&gt;
&lt;li&gt;One new addition of interest is the OMRON LUNA88k, running the &lt;a href="http://www.openbsd.org/luna88k.html" target="_blank" rel="nofollow noopener"&gt;luna88k&lt;/a&gt; port of OpenBSD&lt;/li&gt;
&lt;li&gt;There was even an old cell phone &lt;a href="https://twitter.com/tsutsuii/status/601458973338775553" target="_blank" rel="nofollow noopener"&gt;running Windows games&lt;/a&gt; on NetBSD&lt;/li&gt;
&lt;li&gt;Check the mailing list post for &lt;a href="https://pbs.twimg.com/media/CFrSmztWEAAS2uE.jpg" target="_blank" rel="nofollow noopener"&gt;some&lt;/a&gt; &lt;a href="http://image.movapic.com/pic/m_201505230541335560130d49213.jpeg" target="_blank" rel="nofollow noopener"&gt;links&lt;/a&gt; &lt;a href="http://image.movapic.com/pic/m_2015052305145455600ccea723a.jpeg" target="_blank" rel="nofollow noopener"&gt;to&lt;/a&gt; &lt;a href="https://pbs.twimg.com/media/CFjPv9_UEAA8iEx.jpg:large" target="_blank" rel="nofollow noopener"&gt;all&lt;/a&gt; &lt;a href="https://pbs.twimg.com/media/CD4k6ZUUMAA0tEM.jpg" target="_blank" rel="nofollow noopener"&gt;of&lt;/a&gt; &lt;a href="https://pbs.twimg.com/media/CFqn1GXUsAAFuro.jpg" target="_blank" rel="nofollow noopener"&gt;the&lt;/a&gt; &lt;a href="https://pbs.twimg.com/media/CFdIS2IUkAAZvjc.jpg" target="_blank" rel="nofollow noopener"&gt;nice&lt;/a&gt; &lt;a href="https://pbs.twimg.com/media/CFf5mToUIAAFrRU.jpg" target="_blank" rel="nofollow noopener"&gt;pictures&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.llvm.org/2015/05/openmp-support_22.html" target="_blank" rel="nofollow noopener"&gt;LLVM introduces OpenMP support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the things that has kept some people in the GCC camp is the lack of &lt;a href="https://en.wikipedia.org/wiki/OpenMP" target="_blank" rel="nofollow noopener"&gt;OpenMP&lt;/a&gt; support in LLVM&lt;/li&gt;
&lt;li&gt;According to the blog post, it "enables Clang users to harness full power of modern multi-core processors with vector units"&lt;/li&gt;
&lt;li&gt;With Clang being the default in FreeBSD, Bitrig and OS X, and with some other BSDs exploring the option of switching, the need for this potential speed boost was definitely there&lt;/li&gt;
&lt;li&gt;This could also open some doors for more BSD in the area of high performance computing, putting an end to the current Linux monopoly
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Eric, FSF, John, Jose, Kris and Stewart&lt;/h2&gt;

&lt;p&gt;Various "man on the street" style mini-interviews&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://gitlab.com/worr/libintl/blob/master/src/usr.bin/gettext/gettext.c" target="_blank" rel="nofollow noopener"&gt;BSD-licensed gettext replacement&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've ever installed ports on any of the BSDs, you've probably had GNU's gettext pulled in as a dependency&lt;/li&gt;
&lt;li&gt;Wikipedia says "gettext is an internationalization and localization (i18n) system commonly used for writing multilingual programs on Unix-like computer operating systems"&lt;/li&gt;
&lt;li&gt;A new BSD-licensed rewrite has begun, with the initial version being for NetBSD (but it's likely to be portable)&lt;/li&gt;
&lt;li&gt;If you've got some coding skills, get involved with the project - the more freely-licensed replacements, the better
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/dspinellis/unix-history-repo" target="_blank" rel="nofollow noopener"&gt;Unix history git repo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A git repository was recently created to show off some Unix source code history&lt;/li&gt;
&lt;li&gt;The repository contains 659 thousand commits and 2306 merges&lt;/li&gt;
&lt;li&gt;You can see early 386BSD commits all the way up to some of the more modern FreeBSD code&lt;/li&gt;
&lt;li&gt;If you want to browse through the &lt;em&gt;giant&lt;/em&gt; codebase, it can be a great history lesson
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/05/hotfix-release-to-10-1-2-now-available/" target="_blank" rel="nofollow noopener"&gt;PCBSD 10.1.2 and Lumina updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned 10.1.1 being released last week (and all the cool features a couple weeks before) but now 10.1.2 is out&lt;/li&gt;
&lt;li&gt;This minor update contained a few hotfixes: RAID-Z installation, cache and log devices and the text-only installer in UEFI mode&lt;/li&gt;
&lt;li&gt;There's also a &lt;a href="http://blog.pcbsd.org/2015/05/lumina-desktop-status-updatefaq/" target="_blank" rel="nofollow noopener"&gt;new post&lt;/a&gt; on the PCBSD blog about Lumina, answering some frequently asked questions and giving a general status update
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s25h4Biwzq" target="_blank" rel="nofollow noopener"&gt;Jake writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2AF0bGmL6" target="_blank" rel="nofollow noopener"&gt;Van writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Ie1USFD" target="_blank" rel="nofollow noopener"&gt;Anonymous writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20vBtoKqL" target="_blank" rel="nofollow noopener"&gt;Dominik writes in&lt;/a&gt; (&lt;a href="http://slexy.org/view/s20RjbIT5v" target="_blank" rel="nofollow noopener"&gt;text answer&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20USR3WzT" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-May/033945.html" target="_blank" rel="nofollow noopener"&gt;Death by chocolate&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, lfnw, linuxfest northwest, fsf, rms, hammer fs, nagoya, osc, dm-crypt, luks, cryptography, openmp, clang, llvm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ve got something pretty different. We went to a Linux convention and asked various people if they&#39;ve ever tried BSD and what they know about it. Stay tuned for that, all this week&#39;s news and, of course, answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143247114716771&w=2" rel="nofollow">LUKS in OpenBSD</a></h3>

<ul>
<li>Last week, we were surprised to find out that DragonFlyBSD <a href="http://leaf.dragonflybsd.org/cgi/web-man?command=cryptsetup&section=8" rel="nofollow">has support</a> for <a href="https://en.wikipedia.org/wiki/Dm-crypt" rel="nofollow">dm-crypt</a>, sometimes referred to as LUKS (<a href="https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup" rel="nofollow">Linux Unified Key Setup</a>)</li>
<li>It looks like they might not be the only BSD with support for it for much longer, as OpenBSD is currently reviewing a patch for it as well</li>
<li>LUKS would presumably be an additional option in OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> system, which already provides native disk encryption</li>
<li>Support hasn&#39;t been officially committed yet, it&#39;s still going through testing, but the code is there if you want to try it out and report your findings</li>
<li><strong>If enabled</strong>, this might pave the way for the first (semi-)cross platform encryption scheme since the demise of TrueCrypt (and maybe other BSDs will get it too in time)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-May/072255.html" rel="nofollow">FreeBSD gets 64bit Linux emulation</a></h3>

<ul>
<li>For those who might be unfamiliar, FreeBSD has an <a href="https://www.freebsd.org/doc/handbook/linuxemu.html" rel="nofollow">emulation layer</a> to run Linux-only binaries (as rare as they may be)</li>
<li>The most common use case is for desktop users, enabling them to run proprietary applications like Adobe Flash or Skype</li>
<li>Similar systems can also be found <a href="https://www.netbsd.org/docs/guide/en/chap-linux.html" rel="nofollow">in NetBSD</a> <a href="http://www.openbsd.org/faq/faq9.html#Interact" rel="nofollow">and OpenBSD</a> (though disabled by default on the latter)</li>
<li>However, until now, it&#39;s only supported binaries compiled for the i386 architecture</li>
<li>This new update, already committed to -CURRENT, will open some new possibilities that weren&#39;t previously possible</li>
<li>Meanwhile, HardenedBSD considers <a href="https://hardenedbsd.org/content/poll-linuxulator-removal" rel="nofollow">removing the emulation layer</a> entirely
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/05/23/msg000686.html" rel="nofollow">BSD at Open Source Conference 2015 Nagoya</a></h3>

<ul>
<li>We&#39;ve covered the Japanese NetBSD users group setting up lots of machines at various conferences in the past, but now they&#39;re expanding</li>
<li>Their latest report includes many of the NetBSD things you&#39;d expect, but also a couple OpenBSD machines</li>
<li>Some of the NetBSD ones included a Power Mac G4, SHARP NetWalker, Cubieboard2 and the not-so-foreign Raspberry Pi</li>
<li>One new addition of interest is the OMRON LUNA88k, running the <a href="http://www.openbsd.org/luna88k.html" rel="nofollow">luna88k</a> port of OpenBSD</li>
<li>There was even an old cell phone <a href="https://twitter.com/tsutsuii/status/601458973338775553" rel="nofollow">running Windows games</a> on NetBSD</li>
<li>Check the mailing list post for <a href="https://pbs.twimg.com/media/CFrSmztWEAAS2uE.jpg" rel="nofollow">some</a> <a href="http://image.movapic.com/pic/m_201505230541335560130d49213.jpeg" rel="nofollow">links</a> <a href="http://image.movapic.com/pic/m_2015052305145455600ccea723a.jpeg" rel="nofollow">to</a> <a href="https://pbs.twimg.com/media/CFjPv9_UEAA8iEx.jpg:large" rel="nofollow">all</a> <a href="https://pbs.twimg.com/media/CD4k6ZUUMAA0tEM.jpg" rel="nofollow">of</a> <a href="https://pbs.twimg.com/media/CFqn1GXUsAAFuro.jpg" rel="nofollow">the</a> <a href="https://pbs.twimg.com/media/CFdIS2IUkAAZvjc.jpg" rel="nofollow">nice</a> <a href="https://pbs.twimg.com/media/CFf5mToUIAAFrRU.jpg" rel="nofollow">pictures</a>
***</li>
</ul>

<h3><a href="http://blog.llvm.org/2015/05/openmp-support_22.html" rel="nofollow">LLVM introduces OpenMP support</a></h3>

<ul>
<li>One of the things that has kept some people in the GCC camp is the lack of <a href="https://en.wikipedia.org/wiki/OpenMP" rel="nofollow">OpenMP</a> support in LLVM</li>
<li>According to the blog post, it &quot;enables Clang users to harness full power of modern multi-core processors with vector units&quot;</li>
<li>With Clang being the default in FreeBSD, Bitrig and OS X, and with some other BSDs exploring the option of switching, the need for this potential speed boost was definitely there</li>
<li>This could also open some doors for more BSD in the area of high performance computing, putting an end to the current Linux monopoly
***</li>
</ul>

<h2>Interview - Eric, FSF, John, Jose, Kris and Stewart</h2>

<p>Various &quot;man on the street&quot; style mini-interviews</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://gitlab.com/worr/libintl/blob/master/src/usr.bin/gettext/gettext.c" rel="nofollow">BSD-licensed gettext replacement</a></h3>

<ul>
<li>If you&#39;ve ever installed ports on any of the BSDs, you&#39;ve probably had GNU&#39;s gettext pulled in as a dependency</li>
<li>Wikipedia says &quot;gettext is an internationalization and localization (i18n) system commonly used for writing multilingual programs on Unix-like computer operating systems&quot;</li>
<li>A new BSD-licensed rewrite has begun, with the initial version being for NetBSD (but it&#39;s likely to be portable)</li>
<li>If you&#39;ve got some coding skills, get involved with the project - the more freely-licensed replacements, the better
***</li>
</ul>

<h3><a href="https://github.com/dspinellis/unix-history-repo" rel="nofollow">Unix history git repo</a></h3>

<ul>
<li>A git repository was recently created to show off some Unix source code history</li>
<li>The repository contains 659 thousand commits and 2306 merges</li>
<li>You can see early 386BSD commits all the way up to some of the more modern FreeBSD code</li>
<li>If you want to browse through the <em>giant</em> codebase, it can be a great history lesson
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/hotfix-release-to-10-1-2-now-available/" rel="nofollow">PCBSD 10.1.2 and Lumina updates</a></h3>

<ul>
<li>We mentioned 10.1.1 being released last week (and all the cool features a couple weeks before) but now 10.1.2 is out</li>
<li>This minor update contained a few hotfixes: RAID-Z installation, cache and log devices and the text-only installer in UEFI mode</li>
<li>There&#39;s also a <a href="http://blog.pcbsd.org/2015/05/lumina-desktop-status-updatefaq/" rel="nofollow">new post</a> on the PCBSD blog about Lumina, answering some frequently asked questions and giving a general status update
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25h4Biwzq" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s2AF0bGmL6" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s20Ie1USFD" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s20vBtoKqL" rel="nofollow">Dominik writes in</a> (<a href="http://slexy.org/view/s20RjbIT5v" rel="nofollow">text answer</a>)</li>
<li><a href="http://slexy.org/view/s20USR3WzT" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-May/033945.html" rel="nofollow">Death by chocolate</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ve got something pretty different. We went to a Linux convention and asked various people if they&#39;ve ever tried BSD and what they know about it. Stay tuned for that, all this week&#39;s news and, of course, answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=143247114716771&w=2" rel="nofollow">LUKS in OpenBSD</a></h3>

<ul>
<li>Last week, we were surprised to find out that DragonFlyBSD <a href="http://leaf.dragonflybsd.org/cgi/web-man?command=cryptsetup&section=8" rel="nofollow">has support</a> for <a href="https://en.wikipedia.org/wiki/Dm-crypt" rel="nofollow">dm-crypt</a>, sometimes referred to as LUKS (<a href="https://en.wikipedia.org/wiki/Linux_Unified_Key_Setup" rel="nofollow">Linux Unified Key Setup</a>)</li>
<li>It looks like they might not be the only BSD with support for it for much longer, as OpenBSD is currently reviewing a patch for it as well</li>
<li>LUKS would presumably be an additional option in OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> system, which already provides native disk encryption</li>
<li>Support hasn&#39;t been officially committed yet, it&#39;s still going through testing, but the code is there if you want to try it out and report your findings</li>
<li><strong>If enabled</strong>, this might pave the way for the first (semi-)cross platform encryption scheme since the demise of TrueCrypt (and maybe other BSDs will get it too in time)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-May/072255.html" rel="nofollow">FreeBSD gets 64bit Linux emulation</a></h3>

<ul>
<li>For those who might be unfamiliar, FreeBSD has an <a href="https://www.freebsd.org/doc/handbook/linuxemu.html" rel="nofollow">emulation layer</a> to run Linux-only binaries (as rare as they may be)</li>
<li>The most common use case is for desktop users, enabling them to run proprietary applications like Adobe Flash or Skype</li>
<li>Similar systems can also be found <a href="https://www.netbsd.org/docs/guide/en/chap-linux.html" rel="nofollow">in NetBSD</a> <a href="http://www.openbsd.org/faq/faq9.html#Interact" rel="nofollow">and OpenBSD</a> (though disabled by default on the latter)</li>
<li>However, until now, it&#39;s only supported binaries compiled for the i386 architecture</li>
<li>This new update, already committed to -CURRENT, will open some new possibilities that weren&#39;t previously possible</li>
<li>Meanwhile, HardenedBSD considers <a href="https://hardenedbsd.org/content/poll-linuxulator-removal" rel="nofollow">removing the emulation layer</a> entirely
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/05/23/msg000686.html" rel="nofollow">BSD at Open Source Conference 2015 Nagoya</a></h3>

<ul>
<li>We&#39;ve covered the Japanese NetBSD users group setting up lots of machines at various conferences in the past, but now they&#39;re expanding</li>
<li>Their latest report includes many of the NetBSD things you&#39;d expect, but also a couple OpenBSD machines</li>
<li>Some of the NetBSD ones included a Power Mac G4, SHARP NetWalker, Cubieboard2 and the not-so-foreign Raspberry Pi</li>
<li>One new addition of interest is the OMRON LUNA88k, running the <a href="http://www.openbsd.org/luna88k.html" rel="nofollow">luna88k</a> port of OpenBSD</li>
<li>There was even an old cell phone <a href="https://twitter.com/tsutsuii/status/601458973338775553" rel="nofollow">running Windows games</a> on NetBSD</li>
<li>Check the mailing list post for <a href="https://pbs.twimg.com/media/CFrSmztWEAAS2uE.jpg" rel="nofollow">some</a> <a href="http://image.movapic.com/pic/m_201505230541335560130d49213.jpeg" rel="nofollow">links</a> <a href="http://image.movapic.com/pic/m_2015052305145455600ccea723a.jpeg" rel="nofollow">to</a> <a href="https://pbs.twimg.com/media/CFjPv9_UEAA8iEx.jpg:large" rel="nofollow">all</a> <a href="https://pbs.twimg.com/media/CD4k6ZUUMAA0tEM.jpg" rel="nofollow">of</a> <a href="https://pbs.twimg.com/media/CFqn1GXUsAAFuro.jpg" rel="nofollow">the</a> <a href="https://pbs.twimg.com/media/CFdIS2IUkAAZvjc.jpg" rel="nofollow">nice</a> <a href="https://pbs.twimg.com/media/CFf5mToUIAAFrRU.jpg" rel="nofollow">pictures</a>
***</li>
</ul>

<h3><a href="http://blog.llvm.org/2015/05/openmp-support_22.html" rel="nofollow">LLVM introduces OpenMP support</a></h3>

<ul>
<li>One of the things that has kept some people in the GCC camp is the lack of <a href="https://en.wikipedia.org/wiki/OpenMP" rel="nofollow">OpenMP</a> support in LLVM</li>
<li>According to the blog post, it &quot;enables Clang users to harness full power of modern multi-core processors with vector units&quot;</li>
<li>With Clang being the default in FreeBSD, Bitrig and OS X, and with some other BSDs exploring the option of switching, the need for this potential speed boost was definitely there</li>
<li>This could also open some doors for more BSD in the area of high performance computing, putting an end to the current Linux monopoly
***</li>
</ul>

<h2>Interview - Eric, FSF, John, Jose, Kris and Stewart</h2>

<p>Various &quot;man on the street&quot; style mini-interviews</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://gitlab.com/worr/libintl/blob/master/src/usr.bin/gettext/gettext.c" rel="nofollow">BSD-licensed gettext replacement</a></h3>

<ul>
<li>If you&#39;ve ever installed ports on any of the BSDs, you&#39;ve probably had GNU&#39;s gettext pulled in as a dependency</li>
<li>Wikipedia says &quot;gettext is an internationalization and localization (i18n) system commonly used for writing multilingual programs on Unix-like computer operating systems&quot;</li>
<li>A new BSD-licensed rewrite has begun, with the initial version being for NetBSD (but it&#39;s likely to be portable)</li>
<li>If you&#39;ve got some coding skills, get involved with the project - the more freely-licensed replacements, the better
***</li>
</ul>

<h3><a href="https://github.com/dspinellis/unix-history-repo" rel="nofollow">Unix history git repo</a></h3>

<ul>
<li>A git repository was recently created to show off some Unix source code history</li>
<li>The repository contains 659 thousand commits and 2306 merges</li>
<li>You can see early 386BSD commits all the way up to some of the more modern FreeBSD code</li>
<li>If you want to browse through the <em>giant</em> codebase, it can be a great history lesson
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/hotfix-release-to-10-1-2-now-available/" rel="nofollow">PCBSD 10.1.2 and Lumina updates</a></h3>

<ul>
<li>We mentioned 10.1.1 being released last week (and all the cool features a couple weeks before) but now 10.1.2 is out</li>
<li>This minor update contained a few hotfixes: RAID-Z installation, cache and log devices and the text-only installer in UEFI mode</li>
<li>There&#39;s also a <a href="http://blog.pcbsd.org/2015/05/lumina-desktop-status-updatefaq/" rel="nofollow">new post</a> on the PCBSD blog about Lumina, answering some frequently asked questions and giving a general status update
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25h4Biwzq" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s2AF0bGmL6" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s20Ie1USFD" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s20vBtoKqL" rel="nofollow">Dominik writes in</a> (<a href="http://slexy.org/view/s20RjbIT5v" rel="nofollow">text answer</a>)</li>
<li><a href="http://slexy.org/view/s20USR3WzT" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-May/033945.html" rel="nofollow">Death by chocolate</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>90: ZFS Armistice</title>
  <link>https://www.bsdnow.tv/90</link>
  <guid isPermaLink="false">5faad566-284e-4d62-b377-5144cf232cdb</guid>
  <pubDate>Wed, 20 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5faad566-284e-4d62-b377-5144cf232cdb.mp3" length="52647700" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be chatting with Jed Reynolds about ZFS. He's been using it extensively on a certain other OS, and we can both learn a bit about the other side's implementation. Answers to your questions and all this week's news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be chatting with Jed Reynolds about ZFS. He's been using it extensively on a certain other OS, and we can both learn a bit about the other side's implementation. Answers to your questions and all this week's news, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.conviso.com.br/2015/05/playing-with-sandbox-analysis-of_13.html" target="_blank" rel="nofollow noopener"&gt;Playing with sandboxing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sandboxing and privilege separation are popular topics these days - they're the goal of the new "shill" scripting language, they're used heavily throughout OpenBSD, and they're gaining traction with the capsicum framework&lt;/li&gt;
&lt;li&gt;This blog post explores capsicum in FreeBSD, some of its history and where it's used in the base system&lt;/li&gt;
&lt;li&gt;They also include some code samples so you can verify that capsicum is actually denying the program access to certain system calls&lt;/li&gt;
&lt;li&gt;Check our &lt;a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" target="_blank" rel="nofollow noopener"&gt;interview about capsicum&lt;/a&gt; from a while back if you haven't seen it already
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143195693612629&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;OpenNTPD on by default&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has enabled &lt;a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" target="_blank" rel="nofollow noopener"&gt;ntpd&lt;/a&gt; by default in the installer, rather than prompting the user if they want to turn it on&lt;/li&gt;
&lt;li&gt;In nearly every case, you're going to want to have your clock synced via NTP&lt;/li&gt;
&lt;li&gt;With the HTTPS constraints feature also enabled by default, this should keep the time checked and accurate, even against spoofing attacks&lt;/li&gt;
&lt;li&gt;Lots of problems can be traced back to the time on one system or another being wrong, so this will also eliminate some of those cases&lt;/li&gt;
&lt;li&gt;For those who might be &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/etc/ntpd.conf" target="_blank" rel="nofollow noopener"&gt;curious&lt;/a&gt;, they're using the "&lt;a href="http://www.pool.ntp.org/en/" target="_blank" rel="nofollow noopener"&gt;pool.ntp.org&lt;/a&gt;" cluster of addresses and google for HTTPS constraints (but these can be &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;easily changed&lt;/a&gt;)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.banym.de/freebsd/review-first-freebsd-workshop-in-landshut-on-15-may-2015" target="_blank" rel="nofollow noopener"&gt;FreeBSD workshop in Landshut&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned a BSD installfest happening in Germany a few weeks back, and the organizer wrote in with a review of the event&lt;/li&gt;
&lt;li&gt;The installfest instead became a "FreeBSD workshop" session, introducing curious new users to some of the flagship features of the OS&lt;/li&gt;
&lt;li&gt;They covered when to use UFS or ZFS, firewall options, the release/stable/current branches and finally how to automate installations with Ansible&lt;/li&gt;
&lt;li&gt;If you're in south Germany and want to give similar introduction talks or Q&amp;amp;A sessions about the other BSDs, get in touch&lt;/li&gt;
&lt;li&gt;We'll hear more from him about how it went in the feedback section today
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207690.html" target="_blank" rel="nofollow noopener"&gt;Swap encryption in DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Doing &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;full disk encryption&lt;/a&gt; is very important, but something that people sometimes overlook is encrypting their swap&lt;/li&gt;
&lt;li&gt;This can actually be &lt;em&gt;more&lt;/em&gt; important than the contents of your disks, especially if an unencrypted password or key hits your swap (as it can be recovered quite easily)&lt;/li&gt;
&lt;li&gt;DragonFlyBSD has added a new experimental option to automatically encrypt your swap partition in fstab&lt;/li&gt;
&lt;li&gt;There was &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207691.html" target="_blank" rel="nofollow noopener"&gt;another way&lt;/a&gt; to do it previously, but this is a lot easier&lt;/li&gt;
&lt;li&gt;You can achieve similar results in FreeBSD by adding ".eli" to the end of the swap device in fstab, there are &lt;a href="https://www.netbsd.org/docs/misc/#cgd-swap" target="_blank" rel="nofollow noopener"&gt;a few steps&lt;/a&gt; to do it in NetBSD and swap in OpenBSD is encrypted by default&lt;/li&gt;
&lt;li&gt;A one-time key will be created and then destroyed in each case, making recovery of the plaintext nearly impossible
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jed Reynolds - &lt;a href="mailto:jed@bitratchet.com" target="_blank" rel="nofollow noopener"&gt;jed@bitratchet.com&lt;/a&gt; / &lt;a href="https://twitter.com/jed_reynolds" target="_blank" rel="nofollow noopener"&gt;@jed_reynolds&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Comparing ZFS on Linux and FreeBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.cambus.net/rding-temper-gold-usb-thermometer-on-openbsd/" target="_blank" rel="nofollow noopener"&gt;USB thermometer on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;So maybe you've got BSD on your server or router, maybe NetBSD on a toaster, but have you ever used a thermometer with one?&lt;/li&gt;
&lt;li&gt;This blog post introduces the RDing TEMPer Gold USB thermometer, a small device that can tell the room temperature, and how to get it working on OpenBSD&lt;/li&gt;
&lt;li&gt;Wouldn't you know it, OpenBSD has a native "&lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/ugold.4" target="_blank" rel="nofollow noopener"&gt;ugold&lt;/a&gt;" driver to support it with the sensors framework&lt;/li&gt;
&lt;li&gt;How useful such a device would be is another story though
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sourceforge.net/projects/nas4free/files/NAS4Free-ARM/10.1.0.2.1511/" target="_blank" rel="nofollow noopener"&gt;NAS4Free now on ARM&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We talk a lot about hardware for network-attached storage devices on the show, but ARM doesn't come up a lot&lt;/li&gt;
&lt;li&gt;That might be changing soon, as NAS4Free has just released some ARM builds&lt;/li&gt;
&lt;li&gt;These new (somewhat experimental) images are based on FreeBSD 11-CURRENT&lt;/li&gt;
&lt;li&gt;Included in the announcement is a list of fully-supported and partially-supported hardware that they've tested it with&lt;/li&gt;
&lt;li&gt;If anyone has experience with running a NAS on slightly exotic hardware, write in to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pkgsrc.pub/pkgsrcCon/2015/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon 2015 CFP and info&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's pkgsrcCon will be in Berlin, Germany &lt;a href="https://mail-index.netbsd.org/pkgsrc-users/2015/05/16/msg021560.html" target="_blank" rel="nofollow noopener"&gt;on July 4th and 5th&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They're looking for talk proposals and ideas for things you'd like to see&lt;/li&gt;
&lt;li&gt;If you or your company uses pkgsrc, or if you're just interested in NetBSD in general, it would be a good event to check out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2015/05/bsdtalk253-george-neville-neil.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 253&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDTalk has released another new episode&lt;/li&gt;
&lt;li&gt;In it, he interviews George Neville-Neil about the 2nd edition of "The Design and Implementation of the FreeBSD Operating System"&lt;/li&gt;
&lt;li&gt;They discuss what's new since the last edition, who the book's target audience is and a lot more&lt;/li&gt;
&lt;li&gt;We're up to 90 episodes now, slowly catching up to Will...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2SWlyuOeb" target="_blank" rel="nofollow noopener"&gt;Dominik writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216z44lDU" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2djtX0dSE" target="_blank" rel="nofollow noopener"&gt;Corvin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21XM4hPRh" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, zpool, openzfs, zfsonlinux, nas4free, capsicum, systrace, arm, rfc7539, bsdrp, openntpd, landshut, pkgsrc, pkgsrccon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be chatting with Jed Reynolds about ZFS. He&#39;s been using it extensively on a certain other OS, and we can both learn a bit about the other side&#39;s implementation. Answers to your questions and all this week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.conviso.com.br/2015/05/playing-with-sandbox-analysis-of_13.html" rel="nofollow">Playing with sandboxing</a></h3>

<ul>
<li>Sandboxing and privilege separation are popular topics these days - they&#39;re the goal of the new &quot;shill&quot; scripting language, they&#39;re used heavily throughout OpenBSD, and they&#39;re gaining traction with the capsicum framework</li>
<li>This blog post explores capsicum in FreeBSD, some of its history and where it&#39;s used in the base system</li>
<li>They also include some code samples so you can verify that capsicum is actually denying the program access to certain system calls</li>
<li>Check our <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">interview about capsicum</a> from a while back if you haven&#39;t seen it already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143195693612629&w=4" rel="nofollow">OpenNTPD on by default</a></h3>

<ul>
<li>OpenBSD has enabled <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">ntpd</a> by default in the installer, rather than prompting the user if they want to turn it on</li>
<li>In nearly every case, you&#39;re going to want to have your clock synced via NTP</li>
<li>With the HTTPS constraints feature also enabled by default, this should keep the time checked and accurate, even against spoofing attacks</li>
<li>Lots of problems can be traced back to the time on one system or another being wrong, so this will also eliminate some of those cases</li>
<li>For those who might be <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/etc/ntpd.conf" rel="nofollow">curious</a>, they&#39;re using the &quot;<a href="http://www.pool.ntp.org/en/" rel="nofollow">pool.ntp.org</a>&quot; cluster of addresses and google for HTTPS constraints (but these can be <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">easily changed</a>)
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/review-first-freebsd-workshop-in-landshut-on-15-may-2015" rel="nofollow">FreeBSD workshop in Landshut</a></h3>

<ul>
<li>We mentioned a BSD installfest happening in Germany a few weeks back, and the organizer wrote in with a review of the event</li>
<li>The installfest instead became a &quot;FreeBSD workshop&quot; session, introducing curious new users to some of the flagship features of the OS</li>
<li>They covered when to use UFS or ZFS, firewall options, the release/stable/current branches and finally how to automate installations with Ansible</li>
<li>If you&#39;re in south Germany and want to give similar introduction talks or Q&amp;A sessions about the other BSDs, get in touch</li>
<li>We&#39;ll hear more from him about how it went in the feedback section today
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207690.html" rel="nofollow">Swap encryption in DragonFly</a></h3>

<ul>
<li>Doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">full disk encryption</a> is very important, but something that people sometimes overlook is encrypting their swap</li>
<li>This can actually be <em>more</em> important than the contents of your disks, especially if an unencrypted password or key hits your swap (as it can be recovered quite easily)</li>
<li>DragonFlyBSD has added a new experimental option to automatically encrypt your swap partition in fstab</li>
<li>There was <a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207691.html" rel="nofollow">another way</a> to do it previously, but this is a lot easier</li>
<li>You can achieve similar results in FreeBSD by adding &quot;.eli&quot; to the end of the swap device in fstab, there are <a href="https://www.netbsd.org/docs/misc/#cgd-swap" rel="nofollow">a few steps</a> to do it in NetBSD and swap in OpenBSD is encrypted by default</li>
<li>A one-time key will be created and then destroyed in each case, making recovery of the plaintext nearly impossible
***</li>
</ul>

<h2>Interview - Jed Reynolds - <a href="mailto:jed@bitratchet.com" rel="nofollow">jed@bitratchet.com</a> / <a href="https://twitter.com/jed_reynolds" rel="nofollow">@jed_reynolds</a></h2>

<p>Comparing ZFS on Linux and FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.cambus.net/rding-temper-gold-usb-thermometer-on-openbsd/" rel="nofollow">USB thermometer on OpenBSD</a></h3>

<ul>
<li>So maybe you&#39;ve got BSD on your server or router, maybe NetBSD on a toaster, but have you ever used a thermometer with one?</li>
<li>This blog post introduces the RDing TEMPer Gold USB thermometer, a small device that can tell the room temperature, and how to get it working on OpenBSD</li>
<li>Wouldn&#39;t you know it, OpenBSD has a native &quot;<a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/ugold.4" rel="nofollow">ugold</a>&quot; driver to support it with the sensors framework</li>
<li>How useful such a device would be is another story though
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/nas4free/files/NAS4Free-ARM/10.1.0.2.1511/" rel="nofollow">NAS4Free now on ARM</a></h3>

<ul>
<li>We talk a lot about hardware for network-attached storage devices on the show, but ARM doesn&#39;t come up a lot</li>
<li>That might be changing soon, as NAS4Free has just released some ARM builds</li>
<li>These new (somewhat experimental) images are based on FreeBSD 11-CURRENT</li>
<li>Included in the announcement is a list of fully-supported and partially-supported hardware that they&#39;ve tested it with</li>
<li>If anyone has experience with running a NAS on slightly exotic hardware, write in to us
***</li>
</ul>

<h3><a href="http://pkgsrc.pub/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon 2015 CFP and info</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon will be in Berlin, Germany <a href="https://mail-index.netbsd.org/pkgsrc-users/2015/05/16/msg021560.html" rel="nofollow">on July 4th and 5th</a></li>
<li>They&#39;re looking for talk proposals and ideas for things you&#39;d like to see</li>
<li>If you or your company uses pkgsrc, or if you&#39;re just interested in NetBSD in general, it would be a good event to check out
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/05/bsdtalk253-george-neville-neil.html" rel="nofollow">BSDTalk episode 253</a></h3>

<ul>
<li>BSDTalk has released another new episode</li>
<li>In it, he interviews George Neville-Neil about the 2nd edition of &quot;The Design and Implementation of the FreeBSD Operating System&quot;</li>
<li>They discuss what&#39;s new since the last edition, who the book&#39;s target audience is and a lot more</li>
<li>We&#39;re up to 90 episodes now, slowly catching up to Will...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2SWlyuOeb" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s216z44lDU" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2djtX0dSE" rel="nofollow">Corvin writes in</a></li>
<li><a href="http://slexy.org/view/s21XM4hPRh" rel="nofollow">James writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be chatting with Jed Reynolds about ZFS. He&#39;s been using it extensively on a certain other OS, and we can both learn a bit about the other side&#39;s implementation. Answers to your questions and all this week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.conviso.com.br/2015/05/playing-with-sandbox-analysis-of_13.html" rel="nofollow">Playing with sandboxing</a></h3>

<ul>
<li>Sandboxing and privilege separation are popular topics these days - they&#39;re the goal of the new &quot;shill&quot; scripting language, they&#39;re used heavily throughout OpenBSD, and they&#39;re gaining traction with the capsicum framework</li>
<li>This blog post explores capsicum in FreeBSD, some of its history and where it&#39;s used in the base system</li>
<li>They also include some code samples so you can verify that capsicum is actually denying the program access to certain system calls</li>
<li>Check our <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">interview about capsicum</a> from a while back if you haven&#39;t seen it already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=143195693612629&w=4" rel="nofollow">OpenNTPD on by default</a></h3>

<ul>
<li>OpenBSD has enabled <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">ntpd</a> by default in the installer, rather than prompting the user if they want to turn it on</li>
<li>In nearly every case, you&#39;re going to want to have your clock synced via NTP</li>
<li>With the HTTPS constraints feature also enabled by default, this should keep the time checked and accurate, even against spoofing attacks</li>
<li>Lots of problems can be traced back to the time on one system or another being wrong, so this will also eliminate some of those cases</li>
<li>For those who might be <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/etc/ntpd.conf" rel="nofollow">curious</a>, they&#39;re using the &quot;<a href="http://www.pool.ntp.org/en/" rel="nofollow">pool.ntp.org</a>&quot; cluster of addresses and google for HTTPS constraints (but these can be <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">easily changed</a>)
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/review-first-freebsd-workshop-in-landshut-on-15-may-2015" rel="nofollow">FreeBSD workshop in Landshut</a></h3>

<ul>
<li>We mentioned a BSD installfest happening in Germany a few weeks back, and the organizer wrote in with a review of the event</li>
<li>The installfest instead became a &quot;FreeBSD workshop&quot; session, introducing curious new users to some of the flagship features of the OS</li>
<li>They covered when to use UFS or ZFS, firewall options, the release/stable/current branches and finally how to automate installations with Ansible</li>
<li>If you&#39;re in south Germany and want to give similar introduction talks or Q&amp;A sessions about the other BSDs, get in touch</li>
<li>We&#39;ll hear more from him about how it went in the feedback section today
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207690.html" rel="nofollow">Swap encryption in DragonFly</a></h3>

<ul>
<li>Doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">full disk encryption</a> is very important, but something that people sometimes overlook is encrypting their swap</li>
<li>This can actually be <em>more</em> important than the contents of your disks, especially if an unencrypted password or key hits your swap (as it can be recovered quite easily)</li>
<li>DragonFlyBSD has added a new experimental option to automatically encrypt your swap partition in fstab</li>
<li>There was <a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207691.html" rel="nofollow">another way</a> to do it previously, but this is a lot easier</li>
<li>You can achieve similar results in FreeBSD by adding &quot;.eli&quot; to the end of the swap device in fstab, there are <a href="https://www.netbsd.org/docs/misc/#cgd-swap" rel="nofollow">a few steps</a> to do it in NetBSD and swap in OpenBSD is encrypted by default</li>
<li>A one-time key will be created and then destroyed in each case, making recovery of the plaintext nearly impossible
***</li>
</ul>

<h2>Interview - Jed Reynolds - <a href="mailto:jed@bitratchet.com" rel="nofollow">jed@bitratchet.com</a> / <a href="https://twitter.com/jed_reynolds" rel="nofollow">@jed_reynolds</a></h2>

<p>Comparing ZFS on Linux and FreeBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.cambus.net/rding-temper-gold-usb-thermometer-on-openbsd/" rel="nofollow">USB thermometer on OpenBSD</a></h3>

<ul>
<li>So maybe you&#39;ve got BSD on your server or router, maybe NetBSD on a toaster, but have you ever used a thermometer with one?</li>
<li>This blog post introduces the RDing TEMPer Gold USB thermometer, a small device that can tell the room temperature, and how to get it working on OpenBSD</li>
<li>Wouldn&#39;t you know it, OpenBSD has a native &quot;<a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/ugold.4" rel="nofollow">ugold</a>&quot; driver to support it with the sensors framework</li>
<li>How useful such a device would be is another story though
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/nas4free/files/NAS4Free-ARM/10.1.0.2.1511/" rel="nofollow">NAS4Free now on ARM</a></h3>

<ul>
<li>We talk a lot about hardware for network-attached storage devices on the show, but ARM doesn&#39;t come up a lot</li>
<li>That might be changing soon, as NAS4Free has just released some ARM builds</li>
<li>These new (somewhat experimental) images are based on FreeBSD 11-CURRENT</li>
<li>Included in the announcement is a list of fully-supported and partially-supported hardware that they&#39;ve tested it with</li>
<li>If anyone has experience with running a NAS on slightly exotic hardware, write in to us
***</li>
</ul>

<h3><a href="http://pkgsrc.pub/pkgsrcCon/2015/" rel="nofollow">pkgsrcCon 2015 CFP and info</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon will be in Berlin, Germany <a href="https://mail-index.netbsd.org/pkgsrc-users/2015/05/16/msg021560.html" rel="nofollow">on July 4th and 5th</a></li>
<li>They&#39;re looking for talk proposals and ideas for things you&#39;d like to see</li>
<li>If you or your company uses pkgsrc, or if you&#39;re just interested in NetBSD in general, it would be a good event to check out
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/05/bsdtalk253-george-neville-neil.html" rel="nofollow">BSDTalk episode 253</a></h3>

<ul>
<li>BSDTalk has released another new episode</li>
<li>In it, he interviews George Neville-Neil about the 2nd edition of &quot;The Design and Implementation of the FreeBSD Operating System&quot;</li>
<li>They discuss what&#39;s new since the last edition, who the book&#39;s target audience is and a lot more</li>
<li>We&#39;re up to 90 episodes now, slowly catching up to Will...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2SWlyuOeb" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s216z44lDU" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2djtX0dSE" rel="nofollow">Corvin writes in</a></li>
<li><a href="http://slexy.org/view/s21XM4hPRh" rel="nofollow">James writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>89: Exclusive Disjunction</title>
  <link>https://www.bsdnow.tv/89</link>
  <guid isPermaLink="false">e47f088b-2b32-4187-92cd-0f4be4f1426e</guid>
  <pubDate>Wed, 13 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e47f088b-2b32-4187-92cd-0f4be4f1426e.mp3" length="45530932" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking to Mike Larkin about various memory protections in OpenBSD. We'll cover recent W^X improvements, SSP, ASLR, PIE and all kinds of acronyms! We've also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:03:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be talking to Mike Larkin about various memory protections in OpenBSD. We'll cover recent W&lt;sup&gt;X&lt;/sup&gt; improvements, SSP, ASLR, PIE and all kinds of acronyms! We've also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/05/accept-from-any-for-any-relay-via.html" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD for the whole family&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Setting up a BSD mail server is something a lot of us are probably familiar with doing, at least for our own accounts&lt;/li&gt;
&lt;li&gt;This article talks about configuring a home mail server too, but even for the other people you live with&lt;/li&gt;
&lt;li&gt;After convincing his wife to use their BSD-based Owncloud server for backups, the author talks about moving her over to his brand new OpenSMTPD server too&lt;/li&gt;
&lt;li&gt;If you've ever run a mail server and had to deal with greylisting, you'll appreciate the struggle he went through&lt;/li&gt;
&lt;li&gt;In the end, BGP-based list distribution saved the day, and his family is being served well by a BSD box
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/hands_on_experience_with_edgerouter" target="_blank" rel="nofollow noopener"&gt;NetBSD on the Edgerouter Lite&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked a lot about building your own BSD-based router on the show, but not many of the devices we mention are in the same price range as consumer devices&lt;/li&gt;
&lt;li&gt;The EdgeRouter Lite, a small MIPS-powered machine, is starting to become popular (and is a bit cheaper)&lt;/li&gt;
&lt;li&gt;A NetBSD developer has been hacking on it, and documents the steps to get a working install in this blog post&lt;/li&gt;
&lt;li&gt;The process is fairly simple, and you can &lt;a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener"&gt;cross-compile&lt;/a&gt; your own installation image on any CPU architecture (even from another BSD!)&lt;/li&gt;
&lt;li&gt;OpenBSD and FreeBSD also have &lt;a href="http://www.openbsd.org/octeon.html" target="_blank" rel="nofollow noopener"&gt;some&lt;/a&gt; &lt;a href="http://rtfm.net/FreeBSD/ERL/" target="_blank" rel="nofollow noopener"&gt;support&lt;/a&gt; for these devices
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=h4FhgBdYSUU" target="_blank" rel="nofollow noopener"&gt;Bitrig at NYC*BUG&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The New York City BSD users group has semi-regular meetings with presentations, and this time the speaker was John Vernaleo&lt;/li&gt;
&lt;li&gt;John discussed &lt;a href="http://www.bsdnow.tv/episodes/2014_12_10-must_be_rigged" target="_blank" rel="nofollow noopener"&gt;Bitrig&lt;/a&gt;, an OpenBSD fork that we've talked about a couple times on the show&lt;/li&gt;
&lt;li&gt;He talks about what they've been up to lately, why they're doing what they're doing, difference in supported platforms&lt;/li&gt;
&lt;li&gt;Ports and packages between the two projects are almost exactly the same, but he covers the differences in the base systems, how (some) patches get shared between the two and finally some development model differences
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" target="_blank" rel="nofollow noopener"&gt;OPNsense, meet HardenedBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Speaking of forks, two FreeBSD-based forked projects we've mentioned on the show, &lt;a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" target="_blank" rel="nofollow noopener"&gt;HardenedBSD&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;OPNsense&lt;/a&gt;, have decided to join forces&lt;/li&gt;
&lt;li&gt;Backporting their changes to the 10-STABLE branch, HardenedBSD hopes to introduce some of their security additions to the OPNsense codebase&lt;/li&gt;
&lt;li&gt;Paired up with LibreSSL, this combination should offer a good solution for anyone wanting a BSD-based firewall with an easy web interface&lt;/li&gt;
&lt;li&gt;We'll cover more news on the collaboration as it comes out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Mike Larkin - &lt;a href="mailto:mlarkin@openbsd.org" target="_blank" rel="nofollow noopener"&gt;mlarkin@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/mlarkin2012" target="_blank" rel="nofollow noopener"&gt;@mlarkin2012&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Memory protections in OpenBSD: &lt;a href="https://en.wikipedia.org/wiki/W%5EX" target="_blank" rel="nofollow noopener"&gt;W&lt;sup&gt;X&lt;/sup&gt;&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" target="_blank" rel="nofollow noopener"&gt;ASLR&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Position-independent_code" target="_blank" rel="nofollow noopener"&gt;PIE&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" target="_blank" rel="nofollow noopener"&gt;SSP&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.techopedia.com/2/31035/software/a-closer-look-at-freebsd" target="_blank" rel="nofollow noopener"&gt;A closer look at FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The week wouldn't be complete without at least one BSD article making it to a mainstream tech site&lt;/li&gt;
&lt;li&gt;This time, it's a high-level overview of FreeBSD, some of its features and where it's used&lt;/li&gt;
&lt;li&gt;Being that it's an overview article on a more mainstream site, you won't find anything too technical - it covers some BSD history, stability, ZFS, LLVM and Clang, ports and packages, jails and the licensing&lt;/li&gt;
&lt;li&gt;If you have any BSD-curious Linux friends, this might be a good one to send to them
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ramblingfoo.blogspot.com/2015/05/linksys-nslu2-adventures-into-netbsd.html" target="_blank" rel="nofollow noopener"&gt;Linksys NSLU2 and NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Linksys NSLU2 is a proprietary network-attached storage device introduced back in 2004&lt;/li&gt;
&lt;li&gt;"About 2 months ago I set a goal to run some kind of BSD on the spare Linksys NSLU2 I had. This was driven mostly by curiosity, after listening to a few BSDNow episodes and becoming a regular listener [...]"&lt;/li&gt;
&lt;li&gt;After doing some research, the author of this post discovered that he could cross-compile NetBSD for the device straight from his Linux box&lt;/li&gt;
&lt;li&gt;If you've got one of these old devices kicking around, check out this write-up and get some BSD action on there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.jeffreyforman.net/2015/05/09/from-0-to-an-openbsd-install-with-no-hands-and-a-custom-disk-layou" target="_blank" rel="nofollow noopener"&gt;OpenBSD disklabel templates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered OpenBSD's "autoinstall" feature for unattended installations in the past, but one area where it didn't offer a lot of customization was with the disk layout&lt;/li&gt;
&lt;li&gt;With a few &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150505123418" target="_blank" rel="nofollow noopener"&gt;recent changes&lt;/a&gt;, there are now a series of templates you can use for a completely customized partition scheme&lt;/li&gt;
&lt;li&gt;This article takes you through the process of configuring an autoinstall answer file and adding the new section for disklabel&lt;/li&gt;
&lt;li&gt;Combine this new feature with our &lt;a href="http://www.bsdnow.tv/tutorials/stable-iso" target="_blank" rel="nofollow noopener"&gt;-stable iso tutorial&lt;/a&gt;, and you could deploy completely patched and customized images en masse pretty easily
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=282693" target="_blank" rel="nofollow noopener"&gt;FreeBSD native ARM builds&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD -CURRENT builds for the ARM CPU architecture can now be built natively, without utilities that aren't part of base&lt;/li&gt;
&lt;li&gt;Some of the older board-specific kernel configuration files have been replaced, and now the "IMC6" target is used&lt;/li&gt;
&lt;li&gt;This goes along with what we read in the most recent quarterly status report - ARM is starting to get treated as a first class citizen
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2088U2OjO" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s29ZKhQKOz" target="_blank" rel="nofollow noopener"&gt;Ron writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2NCVHEKt1" target="_blank" rel="nofollow noopener"&gt;Charles writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2mGRoKo5G" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, verisign, vbsdcon, 2015, presentations, talks, w^x, aslr, pie, ssp, stack smashing, gcc, exploit mitigation, security, edgerouter lite, opnsense, hardenedbsd, bitrig</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Mike Larkin about various memory protections in OpenBSD. We&#39;ll cover recent W<sup>X</sup> improvements, SSP, ASLR, PIE and all kinds of acronyms! We&#39;ve also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/05/accept-from-any-for-any-relay-via.html" rel="nofollow">OpenSMTPD for the whole family</a></h3>

<ul>
<li>Setting up a BSD mail server is something a lot of us are probably familiar with doing, at least for our own accounts</li>
<li>This article talks about configuring a home mail server too, but even for the other people you live with</li>
<li>After convincing his wife to use their BSD-based Owncloud server for backups, the author talks about moving her over to his brand new OpenSMTPD server too</li>
<li>If you&#39;ve ever run a mail server and had to deal with greylisting, you&#39;ll appreciate the struggle he went through</li>
<li>In the end, BGP-based list distribution saved the day, and his family is being served well by a BSD box
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/hands_on_experience_with_edgerouter" rel="nofollow">NetBSD on the Edgerouter Lite</a></h3>

<ul>
<li>We&#39;ve talked a lot about building your own BSD-based router on the show, but not many of the devices we mention are in the same price range as consumer devices</li>
<li>The EdgeRouter Lite, a small MIPS-powered machine, is starting to become popular (and is a bit cheaper)</li>
<li>A NetBSD developer has been hacking on it, and documents the steps to get a working install in this blog post</li>
<li>The process is fairly simple, and you can <a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">cross-compile</a> your own installation image on any CPU architecture (even from another BSD!)</li>
<li>OpenBSD and FreeBSD also have <a href="http://www.openbsd.org/octeon.html" rel="nofollow">some</a> <a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">support</a> for these devices
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=h4FhgBdYSUU" rel="nofollow">Bitrig at NYC*BUG</a></h3>

<ul>
<li>The New York City BSD users group has semi-regular meetings with presentations, and this time the speaker was John Vernaleo</li>
<li>John discussed <a href="http://www.bsdnow.tv/episodes/2014_12_10-must_be_rigged" rel="nofollow">Bitrig</a>, an OpenBSD fork that we&#39;ve talked about a couple times on the show</li>
<li>He talks about what they&#39;ve been up to lately, why they&#39;re doing what they&#39;re doing, difference in supported platforms</li>
<li>Ports and packages between the two projects are almost exactly the same, but he covers the differences in the base systems, how (some) patches get shared between the two and finally some development model differences
***</li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">OPNsense, meet HardenedBSD</a></h3>

<ul>
<li>Speaking of forks, two FreeBSD-based forked projects we&#39;ve mentioned on the show, <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">HardenedBSD</a> and <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a>, have decided to join forces</li>
<li>Backporting their changes to the 10-STABLE branch, HardenedBSD hopes to introduce some of their security additions to the OPNsense codebase</li>
<li>Paired up with LibreSSL, this combination should offer a good solution for anyone wanting a BSD-based firewall with an easy web interface</li>
<li>We&#39;ll cover more news on the collaboration as it comes out
***</li>
</ul>

<h2>Interview - Mike Larkin - <a href="mailto:mlarkin@openbsd.org" rel="nofollow">mlarkin@openbsd.org</a> / <a href="https://twitter.com/mlarkin2012" rel="nofollow">@mlarkin2012</a></h2>

<p>Memory protections in OpenBSD: <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup></a>, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a>, <a href="https://en.wikipedia.org/wiki/Position-independent_code" rel="nofollow">PIE</a>, <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">SSP</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.techopedia.com/2/31035/software/a-closer-look-at-freebsd" rel="nofollow">A closer look at FreeBSD</a></h3>

<ul>
<li>The week wouldn&#39;t be complete without at least one BSD article making it to a mainstream tech site</li>
<li>This time, it&#39;s a high-level overview of FreeBSD, some of its features and where it&#39;s used</li>
<li>Being that it&#39;s an overview article on a more mainstream site, you won&#39;t find anything too technical - it covers some BSD history, stability, ZFS, LLVM and Clang, ports and packages, jails and the licensing</li>
<li>If you have any BSD-curious Linux friends, this might be a good one to send to them
***</li>
</ul>

<h3><a href="http://ramblingfoo.blogspot.com/2015/05/linksys-nslu2-adventures-into-netbsd.html" rel="nofollow">Linksys NSLU2 and NetBSD</a></h3>

<ul>
<li>The Linksys NSLU2 is a proprietary network-attached storage device introduced back in 2004</li>
<li>&quot;About 2 months ago I set a goal to run some kind of BSD on the spare Linksys NSLU2 I had. This was driven mostly by curiosity, after listening to a few BSDNow episodes and becoming a regular listener [...]&quot;</li>
<li>After doing some research, the author of this post discovered that he could cross-compile NetBSD for the device straight from his Linux box</li>
<li>If you&#39;ve got one of these old devices kicking around, check out this write-up and get some BSD action on there
***</li>
</ul>

<h3><a href="http://blog.jeffreyforman.net/2015/05/09/from-0-to-an-openbsd-install-with-no-hands-and-a-custom-disk-layou" rel="nofollow">OpenBSD disklabel templates</a></h3>

<ul>
<li>We&#39;ve covered OpenBSD&#39;s &quot;autoinstall&quot; feature for unattended installations in the past, but one area where it didn&#39;t offer a lot of customization was with the disk layout</li>
<li>With a few <a href="http://undeadly.org/cgi?action=article&sid=20150505123418" rel="nofollow">recent changes</a>, there are now a series of templates you can use for a completely customized partition scheme</li>
<li>This article takes you through the process of configuring an autoinstall answer file and adding the new section for disklabel</li>
<li>Combine this new feature with our <a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">-stable iso tutorial</a>, and you could deploy completely patched and customized images en masse pretty easily
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=282693" rel="nofollow">FreeBSD native ARM builds</a></h3>

<ul>
<li>FreeBSD -CURRENT builds for the ARM CPU architecture can now be built natively, without utilities that aren&#39;t part of base</li>
<li>Some of the older board-specific kernel configuration files have been replaced, and now the &quot;IMC6&quot; target is used</li>
<li>This goes along with what we read in the most recent quarterly status report - ARM is starting to get treated as a first class citizen
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2088U2OjO" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s29ZKhQKOz" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2NCVHEKt1" rel="nofollow">Charles writes in</a></li>
<li><a href="http://slexy.org/view/s2mGRoKo5G" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Mike Larkin about various memory protections in OpenBSD. We&#39;ll cover recent W<sup>X</sup> improvements, SSP, ASLR, PIE and all kinds of acronyms! We&#39;ve also got a bunch of news and answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/05/accept-from-any-for-any-relay-via.html" rel="nofollow">OpenSMTPD for the whole family</a></h3>

<ul>
<li>Setting up a BSD mail server is something a lot of us are probably familiar with doing, at least for our own accounts</li>
<li>This article talks about configuring a home mail server too, but even for the other people you live with</li>
<li>After convincing his wife to use their BSD-based Owncloud server for backups, the author talks about moving her over to his brand new OpenSMTPD server too</li>
<li>If you&#39;ve ever run a mail server and had to deal with greylisting, you&#39;ll appreciate the struggle he went through</li>
<li>In the end, BGP-based list distribution saved the day, and his family is being served well by a BSD box
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/hands_on_experience_with_edgerouter" rel="nofollow">NetBSD on the Edgerouter Lite</a></h3>

<ul>
<li>We&#39;ve talked a lot about building your own BSD-based router on the show, but not many of the devices we mention are in the same price range as consumer devices</li>
<li>The EdgeRouter Lite, a small MIPS-powered machine, is starting to become popular (and is a bit cheaper)</li>
<li>A NetBSD developer has been hacking on it, and documents the steps to get a working install in this blog post</li>
<li>The process is fairly simple, and you can <a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">cross-compile</a> your own installation image on any CPU architecture (even from another BSD!)</li>
<li>OpenBSD and FreeBSD also have <a href="http://www.openbsd.org/octeon.html" rel="nofollow">some</a> <a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">support</a> for these devices
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=h4FhgBdYSUU" rel="nofollow">Bitrig at NYC*BUG</a></h3>

<ul>
<li>The New York City BSD users group has semi-regular meetings with presentations, and this time the speaker was John Vernaleo</li>
<li>John discussed <a href="http://www.bsdnow.tv/episodes/2014_12_10-must_be_rigged" rel="nofollow">Bitrig</a>, an OpenBSD fork that we&#39;ve talked about a couple times on the show</li>
<li>He talks about what they&#39;ve been up to lately, why they&#39;re doing what they&#39;re doing, difference in supported platforms</li>
<li>Ports and packages between the two projects are almost exactly the same, but he covers the differences in the base systems, how (some) patches get shared between the two and finally some development model differences
***</li>
</ul>

<h3><a href="https://hardenedbsd.org/article/shawn-webb/2015-05-08/hardenedbsd-teams-opnsense" rel="nofollow">OPNsense, meet HardenedBSD</a></h3>

<ul>
<li>Speaking of forks, two FreeBSD-based forked projects we&#39;ve mentioned on the show, <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">HardenedBSD</a> and <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a>, have decided to join forces</li>
<li>Backporting their changes to the 10-STABLE branch, HardenedBSD hopes to introduce some of their security additions to the OPNsense codebase</li>
<li>Paired up with LibreSSL, this combination should offer a good solution for anyone wanting a BSD-based firewall with an easy web interface</li>
<li>We&#39;ll cover more news on the collaboration as it comes out
***</li>
</ul>

<h2>Interview - Mike Larkin - <a href="mailto:mlarkin@openbsd.org" rel="nofollow">mlarkin@openbsd.org</a> / <a href="https://twitter.com/mlarkin2012" rel="nofollow">@mlarkin2012</a></h2>

<p>Memory protections in OpenBSD: <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup></a>, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a>, <a href="https://en.wikipedia.org/wiki/Position-independent_code" rel="nofollow">PIE</a>, <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">SSP</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.techopedia.com/2/31035/software/a-closer-look-at-freebsd" rel="nofollow">A closer look at FreeBSD</a></h3>

<ul>
<li>The week wouldn&#39;t be complete without at least one BSD article making it to a mainstream tech site</li>
<li>This time, it&#39;s a high-level overview of FreeBSD, some of its features and where it&#39;s used</li>
<li>Being that it&#39;s an overview article on a more mainstream site, you won&#39;t find anything too technical - it covers some BSD history, stability, ZFS, LLVM and Clang, ports and packages, jails and the licensing</li>
<li>If you have any BSD-curious Linux friends, this might be a good one to send to them
***</li>
</ul>

<h3><a href="http://ramblingfoo.blogspot.com/2015/05/linksys-nslu2-adventures-into-netbsd.html" rel="nofollow">Linksys NSLU2 and NetBSD</a></h3>

<ul>
<li>The Linksys NSLU2 is a proprietary network-attached storage device introduced back in 2004</li>
<li>&quot;About 2 months ago I set a goal to run some kind of BSD on the spare Linksys NSLU2 I had. This was driven mostly by curiosity, after listening to a few BSDNow episodes and becoming a regular listener [...]&quot;</li>
<li>After doing some research, the author of this post discovered that he could cross-compile NetBSD for the device straight from his Linux box</li>
<li>If you&#39;ve got one of these old devices kicking around, check out this write-up and get some BSD action on there
***</li>
</ul>

<h3><a href="http://blog.jeffreyforman.net/2015/05/09/from-0-to-an-openbsd-install-with-no-hands-and-a-custom-disk-layou" rel="nofollow">OpenBSD disklabel templates</a></h3>

<ul>
<li>We&#39;ve covered OpenBSD&#39;s &quot;autoinstall&quot; feature for unattended installations in the past, but one area where it didn&#39;t offer a lot of customization was with the disk layout</li>
<li>With a few <a href="http://undeadly.org/cgi?action=article&sid=20150505123418" rel="nofollow">recent changes</a>, there are now a series of templates you can use for a completely customized partition scheme</li>
<li>This article takes you through the process of configuring an autoinstall answer file and adding the new section for disklabel</li>
<li>Combine this new feature with our <a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">-stable iso tutorial</a>, and you could deploy completely patched and customized images en masse pretty easily
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=282693" rel="nofollow">FreeBSD native ARM builds</a></h3>

<ul>
<li>FreeBSD -CURRENT builds for the ARM CPU architecture can now be built natively, without utilities that aren&#39;t part of base</li>
<li>Some of the older board-specific kernel configuration files have been replaced, and now the &quot;IMC6&quot; target is used</li>
<li>This goes along with what we read in the most recent quarterly status report - ARM is starting to get treated as a first class citizen
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2088U2OjO" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s29ZKhQKOz" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2NCVHEKt1" rel="nofollow">Charles writes in</a></li>
<li><a href="http://slexy.org/view/s2mGRoKo5G" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>88: Below the Clouds</title>
  <link>https://www.bsdnow.tv/88</link>
  <guid isPermaLink="false">26ef6d0e-ea2a-4032-88ee-121e1b2be033</guid>
  <pubDate>Wed, 06 May 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/26ef6d0e-ea2a-4032-88ee-121e1b2be033.mp3" length="67680724" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Ed Schouten about CloudABI. It's a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week's BSD news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:34:00</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking with Ed Schouten about CloudABI. It's a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week's BSD news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2015-01-2015-03.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD quarterly status report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD team has posted a report of the activities that went on between January and March of this year&lt;/li&gt;
&lt;li&gt;As usual, it's broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)&lt;/li&gt;
&lt;li&gt;The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter&lt;/li&gt;
&lt;li&gt;The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward&lt;/li&gt;
&lt;li&gt;FreeBSD's future release support model was also finalized and published in February, which should be a big improvement for both users and the release team&lt;/li&gt;
&lt;li&gt;Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code&lt;/li&gt;
&lt;li&gt;Lots of activity is happening in bhyve, some of which we've covered &lt;a href="http://www.bsdnow.tv/episodes/2015_04_29-on_the_list" target="_blank" rel="nofollow noopener"&gt;recently&lt;/a&gt;, and a number of improvements were made this quarter&lt;/li&gt;
&lt;li&gt;Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT&lt;/li&gt;
&lt;li&gt;Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being&lt;/li&gt;
&lt;li&gt;The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" target="_blank" rel="nofollow noopener"&gt;ASLR work&lt;/a&gt; is still being done by the HardenedBSD guys, and their next aim is position-independent executable&lt;/li&gt;
&lt;li&gt;The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more&lt;/li&gt;
&lt;li&gt;Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/57.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.7 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has formally released another new version, complete with the giant changelog we've come to expect&lt;/li&gt;
&lt;li&gt;In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs&lt;/li&gt;
&lt;li&gt;If you're using one of the Soekris boards, there's even &lt;a href="http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/" target="_blank" rel="nofollow noopener"&gt;a new driver&lt;/a&gt; to manipulate the GPIO and LEDs on them - this has some fun possibilities&lt;/li&gt;
&lt;li&gt;Some new security improvements include: &lt;a href="https://en.wikipedia.org/wiki/SipHash" target="_blank" rel="nofollow noopener"&gt;SipHash&lt;/a&gt; being sprinkled in some areas to protect hashing functions, big &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;W&lt;sup&gt;X&lt;/sup&gt; improvements&lt;/a&gt; in the kernel space, &lt;a href="http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky" target="_blank" rel="nofollow noopener"&gt;static PIE&lt;/a&gt; on all architectures, deterministic "random" functions &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;being replaced&lt;/a&gt; with strong randomness, and support for remote logging over TLS&lt;/li&gt;
&lt;li&gt;The entire source tree has also been audited to use &lt;a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" target="_blank" rel="nofollow noopener"&gt;reallocarray&lt;/a&gt;, which unintentionally &lt;a href="https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c" target="_blank" rel="nofollow noopener"&gt;saved&lt;/a&gt; OpenBSD's libc from being vulnerable to &lt;a href="https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/" target="_blank" rel="nofollow noopener"&gt;earlier attacks&lt;/a&gt; affecting other BSDs' implementations&lt;/li&gt;
&lt;li&gt;Being that it's OpenBSD, a number of things have also been &lt;em&gt;removed&lt;/em&gt; from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)&lt;/li&gt;
&lt;li&gt;Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily&lt;/li&gt;
&lt;li&gt;BIND and nginx have been taken out, so you'll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon&lt;/li&gt;
&lt;li&gt;Speaking of httpd, it's gotten a number of &lt;a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" target="_blank" rel="nofollow noopener"&gt;new&lt;/a&gt; &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5" target="_blank" rel="nofollow noopener"&gt;features&lt;/a&gt;, and has had time to grow and mature since its initial debut - if you've been considering trying it out, now would be a great time to do so&lt;/li&gt;
&lt;li&gt;This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and &lt;a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" target="_blank" rel="nofollow noopener"&gt;mandoc&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Check the &lt;a href="http://www.openbsd.org/errata57.html" target="_blank" rel="nofollow noopener"&gt;errata page&lt;/a&gt; for any post-release fixes, and the &lt;a href="http://www.openbsd.org/faq/upgrade57.html" target="_blank" rel="nofollow noopener"&gt;upgrade guide&lt;/a&gt; for specific instructions on updating from 5.6&lt;/li&gt;
&lt;li&gt;Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases&lt;/li&gt;
&lt;li&gt;There's a &lt;a href="http://www.openbsd.org/lyrics.html#57" target="_blank" rel="nofollow noopener"&gt;song and artwork&lt;/a&gt; to go along with the release as always, and CDs should be arriving within a few days - we'll show some pictures next week&lt;/li&gt;
&lt;li&gt;Consider &lt;a href="https://www.openbsdstore.com" target="_blank" rel="nofollow noopener"&gt;picking one up&lt;/a&gt; to support the project (and it's the only way to get puffy stickers)&lt;/li&gt;
&lt;li&gt;For those of you paying close attention, the &lt;a href="http://www.openbsd.org/images/puffy57.gif" target="_blank" rel="nofollow noopener"&gt;banner image&lt;/a&gt; for this release just might remind you of a &lt;a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener"&gt;certain special episode&lt;/a&gt; of BSD Now...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://torbsd.github.io/" target="_blank" rel="nofollow noopener"&gt;Tor-BSD diversity project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)&lt;/li&gt;
&lt;li&gt;A new initiative has started to do just that, called the Tor-BSD diversity project&lt;/li&gt;
&lt;li&gt;"Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity."&lt;/li&gt;
&lt;li&gt;In addition to encouraging people to put up more relays, they're also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy&lt;/li&gt;
&lt;li&gt;There's an additional &lt;a href="http://trac.haqistan.net/blog/tor-browser-ports-progress" target="_blank" rel="nofollow noopener"&gt;progress report&lt;/a&gt; for that part specifically, and it looks like most of the work is done now&lt;/li&gt;
&lt;li&gt;Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list &lt;/li&gt;
&lt;li&gt;If you've been considering running a node to help out, there's always &lt;a href="http://www.bsdnow.tv/tutorials/tor" target="_blank" rel="nofollow noopener"&gt;our handy tutorial&lt;/a&gt; on getting set up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/" target="_blank" rel="nofollow noopener"&gt;PC-BSD 10.1.2-RC1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab&lt;/li&gt;
&lt;li&gt;This quarterly update includes a number of new features, improvements and even some additional utilities&lt;/li&gt;
&lt;li&gt;PersonaCrypt is one of them - it's a new tool for easily migrating encrypted home directories between systems&lt;/li&gt;
&lt;li&gt;A new "stealth mode" option allows for a one-time login, using a blank home directory that gets wiped after use&lt;/li&gt;
&lt;li&gt;Similarly, a new "Tor mode" allows for easy tunneling of all your traffic through the Tor network&lt;/li&gt;
&lt;li&gt;IPFW is now the default firewall, offering improved VIMAGE capabilities&lt;/li&gt;
&lt;li&gt;The life preserver backup tool now allows for bare-metal restores via the install CD&lt;/li&gt;
&lt;li&gt;ISC's NTP daemon has been replaced with &lt;a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" target="_blank" rel="nofollow noopener"&gt;OpenNTPD&lt;/a&gt;, and OpenSSL has been replaced with &lt;a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" target="_blank" rel="nofollow noopener"&gt;LibreSSL&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;It also includes the latest &lt;a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" target="_blank" rel="nofollow noopener"&gt;Lumina&lt;/a&gt; desktop, and there's another &lt;a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/" target="_blank" rel="nofollow noopener"&gt;post dedicated to that&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Binary packages have also been updated to fresh versions from the ports tree&lt;/li&gt;
&lt;li&gt;More details, including upgrade instructions, can be found in the linked blog post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ed Schouten - &lt;a href="mailto:ed@freebsd.org" target="_blank" rel="nofollow noopener"&gt;ed@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/edschouten" target="_blank" rel="nofollow noopener"&gt;@edschouten&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.bsdcan.org/2015/schedule/track/Security/524.en.html" target="_blank" rel="nofollow noopener"&gt;CloudABI&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/" target="_blank" rel="nofollow noopener"&gt;Open Household Router Contraption&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This article introduces OpenHRC, the "Open Household Router Contraption"&lt;/li&gt;
&lt;li&gt;In short, it's a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device&lt;/li&gt;
&lt;li&gt;It also makes use of Ansible playbooks for configuration, allowing for a more "mass deployment" type of setup&lt;/li&gt;
&lt;li&gt;Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation&lt;/li&gt;
&lt;li&gt;All the code is open source &lt;a href="https://github.com/ioc32/openhrc" target="_blank" rel="nofollow noopener"&gt;and on Github&lt;/a&gt;, so you can read through what's actually being changed and put in place&lt;/li&gt;
&lt;li&gt;There's also a &lt;a href="https://www.youtube.com/watch?v=LZeKDM5jc90" target="_blank" rel="nofollow noopener"&gt;video guide&lt;/a&gt; to the entire process, if you're more of a visual person
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=365.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.1.10 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Speaking of BSD routers, if you're looking for a "prebuilt and ready to go" option, OPNsense has just released a new version&lt;/li&gt;
&lt;li&gt;15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code&lt;/li&gt;
&lt;li&gt;Going along with this theme, they've redone how they do ports, and are now kept totally in sync with the regular ports tree&lt;/li&gt;
&lt;li&gt;Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed&lt;/li&gt;
&lt;li&gt;NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well&lt;/li&gt;
&lt;li&gt;Version &lt;a href="https://twitter.com/opnsense/status/596009164746432512" target="_blank" rel="nofollow noopener"&gt;15.1.10.1&lt;/a&gt; was released shortly thereafter, including a hotfix for VLANs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en" target="_blank" rel="nofollow noopener"&gt;IBM Workpad Z50 and NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same&lt;/li&gt;
&lt;li&gt;Back in 1999, they released &lt;a href="http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/" target="_blank" rel="nofollow noopener"&gt;the Workpad Z50&lt;/a&gt; with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display&lt;/li&gt;
&lt;li&gt;You can probably tell where this is going... the article is about installing NetBSD it&lt;/li&gt;
&lt;li&gt;"What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running"&lt;/li&gt;
&lt;li&gt;The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern&lt;/li&gt;
&lt;li&gt;He's also got a &lt;a href="https://www.youtube.com/watch?v=hSLVnSZKB9I" target="_blank" rel="nofollow noopener"&gt;couple&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=mIA-NWEHLM4" target="_blank" rel="nofollow noopener"&gt;videos&lt;/a&gt; of the bootup process and running Xorg (neither of which we'd call "speedy" by any stretch of the imagination)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD from the trenches&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has a new blog post up in their "from the trenches" series, detailing FreeBSD in some real-world use cases&lt;/li&gt;
&lt;li&gt;In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI&lt;/li&gt;
&lt;li&gt;While the installer allows for an automatic ZFS layout, Glen notes that it's not a one-size-fits-all thing, and goes through doing everything manually&lt;/li&gt;
&lt;li&gt;Each command is explained, and he walks you through the process of doing &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;an encrypted installation&lt;/a&gt; on your root zpool
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html" target="_blank" rel="nofollow noopener"&gt;Broadwell in DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver&lt;/li&gt;
&lt;li&gt;Their i915 driver has been brought up to speed with Linux 3.14's, adding not only Broadwell support, but many other bugfixes for other cards too&lt;/li&gt;
&lt;li&gt;It's planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216QQcHyX" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21hGSk3c0" target="_blank" rel="nofollow noopener"&gt;Hunter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20JwPw9Je" target="_blank" rel="nofollow noopener"&gt;Hrishi writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2x1GYr7y6" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2swXxr2PX" target="_blank" rel="nofollow noopener"&gt;Sergei writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html" target="_blank" rel="nofollow noopener"&gt;How did you guess&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, 5.7, libressl, opensmtpd, openntpd, openssh, cloudabi, capsicum, 5.7, tor-bsd, tor, diversity, browser bundle, ipfw, openhrc, opnsense, router, workpad z50, gateway</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Ed Schouten about CloudABI. It&#39;s a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week&#39;s BSD news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-01-2015-03.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted a report of the activities that went on between January and March of this year</li>
<li>As usual, it&#39;s broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)</li>
<li>The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter</li>
<li>The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward</li>
<li>FreeBSD&#39;s future release support model was also finalized and published in February, which should be a big improvement for both users and the release team</li>
<li>Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code</li>
<li>Lots of activity is happening in bhyve, some of which we&#39;ve covered <a href="http://www.bsdnow.tv/episodes/2015_04_29-on_the_list" rel="nofollow">recently</a>, and a number of improvements were made this quarter</li>
<li>Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT</li>
<li>Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being</li>
<li>The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">ASLR work</a> is still being done by the HardenedBSD guys, and their next aim is position-independent executable</li>
<li>The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more</li>
<li>Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***</li>
</ul>

<h3><a href="http://www.openbsd.org/57.html" rel="nofollow">OpenBSD 5.7 released</a></h3>

<ul>
<li>OpenBSD has formally released another new version, complete with the giant changelog we&#39;ve come to expect</li>
<li>In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs</li>
<li>If you&#39;re using one of the Soekris boards, there&#39;s even <a href="http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/" rel="nofollow">a new driver</a> to manipulate the GPIO and LEDs on them - this has some fun possibilities</li>
<li>Some new security improvements include: <a href="https://en.wikipedia.org/wiki/SipHash" rel="nofollow">SipHash</a> being sprinkled in some areas to protect hashing functions, big <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">W<sup>X</sup> improvements</a> in the kernel space, <a href="http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky" rel="nofollow">static PIE</a> on all architectures, deterministic &quot;random&quot; functions <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">being replaced</a> with strong randomness, and support for remote logging over TLS</li>
<li>The entire source tree has also been audited to use <a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray</a>, which unintentionally <a href="https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c" rel="nofollow">saved</a> OpenBSD&#39;s libc from being vulnerable to <a href="https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/" rel="nofollow">earlier attacks</a> affecting other BSDs&#39; implementations</li>
<li>Being that it&#39;s OpenBSD, a number of things have also been <em>removed</em> from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)</li>
<li>Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily</li>
<li>BIND and nginx have been taken out, so you&#39;ll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon</li>
<li>Speaking of httpd, it&#39;s gotten a number of <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">new</a> <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5" rel="nofollow">features</a>, and has had time to grow and mature since its initial debut - if you&#39;ve been considering trying it out, now would be a great time to do so</li>
<li>This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Check the <a href="http://www.openbsd.org/errata57.html" rel="nofollow">errata page</a> for any post-release fixes, and the <a href="http://www.openbsd.org/faq/upgrade57.html" rel="nofollow">upgrade guide</a> for specific instructions on updating from 5.6</li>
<li>Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases</li>
<li>There&#39;s a <a href="http://www.openbsd.org/lyrics.html#57" rel="nofollow">song and artwork</a> to go along with the release as always, and CDs should be arriving within a few days - we&#39;ll show some pictures next week</li>
<li>Consider <a href="https://www.openbsdstore.com" rel="nofollow">picking one up</a> to support the project (and it&#39;s the only way to get puffy stickers)</li>
<li>For those of you paying close attention, the <a href="http://www.openbsd.org/images/puffy57.gif" rel="nofollow">banner image</a> for this release just might remind you of a <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">certain special episode</a> of BSD Now...
***</li>
</ul>

<h3><a href="https://torbsd.github.io/" rel="nofollow">Tor-BSD diversity project</a></h3>

<ul>
<li>We&#39;ve talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)</li>
<li>A new initiative has started to do just that, called the Tor-BSD diversity project</li>
<li>&quot;Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity.&quot;</li>
<li>In addition to encouraging people to put up more relays, they&#39;re also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy</li>
<li>There&#39;s an additional <a href="http://trac.haqistan.net/blog/tor-browser-ports-progress" rel="nofollow">progress report</a> for that part specifically, and it looks like most of the work is done now</li>
<li>Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list </li>
<li>If you&#39;ve been considering running a node to help out, there&#39;s always <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">our handy tutorial</a> on getting set up
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/" rel="nofollow">PC-BSD 10.1.2-RC1 released</a></h3>

<ul>
<li>If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab</li>
<li>This quarterly update includes a number of new features, improvements and even some additional utilities</li>
<li>PersonaCrypt is one of them - it&#39;s a new tool for easily migrating encrypted home directories between systems</li>
<li>A new &quot;stealth mode&quot; option allows for a one-time login, using a blank home directory that gets wiped after use</li>
<li>Similarly, a new &quot;Tor mode&quot; allows for easy tunneling of all your traffic through the Tor network</li>
<li>IPFW is now the default firewall, offering improved VIMAGE capabilities</li>
<li>The life preserver backup tool now allows for bare-metal restores via the install CD</li>
<li>ISC&#39;s NTP daemon has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">OpenNTPD</a>, and OpenSSL has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">LibreSSL</a></li>
<li>It also includes the latest <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">Lumina</a> desktop, and there&#39;s another <a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/" rel="nofollow">post dedicated to that</a></li>
<li>Binary packages have also been updated to fresh versions from the ports tree</li>
<li>More details, including upgrade instructions, can be found in the linked blog post
***</li>
</ul>

<h2>Interview - Ed Schouten - <a href="mailto:ed@freebsd.org" rel="nofollow">ed@freebsd.org</a> / <a href="https://twitter.com/edschouten" rel="nofollow">@edschouten</a></h2>

<p><a href="https://www.bsdcan.org/2015/schedule/track/Security/524.en.html" rel="nofollow">CloudABI</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/" rel="nofollow">Open Household Router Contraption</a></h3>

<ul>
<li>This article introduces OpenHRC, the &quot;Open Household Router Contraption&quot;</li>
<li>In short, it&#39;s a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device</li>
<li>It also makes use of Ansible playbooks for configuration, allowing for a more &quot;mass deployment&quot; type of setup</li>
<li>Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation</li>
<li>All the code is open source <a href="https://github.com/ioc32/openhrc" rel="nofollow">and on Github</a>, so you can read through what&#39;s actually being changed and put in place</li>
<li>There&#39;s also a <a href="https://www.youtube.com/watch?v=LZeKDM5jc90" rel="nofollow">video guide</a> to the entire process, if you&#39;re more of a visual person
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=365.0" rel="nofollow">OPNsense 15.1.10 released</a></h3>

<ul>
<li>Speaking of BSD routers, if you&#39;re looking for a &quot;prebuilt and ready to go&quot; option, OPNsense has just released a new version</li>
<li>15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code</li>
<li>Going along with this theme, they&#39;ve redone how they do ports, and are now kept totally in sync with the regular ports tree</li>
<li>Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed</li>
<li>NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well</li>
<li>Version <a href="https://twitter.com/opnsense/status/596009164746432512" rel="nofollow">15.1.10.1</a> was released shortly thereafter, including a hotfix for VLANs
***</li>
</ul>

<h3><a href="https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en" rel="nofollow">IBM Workpad Z50 and NetBSD</a></h3>

<ul>
<li>Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same</li>
<li>Back in 1999, they released <a href="http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/" rel="nofollow">the Workpad Z50</a> with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display</li>
<li>You can probably tell where this is going... the article is about installing NetBSD it</li>
<li>&quot;What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running&quot;</li>
<li>The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern</li>
<li>He&#39;s also got a <a href="https://www.youtube.com/watch?v=hSLVnSZKB9I" rel="nofollow">couple</a> <a href="https://www.youtube.com/watch?v=mIA-NWEHLM4" rel="nofollow">videos</a> of the bootup process and running Xorg (neither of which we&#39;d call &quot;speedy&quot; by any stretch of the imagination)
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html" rel="nofollow">FreeBSD from the trenches</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post up in their &quot;from the trenches&quot; series, detailing FreeBSD in some real-world use cases</li>
<li>In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI</li>
<li>While the installer allows for an automatic ZFS layout, Glen notes that it&#39;s not a one-size-fits-all thing, and goes through doing everything manually</li>
<li>Each command is explained, and he walks you through the process of doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">an encrypted installation</a> on your root zpool
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver</li>
<li>Their i915 driver has been brought up to speed with Linux 3.14&#39;s, adding not only Broadwell support, but many other bugfixes for other cards too</li>
<li>It&#39;s planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216QQcHyX" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21hGSk3c0" rel="nofollow">Hunter writes in</a></li>
<li><a href="http://slexy.org/view/s20JwPw9Je" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2x1GYr7y6" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s2swXxr2PX" rel="nofollow">Sergei writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html" rel="nofollow">How did you guess</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Ed Schouten about CloudABI. It&#39;s a new application binary interface with a strong focus on isolation and restricted capabilities. As always, all this week&#39;s BSD news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2015-01-2015-03.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted a report of the activities that went on between January and March of this year</li>
<li>As usual, it&#39;s broken down into separate reports from the various teams in the project (ports, kernel, virtualization, etc)</li>
<li>The ports team continuing battling the flood of PRs, closing quite a lot of them and boasting nearly 7,000 commits this quarter</li>
<li>The core team and cluster admins dealt with the accidental deletion of the Bugzilla database, and are making plans for an improved backup strategy within the project going forward</li>
<li>FreeBSD&#39;s future release support model was also finalized and published in February, which should be a big improvement for both users and the release team</li>
<li>Some topics are still being discussed internally, mainly MFCing ZFS ARC responsiveness patches to the 10 branch and deciding whether to maintain or abandon C89 support in the kernel code</li>
<li>Lots of activity is happening in bhyve, some of which we&#39;ve covered <a href="http://www.bsdnow.tv/episodes/2015_04_29-on_the_list" rel="nofollow">recently</a>, and a number of improvements were made this quarter</li>
<li>Clang, LLVM and LLDB have been updated to the 3.6.0 branch in -CURRENT</li>
<li>Work to get FreeBSD booting natively on the POWER8 CPU architecture is also still in progress, but it does boot in KVM for the time being</li>
<li>The project to replace forth in the bootloader with lua is in its final stages, and can be used on x86 already</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">ASLR work</a> is still being done by the HardenedBSD guys, and their next aim is position-independent executable</li>
<li>The report also touches on multipath TCP support, the new automounter, opaque ifnet, pkgng updates, secureboot (which should be in 10.2-RELEASE), GNOME and KDE on FreeBSD, PCIe hotplugging, nested kernel support and more</li>
<li>Also of note: work is going on to make ARM a Tier 1 platform in the upcoming 11.0-RELEASE (and support for more ARM boards is still being added, including ARM64)
***</li>
</ul>

<h3><a href="http://www.openbsd.org/57.html" rel="nofollow">OpenBSD 5.7 released</a></h3>

<ul>
<li>OpenBSD has formally released another new version, complete with the giant changelog we&#39;ve come to expect</li>
<li>In the hardware department, 5.7 features many driver improvements and fixes, as well as support for some new things: USB 3.0 controllers, newer Intel and Atheros wireless cards and some additional 10gbit NICs</li>
<li>If you&#39;re using one of the Soekris boards, there&#39;s even <a href="http://bodgitandscarper.co.uk/openbsd/further-soekris-net6501-improvements-for-openbsd/" rel="nofollow">a new driver</a> to manipulate the GPIO and LEDs on them - this has some fun possibilities</li>
<li>Some new security improvements include: <a href="https://en.wikipedia.org/wiki/SipHash" rel="nofollow">SipHash</a> being sprinkled in some areas to protect hashing functions, big <a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">W<sup>X</sup> improvements</a> in the kernel space, <a href="http://www.bsdnow.tv/episodes/2015_04_15-pie_in_the_sky" rel="nofollow">static PIE</a> on all architectures, deterministic &quot;random&quot; functions <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">being replaced</a> with strong randomness, and support for remote logging over TLS</li>
<li>The entire source tree has also been audited to use <a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray</a>, which unintentionally <a href="https://splone.com/blog/2015/3/11/integer-overflow-prevention-in-c" rel="nofollow">saved</a> OpenBSD&#39;s libc from being vulnerable to <a href="https://guidovranken.wordpress.com/2015/02/04/full-disclosure-heap-overflow-in-h-spencers-regex-library-on-32-bit-systems/" rel="nofollow">earlier attacks</a> affecting other BSDs&#39; implementations</li>
<li>Being that it&#39;s OpenBSD, a number of things have also been <em>removed</em> from the base system: procfs, sendmail, SSLv3 support and loadable kernel modules are all gone now (not to mention the continuing massacre of dead code in LibreSSL)</li>
<li>Some people seem to be surprised about the removal of loadable modules, but almost nothing utilized them in OpenBSD, so it was really just removing old code that no one used anymore - very different from FreeBSD or Linux in this regard, where kernel modules are used pretty heavily</li>
<li>BIND and nginx have been taken out, so you&#39;ll need to either use the versions in ports or switch to Unbound and the in-base HTTP daemon</li>
<li>Speaking of httpd, it&#39;s gotten a number of <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">new</a> <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man5/httpd.conf.5" rel="nofollow">features</a>, and has had time to grow and mature since its initial debut - if you&#39;ve been considering trying it out, now would be a great time to do so</li>
<li>This release also includes the latest OpenSSH (with stronger fingerprint types and host key rotation), OpenNTPD (with the HTTPS constraints feature), OpenSMTPD, LibreSSL and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Check the <a href="http://www.openbsd.org/errata57.html" rel="nofollow">errata page</a> for any post-release fixes, and the <a href="http://www.openbsd.org/faq/upgrade57.html" rel="nofollow">upgrade guide</a> for specific instructions on updating from 5.6</li>
<li>Groundwork has also been laid for some major SMP scalability improvements - look forward to those in future releases</li>
<li>There&#39;s a <a href="http://www.openbsd.org/lyrics.html#57" rel="nofollow">song and artwork</a> to go along with the release as always, and CDs should be arriving within a few days - we&#39;ll show some pictures next week</li>
<li>Consider <a href="https://www.openbsdstore.com" rel="nofollow">picking one up</a> to support the project (and it&#39;s the only way to get puffy stickers)</li>
<li>For those of you paying close attention, the <a href="http://www.openbsd.org/images/puffy57.gif" rel="nofollow">banner image</a> for this release just might remind you of a <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">certain special episode</a> of BSD Now...
***</li>
</ul>

<h3><a href="https://torbsd.github.io/" rel="nofollow">Tor-BSD diversity project</a></h3>

<ul>
<li>We&#39;ve talked about Tor on the show a few times, and specifically about getting more of the network on BSD (Linux has an overwhelming majority right now)</li>
<li>A new initiative has started to do just that, called the Tor-BSD diversity project</li>
<li>&quot;Monocultures in nature are dangerous, as vulnerabilities are held in common across a broad spectrum. Diversity means single vulnerabilities are less likely to harm the entire ecosystem. [...] A single kernel vulnerability in GNU/Linux that impacting Tor relays could be devastating. We want to see a stronger Tor network, and we believe one critical ingredient for that is operating system diversity.&quot;</li>
<li>In addition to encouraging people to put up more relays, they&#39;re also continuing work on porting the Tor Browser Bundle to BSD, so more desktop users can have easy access to online privacy</li>
<li>There&#39;s an additional <a href="http://trac.haqistan.net/blog/tor-browser-ports-progress" rel="nofollow">progress report</a> for that part specifically, and it looks like most of the work is done now</li>
<li>Engaging the broader BSD community about Tor and fixing up the official documentation are also both on their todo list </li>
<li>If you&#39;ve been considering running a node to help out, there&#39;s always <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">our handy tutorial</a> on getting set up
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-now-available/" rel="nofollow">PC-BSD 10.1.2-RC1 released</a></h3>

<ul>
<li>If you want a sneak peek at the upcoming PC-BSD 10.1.2, the first release candidate is now available to grab</li>
<li>This quarterly update includes a number of new features, improvements and even some additional utilities</li>
<li>PersonaCrypt is one of them - it&#39;s a new tool for easily migrating encrypted home directories between systems</li>
<li>A new &quot;stealth mode&quot; option allows for a one-time login, using a blank home directory that gets wiped after use</li>
<li>Similarly, a new &quot;Tor mode&quot; allows for easy tunneling of all your traffic through the Tor network</li>
<li>IPFW is now the default firewall, offering improved VIMAGE capabilities</li>
<li>The life preserver backup tool now allows for bare-metal restores via the install CD</li>
<li>ISC&#39;s NTP daemon has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">OpenNTPD</a>, and OpenSSL has been replaced with <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">LibreSSL</a></li>
<li>It also includes the latest <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">Lumina</a> desktop, and there&#39;s another <a href="http://blog.pcbsd.org/2015/05/pc-bsd-10-1-2-rc1-lumina-desktop-0-8-4-released/" rel="nofollow">post dedicated to that</a></li>
<li>Binary packages have also been updated to fresh versions from the ports tree</li>
<li>More details, including upgrade instructions, can be found in the linked blog post
***</li>
</ul>

<h2>Interview - Ed Schouten - <a href="mailto:ed@freebsd.org" rel="nofollow">ed@freebsd.org</a> / <a href="https://twitter.com/edschouten" rel="nofollow">@edschouten</a></h2>

<p><a href="https://www.bsdcan.org/2015/schedule/track/Security/524.en.html" rel="nofollow">CloudABI</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://code.saghul.net/index.php/2015/05/01/announcing-the-open-household-router-contraption/" rel="nofollow">Open Household Router Contraption</a></h3>

<ul>
<li>This article introduces OpenHRC, the &quot;Open Household Router Contraption&quot;</li>
<li>In short, it&#39;s a set of bootstrapping scripts to turn a vanilla OpenBSD install into a feature-rich gateway device</li>
<li>It also makes use of Ansible playbooks for configuration, allowing for a more &quot;mass deployment&quot; type of setup</li>
<li>Everything is configured via a simple text file, and you end up with a local NTP server, DHCP server, firewall (obviously) and local caching DNS resolver - it even does DNSSEC validation</li>
<li>All the code is open source <a href="https://github.com/ioc32/openhrc" rel="nofollow">and on Github</a>, so you can read through what&#39;s actually being changed and put in place</li>
<li>There&#39;s also a <a href="https://www.youtube.com/watch?v=LZeKDM5jc90" rel="nofollow">video guide</a> to the entire process, if you&#39;re more of a visual person
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=365.0" rel="nofollow">OPNsense 15.1.10 released</a></h3>

<ul>
<li>Speaking of BSD routers, if you&#39;re looking for a &quot;prebuilt and ready to go&quot; option, OPNsense has just released a new version</li>
<li>15.1.10 drops some of the legacy patches they inherited from pfSense, aiming to stay closer to the mainline FreeBSD source code</li>
<li>Going along with this theme, they&#39;ve redone how they do ports, and are now kept totally in sync with the regular ports tree</li>
<li>Their binary packages are now signed using the fingerprint-style method, various GUI menus have been rewritten and a number of other bugs were fixed</li>
<li>NanoBSD-based images are also available now, so you can try it out on hardware with constrained resources as well</li>
<li>Version <a href="https://twitter.com/opnsense/status/596009164746432512" rel="nofollow">15.1.10.1</a> was released shortly thereafter, including a hotfix for VLANs
***</li>
</ul>

<h3><a href="https://www.ibm.com/developerworks/community/blogs/hpcgoulash/entry/ibm_workpad_z50_netbsd_an_interesting_combination1?lang=en" rel="nofollow">IBM Workpad Z50 and NetBSD</a></h3>

<ul>
<li>Before the infamous netbook fad came and went, IBM had a handheld PDA device that looked pretty much the same</li>
<li>Back in 1999, they released <a href="http://www.hpcfactor.com/reviews/hardware/ibm/workpad-z50/" rel="nofollow">the Workpad Z50</a> with Windows CE, sporting a 131MHz MIPS CPU, 16MB of RAM and a 640x480 display</li>
<li>You can probably tell where this is going... the article is about installing NetBSD it</li>
<li>&quot;What prevents me from taking my pristine Workpad z50 to the local electronics recycling  facility is NetBSD. With a little effort it is possible to install recent versions of NetBSD on the Workpad z50 and even have XWindows running&quot;</li>
<li>The author got pkgsrc up and running on it too, and cleverly used distcc to offload the compiling jobs to something a bit more modern</li>
<li>He&#39;s also got a <a href="https://www.youtube.com/watch?v=hSLVnSZKB9I" rel="nofollow">couple</a> <a href="https://www.youtube.com/watch?v=mIA-NWEHLM4" rel="nofollow">videos</a> of the bootup process and running Xorg (neither of which we&#39;d call &quot;speedy&quot; by any stretch of the imagination)
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/04/from-trenches-tips-tricks-edition.html" rel="nofollow">FreeBSD from the trenches</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post up in their &quot;from the trenches&quot; series, detailing FreeBSD in some real-world use cases</li>
<li>In this installment, Glen Barber talks about how he sets up all his laptops with ZFS and GELI</li>
<li>While the installer allows for an automatic ZFS layout, Glen notes that it&#39;s not a one-size-fits-all thing, and goes through doing everything manually</li>
<li>Each command is explained, and he walks you through the process of doing <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">an encrypted installation</a> on your root zpool
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-May/207671.html" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>DragonFlyBSD has officially won the race to get an Intel Broadwell graphics driver</li>
<li>Their i915 driver has been brought up to speed with Linux 3.14&#39;s, adding not only Broadwell support, but many other bugfixes for other cards too</li>
<li>It&#39;s planned for commit to the main tree very soon, but you can test it out with a git branch for the time being
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216QQcHyX" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21hGSk3c0" rel="nofollow">Hunter writes in</a></li>
<li><a href="http://slexy.org/view/s20JwPw9Je" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2x1GYr7y6" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s2swXxr2PX" rel="nofollow">Sergei writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2015-May/004541.html" rel="nofollow">How did you guess</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>87: On the List</title>
  <link>https://www.bsdnow.tv/87</link>
  <guid isPermaLink="false">56f4b27b-9384-4cb9-9877-d825f62815a7</guid>
  <pubDate>Wed, 29 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/56f4b27b-9384-4cb9-9877-d825f62815a7.mp3" length="58344340" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:21:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be speaking with Christos Zoulas, a NetBSD security officer. He's got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We've also got answers to your emails and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142990524317070&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;New PAE support in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has just added &lt;a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" target="_blank" rel="nofollow noopener"&gt;Physical Address Extention&lt;/a&gt; support to the i386 architecture, but it's probably not what you'd think of when you hear the term&lt;/li&gt;
&lt;li&gt;In most operating systems, PAE's main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn't for that&lt;/li&gt;
&lt;li&gt;Instead, this change specifically allows the system to use the &lt;a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" target="_blank" rel="nofollow noopener"&gt;No-eXecute Bit&lt;/a&gt; of the processor for the userland, further hardening the in-place memory protections&lt;/li&gt;
&lt;li&gt;Other operating systems enable the CPU feature without doing anything to the &lt;a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" target="_blank" rel="nofollow noopener"&gt;page table entries&lt;/a&gt;, so they &lt;strong&gt;do get&lt;/strong&gt; the available memory expansion, but &lt;strong&gt;don't get&lt;/strong&gt; the potential security benefit&lt;/li&gt;
&lt;li&gt;As we discussed in a &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;previous episode&lt;/a&gt;, the AMD64 platform already saw some major W&lt;sup&gt;X&lt;/sup&gt; kernel &lt;strong&gt;and&lt;/strong&gt; userland improvements - the i386 kernel reworking will begin shortly&lt;/li&gt;
&lt;li&gt;Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W&lt;sup&gt;X&lt;/sup&gt; that was already there&lt;/li&gt;
&lt;li&gt;The AMD64 improvements will be in 5.7, due out in just a couple days as of when we're recording this, but the i386 improvements will likely be in 5.8
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://twitter.com/nahannisys/status/591733319357730816" target="_blank" rel="nofollow noopener"&gt;Booting Windows in bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Work on FreeBSD's &lt;a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" target="_blank" rel="nofollow noopener"&gt;bhyve&lt;/a&gt; continues, and a big addition is on the way&lt;/li&gt;
&lt;li&gt;Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, &lt;em&gt;no Windows&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter&lt;/li&gt;
&lt;li&gt;Graphics emulation is still in the works; this image was taken by booting headless and using RDP&lt;/li&gt;
&lt;li&gt;A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)&lt;/li&gt;
&lt;li&gt;Not a lot of details on the matter currently, but we'll be sure to bring you more info as it comes out&lt;/li&gt;
&lt;li&gt;Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.midnightbsd.org/notes/" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 0.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;MidnightBSD is a smaller project we've not covered a lot on the show before&lt;/li&gt;
&lt;li&gt;It's an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use&lt;/li&gt;
&lt;li&gt;They also have their own, smaller version of FreeBSD ports, called "mports"&lt;/li&gt;
&lt;li&gt;If you're already using it, this new version is mainly a security and bugfix release&lt;/li&gt;
&lt;li&gt;It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions&lt;/li&gt;
&lt;li&gt;You can check &lt;a href="http://www.midnightbsd.org/about/" target="_blank" rel="nofollow noopener"&gt;their site&lt;/a&gt; for more information about the project&lt;/li&gt;
&lt;li&gt;We're trying to get the lead developer to come on for an interview, but haven't heard anything back yet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989267412968&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;OpenBSD rewrites the file utility&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We're all probably familiar with the traditional &lt;a href="https://en.wikipedia.org/wiki/File_%28command%29" target="_blank" rel="nofollow noopener"&gt;file&lt;/a&gt; command - it's been around &lt;a href="http://darwinsys.com/file/" target="_blank" rel="nofollow noopener"&gt;since the 1970s&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;For anyone who doesn't know, it's used to determine what type of file something actually is&lt;/li&gt;
&lt;li&gt;This tool doesn't see a lot of development these days, and it's had its share of security issues as well&lt;/li&gt;
&lt;li&gt;Some of those security issues &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141857001403570&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;remain&lt;/a&gt; &lt;a href="https://www.marc.info/?l=freebsd-security&amp;amp;m=142980545021888&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;unfixed&lt;/a&gt; in various BSDs &lt;strong&gt;even today&lt;/strong&gt;, despite being publicly known for a while&lt;/li&gt;
&lt;li&gt;It's not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it&lt;/li&gt;
&lt;li&gt;When you think about it, file was technically &lt;em&gt;designed&lt;/em&gt; to be used on untrusted files&lt;/li&gt;
&lt;li&gt;OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny&lt;/li&gt;
&lt;li&gt;This new version will, by default, run &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014212727213&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;as an unprivileged user&lt;/a&gt; with no shell, and in a &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=143014276127454&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;systrace sandbox&lt;/a&gt;, strictly limiting what system calls can be made&lt;/li&gt;
&lt;li&gt;With these two things combined, it should drastically reduce the damage a malicious file could potentially do&lt;/li&gt;
&lt;li&gt;Ian Darwin, the original author of the utility, &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142989483913635&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;saw the commit and replied&lt;/a&gt;, in what may be a moment in BSD history to remember&lt;/li&gt;
&lt;li&gt;It'll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone's already thrown together an unofficial portable version&lt;/li&gt;
&lt;li&gt;Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Christos Zoulas - &lt;a href="mailto:christos@netbsd.org" target="_blank" rel="nofollow noopener"&gt;christos@netbsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" target="_blank" rel="nofollow noopener"&gt;blacklistd&lt;/a&gt; and NetBSD advocacy&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" target="_blank" rel="nofollow noopener"&gt;GSoC-accepted BSD projects&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list&lt;/li&gt;
&lt;li&gt;FreeBSD's &lt;a href="https://wiki.freebsd.org/SummerOfCode2015Projects" target="_blank" rel="nofollow noopener"&gt;list&lt;/a&gt; includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. &lt;strong&gt;memory compression and deduplication&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD's &lt;a href="http://www.openbsdfoundation.org/gsoc2015.html" target="_blank" rel="nofollow noopener"&gt;list&lt;/a&gt; includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp;amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... &lt;strong&gt;porting HAMMER FS to OpenBSD&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;We'll be sure to keep you up to date on developments from both projects&lt;/li&gt;
&lt;li&gt;Hopefully the other BSDs will make the cut too next year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD on the Gumstix Duovero&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're not familiar with the Gumstix Duovero, it's an dual core ARM-based &lt;a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" target="_blank" rel="nofollow noopener"&gt;computer-on-module&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They actually look more like a stick of RAM than a mini-computer&lt;/li&gt;
&lt;li&gt;This article shows you how to build a FreeBSD -CURRENT image to run on them, using &lt;a href="https://github.com/freebsd/crochet" target="_blank" rel="nofollow noopener"&gt;crochet-freebsd&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" target="_blank" rel="nofollow noopener"&gt;EU study recommends OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools&lt;/li&gt;
&lt;li&gt;This is especially important, in all countries, after the mass surveillance documents came out &lt;/li&gt;
&lt;li&gt;"[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts."&lt;/li&gt;
&lt;li&gt;The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on&lt;/li&gt;
&lt;li&gt;Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: "Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways"&lt;/li&gt;
&lt;li&gt;Reddit, Undeadly and Hacker News also &lt;a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" target="_blank" rel="nofollow noopener"&gt;had&lt;/a&gt; &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150427093546" target="_blank" rel="nofollow noopener"&gt;some&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=9445831" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt;, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we've discussed with &lt;a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" target="_blank" rel="nofollow noopener"&gt;Voxer&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" target="_blank" rel="nofollow noopener"&gt;M:Tier&lt;/a&gt; before
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD workflow with Git&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're interested in contributing to FreeBSD, but aren't a big fan of SVN, they have a Github mirror too&lt;/li&gt;
&lt;li&gt;This mailing list post talks about interacting &lt;a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" target="_blank" rel="nofollow noopener"&gt;between&lt;/a&gt; the official source repository and the Git mirror&lt;/li&gt;
&lt;li&gt;This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2vjh3ogvG" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20GMcWvKE" target="_blank" rel="nofollow noopener"&gt;Bryan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21M1imT3d" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s25ScxQSwb" target="_blank" rel="nofollow noopener"&gt;Charles writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, blacklistd, file, pae, w^x, aslr, bhyve, windows, efi, rdp, gumstix, duovero, midnightbsd, coreclr, gsoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be speaking with Christos Zoulas, a NetBSD security officer. He&#39;s got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We&#39;ve also got answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142990524317070&w=2" rel="nofollow">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" rel="nofollow">Physical Address Extention</a> support to the i386 architecture, but it&#39;s probably not what you&#39;d think of when you hear the term</li>
<li>In most operating systems, PAE&#39;s main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn&#39;t for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" rel="nofollow">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" rel="nofollow">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don&#39;t get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we&#39;re recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" rel="nofollow">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em></li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we&#39;ll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we&#39;ve not covered a lot on the show before</li>
<li>It&#39;s an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called &quot;mports&quot;</li>
<li>If you&#39;re already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" rel="nofollow">their site</a> for more information about the project</li>
<li>We&#39;re trying to get the lead developer to come on for an interview, but haven&#39;t heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142989267412968&w=4" rel="nofollow">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We&#39;re all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" rel="nofollow">file</a> command - it&#39;s been around <a href="http://darwinsys.com/file/" rel="nofollow">since the 1970s</a></li>
<li>For anyone who doesn&#39;t know, it&#39;s used to determine what type of file something actually is</li>
<li>This tool doesn&#39;t see a lot of development these days, and it&#39;s had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&m=141857001403570&w=2" rel="nofollow">remain</a> <a href="https://www.marc.info/?l=freebsd-security&m=142980545021888&w=2" rel="nofollow">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It&#39;s not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&m=143014212727213&w=2" rel="nofollow">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&m=143014276127454&w=2" rel="nofollow">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&m=142989483913635&w=4" rel="nofollow">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It&#39;ll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone&#39;s already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" rel="nofollow">christos@netbsd.org</a></h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" rel="nofollow">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD&#39;s <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" rel="nofollow">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong></li>
<li>OpenBSD&#39;s <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong></li>
<li>We&#39;ll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" rel="nofollow">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you&#39;re not familiar with the Gumstix Duovero, it&#39;s an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" rel="nofollow">computer-on-module</a></li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" rel="nofollow">crochet-freebsd</a></li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" rel="nofollow">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>&quot;[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts.&quot;</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: &quot;Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways&quot;</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" rel="nofollow">had</a> <a href="http://undeadly.org/cgi?action=article&sid=20150427093546" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=9445831" rel="nofollow">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we&#39;ve discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" rel="nofollow">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" rel="nofollow">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" rel="nofollow">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you&#39;re interested in contributing to FreeBSD, but aren&#39;t a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" rel="nofollow">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" rel="nofollow">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s25ScxQSwb" rel="nofollow">Charles writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be speaking with Christos Zoulas, a NetBSD security officer. He&#39;s got a new project called blacklistd, with some interesting possibilities for stopping bruteforce attacks. We&#39;ve also got answers to your emails and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142990524317070&w=2" rel="nofollow">New PAE support in OpenBSD</a></h3>

<ul>
<li>OpenBSD has just added <a href="https://en.wikipedia.org/wiki/Physical_Address_Extension" rel="nofollow">Physical Address Extention</a> support to the i386 architecture, but it&#39;s probably not what you&#39;d think of when you hear the term</li>
<li>In most operating systems, PAE&#39;s main advantage is to partially circumvent the 4GB memory limit on 32 bit platforms - this version isn&#39;t for that</li>
<li>Instead, this change specifically allows the system to use the <a href="https://en.wikipedia.org/wiki/NX_bit#OpenBSD" rel="nofollow">No-eXecute Bit</a> of the processor for the userland, further hardening the in-place memory protections</li>
<li>Other operating systems enable the CPU feature without doing anything to the <a href="https://en.wikipedia.org/wiki/Page_table#Role_of_the_page_table" rel="nofollow">page table entries</a>, so they <strong>do get</strong> the available memory expansion, but <strong>don&#39;t get</strong> the potential security benefit</li>
<li>As we discussed in a <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">previous episode</a>, the AMD64 platform already saw some major W<sup>X</sup> kernel <strong>and</strong> userland improvements - the i386 kernel reworking will begin shortly</li>
<li>Not all CPUs support this feature, but, if yours supports NX, this will improve upon the previous version of W<sup>X</sup> that was already there</li>
<li>The AMD64 improvements will be in 5.7, due out in just a couple days as of when we&#39;re recording this, but the i386 improvements will likely be in 5.8
***</li>
</ul>

<h3><a href="https://twitter.com/nahannisys/status/591733319357730816" rel="nofollow">Booting Windows in bhyve</a></h3>

<ul>
<li>Work on FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">bhyve</a> continues, and a big addition is on the way</li>
<li>Thus far, bhyve has only been able to boot operating systems with a serial console - no VGA, no graphics, <em>no Windows</em></li>
<li>This is finally changing, and a teasing screenshot of Windows Server was recently posted on Twitter</li>
<li>Graphics emulation is still in the works; this image was taken by booting headless and using RDP</li>
<li>A lot of the needed code is being committed to -CURRENT now, but the UEFI portion of it requires a bit more development (and the aim for that is around the time of BSDCan)</li>
<li>Not a lot of details on the matter currently, but we&#39;ll be sure to bring you more info as it comes out</li>
<li>Are you more interested in bhyve or Xen on FreeBSD? Email us your thoughts
***</li>
</ul>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.6 released</a></h3>

<ul>
<li>MidnightBSD is a smaller project we&#39;ve not covered a lot on the show before</li>
<li>It&#39;s an operating system that was forked from FreeBSD back in the 6.1 days, and their focus seems to be on ease-of-use</li>
<li>They also have their own, smaller version of FreeBSD ports, called &quot;mports&quot;</li>
<li>If you&#39;re already using it, this new version is mainly a security and bugfix release</li>
<li>It syncs up with the most recent FreeBSD security patches and gets a lot of their ports closer to the latest versions</li>
<li>You can check <a href="http://www.midnightbsd.org/about/" rel="nofollow">their site</a> for more information about the project</li>
<li>We&#39;re trying to get the lead developer to come on for an interview, but haven&#39;t heard anything back yet
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142989267412968&w=4" rel="nofollow">OpenBSD rewrites the file utility</a></h3>

<ul>
<li>We&#39;re all probably familiar with the traditional <a href="https://en.wikipedia.org/wiki/File_%28command%29" rel="nofollow">file</a> command - it&#39;s been around <a href="http://darwinsys.com/file/" rel="nofollow">since the 1970s</a></li>
<li>For anyone who doesn&#39;t know, it&#39;s used to determine what type of file something actually is</li>
<li>This tool doesn&#39;t see a lot of development these days, and it&#39;s had its share of security issues as well</li>
<li>Some of those security issues <a href="https://www.marc.info/?l=openbsd-tech&m=141857001403570&w=2" rel="nofollow">remain</a> <a href="https://www.marc.info/?l=freebsd-security&m=142980545021888&w=2" rel="nofollow">unfixed</a> in various BSDs <strong>even today</strong>, despite being publicly known for a while</li>
<li>It&#39;s not uncommon for people to run file on random things they download from the internet, maybe even as root, and some of the previous bugs have allowed file to overwrite other files or execute code as the user running it</li>
<li>When you think about it, file was technically <em>designed</em> to be used on untrusted files</li>
<li>OpenBSD developer Nicholas Marriott, who also happens to be the author of tmux, decided it was time to do a complete rewrite - this time with modern coding practices and the usual OpenBSD scrutiny</li>
<li>This new version will, by default, run <a href="https://www.marc.info/?l=openbsd-cvs&m=143014212727213&w=2" rel="nofollow">as an unprivileged user</a> with no shell, and in a <a href="https://www.marc.info/?l=openbsd-cvs&m=143014276127454&w=2" rel="nofollow">systrace sandbox</a>, strictly limiting what system calls can be made</li>
<li>With these two things combined, it should drastically reduce the damage a malicious file could potentially do</li>
<li>Ian Darwin, the original author of the utility, <a href="https://www.marc.info/?l=openbsd-cvs&m=142989483913635&w=4" rel="nofollow">saw the commit and replied</a>, in what may be a moment in BSD history to remember</li>
<li>It&#39;ll be interesting to see if the other BSDs, OS X, Linux or other UNIXes consider adopting this implementation in the future - someone&#39;s already thrown together an unofficial portable version</li>
<li>Coincidentally, the lead developer and current maintainer of file just happens to be our guest today…
***</li>
</ul>

<h2>Interview - Christos Zoulas - <a href="mailto:christos@netbsd.org" rel="nofollow">christos@netbsd.org</a></h2>

<p><a href="https://www.youtube.com/watch?v=0UKCAsezF3Q" rel="nofollow">blacklistd</a> and NetBSD advocacy</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.google-melange.com/gsoc/projects/list/google/gsoc2015" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code people have published a list of all the projects that got accepted this year, and both FreeBSD and OpenBSD are on that list</li>
<li>FreeBSD&#39;s <a href="https://wiki.freebsd.org/SummerOfCode2015Projects" rel="nofollow">list</a> includes: NE2000 device model in userspace for bhyve, updating Ficl in the bootloader, type-aware kernel virtual memory access for utilities, JIT compilation for firewalls, test cluster automation, Linux packages for pkgng, an mtree parsing and manipulation library, porting bhyve to ARM-based platforms, CD-ROM emulation in CTL, libc security extensions, gptzfsboot support for dynamically discovering BEs during startup, CubieBoard support, a bhyve version of the netmap virtual passthrough for VMs, PXE support for FreeBSD guests in bhyve and finally.. <strong>memory compression and deduplication</strong></li>
<li>OpenBSD&#39;s <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">list</a> includes: asynchronous USB transfer submission from userland, ARM SD/MMC &amp; controller driver in libsa, improving USB userland tools and ioctl, automating module porting, implementing a KMS driver to the kernel and, wait for it... <strong>porting HAMMER FS to OpenBSD</strong></li>
<li>We&#39;ll be sure to keep you up to date on developments from both projects</li>
<li>Hopefully the other BSDs will make the cut too next year
***</li>
</ul>

<h3><a href="http://www.jumpnowtek.com/gumstix-freebsd/FreeBSD-Duovero-build-workstation-setup.html" rel="nofollow">FreeBSD on the Gumstix Duovero</a></h3>

<ul>
<li>If you&#39;re not familiar with the Gumstix Duovero, it&#39;s an dual core ARM-based <a href="https://store.gumstix.com/index.php/coms/duovero-coms.html" rel="nofollow">computer-on-module</a></li>
<li>They actually look more like a stick of RAM than a mini-computer</li>
<li>This article shows you how to build a FreeBSD -CURRENT image to run on them, using <a href="https://github.com/freebsd/crochet" rel="nofollow">crochet-freebsd</a></li>
<li>If anyone has any interesting devices like this that they use BSD on, write up something about it and send it to us
***</li>
</ul>

<h3><a href="https://joinup.ec.europa.eu/community/osor/news/ep-study-%E2%80%9Ceu-should-finance-key-open-source-tools%E2%80%9D" rel="nofollow">EU study recommends OpenBSD</a></h3>

<ul>
<li>A recent study by the European Parliament was published, explaining that more funding should go into critical open source projects and tools</li>
<li>This is especially important, in all countries, after the mass surveillance documents came out </li>
<li>&quot;[...] the use of open source computer operating systems and applications reduces the risk of privacy intrusion by mass surveillance. Open source software is not error free, or less prone to errors than proprietary software, the experts write. But proprietary software does not allow constant inspection and scrutiny by a large community of experts.&quot;</li>
<li>The report goes on to mention users becoming more and more security and privacy-aware, installing additional software to help protect themselves and their traffic from being spied on</li>
<li>Alongside Qubes, a Linux distro focused on containment and isolation, OpenBSD got a special mention: &quot;Proactive security and cryptography are two of the features highlighted in the product together with portability, standardisation and correctness. Its built-in cryptography and packet filter make OpenBSD suitable for use in the security industry, for example on firewalls, intrusion-detection systems and VPN gateways&quot;</li>
<li>Reddit, Undeadly and Hacker News also <a href="https://www.reddit.com/r/programming/comments/340xh3/eu_study_recommends_use_of_openbsd_for_its/" rel="nofollow">had</a> <a href="http://undeadly.org/cgi?action=article&sid=20150427093546" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=9445831" rel="nofollow">discussion</a>, particularly about corporations giving back to the BSDs that they make use of in their infrastructure - something we&#39;ve discussed with <a href="http://www.bsdnow.tv/episodes/2014_10_08-behind_the_masq" rel="nofollow">Voxer</a> and <a href="http://www.bsdnow.tv/episodes/2015_04_22-business_as_usual" rel="nofollow">M:Tier</a> before
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055551.html" rel="nofollow">FreeBSD workflow with Git</a></h3>

<ul>
<li>If you&#39;re interested in contributing to FreeBSD, but aren&#39;t a big fan of SVN, they have a Github mirror too</li>
<li>This mailing list post talks about interacting <a href="https://wiki.freebsd.org/GitWorkflow/GitSvn" rel="nofollow">between</a> the official source repository and the Git mirror</li>
<li>This makes it easy to get pull requests merged into the official tree, and encourages more developers to get involved
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2vjh3ogvG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20GMcWvKE" rel="nofollow">Bryan writes in</a></li>
<li><a href="http://slexy.org/view/s21M1imT3d" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s25ScxQSwb" rel="nofollow">Charles writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>86: Business as Usual</title>
  <link>https://www.bsdnow.tv/86</link>
  <guid isPermaLink="false">299268e7-d000-4377-8a05-1d0b89b36c5c</guid>
  <pubDate>Wed, 22 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/299268e7-d000-4377-8a05-1d0b89b36c5c.mp3" length="75048916" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we'll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:44:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we'll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" target="_blank" rel="nofollow noopener"&gt;Optimizing TLS for high bandwidth applications&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD&lt;/li&gt;
&lt;li&gt;TLS has traditionally had too much overhead for the levels of bandwidth they're using, so this pdf outlines some of their strategy in optimizing it&lt;/li&gt;
&lt;li&gt;The sendfile() syscall (which nginx uses) isn't available when data is encrypted in userland&lt;/li&gt;
&lt;li&gt;To get around this, Netflix is proposing to add TLS support to the FreeBSD &lt;strong&gt;kernel&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Having encrypted movie streams would be pretty neat
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142944822223482&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Crypto in unexpected places&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)&lt;/li&gt;
&lt;li&gt;One place you might not expect crypto to be used (or even needed) is in the "ping" utility, right? Well, think again &lt;/li&gt;
&lt;li&gt;David Gwynne recently &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142944754923359&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;committed&lt;/a&gt; a change that adds &lt;a href="https://en.wikipedia.org/wiki/Message_authentication_code" target="_blank" rel="nofollow noopener"&gt;MAC&lt;/a&gt; to the ping timestamp payload&lt;/li&gt;
&lt;li&gt;By default, it'll be filled with a ChaCha stream instead of an unvarying payload, and David says "this lets us have some confidence that the timestamp hasn't been damaged or tampered with in transit"&lt;/li&gt;
&lt;li&gt;Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward&lt;/li&gt;
&lt;li&gt;Maybe we can look forward to a cryptographically secure "echo" command next...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" target="_blank" rel="nofollow noopener"&gt;Broadwell in DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status&lt;/li&gt;
&lt;li&gt;Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn't work&lt;/li&gt;
&lt;li&gt;The two main show-stoppers right now are the graphics and wireless, but they have someone who's already making progress with the GPU support&lt;/li&gt;
&lt;li&gt;Wireless support will likely have to wait until FreeBSD gets it, then they'll port it back over&lt;/li&gt;
&lt;li&gt;None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" target="_blank" rel="nofollow noopener"&gt;DIY NAS software roundup&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this blog post, the author compares a few different software solutions for a network attached storage device&lt;/li&gt;
&lt;li&gt;He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based&lt;/li&gt;
&lt;li&gt;NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface&lt;/li&gt;
&lt;li&gt;If you've been thinking about putting together a NAS, but aren't quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names&lt;/li&gt;
&lt;li&gt;Some competition is always good, gotta keep those guys on their toes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Antoine Jacoutot - &lt;a href="mailto:ajacoutot@openbsd.org" target="_blank" rel="nofollow noopener"&gt;ajacoutot@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/ajacoutot" target="_blank" rel="nofollow noopener"&gt;@ajacoutot&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD at &lt;a href="http://www.mtier.org/about-us/" target="_blank" rel="nofollow noopener"&gt;M:Tier&lt;/a&gt;, business adoption of BSD, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" target="_blank" rel="nofollow noopener"&gt;OpenBSD on DigitalOcean&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow&lt;/li&gt;
&lt;li&gt;This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS&lt;/li&gt;
&lt;li&gt;Using a -current snapshot and some swapfile trickery, it's possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk&lt;/li&gt;
&lt;li&gt;After doing so, you just boot from their web UI-based console and can perform a standard installation &lt;/li&gt;
&lt;li&gt;You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=281494" target="_blank" rel="nofollow noopener"&gt;Initial ARM64 support lands in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ARM64 architecture, sometimes called &lt;a href="https://wiki.freebsd.org/arm64" target="_blank" rel="nofollow noopener"&gt;ARMv8 or AArch64&lt;/a&gt;, is a new generation of CPUs that will mostly be in embedded devices&lt;/li&gt;
&lt;li&gt;FreeBSD has just gotten support for this platform in the -CURRENT branch&lt;/li&gt;
&lt;li&gt;Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now &lt;a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" target="_blank" rel="nofollow noopener"&gt;a full build&lt;/a&gt; is possible&lt;/li&gt;
&lt;li&gt;Work should now start happening in the main source code tree, and hopefully they'll have full support in a branch soon
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://shill.seas.harvard.edu/" target="_blank" rel="nofollow noopener"&gt;Scripting with least privilege&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new scripting language with a focus on privilege separation and running with only what's absolutely needed has been popular in the headlines lately&lt;/li&gt;
&lt;li&gt;Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.&lt;/li&gt;
&lt;li&gt;Shill aims to answer the questions "how do we limit the authority of scripts" and "how do we determine what authority is necessary" by including a declarative security policy that's checked and enforced by the language runtime&lt;/li&gt;
&lt;li&gt;If used on FreeBSD, Shill will use Capsicum for sandboxing&lt;/li&gt;
&lt;li&gt;You can find some more of the technical information in their &lt;a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" target="_blank" rel="nofollow noopener"&gt;documentation pdf&lt;/a&gt; or watch their &lt;a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" target="_blank" rel="nofollow noopener"&gt;USENIX presentation&lt;/a&gt; video&lt;/li&gt;
&lt;li&gt;Hacker News also &lt;a href="https://news.ycombinator.com/item?id=9328277" target="_blank" rel="nofollow noopener"&gt;had some discussion&lt;/a&gt; on the topic
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.greduan.com/2015-04-19-mstobfi.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD first impressions&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A brand new BSD user has started documenting his experience through a series of blog posts&lt;/li&gt;
&lt;li&gt;Formerly a Linux guy, he's tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop&lt;/li&gt;
&lt;li&gt;The first post goes into why he chose BSD at all, why he's switching away from Linux, how the initial transition has been, what you'll need to relearn and what he's got planned going forward&lt;/li&gt;
&lt;li&gt;He's only been using OpenBSD for a few days as of the time this was written - we don't usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" target="_blank" rel="nofollow noopener"&gt;PCBSD and 4K oh my!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out&lt;/li&gt;
&lt;li&gt;The short of it - It works great!&lt;/li&gt;
&lt;li&gt;Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box&lt;/li&gt;
&lt;li&gt;This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21kFuvAFs" target="_blank" rel="nofollow noopener"&gt;Darin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2nf4o9p4E" target="_blank" rel="nofollow noopener"&gt;Mitch writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Discussion&lt;/h2&gt;

&lt;h3&gt;Comparison of BSD release cycles&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt;, &lt;a href="http://www.openbsd.org/faq/faq5.html#Flavors" target="_blank" rel="nofollow noopener"&gt;OpenBSD&lt;/a&gt;, &lt;a href="https://www.netbsd.org/releases/release-map.html" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt; and &lt;a href="https://www.dragonflybsd.org/releases/" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, mtier, m:tier, business, it, consulting, binpatch-ng, openup, stable, packages, enterprise, support, freenas, tls, netflix, broadwell, nas4free</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we&#39;ll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">Optimizing TLS for high bandwidth applications</a></h3>

<ul>
<li>Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD</li>
<li>TLS has traditionally had too much overhead for the levels of bandwidth they&#39;re using, so this pdf outlines some of their strategy in optimizing it</li>
<li>The sendfile() syscall (which nginx uses) isn&#39;t available when data is encrypted in userland</li>
<li>To get around this, Netflix is proposing to add TLS support to the FreeBSD <strong>kernel</strong></li>
<li>Having encrypted movie streams would be pretty neat
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142944822223482&w=2" rel="nofollow">Crypto in unexpected places</a></h3>

<ul>
<li>OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)</li>
<li>One place you might not expect crypto to be used (or even needed) is in the &quot;ping&quot; utility, right? Well, think again </li>
<li>David Gwynne recently <a href="https://www.marc.info/?l=openbsd-cvs&m=142944754923359&w=2" rel="nofollow">committed</a> a change that adds <a href="https://en.wikipedia.org/wiki/Message_authentication_code" rel="nofollow">MAC</a> to the ping timestamp payload</li>
<li>By default, it&#39;ll be filled with a ChaCha stream instead of an unvarying payload, and David says &quot;this lets us have some confidence that the timestamp hasn&#39;t been damaged or tampered with in transit&quot;</li>
<li>Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward</li>
<li>Maybe we can look forward to a cryptographically secure &quot;echo&quot; command next...
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status</li>
<li>Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn&#39;t work</li>
<li>The two main show-stoppers right now are the graphics and wireless, but they have someone who&#39;s already making progress with the GPU support</li>
<li>Wireless support will likely have to wait until FreeBSD gets it, then they&#39;ll port it back over</li>
<li>None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" rel="nofollow">DIY NAS software roundup</a></h3>

<ul>
<li>In this blog post, the author compares a few different software solutions for a network attached storage device</li>
<li>He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based</li>
<li>NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface</li>
<li>If you&#39;ve been thinking about putting together a NAS, but aren&#39;t quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names</li>
<li>Some competition is always good, gotta keep those guys on their toes
***</li>
</ul>

<h2>Interview - Antoine Jacoutot - <a href="mailto:ajacoutot@openbsd.org" rel="nofollow">ajacoutot@openbsd.org</a> / <a href="https://twitter.com/ajacoutot" rel="nofollow">@ajacoutot</a></h2>

<p>OpenBSD at <a href="http://www.mtier.org/about-us/" rel="nofollow">M:Tier</a>, business adoption of BSD, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" rel="nofollow">OpenBSD on DigitalOcean</a></h3>

<ul>
<li>When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow</li>
<li>This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS</li>
<li>Using a -current snapshot and some swapfile trickery, it&#39;s possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk</li>
<li>After doing so, you just boot from their web UI-based console and can perform a standard installation </li>
<li>You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=281494" rel="nofollow">Initial ARM64 support lands in FreeBSD</a></h3>

<ul>
<li>The ARM64 architecture, sometimes called <a href="https://wiki.freebsd.org/arm64" rel="nofollow">ARMv8 or AArch64</a>, is a new generation of CPUs that will mostly be in embedded devices</li>
<li>FreeBSD has just gotten support for this platform in the -CURRENT branch</li>
<li>Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now <a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" rel="nofollow">a full build</a> is possible</li>
<li>Work should now start happening in the main source code tree, and hopefully they&#39;ll have full support in a branch soon
***</li>
</ul>

<h3><a href="http://shill.seas.harvard.edu/" rel="nofollow">Scripting with least privilege</a></h3>

<ul>
<li>A new scripting language with a focus on privilege separation and running with only what&#39;s absolutely needed has been popular in the headlines lately</li>
<li>Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.</li>
<li>Shill aims to answer the questions &quot;how do we limit the authority of scripts&quot; and &quot;how do we determine what authority is necessary&quot; by including a declarative security policy that&#39;s checked and enforced by the language runtime</li>
<li>If used on FreeBSD, Shill will use Capsicum for sandboxing</li>
<li>You can find some more of the technical information in their <a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" rel="nofollow">documentation pdf</a> or watch their <a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" rel="nofollow">USENIX presentation</a> video</li>
<li>Hacker News also <a href="https://news.ycombinator.com/item?id=9328277" rel="nofollow">had some discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://blog.greduan.com/2015-04-19-mstobfi.html" rel="nofollow">OpenBSD first impressions</a></h3>

<ul>
<li>A brand new BSD user has started documenting his experience through a series of blog posts</li>
<li>Formerly a Linux guy, he&#39;s tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop</li>
<li>The first post goes into why he chose BSD at all, why he&#39;s switching away from Linux, how the initial transition has been, what you&#39;ll need to relearn and what he&#39;s got planned going forward</li>
<li>He&#39;s only been using OpenBSD for a few days as of the time this was written - we don&#39;t usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" rel="nofollow">PCBSD and 4K oh my!</a></h3>

<ul>
<li>Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out</li>
<li>The short of it - It works great!</li>
<li>Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box</li>
<li>This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21kFuvAFs" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2nf4o9p4E" rel="nofollow">Mitch writes in</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of BSD release cycles</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" rel="nofollow">FreeBSD</a>, <a href="http://www.openbsd.org/faq/faq5.html#Flavors" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/releases/release-map.html" rel="nofollow">NetBSD</a> and <a href="https://www.dragonflybsd.org/releases/" rel="nofollow">DragonFlyBSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be chatting with Antoine Jacoutot about how M:Tier uses BSD in their business. After that, we&#39;ll be discussing the different release models across the BSDs, and which style we like the most. As always, answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://people.freebsd.org/%7Errs/asiabsd_2015_tls.pdf" rel="nofollow">Optimizing TLS for high bandwidth applications</a></h3>

<ul>
<li>Netflix has released a report on some of their recent activities, pushing lots of traffic through TLS on FreeBSD</li>
<li>TLS has traditionally had too much overhead for the levels of bandwidth they&#39;re using, so this pdf outlines some of their strategy in optimizing it</li>
<li>The sendfile() syscall (which nginx uses) isn&#39;t available when data is encrypted in userland</li>
<li>To get around this, Netflix is proposing to add TLS support to the FreeBSD <strong>kernel</strong></li>
<li>Having encrypted movie streams would be pretty neat
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142944822223482&w=2" rel="nofollow">Crypto in unexpected places</a></h3>

<ul>
<li>OpenBSD is somewhat known for its integrated cryptography, right down to strong randomness in every place you could imagine (process IDs, TCP initial sequence numbers, etc)</li>
<li>One place you might not expect crypto to be used (or even needed) is in the &quot;ping&quot; utility, right? Well, think again </li>
<li>David Gwynne recently <a href="https://www.marc.info/?l=openbsd-cvs&m=142944754923359&w=2" rel="nofollow">committed</a> a change that adds <a href="https://en.wikipedia.org/wiki/Message_authentication_code" rel="nofollow">MAC</a> to the ping timestamp payload</li>
<li>By default, it&#39;ll be filled with a ChaCha stream instead of an unvarying payload, and David says &quot;this lets us have some confidence that the timestamp hasn&#39;t been damaged or tampered with in transit&quot;</li>
<li>Not only is this a security feature, but it should also help detect dodgy or malfunctioning network equipment going forward</li>
<li>Maybe we can look forward to a cryptographically secure &quot;echo&quot; command next...
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/newhandbook/docs/newhandbook/BroadwellBoxes/" rel="nofollow">Broadwell in DragonFly</a></h3>

<ul>
<li>The DragonFlyBSD guys have started a new page on their wiki to discuss Broadwell hardware and its current status</li>
<li>Matt Dillon, the project lead, recently bought some hardware with this chipset, and lays out what works and what doesn&#39;t work</li>
<li>The two main show-stoppers right now are the graphics and wireless, but they have someone who&#39;s already making progress with the GPU support</li>
<li>Wireless support will likely have to wait until FreeBSD gets it, then they&#39;ll port it back over</li>
<li>None of the BSDs currently have full Broadwell support, so stay tuned for further updates
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2015/04/diy-nas-software-roundup.html" rel="nofollow">DIY NAS software roundup</a></h3>

<ul>
<li>In this blog post, the author compares a few different software solutions for a network attached storage device</li>
<li>He puts FreeNAS, one of our favorites, up against a number of opponents - both BSD and Linux-based</li>
<li>NAS4Free gets an honorable mention as well, particularly for its lower hardware requirements and sleek interface</li>
<li>If you&#39;ve been thinking about putting together a NAS, but aren&#39;t quite comfortable enough to set it up by yourself yet, this article should give you a good view of the current big names</li>
<li>Some competition is always good, gotta keep those guys on their toes
***</li>
</ul>

<h2>Interview - Antoine Jacoutot - <a href="mailto:ajacoutot@openbsd.org" rel="nofollow">ajacoutot@openbsd.org</a> / <a href="https://twitter.com/ajacoutot" rel="nofollow">@ajacoutot</a></h2>

<p>OpenBSD at <a href="http://www.mtier.org/about-us/" rel="nofollow">M:Tier</a>, business adoption of BSD, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tubsta.com/2015/04/openbsd-on-digital-ocean/" rel="nofollow">OpenBSD on DigitalOcean</a></h3>

<ul>
<li>When DigitalOcean rolled out initial support for FreeBSD, it was a great step in the right direction - we hoped that all the other BSDs would soon follow</li>
<li>This is not yet the case, but a blog article here has details on how you can install OpenBSD (and likely the others too) on your VPS</li>
<li>Using a -current snapshot and some swapfile trickery, it&#39;s possible to image an OpenBSD ramdisk installer onto an unmounted portion of the virtual disk</li>
<li>After doing so, you just boot from their web UI-based console and can perform a standard installation </li>
<li>You will have to pay special attention to some details of the disk layout, but this article takes you through the entire process step by step
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=281494" rel="nofollow">Initial ARM64 support lands in FreeBSD</a></h3>

<ul>
<li>The ARM64 architecture, sometimes called <a href="https://wiki.freebsd.org/arm64" rel="nofollow">ARMv8 or AArch64</a>, is a new generation of CPUs that will mostly be in embedded devices</li>
<li>FreeBSD has just gotten support for this platform in the -CURRENT branch</li>
<li>Previously, it was only the beginnings of the kernel and enough bits to boot in QEMU - now <a href="https://lists.freebsd.org/pipermail/freebsd-testing/2015-April/000918.html" rel="nofollow">a full build</a> is possible</li>
<li>Work should now start happening in the main source code tree, and hopefully they&#39;ll have full support in a branch soon
***</li>
</ul>

<h3><a href="http://shill.seas.harvard.edu/" rel="nofollow">Scripting with least privilege</a></h3>

<ul>
<li>A new scripting language with a focus on privilege separation and running with only what&#39;s absolutely needed has been popular in the headlines lately</li>
<li>Shell scripts are used everywhere today: startup scripts, orchestration scripts for mass deployment, configuring and compiling software, etc.</li>
<li>Shill aims to answer the questions &quot;how do we limit the authority of scripts&quot; and &quot;how do we determine what authority is necessary&quot; by including a declarative security policy that&#39;s checked and enforced by the language runtime</li>
<li>If used on FreeBSD, Shill will use Capsicum for sandboxing</li>
<li>You can find some more of the technical information in their <a href="http://shill.seas.harvard.edu/shill-osdi-2014.pdf" rel="nofollow">documentation pdf</a> or watch their <a href="https://2459d6dc103cb5933875-c0245c5c937c5dedcca3f1764ecc9b2f.ssl.cf2.rackcdn.com/osdi14/moore.mp4" rel="nofollow">USENIX presentation</a> video</li>
<li>Hacker News also <a href="https://news.ycombinator.com/item?id=9328277" rel="nofollow">had some discussion</a> on the topic
***</li>
</ul>

<h3><a href="http://blog.greduan.com/2015-04-19-mstobfi.html" rel="nofollow">OpenBSD first impressions</a></h3>

<ul>
<li>A brand new BSD user has started documenting his experience through a series of blog posts</li>
<li>Formerly a Linux guy, he&#39;s tried out FreeBSD and OpenBSD so far, and is currently working on an OpenBSD desktop</li>
<li>The first post goes into why he chose BSD at all, why he&#39;s switching away from Linux, how the initial transition has been, what you&#39;ll need to relearn and what he&#39;s got planned going forward</li>
<li>He&#39;s only been using OpenBSD for a few days as of the time this was written - we don&#39;t usually get to hear from people this early in on their BSD journey, so it offers a unique perspective
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/04/pc-bsd-and-4k-oh-my/" rel="nofollow">PCBSD and 4K oh my!</a></h3>

<ul>
<li>Yesterday, Kris got ahold of some 4K monitor hardware to test PC-BSD out</li>
<li>The short of it - It works great!</li>
<li>Minor tweaks being made to some of the PC-BSD defaults to better accommodate 4K out of box</li>
<li>This particular model monitor ships with DisplayPort set to 1.1 mode only, switching it to 1.2 mode enables 60Hz properly
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21kFuvAFs" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s2nf4o9p4E" rel="nofollow">Mitch writes in</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of BSD release cycles</h3>

<ul>
<li><a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/faq/introduction.html#idp55486416" rel="nofollow">FreeBSD</a>, <a href="http://www.openbsd.org/faq/faq5.html#Flavors" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/releases/release-map.html" rel="nofollow">NetBSD</a> and <a href="https://www.dragonflybsd.org/releases/" rel="nofollow">DragonFlyBSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>85: PIE in the Sky</title>
  <link>https://www.bsdnow.tv/85</link>
  <guid isPermaLink="false">7b947cd6-04e4-4210-a3a1-3f80d96ccc79</guid>
  <pubDate>Wed, 15 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7b947cd6-04e4-4210-a3a1-3f80d96ccc79.mp3" length="58114516" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He'll tell us what types of attacks it prevents, and why it's such a big deal. We've also got answers to questions from you in the audience and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:42</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He'll tell us what types of attacks it prevents, and why it's such a big deal. We've also got answers to questions from you in the audience and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html" target="_blank" rel="nofollow noopener"&gt;Solaris' networking future is with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A curious patch from someone with an Oracle email address was &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142822852613581&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recently sent in&lt;/a&gt; to one of the OpenBSD mailing lists&lt;/li&gt;
&lt;li&gt;It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the &lt;strong&gt;current&lt;/strong&gt; version of PF&lt;/li&gt;
&lt;li&gt;For anyone unfamiliar with the history of PF, it was actually made &lt;em&gt;as a replacement for&lt;/em&gt; IPFilter in OpenBSD, due to some licensing issues&lt;/li&gt;
&lt;li&gt;What's more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting&lt;/li&gt;
&lt;li&gt;This blog post goes through some of the backstory of the two firewalls&lt;/li&gt;
&lt;li&gt;PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too&lt;/li&gt;
&lt;li&gt;"Many of the world's largest corporations and government agencies are heavy Solaris users, meaning that even if you're neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD's PF for their filtering needs, we will all be benefiting even more from the OpenBSD project's emphasis on correctness, quality and security"&lt;/li&gt;
&lt;li&gt;You're welcome, Oracle
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15" target="_blank" rel="nofollow noopener"&gt;BAFUG discussion videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Bay Area FreeBSD users group has been uploading some videos from their recent meetings&lt;/li&gt;
&lt;li&gt;Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)&lt;/li&gt;
&lt;li&gt;Craig Rodrigues also gave &lt;a href="https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15" target="_blank" rel="nofollow noopener"&gt;a talk&lt;/a&gt; about Kyua and the FreeBSD testing framework&lt;/li&gt;
&lt;li&gt;Lastly, Kip Macy gave &lt;a href="https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15" target="_blank" rel="nofollow noopener"&gt;a talk&lt;/a&gt; titled "network stack changes, user-level FreeBSD"&lt;/li&gt;
&lt;li&gt;The main two subjects there are some network stack changes, and how to get more people contributing, but there's also open discussion about a variety of FreeBSD topics&lt;/li&gt;
&lt;li&gt;If you're close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html" target="_blank" rel="nofollow noopener"&gt;More than just a makefile&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux&lt;/li&gt;
&lt;li&gt;This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs&lt;/li&gt;
&lt;li&gt;As it turns out, the ports system really isn't that different from a binary package manager - they are what's &lt;em&gt;used&lt;/em&gt; to create binary packages, after all&lt;/li&gt;
&lt;li&gt;The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream&lt;/li&gt;
&lt;li&gt;After that, he shows you how to get your new port tested, if you're interesting in doing some porting yourself, and getting involved with the rest of the community&lt;/li&gt;
&lt;li&gt;This post is very long and there's a lot more to it, so check it out (and more discussion &lt;a href="https://news.ycombinator.com/item?id=9360827" target="_blank" rel="nofollow noopener"&gt;on Hacker News&lt;/a&gt;)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.scip.ch/en/?labs.20150409" target="_blank" rel="nofollow noopener"&gt;Securing your home fences&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a &lt;a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" target="_blank" rel="nofollow noopener"&gt;bad&lt;/a&gt; &lt;a href="https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970" target="_blank" rel="nofollow noopener"&gt;idea&lt;/a&gt; by now&lt;/li&gt;
&lt;li&gt;We hear from a lot of users who want to set up some kind of BSD-based firewall, but don't hear back from them after they've done it.. until now&lt;/li&gt;
&lt;li&gt;In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines &lt;a href="http://www.pcengines.ch/apu1d4.htm" target="_blank" rel="nofollow noopener"&gt;APU board&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;He notes that you have a lot of options software-wise, including vanilla &lt;a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt;, &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;OpenBSD&lt;/a&gt; or even Linux, but decided to go with OPNsense because of the easy interface and configuration&lt;/li&gt;
&lt;li&gt;The post covers all the hardware you'll need, getting the OS installed to a flash drive or SD card and going through the whole process&lt;/li&gt;
&lt;li&gt;Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up&lt;/li&gt;
&lt;li&gt;If you don't have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)&lt;/li&gt;
&lt;li&gt;We love super-detailed guides like this, so everyone should write more and send them to us immediately
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Pascal Stumpf - &lt;a href="mailto:pascal@openbsd.org" target="_blank" rel="nofollow noopener"&gt;pascal@openbsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Static PIE in OpenBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.llvm.org/2015/04/fuzz-all-clangs.html" target="_blank" rel="nofollow noopener"&gt;LLVM's new libFuzzer&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility&lt;/li&gt;
&lt;li&gt;It looks like LLVM is going to have their own fuzzing tool too now&lt;/li&gt;
&lt;li&gt;The Clang and LLVM guys are no strangers to this type of code testing, but decided to "close the loop" and start fuzzing parts of LLVM (including Clang) using LLVM itself&lt;/li&gt;
&lt;li&gt;With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02" target="_blank" rel="nofollow noopener"&gt;HardenedBSD upgrades secadm&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support&lt;/li&gt;
&lt;li&gt;We covered both the secadm tool and integriforce in previous episodes, but the short version is that it's a way to prevent files from being altered (even as root)&lt;/li&gt;
&lt;li&gt;Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142877132517229&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;RAID5 returns to OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD's &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" target="_blank" rel="nofollow noopener"&gt;softraid&lt;/a&gt; subsystem, somewhat similar to FreeBSD's GEOM, has had experimental RAID5 support for a while&lt;/li&gt;
&lt;li&gt;However, it was exactly that - experimental - and required a recompile to enable&lt;/li&gt;
&lt;li&gt;With some work from recent hackathons, the &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142876943116907&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;final piece&lt;/a&gt; was added to enable resuming partial array rebuilds&lt;/li&gt;
&lt;li&gt;Now it's &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142877026917030&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;on by default&lt;/a&gt;, and there's a call for testing being put out, so grab a snapshot and put the code through its paces&lt;/li&gt;
&lt;li&gt;The bioctl softraid command also &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142877223817406&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;now supports&lt;/a&gt; DUIDs during pseudo-device detachment, possibly paving the way for the installer to &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142643313416298&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;drop&lt;/a&gt; the "do you want to enable DUIDs?" question entirely
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html" target="_blank" rel="nofollow noopener"&gt;pkgng 1.5.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Going back to what we &lt;a href="http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update" target="_blank" rel="nofollow noopener"&gt;talked about last week&lt;/a&gt;, the final version of pkgng 1.5.0 is out&lt;/li&gt;
&lt;li&gt;The "provides" and "requires" support is finally in a regular release&lt;/li&gt;
&lt;li&gt;A new "-r" switch will allow for direct installation to a chroot or alternate root directory&lt;/li&gt;
&lt;li&gt;Memory usage should be much better now, and some general code speed-ups were added&lt;/li&gt;
&lt;li&gt;This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it'll be interesting to see if anything comes of that&lt;/li&gt;
&lt;li&gt;Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150411160247" target="_blank" rel="nofollow noopener"&gt;p2k15 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work&lt;/li&gt;
&lt;li&gt;As usual, the developers sent in reports of some of the things they got done at the event&lt;/li&gt;
&lt;li&gt;Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit&lt;/li&gt;
&lt;li&gt;Stefan Sperling &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150414064710" target="_blank" rel="nofollow noopener"&gt;wrote in&lt;/a&gt;, detailing his work with wireless chipsets, specifically when the vendor doesn't provide any hardware documentation, as well as updating some of the games in ports&lt;/li&gt;
&lt;li&gt;Ken Westerback &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150413163333" target="_blank" rel="nofollow noopener"&gt;also sent in a report&lt;/a&gt;, but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iNBo2swq" target="_blank" rel="nofollow noopener"&gt;Shaun writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s202BRLwrd" target="_blank" rel="nofollow noopener"&gt;Hrishi writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2KT7M35uY" target="_blank" rel="nofollow noopener"&gt;Randy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Q5lOoxzl" target="_blank" rel="nofollow noopener"&gt;Zach writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ynDjuzVi" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-ports&amp;amp;m=142884995931428&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Gstreamer hates us&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html" target="_blank" rel="nofollow noopener"&gt;At least he's honest&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html" target="_blank" rel="nofollow noopener"&gt;I find myself in a situation&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, aslr, pie, position-independent executable, static, binary, dynamic, linking, security, llvm, fuzzing, clang, opnsense, pcengines, apu, alix, hammer2, zfs, oracle, solaris, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He&#39;ll tell us what types of attacks it prevents, and why it&#39;s such a big deal. We&#39;ve also got answers to questions from you in the audience and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html" rel="nofollow">Solaris&#39; networking future is with OpenBSD</a></h3>

<ul>
<li>A curious patch from someone with an Oracle email address was <a href="https://www.marc.info/?l=openbsd-tech&m=142822852613581&w=2" rel="nofollow">recently sent in</a> to one of the OpenBSD mailing lists</li>
<li>It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the <strong>current</strong> version of PF</li>
<li>For anyone unfamiliar with the history of PF, it was actually made <em>as a replacement for</em> IPFilter in OpenBSD, due to some licensing issues</li>
<li>What&#39;s more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting</li>
<li>This blog post goes through some of the backstory of the two firewalls</li>
<li>PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too</li>
<li>&quot;Many of the world&#39;s largest corporations and government agencies are heavy Solaris users, meaning that even if you&#39;re neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD&#39;s PF for their filtering needs, we will all be benefiting even more from the OpenBSD project&#39;s emphasis on correctness, quality and security&quot;</li>
<li>You&#39;re welcome, Oracle
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15" rel="nofollow">BAFUG discussion videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos from their recent meetings</li>
<li>Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)</li>
<li>Craig Rodrigues also gave <a href="https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15" rel="nofollow">a talk</a> about Kyua and the FreeBSD testing framework</li>
<li>Lastly, Kip Macy gave <a href="https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15" rel="nofollow">a talk</a> titled &quot;network stack changes, user-level FreeBSD&quot;</li>
<li>The main two subjects there are some network stack changes, and how to get more people contributing, but there&#39;s also open discussion about a variety of FreeBSD topics</li>
<li>If you&#39;re close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html" rel="nofollow">More than just a makefile</a></h3>

<ul>
<li>If you&#39;re not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux</li>
<li>This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs</li>
<li>As it turns out, the ports system really isn&#39;t that different from a binary package manager - they are what&#39;s <em>used</em> to create binary packages, after all</li>
<li>The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream</li>
<li>After that, he shows you how to get your new port tested, if you&#39;re interesting in doing some porting yourself, and getting involved with the rest of the community</li>
<li>This post is very long and there&#39;s a lot more to it, so check it out (and more discussion <a href="https://news.ycombinator.com/item?id=9360827" rel="nofollow">on Hacker News</a>)
***</li>
</ul>

<h3><a href="http://www.scip.ch/en/?labs.20150409" rel="nofollow">Securing your home fences</a></h3>

<ul>
<li>Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a <a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" rel="nofollow">bad</a> <a href="https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970" rel="nofollow">idea</a> by now</li>
<li>We hear from a lot of users who want to set up some kind of BSD-based firewall, but don&#39;t hear back from them after they&#39;ve done it.. until now</li>
<li>In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines <a href="http://www.pcengines.ch/apu1d4.htm" rel="nofollow">APU board</a></li>
<li>He notes that you have a lot of options software-wise, including vanilla <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a>, <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a> or even Linux, but decided to go with OPNsense because of the easy interface and configuration</li>
<li>The post covers all the hardware you&#39;ll need, getting the OS installed to a flash drive or SD card and going through the whole process</li>
<li>Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up</li>
<li>If you don&#39;t have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)</li>
<li>We love super-detailed guides like this, so everyone should write more and send them to us immediately
***</li>
</ul>

<h2>Interview - Pascal Stumpf - <a href="mailto:pascal@openbsd.org" rel="nofollow">pascal@openbsd.org</a></h2>

<p>Static PIE in OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.llvm.org/2015/04/fuzz-all-clangs.html" rel="nofollow">LLVM&#39;s new libFuzzer</a></h3>

<ul>
<li>We&#39;ve discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility</li>
<li>It looks like LLVM is going to have their own fuzzing tool too now</li>
<li>The Clang and LLVM guys are no strangers to this type of code testing, but decided to &quot;close the loop&quot; and start fuzzing parts of LLVM (including Clang) using LLVM itself</li>
<li>With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02" rel="nofollow">HardenedBSD upgrades secadm</a></h3>

<ul>
<li>The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support</li>
<li>We covered both the secadm tool and integriforce in previous episodes, but the short version is that it&#39;s a way to prevent files from being altered (even as root)</li>
<li>Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142877132517229&w=2" rel="nofollow">RAID5 returns to OpenBSD</a></h3>

<ul>
<li>OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> subsystem, somewhat similar to FreeBSD&#39;s GEOM, has had experimental RAID5 support for a while</li>
<li>However, it was exactly that - experimental - and required a recompile to enable</li>
<li>With some work from recent hackathons, the <a href="https://www.marc.info/?l=openbsd-cvs&m=142876943116907&w=2" rel="nofollow">final piece</a> was added to enable resuming partial array rebuilds</li>
<li>Now it&#39;s <a href="https://www.marc.info/?l=openbsd-cvs&m=142877026917030&w=2" rel="nofollow">on by default</a>, and there&#39;s a call for testing being put out, so grab a snapshot and put the code through its paces</li>
<li>The bioctl softraid command also <a href="https://www.marc.info/?l=openbsd-cvs&m=142877223817406&w=2" rel="nofollow">now supports</a> DUIDs during pseudo-device detachment, possibly paving the way for the installer to <a href="https://www.marc.info/?l=openbsd-tech&m=142643313416298&w=2" rel="nofollow">drop</a> the &quot;do you want to enable DUIDs?&quot; question entirely
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html" rel="nofollow">pkgng 1.5.0 released</a></h3>

<ul>
<li>Going back to what we <a href="http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update" rel="nofollow">talked about last week</a>, the final version of pkgng 1.5.0 is out</li>
<li>The &quot;provides&quot; and &quot;requires&quot; support is finally in a regular release</li>
<li>A new &quot;-r&quot; switch will allow for direct installation to a chroot or alternate root directory</li>
<li>Memory usage should be much better now, and some general code speed-ups were added</li>
<li>This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it&#39;ll be interesting to see if anything comes of that</li>
<li>Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150411160247" rel="nofollow">p2k15 hackathon reports</a></h3>

<ul>
<li>There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work</li>
<li>As usual, the developers sent in reports of some of the things they got done at the event</li>
<li>Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit</li>
<li>Stefan Sperling <a href="http://undeadly.org/cgi?action=article&sid=20150414064710" rel="nofollow">wrote in</a>, detailing his work with wireless chipsets, specifically when the vendor doesn&#39;t provide any hardware documentation, as well as updating some of the games in ports</li>
<li>Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150413163333" rel="nofollow">also sent in a report</a>, but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iNBo2swq" rel="nofollow">Shaun writes in</a></li>
<li><a href="http://slexy.org/view/s202BRLwrd" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2KT7M35uY" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2Q5lOoxzl" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s2ynDjuzVi" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142884995931428&w=2" rel="nofollow">Gstreamer hates us</a></li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html" rel="nofollow">At least he&#39;s honest</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html" rel="nofollow">I find myself in a situation</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Pascal Stumpf about static PIE in the upcoming OpenBSD release. He&#39;ll tell us what types of attacks it prevents, and why it&#39;s such a big deal. We&#39;ve also got answers to questions from you in the audience and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2015/04/solaris-admins-for-glimpse-of-your.html" rel="nofollow">Solaris&#39; networking future is with OpenBSD</a></h3>

<ul>
<li>A curious patch from someone with an Oracle email address was <a href="https://www.marc.info/?l=openbsd-tech&m=142822852613581&w=2" rel="nofollow">recently sent in</a> to one of the OpenBSD mailing lists</li>
<li>It was revealed that future releases of Solaris are going to drop their IPFilter firewall entirely, in favor of a port of the <strong>current</strong> version of PF</li>
<li>For anyone unfamiliar with the history of PF, it was actually made <em>as a replacement for</em> IPFilter in OpenBSD, due to some licensing issues</li>
<li>What&#39;s more, Solaris was the original development platform for IPFilter, so the fact that it would be replaced in its own home is pretty interesting</li>
<li>This blog post goes through some of the backstory of the two firewalls</li>
<li>PF is in a lot of places - other BSDs, Mac OS X and iOS - but there are plenty of other OpenBSD-developed technologies end up ported to other projects too</li>
<li>&quot;Many of the world&#39;s largest corporations and government agencies are heavy Solaris users, meaning that even if you&#39;re neither an OpenBSD user or a Solaris user, your kit is likely interacting intensely with both kinds, and with Solaris moving to OpenBSD&#39;s PF for their filtering needs, we will all be benefiting even more from the OpenBSD project&#39;s emphasis on correctness, quality and security&quot;</li>
<li>You&#39;re welcome, Oracle
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=Cb--h-iOQEM#t=15" rel="nofollow">BAFUG discussion videos</a></h3>

<ul>
<li>The Bay Area FreeBSD users group has been uploading some videos from their recent meetings</li>
<li>Sean Bruno gave a recap of his experiences at EuroBSDCon last year, including the devsummit and some proposed ideas from it (as well as their current status)</li>
<li>Craig Rodrigues also gave <a href="https://www.youtube.com/watch?v=kPs8Dni_g3M#t=15" rel="nofollow">a talk</a> about Kyua and the FreeBSD testing framework</li>
<li>Lastly, Kip Macy gave <a href="https://www.youtube.com/watch?v=Q13WtuqbZ7E#t=15" rel="nofollow">a talk</a> titled &quot;network stack changes, user-level FreeBSD&quot;</li>
<li>The main two subjects there are some network stack changes, and how to get more people contributing, but there&#39;s also open discussion about a variety of FreeBSD topics</li>
<li>If you&#39;re close to the Bay Area in California, be sure to check out their group and attend a meeting sometime
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/04/ports-are-more-than-just-makefile.html" rel="nofollow">More than just a makefile</a></h3>

<ul>
<li>If you&#39;re not a BSD user just yet, you might be wondering how the various ports and pkgsrc systems compare to the binary way of doing things on Linux</li>
<li>This blog entry talks about the ports system in OpenBSD, but a lot of the concepts apply to all the ports systems across the BSDs</li>
<li>As it turns out, the ports system really isn&#39;t that different from a binary package manager - they are what&#39;s <em>used</em> to create binary packages, after all</li>
<li>The author goes through what makefiles do, customizing which options software is compiled with, patching source code to build and getting those patches back upstream</li>
<li>After that, he shows you how to get your new port tested, if you&#39;re interesting in doing some porting yourself, and getting involved with the rest of the community</li>
<li>This post is very long and there&#39;s a lot more to it, so check it out (and more discussion <a href="https://news.ycombinator.com/item?id=9360827" rel="nofollow">on Hacker News</a>)
***</li>
</ul>

<h3><a href="http://www.scip.ch/en/?labs.20150409" rel="nofollow">Securing your home fences</a></h3>

<ul>
<li>Hopefully all our listeners have realized that trusting your network(s) to a consumer router is a <a href="http://www.devttys0.com/2015/04/hacking-the-d-link-dir-890l/" rel="nofollow">bad</a> <a href="https://threatpost.com/12-million-home-routers-vulnerable-to-takeover/109970" rel="nofollow">idea</a> by now</li>
<li>We hear from a lot of users who want to set up some kind of BSD-based firewall, but don&#39;t hear back from them after they&#39;ve done it.. until now</li>
<li>In this post, someone goes through the process of setting up a home firewall using OPNsense on a PCEngines <a href="http://www.pcengines.ch/apu1d4.htm" rel="nofollow">APU board</a></li>
<li>He notes that you have a lot of options software-wise, including vanilla <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a>, <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a> or even Linux, but decided to go with OPNsense because of the easy interface and configuration</li>
<li>The post covers all the hardware you&#39;ll need, getting the OS installed to a flash drive or SD card and going through the whole process</li>
<li>Finally, he goes through setting up the firewall with the graphical interface, applying updates and finishing everything up</li>
<li>If you don&#39;t have any experience using a serial console, this guide also has some good info for beginners about those (which also applies to regular FreeBSD)</li>
<li>We love super-detailed guides like this, so everyone should write more and send them to us immediately
***</li>
</ul>

<h2>Interview - Pascal Stumpf - <a href="mailto:pascal@openbsd.org" rel="nofollow">pascal@openbsd.org</a></h2>

<p>Static PIE in OpenBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.llvm.org/2015/04/fuzz-all-clangs.html" rel="nofollow">LLVM&#39;s new libFuzzer</a></h3>

<ul>
<li>We&#39;ve discussed fuzzing on the show a number of times, albeit mostly with the American Fuzzy Lop utility</li>
<li>It looks like LLVM is going to have their own fuzzing tool too now</li>
<li>The Clang and LLVM guys are no strangers to this type of code testing, but decided to &quot;close the loop&quot; and start fuzzing parts of LLVM (including Clang) using LLVM itself</li>
<li>With Clang being the default in both FreeBSD and Bitrig, and with the other BSDs considering the switch, this could make for some good bug hunting across all the projects in the future
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-04-14/introducing-secadm-02" rel="nofollow">HardenedBSD upgrades secadm</a></h3>

<ul>
<li>The HardenedBSD guys have released a new version of their secadm tool, with the showcase feature being integriforce support</li>
<li>We covered both the secadm tool and integriforce in previous episodes, but the short version is that it&#39;s a way to prevent files from being altered (even as root)</li>
<li>Their integriforce feature itself has also gotten a couple improvements: shared objects are now checked too, instead of just binaries, and it uses more caching to speed up the whole process now
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142877132517229&w=2" rel="nofollow">RAID5 returns to OpenBSD</a></h3>

<ul>
<li>OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/softraid.4" rel="nofollow">softraid</a> subsystem, somewhat similar to FreeBSD&#39;s GEOM, has had experimental RAID5 support for a while</li>
<li>However, it was exactly that - experimental - and required a recompile to enable</li>
<li>With some work from recent hackathons, the <a href="https://www.marc.info/?l=openbsd-cvs&m=142876943116907&w=2" rel="nofollow">final piece</a> was added to enable resuming partial array rebuilds</li>
<li>Now it&#39;s <a href="https://www.marc.info/?l=openbsd-cvs&m=142877026917030&w=2" rel="nofollow">on by default</a>, and there&#39;s a call for testing being put out, so grab a snapshot and put the code through its paces</li>
<li>The bioctl softraid command also <a href="https://www.marc.info/?l=openbsd-cvs&m=142877223817406&w=2" rel="nofollow">now supports</a> DUIDs during pseudo-device detachment, possibly paving the way for the installer to <a href="https://www.marc.info/?l=openbsd-tech&m=142643313416298&w=2" rel="nofollow">drop</a> the &quot;do you want to enable DUIDs?&quot; question entirely
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055463.html" rel="nofollow">pkgng 1.5.0 released</a></h3>

<ul>
<li>Going back to what we <a href="http://www.bsdnow.tv/episodes/2015_04_08-pkg_remove_freebsd-update" rel="nofollow">talked about last week</a>, the final version of pkgng 1.5.0 is out</li>
<li>The &quot;provides&quot; and &quot;requires&quot; support is finally in a regular release</li>
<li>A new &quot;-r&quot; switch will allow for direct installation to a chroot or alternate root directory</li>
<li>Memory usage should be much better now, and some general code speed-ups were added</li>
<li>This version also introduces support for Mac OS X, NetBSD and EdgeBSD - it&#39;ll be interesting to see if anything comes of that</li>
<li>Many more bugs were fixed, so check the mailing list announcement for the rest (and plenty new bugs were added, according to bapt)
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150411160247" rel="nofollow">p2k15 hackathon reports</a></h3>

<ul>
<li>There was another OpenBSD hackathon that just finished up in the UK - this time it was mainly for ports work</li>
<li>As usual, the developers sent in reports of some of the things they got done at the event</li>
<li>Landry Breuil, both an upstream Mozilla developer and an OpenBSD developer, wrote in about the work he did on the Firefox port (specifically WebRTC) and some others, as well as reviewing lots of patches that were ready to commit</li>
<li>Stefan Sperling <a href="http://undeadly.org/cgi?action=article&sid=20150414064710" rel="nofollow">wrote in</a>, detailing his work with wireless chipsets, specifically when the vendor doesn&#39;t provide any hardware documentation, as well as updating some of the games in ports</li>
<li>Ken Westerback <a href="http://undeadly.org/cgi?action=article&sid=20150413163333" rel="nofollow">also sent in a report</a>, but decided to be a rebel and not work on ports at all - he got a lot of GPT-related work done, and also reviewed the RAID5 support we talked about earlier
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iNBo2swq" rel="nofollow">Shaun writes in</a></li>
<li><a href="http://slexy.org/view/s202BRLwrd" rel="nofollow">Hrishi writes in</a></li>
<li><a href="http://slexy.org/view/s2KT7M35uY" rel="nofollow">Randy writes in</a></li>
<li><a href="http://slexy.org/view/s2Q5lOoxzl" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s2ynDjuzVi" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142884995931428&w=2" rel="nofollow">Gstreamer hates us</a></li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2015-April/006765.html" rel="nofollow">At least he&#39;s honest</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055390.html" rel="nofollow">I find myself in a situation</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>84: pkg remove freebsd-update</title>
  <link>https://www.bsdnow.tv/84</link>
  <guid isPermaLink="false">88c9bd14-b1bf-4d45-96b6-9af12b44d40b</guid>
  <pubDate>Wed, 08 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/88c9bd14-b1bf-4d45-96b6-9af12b44d40b.mp3" length="53948308" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's mini-episode, we'll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We'll find out, and also get to a couple of your emails while we're at it, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;On this week's mini-episode, we'll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We'll find out, and also get to a couple of your emails while we're at it, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=382965" target="_blank" rel="nofollow noopener"&gt;Xen dom0 in FreeBSD 11-CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD has just gotten &lt;a href="http://wiki.xen.org/wiki/Dom0" target="_blank" rel="nofollow noopener"&gt;dom0&lt;/a&gt; support for the Xen hypervisor, something &lt;a href="http://wiki.netbsd.org/ports/xen/howto/#netbsd-dom0" target="_blank" rel="nofollow noopener"&gt;NetBSD has had&lt;/a&gt; for a while now&lt;/li&gt;
&lt;li&gt;The ports tree will now have a Xen kernel and toolstack, meaning that they can be updated much more rapidly than if they were part of base&lt;/li&gt;
&lt;li&gt;It's currently limited to Intel boxes with EPT and a working IOMMU, running a recent version of the -CURRENT branch, but we'll likely see it when 11.0 comes out&lt;/li&gt;
&lt;li&gt;How will this affect interest in Bhyve?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.anthrobsd.net/044.html" target="_blank" rel="nofollow noopener"&gt;A tale of two educational moments&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post from an OpenBSD developer about some experiences he had helping people get involved with the project&lt;/li&gt;
&lt;li&gt;It's split into two stories: one that could've gone better, and one that went really well&lt;/li&gt;
&lt;li&gt;For the first one, he found that someone was trying to modify a package from their ports tree to have fewer dependencies&lt;/li&gt;
&lt;li&gt;Experience really showed its worth, and he was able to write a quick patch to do exactly what the other person had been working on for a few hours - but wasn't so encouraging about getting it committed&lt;/li&gt;
&lt;li&gt;In the second story, he discussed updating a different port with a user of a forum, and ended up improving the new user's workflow considerably with just a few tips&lt;/li&gt;
&lt;li&gt;The lesson to take away from this is that we can all help out to encourage and assist new users - everyone was a newbie once
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://saveosx.org/NetBSD7/" target="_blank" rel="nofollow noopener"&gt;What's coming in NetBSD 7&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We first mentioned NetBSD 7.0 on the show in July of 2014, but it still hasn't been released and there hasn't been much public info about it&lt;/li&gt;
&lt;li&gt;This blog post outlines some of the bigger features that we can expect to see when it actually does come out&lt;/li&gt;
&lt;li&gt;Their total platform count is now over 70, so you'd be hard-pressed to find something that it doesn't run on&lt;/li&gt;
&lt;li&gt;There have been a lot of improvements in the graphics area, particularly with DRM/KMS, including Intel Haswell and Nouveau (for nVidia cards)&lt;/li&gt;
&lt;li&gt;Many ARM boards now have full SMP support&lt;/li&gt;
&lt;li&gt;Clang has also finally made its way into the base system, something we're glad to see, and it should be able to build the base OS on i386, AMD64 and ARM - other architectures are still a WIP&lt;/li&gt;
&lt;li&gt;In the crypto department: their PNRG has switched from the broken RC4 to the more modern ChaCha20, OpenSSL has been updated in base and LibreSSL is in pkgsrc&lt;/li&gt;
&lt;li&gt;NetBSD's in-house firewall, npf, has gotten major improvements since its initial debut in NetBSD 6.0&lt;/li&gt;
&lt;li&gt;Looking to the future, NetBSD hopes to integrate a stable ZFS implementation later on
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=mS4bfbEq46I" target="_blank" rel="nofollow noopener"&gt;OpenZFS office hours&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned a couple weeks back that the OpenZFS office hours series was starting back up&lt;/li&gt;
&lt;li&gt;They've just uploaded the recording of their most recent freeform discussion, with &lt;a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" target="_blank" rel="nofollow noopener"&gt;Justin Gibbs&lt;/a&gt; being the main presenter&lt;/li&gt;
&lt;li&gt;In it, they cover how Justin got into ZFS, running in virtualized environments, getting patches into the different projects, getting more people involved, reviewing code, spinning disks vs SSDs, defragging, speeding up resilvering, zfsd and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Baptiste Daroussin - &lt;a href="mailto:bapt@freebsd.org" target="_blank" rel="nofollow noopener"&gt;bapt@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Packaging the FreeBSD base system with pkgng&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Discussion&lt;/h2&gt;

&lt;h3&gt;Packaging the FreeBSD base system with pkgng (follow-up)&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20AWp6Av1" target="_blank" rel="nofollow noopener"&gt;Jeff writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20QiFcdh8" target="_blank" rel="nofollow noopener"&gt;Anonymous writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2YzZlswaB" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Mx9TopQ" target="_blank" rel="nofollow noopener"&gt;Joris writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-ports&amp;amp;m=142679136422432&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;ok feedback@&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkg, poudriere, pkgng, freebsd-update, packaging base, presentation, asiabsdcon, xen, dom0, domu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s mini-episode, we&#39;ll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We&#39;ll find out, and also get to a couple of your emails while we&#39;re at it, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=382965" rel="nofollow">Xen dom0 in FreeBSD 11-CURRENT</a></h3>

<ul>
<li>FreeBSD has just gotten <a href="http://wiki.xen.org/wiki/Dom0" rel="nofollow">dom0</a> support for the Xen hypervisor, something <a href="http://wiki.netbsd.org/ports/xen/howto/#netbsd-dom0" rel="nofollow">NetBSD has had</a> for a while now</li>
<li>The ports tree will now have a Xen kernel and toolstack, meaning that they can be updated much more rapidly than if they were part of base</li>
<li>It&#39;s currently limited to Intel boxes with EPT and a working IOMMU, running a recent version of the -CURRENT branch, but we&#39;ll likely see it when 11.0 comes out</li>
<li>How will this affect interest in Bhyve?
***</li>
</ul>

<h3><a href="http://blog.anthrobsd.net/044.html" rel="nofollow">A tale of two educational moments</a></h3>

<ul>
<li>Here we have a blog post from an OpenBSD developer about some experiences he had helping people get involved with the project</li>
<li>It&#39;s split into two stories: one that could&#39;ve gone better, and one that went really well</li>
<li>For the first one, he found that someone was trying to modify a package from their ports tree to have fewer dependencies</li>
<li>Experience really showed its worth, and he was able to write a quick patch to do exactly what the other person had been working on for a few hours - but wasn&#39;t so encouraging about getting it committed</li>
<li>In the second story, he discussed updating a different port with a user of a forum, and ended up improving the new user&#39;s workflow considerably with just a few tips</li>
<li>The lesson to take away from this is that we can all help out to encourage and assist new users - everyone was a newbie once
***</li>
</ul>

<h3><a href="http://saveosx.org/NetBSD7/" rel="nofollow">What&#39;s coming in NetBSD 7</a></h3>

<ul>
<li>We first mentioned NetBSD 7.0 on the show in July of 2014, but it still hasn&#39;t been released and there hasn&#39;t been much public info about it</li>
<li>This blog post outlines some of the bigger features that we can expect to see when it actually does come out</li>
<li>Their total platform count is now over 70, so you&#39;d be hard-pressed to find something that it doesn&#39;t run on</li>
<li>There have been a lot of improvements in the graphics area, particularly with DRM/KMS, including Intel Haswell and Nouveau (for nVidia cards)</li>
<li>Many ARM boards now have full SMP support</li>
<li>Clang has also finally made its way into the base system, something we&#39;re glad to see, and it should be able to build the base OS on i386, AMD64 and ARM - other architectures are still a WIP</li>
<li>In the crypto department: their PNRG has switched from the broken RC4 to the more modern ChaCha20, OpenSSL has been updated in base and LibreSSL is in pkgsrc</li>
<li>NetBSD&#39;s in-house firewall, npf, has gotten major improvements since its initial debut in NetBSD 6.0</li>
<li>Looking to the future, NetBSD hopes to integrate a stable ZFS implementation later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mS4bfbEq46I" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>We mentioned a couple weeks back that the OpenZFS office hours series was starting back up</li>
<li>They&#39;ve just uploaded the recording of their most recent freeform discussion, with <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">Justin Gibbs</a> being the main presenter</li>
<li>In it, they cover how Justin got into ZFS, running in virtualized environments, getting patches into the different projects, getting more people involved, reviewing code, spinning disks vs SSDs, defragging, speeding up resilvering, zfsd and much more
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>Packaging the FreeBSD base system with pkgng</p>

<hr>

<h2>Discussion</h2>

<h3>Packaging the FreeBSD base system with pkgng (follow-up)</h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20AWp6Av1" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20QiFcdh8" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s2YzZlswaB" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s21Mx9TopQ" rel="nofollow">Joris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142679136422432&w=2" rel="nofollow">ok feedback@</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s mini-episode, we&#39;ll be talking with Baptiste Daroussin about packaging the FreeBSD base system with pkgng. Is this the best way going forward, or are we getting dangerously close to being Linux-like? We&#39;ll find out, and also get to a couple of your emails while we&#39;re at it, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=382965" rel="nofollow">Xen dom0 in FreeBSD 11-CURRENT</a></h3>

<ul>
<li>FreeBSD has just gotten <a href="http://wiki.xen.org/wiki/Dom0" rel="nofollow">dom0</a> support for the Xen hypervisor, something <a href="http://wiki.netbsd.org/ports/xen/howto/#netbsd-dom0" rel="nofollow">NetBSD has had</a> for a while now</li>
<li>The ports tree will now have a Xen kernel and toolstack, meaning that they can be updated much more rapidly than if they were part of base</li>
<li>It&#39;s currently limited to Intel boxes with EPT and a working IOMMU, running a recent version of the -CURRENT branch, but we&#39;ll likely see it when 11.0 comes out</li>
<li>How will this affect interest in Bhyve?
***</li>
</ul>

<h3><a href="http://blog.anthrobsd.net/044.html" rel="nofollow">A tale of two educational moments</a></h3>

<ul>
<li>Here we have a blog post from an OpenBSD developer about some experiences he had helping people get involved with the project</li>
<li>It&#39;s split into two stories: one that could&#39;ve gone better, and one that went really well</li>
<li>For the first one, he found that someone was trying to modify a package from their ports tree to have fewer dependencies</li>
<li>Experience really showed its worth, and he was able to write a quick patch to do exactly what the other person had been working on for a few hours - but wasn&#39;t so encouraging about getting it committed</li>
<li>In the second story, he discussed updating a different port with a user of a forum, and ended up improving the new user&#39;s workflow considerably with just a few tips</li>
<li>The lesson to take away from this is that we can all help out to encourage and assist new users - everyone was a newbie once
***</li>
</ul>

<h3><a href="http://saveosx.org/NetBSD7/" rel="nofollow">What&#39;s coming in NetBSD 7</a></h3>

<ul>
<li>We first mentioned NetBSD 7.0 on the show in July of 2014, but it still hasn&#39;t been released and there hasn&#39;t been much public info about it</li>
<li>This blog post outlines some of the bigger features that we can expect to see when it actually does come out</li>
<li>Their total platform count is now over 70, so you&#39;d be hard-pressed to find something that it doesn&#39;t run on</li>
<li>There have been a lot of improvements in the graphics area, particularly with DRM/KMS, including Intel Haswell and Nouveau (for nVidia cards)</li>
<li>Many ARM boards now have full SMP support</li>
<li>Clang has also finally made its way into the base system, something we&#39;re glad to see, and it should be able to build the base OS on i386, AMD64 and ARM - other architectures are still a WIP</li>
<li>In the crypto department: their PNRG has switched from the broken RC4 to the more modern ChaCha20, OpenSSL has been updated in base and LibreSSL is in pkgsrc</li>
<li>NetBSD&#39;s in-house firewall, npf, has gotten major improvements since its initial debut in NetBSD 6.0</li>
<li>Looking to the future, NetBSD hopes to integrate a stable ZFS implementation later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mS4bfbEq46I" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>We mentioned a couple weeks back that the OpenZFS office hours series was starting back up</li>
<li>They&#39;ve just uploaded the recording of their most recent freeform discussion, with <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">Justin Gibbs</a> being the main presenter</li>
<li>In it, they cover how Justin got into ZFS, running in virtualized environments, getting patches into the different projects, getting more people involved, reviewing code, spinning disks vs SSDs, defragging, speeding up resilvering, zfsd and much more
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>Packaging the FreeBSD base system with pkgng</p>

<hr>

<h2>Discussion</h2>

<h3>Packaging the FreeBSD base system with pkgng (follow-up)</h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20AWp6Av1" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20QiFcdh8" rel="nofollow">Anonymous writes in</a></li>
<li><a href="http://slexy.org/view/s2YzZlswaB" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s21Mx9TopQ" rel="nofollow">Joris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=142679136422432&w=2" rel="nofollow">ok feedback@</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>83: woN DSB</title>
  <link>https://www.bsdnow.tv/83</link>
  <guid isPermaLink="false">6b7846ec-2bb1-475f-aead-9fa2dd2d70ef</guid>
  <pubDate>Wed, 01 Apr 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6b7846ec-2bb1-475f-aead-9fa2dd2d70ef.mp3" length="46578388" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we'll be talking to Kamila Součková, a Google intern. She's been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:04:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show, we'll be talking to Kamila Součková, a Google intern. She's been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week's news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/04/huge-announcement-for-pc-bsd/" target="_blank" rel="nofollow noopener"&gt;Major changes coming in PCBSD 11&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PCBSD team has announced that version 11.0 will have some more pretty big changes (as they've been known to do lately with NTP daemons and firewalls)&lt;/li&gt;
&lt;li&gt;Switching from PF to IPFW provided some benefits for VIMAGE, but the syntax was just too complicated for regular everyday users&lt;/li&gt;
&lt;li&gt;To solve this, they've ported over Linux's iptables, giving users a much more &lt;a href="http://dpaste.com/2F1KM6T.txt" target="_blank" rel="nofollow noopener"&gt;straightforward configuration&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;While ZFS has served them well as the default filesystem for a while, Kris decided that Btrfs would be a better choice going forward&lt;/li&gt;
&lt;li&gt;Since the FreeBSD kernel doesn't support it natively, all filesystem calls will be through FUSE from now on - performance is Good Enough&lt;/li&gt;
&lt;li&gt;People often complain about PCBSD's huge ISO download, so, to save space, the default email client will be switched to mutt, and KDE will be replaced with DWM as the default window manager&lt;/li&gt;
&lt;li&gt;To reconfigure it, or make any appearance changes, users just need to edit a simple C header file and recompile - easy peasy&lt;/li&gt;
&lt;li&gt;As we've mentioned on the show, PCBSD has been promoting safe backup solutions for a long time with its "life preserver" utility, making it simple to manage multiple snapshots too&lt;/li&gt;
&lt;li&gt;To test if people have been listening to this advice, Kris recently activated the backdoor he put in life preserver that deletes all the users' files - hope you had that stuff backed up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.freebsddiary.org/fretbsd.php" target="_blank" rel="nofollow noopener"&gt;NetBSD and FreeBSD join forces&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The BSD community has been running into one of the same problems Linux has lately: we just have too many different BSDs to choose from&lt;/li&gt;
&lt;li&gt;What's more, none of them have any specific areas they focus on or anything like that (they're all basically the same)&lt;/li&gt;
&lt;li&gt;That situation is about to improve somewhat, as FreeBSD and NetBSD have just merged codebases... say hello to &lt;strong&gt;FretBSD&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Within a week, all mailing lists and webservers for the legacy NetBSD and FreeBSD projects will be terminated - the mailing list for the new combined project will be hosted from the United Nations datacenter on a Microsoft Exchange server&lt;/li&gt;
&lt;li&gt;As UN monitors will be moderating the mailing lists to prevent disagreements and divisive arguments before they begin, this system is expected to be adequate for the load&lt;/li&gt;
&lt;li&gt;With FretBSD, your toaster can now run ZFS, so you'll never need to worry about the bread becoming silently corrupted again
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/03/puffy-in-cloud.html" target="_blank" rel="nofollow noopener"&gt;Puffy in the cloud&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've ever wanted to set up a backup server, especially for family members or someone who's not as technology-savvy, you've probably realized there are a lot of options&lt;/li&gt;
&lt;li&gt;This post explores the option of setting up your own Dropbox-like service with Owncloud and PostgreSQL, running atop the new OpenBSD http daemon&lt;/li&gt;
&lt;li&gt;Doing it this way with your own setup, you can control all the security aspects - disk encryption, firewall rules, who can access what and from where, etc&lt;/li&gt;
&lt;li&gt;He also mentions &lt;a href="http://www.bsdnow.tv/tutorials/pf" target="_blank" rel="nofollow noopener"&gt;our pf tutorial&lt;/a&gt; being helpful in blocking script kiddies from hammering the box&lt;/li&gt;
&lt;li&gt;Be sure to encourage your less-technical friends to always back up their important data
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/asiabsdcon_2015" target="_blank" rel="nofollow noopener"&gt;NetBSD at AsiaBSDCon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Some NetBSD developers have put together a report of what they did at the most recent event in Tokyo&lt;/li&gt;
&lt;li&gt;It includes a wrap-up of the event, as well as a &lt;a href="https://www.netbsd.org/gallery/presentations/#asiabsdcon2015" target="_blank" rel="nofollow noopener"&gt;list of presentations&lt;/a&gt; that NetBSD developers gave&lt;/li&gt;
&lt;li&gt;Have you ever wanted even more pictures of NetBSD running on lots of devices? There's a never-ending supply, apparently&lt;/li&gt;
&lt;li&gt;At the BSD research booth of AsiaBSDCon, there were a large number of machines on display, and someone has finally uploaded &lt;a href="http://www.ki.nu/%7Emakoto/p15/20150315/" target="_blank" rel="nofollow noopener"&gt;pictures of all of them&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's also &lt;a href="https://www.youtube.com/watch?v=K1y9cdmLFjw" target="_blank" rel="nofollow noopener"&gt;a video&lt;/a&gt; of an OMRON LUNA-II running the luna68k port
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Kamila Součková - &lt;a href="mailto:kamila@ksp.sk" target="_blank" rel="nofollow noopener"&gt;kamila@ksp.sk&lt;/a&gt; / &lt;a href="https://twitter.com/anotherkamila" target="_blank" rel="nofollow noopener"&gt;@anotherkamila&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD conferences, Google Summer of Code, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2015marchupdate.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation March update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has published their March update for fundraising and sponsored projects&lt;/li&gt;
&lt;li&gt;In the document, you'll find information about upcoming ARMv8 enhancements, some event recaps and a Google Summer of Code status update&lt;/li&gt;
&lt;li&gt;They also mention &lt;a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" target="_blank" rel="nofollow noopener"&gt;our interview with the foundation president&lt;/a&gt; - be sure to check it out if you haven't
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sdtimes.com/inside-openbsds-new-httpd-web-server/" target="_blank" rel="nofollow noopener"&gt;Inside OpenBSD's new httpd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD news continues to &lt;strong&gt;dominate&lt;/strong&gt; mainstream tech news sites… well &lt;em&gt;not really&lt;/em&gt;, but they talk about it once in a while&lt;/li&gt;
&lt;li&gt;The SD Times is featuring an article about OpenBSD's in-house HTTP server, after seeing Reyk's &lt;a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon presentation&lt;/a&gt; about it (which he's giving at BSDCan this year, too)&lt;/li&gt;
&lt;li&gt;In this article, they talk about the rapid transition of webservers in the base system - apache being replaced with nginx, only to be replaced with httpd shortly thereafter&lt;/li&gt;
&lt;li&gt;Since the new daemon has had almost a full release cycle to grow, new features and fixes have been pouring in&lt;/li&gt;
&lt;li&gt;The post also highlights some of the security features: everything runs in a chroot with privsep by default, and it also leverages strong TLS 1.2 defaults (including Perfect Forward Secrecy)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdxbsdx.blogspot.com/2015/04/build-packages-in-poudriere-without.html" target="_blank" rel="nofollow noopener"&gt;Using poudriere without OpenSSL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Last week we &lt;a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" target="_blank" rel="nofollow noopener"&gt;talked about&lt;/a&gt; using LibreSSL in FreeBSD for all your ports&lt;/li&gt;
&lt;li&gt;One of the problems that was mentioned is that some ports are configured improperly, and end up linking against the OpenSSL in the base system even when you tell them not to&lt;/li&gt;
&lt;li&gt;This blog post shows how to completely strip OpenSSL out of the &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere&lt;/a&gt; build jails, something that's a lot more difficult than you'd think&lt;/li&gt;
&lt;li&gt;If you're a port maintainer, pay close attention to this post, and get your ports fixed to adhere to the make.conf options properly
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142755452428573&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;HAMMER and GPT in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Someone, presumably a Google Summer of Code student, wrote in to the lists about his &lt;a href="http://www.bsdnow.tv/tutorials/hammer" target="_blank" rel="nofollow noopener"&gt;HAMMER FS&lt;/a&gt; porting proposal&lt;/li&gt;
&lt;li&gt;He outlined the entire process and estimated timetable, including what would be supported and which aspects were beyond the scope of his work (like the clustering stuff)&lt;/li&gt;
&lt;li&gt;There's no word yet on if it will be accepted, but it's an interesting idea to explore, especially when you consider that HAMMER really only has one developer&lt;/li&gt;
&lt;li&gt;In more disk-related news, &lt;a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" target="_blank" rel="nofollow noopener"&gt;Ken Westerback&lt;/a&gt; has been committing quite a lot of &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=gpt&amp;amp;q=b" target="_blank" rel="nofollow noopener"&gt;GPT-related fixes&lt;/a&gt; recently&lt;/li&gt;
&lt;li&gt;Full GPT support will most likely be finished before 5.8, but anything involving HAMMER FS is still anyone's guess
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20e30p4qf" target="_blank" rel="nofollow noopener"&gt;Morgan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20clKByMP" target="_blank" rel="nofollow noopener"&gt;Dustin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20aBlmaT5" target="_blank" rel="nofollow noopener"&gt;Stan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ufFrZY9y" target="_blank" rel="nofollow noopener"&gt;Mica writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055281.html" target="_blank" rel="nofollow noopener"&gt;Developers in freefall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142786808725483&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;Xorg thieves pt. 1&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142790740405547&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;Xorg thieves pt. 2&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, april fools, prank, fretbsd, httpd, foundation, newsletter, cloud, dropbox, owncloud, backups, asiabsdcon, eurobsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking to Kamila Součková, a Google intern. She&#39;s been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.pcbsd.org/2015/04/huge-announcement-for-pc-bsd/" rel="nofollow">Major changes coming in PCBSD 11</a></h3>

<ul>
<li>The PCBSD team has announced that version 11.0 will have some more pretty big changes (as they&#39;ve been known to do lately with NTP daemons and firewalls)</li>
<li>Switching from PF to IPFW provided some benefits for VIMAGE, but the syntax was just too complicated for regular everyday users</li>
<li>To solve this, they&#39;ve ported over Linux&#39;s iptables, giving users a much more <a href="http://dpaste.com/2F1KM6T.txt" rel="nofollow">straightforward configuration</a></li>
<li>While ZFS has served them well as the default filesystem for a while, Kris decided that Btrfs would be a better choice going forward</li>
<li>Since the FreeBSD kernel doesn&#39;t support it natively, all filesystem calls will be through FUSE from now on - performance is Good Enough</li>
<li>People often complain about PCBSD&#39;s huge ISO download, so, to save space, the default email client will be switched to mutt, and KDE will be replaced with DWM as the default window manager</li>
<li>To reconfigure it, or make any appearance changes, users just need to edit a simple C header file and recompile - easy peasy</li>
<li>As we&#39;ve mentioned on the show, PCBSD has been promoting safe backup solutions for a long time with its &quot;life preserver&quot; utility, making it simple to manage multiple snapshots too</li>
<li>To test if people have been listening to this advice, Kris recently activated the backdoor he put in life preserver that deletes all the users&#39; files - hope you had that stuff backed up
***</li>
</ul>

<h3><a href="http://www.freebsddiary.org/fretbsd.php" rel="nofollow">NetBSD and FreeBSD join forces</a></h3>

<ul>
<li>The BSD community has been running into one of the same problems Linux has lately: we just have too many different BSDs to choose from</li>
<li>What&#39;s more, none of them have any specific areas they focus on or anything like that (they&#39;re all basically the same)</li>
<li>That situation is about to improve somewhat, as FreeBSD and NetBSD have just merged codebases... say hello to <strong>FretBSD</strong></li>
<li>Within a week, all mailing lists and webservers for the legacy NetBSD and FreeBSD projects will be terminated - the mailing list for the new combined project will be hosted from the United Nations datacenter on a Microsoft Exchange server</li>
<li>As UN monitors will be moderating the mailing lists to prevent disagreements and divisive arguments before they begin, this system is expected to be adequate for the load</li>
<li>With FretBSD, your toaster can now run ZFS, so you&#39;ll never need to worry about the bread becoming silently corrupted again
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/03/puffy-in-cloud.html" rel="nofollow">Puffy in the cloud</a></h3>

<ul>
<li>If you&#39;ve ever wanted to set up a backup server, especially for family members or someone who&#39;s not as technology-savvy, you&#39;ve probably realized there are a lot of options</li>
<li>This post explores the option of setting up your own Dropbox-like service with Owncloud and PostgreSQL, running atop the new OpenBSD http daemon</li>
<li>Doing it this way with your own setup, you can control all the security aspects - disk encryption, firewall rules, who can access what and from where, etc</li>
<li>He also mentions <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">our pf tutorial</a> being helpful in blocking script kiddies from hammering the box</li>
<li>Be sure to encourage your less-technical friends to always back up their important data
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/asiabsdcon_2015" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>Some NetBSD developers have put together a report of what they did at the most recent event in Tokyo</li>
<li>It includes a wrap-up of the event, as well as a <a href="https://www.netbsd.org/gallery/presentations/#asiabsdcon2015" rel="nofollow">list of presentations</a> that NetBSD developers gave</li>
<li>Have you ever wanted even more pictures of NetBSD running on lots of devices? There&#39;s a never-ending supply, apparently</li>
<li>At the BSD research booth of AsiaBSDCon, there were a large number of machines on display, and someone has finally uploaded <a href="http://www.ki.nu/%7Emakoto/p15/20150315/" rel="nofollow">pictures of all of them</a></li>
<li>There&#39;s also <a href="https://www.youtube.com/watch?v=K1y9cdmLFjw" rel="nofollow">a video</a> of an OMRON LUNA-II running the luna68k port
***</li>
</ul>

<h2>Interview - Kamila Součková - <a href="mailto:kamila@ksp.sk" rel="nofollow">kamila@ksp.sk</a> / <a href="https://twitter.com/anotherkamila" rel="nofollow">@anotherkamila</a></h2>

<p>BSD conferences, Google Summer of Code, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2015marchupdate.pdf" rel="nofollow">FreeBSD foundation March update</a></h3>

<ul>
<li>The FreeBSD foundation has published their March update for fundraising and sponsored projects</li>
<li>In the document, you&#39;ll find information about upcoming ARMv8 enhancements, some event recaps and a Google Summer of Code status update</li>
<li>They also mention <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">our interview with the foundation president</a> - be sure to check it out if you haven&#39;t
***</li>
</ul>

<h3><a href="http://sdtimes.com/inside-openbsds-new-httpd-web-server/" rel="nofollow">Inside OpenBSD&#39;s new httpd</a></h3>

<ul>
<li>BSD news continues to <strong>dominate</strong> mainstream tech news sites… well <em>not really</em>, but they talk about it once in a while</li>
<li>The SD Times is featuring an article about OpenBSD&#39;s in-house HTTP server, after seeing Reyk&#39;s <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">AsiaBSDCon presentation</a> about it (which he&#39;s giving at BSDCan this year, too)</li>
<li>In this article, they talk about the rapid transition of webservers in the base system - apache being replaced with nginx, only to be replaced with httpd shortly thereafter</li>
<li>Since the new daemon has had almost a full release cycle to grow, new features and fixes have been pouring in</li>
<li>The post also highlights some of the security features: everything runs in a chroot with privsep by default, and it also leverages strong TLS 1.2 defaults (including Perfect Forward Secrecy)
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/04/build-packages-in-poudriere-without.html" rel="nofollow">Using poudriere without OpenSSL</a></h3>

<ul>
<li>Last week we <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">talked about</a> using LibreSSL in FreeBSD for all your ports</li>
<li>One of the problems that was mentioned is that some ports are configured improperly, and end up linking against the OpenSSL in the base system even when you tell them not to</li>
<li>This blog post shows how to completely strip OpenSSL out of the <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> build jails, something that&#39;s a lot more difficult than you&#39;d think</li>
<li>If you&#39;re a port maintainer, pay close attention to this post, and get your ports fixed to adhere to the make.conf options properly
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142755452428573&w=2" rel="nofollow">HAMMER and GPT in OpenBSD</a></h3>

<ul>
<li>Someone, presumably a Google Summer of Code student, wrote in to the lists about his <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">HAMMER FS</a> porting proposal</li>
<li>He outlined the entire process and estimated timetable, including what would be supported and which aspects were beyond the scope of his work (like the clustering stuff)</li>
<li>There&#39;s no word yet on if it will be accepted, but it&#39;s an interesting idea to explore, especially when you consider that HAMMER really only has one developer</li>
<li>In more disk-related news, <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">Ken Westerback</a> has been committing quite a lot of <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=gpt&q=b" rel="nofollow">GPT-related fixes</a> recently</li>
<li>Full GPT support will most likely be finished before 5.8, but anything involving HAMMER FS is still anyone&#39;s guess
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20e30p4qf" rel="nofollow">Morgan writes in</a></li>
<li><a href="http://slexy.org/view/s20clKByMP" rel="nofollow">Dustin writes in</a></li>
<li><a href="http://slexy.org/view/s20aBlmaT5" rel="nofollow">Stan writes in</a></li>
<li><a href="http://slexy.org/view/s2ufFrZY9y" rel="nofollow">Mica writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055281.html" rel="nofollow">Developers in freefall</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142786808725483&w=4" rel="nofollow">Xorg thieves pt. 1</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142790740405547&w=4" rel="nofollow">Xorg thieves pt. 2</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking to Kamila Součková, a Google intern. She&#39;s been working on the FreeBSD pager daemon, and also tells us about her initial experiences trying out BSD and going to a conference. As always, all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.pcbsd.org/2015/04/huge-announcement-for-pc-bsd/" rel="nofollow">Major changes coming in PCBSD 11</a></h3>

<ul>
<li>The PCBSD team has announced that version 11.0 will have some more pretty big changes (as they&#39;ve been known to do lately with NTP daemons and firewalls)</li>
<li>Switching from PF to IPFW provided some benefits for VIMAGE, but the syntax was just too complicated for regular everyday users</li>
<li>To solve this, they&#39;ve ported over Linux&#39;s iptables, giving users a much more <a href="http://dpaste.com/2F1KM6T.txt" rel="nofollow">straightforward configuration</a></li>
<li>While ZFS has served them well as the default filesystem for a while, Kris decided that Btrfs would be a better choice going forward</li>
<li>Since the FreeBSD kernel doesn&#39;t support it natively, all filesystem calls will be through FUSE from now on - performance is Good Enough</li>
<li>People often complain about PCBSD&#39;s huge ISO download, so, to save space, the default email client will be switched to mutt, and KDE will be replaced with DWM as the default window manager</li>
<li>To reconfigure it, or make any appearance changes, users just need to edit a simple C header file and recompile - easy peasy</li>
<li>As we&#39;ve mentioned on the show, PCBSD has been promoting safe backup solutions for a long time with its &quot;life preserver&quot; utility, making it simple to manage multiple snapshots too</li>
<li>To test if people have been listening to this advice, Kris recently activated the backdoor he put in life preserver that deletes all the users&#39; files - hope you had that stuff backed up
***</li>
</ul>

<h3><a href="http://www.freebsddiary.org/fretbsd.php" rel="nofollow">NetBSD and FreeBSD join forces</a></h3>

<ul>
<li>The BSD community has been running into one of the same problems Linux has lately: we just have too many different BSDs to choose from</li>
<li>What&#39;s more, none of them have any specific areas they focus on or anything like that (they&#39;re all basically the same)</li>
<li>That situation is about to improve somewhat, as FreeBSD and NetBSD have just merged codebases... say hello to <strong>FretBSD</strong></li>
<li>Within a week, all mailing lists and webservers for the legacy NetBSD and FreeBSD projects will be terminated - the mailing list for the new combined project will be hosted from the United Nations datacenter on a Microsoft Exchange server</li>
<li>As UN monitors will be moderating the mailing lists to prevent disagreements and divisive arguments before they begin, this system is expected to be adequate for the load</li>
<li>With FretBSD, your toaster can now run ZFS, so you&#39;ll never need to worry about the bread becoming silently corrupted again
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/03/puffy-in-cloud.html" rel="nofollow">Puffy in the cloud</a></h3>

<ul>
<li>If you&#39;ve ever wanted to set up a backup server, especially for family members or someone who&#39;s not as technology-savvy, you&#39;ve probably realized there are a lot of options</li>
<li>This post explores the option of setting up your own Dropbox-like service with Owncloud and PostgreSQL, running atop the new OpenBSD http daemon</li>
<li>Doing it this way with your own setup, you can control all the security aspects - disk encryption, firewall rules, who can access what and from where, etc</li>
<li>He also mentions <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">our pf tutorial</a> being helpful in blocking script kiddies from hammering the box</li>
<li>Be sure to encourage your less-technical friends to always back up their important data
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/asiabsdcon_2015" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>Some NetBSD developers have put together a report of what they did at the most recent event in Tokyo</li>
<li>It includes a wrap-up of the event, as well as a <a href="https://www.netbsd.org/gallery/presentations/#asiabsdcon2015" rel="nofollow">list of presentations</a> that NetBSD developers gave</li>
<li>Have you ever wanted even more pictures of NetBSD running on lots of devices? There&#39;s a never-ending supply, apparently</li>
<li>At the BSD research booth of AsiaBSDCon, there were a large number of machines on display, and someone has finally uploaded <a href="http://www.ki.nu/%7Emakoto/p15/20150315/" rel="nofollow">pictures of all of them</a></li>
<li>There&#39;s also <a href="https://www.youtube.com/watch?v=K1y9cdmLFjw" rel="nofollow">a video</a> of an OMRON LUNA-II running the luna68k port
***</li>
</ul>

<h2>Interview - Kamila Součková - <a href="mailto:kamila@ksp.sk" rel="nofollow">kamila@ksp.sk</a> / <a href="https://twitter.com/anotherkamila" rel="nofollow">@anotherkamila</a></h2>

<p>BSD conferences, Google Summer of Code, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2015marchupdate.pdf" rel="nofollow">FreeBSD foundation March update</a></h3>

<ul>
<li>The FreeBSD foundation has published their March update for fundraising and sponsored projects</li>
<li>In the document, you&#39;ll find information about upcoming ARMv8 enhancements, some event recaps and a Google Summer of Code status update</li>
<li>They also mention <a href="http://www.bsdnow.tv/episodes/2015_03_11-the_pcbsd_tour_ii" rel="nofollow">our interview with the foundation president</a> - be sure to check it out if you haven&#39;t
***</li>
</ul>

<h3><a href="http://sdtimes.com/inside-openbsds-new-httpd-web-server/" rel="nofollow">Inside OpenBSD&#39;s new httpd</a></h3>

<ul>
<li>BSD news continues to <strong>dominate</strong> mainstream tech news sites… well <em>not really</em>, but they talk about it once in a while</li>
<li>The SD Times is featuring an article about OpenBSD&#39;s in-house HTTP server, after seeing Reyk&#39;s <a href="http://www.openbsd.org/papers/httpd-slides-asiabsdcon2015.pdf" rel="nofollow">AsiaBSDCon presentation</a> about it (which he&#39;s giving at BSDCan this year, too)</li>
<li>In this article, they talk about the rapid transition of webservers in the base system - apache being replaced with nginx, only to be replaced with httpd shortly thereafter</li>
<li>Since the new daemon has had almost a full release cycle to grow, new features and fixes have been pouring in</li>
<li>The post also highlights some of the security features: everything runs in a chroot with privsep by default, and it also leverages strong TLS 1.2 defaults (including Perfect Forward Secrecy)
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/04/build-packages-in-poudriere-without.html" rel="nofollow">Using poudriere without OpenSSL</a></h3>

<ul>
<li>Last week we <a href="http://www.bsdnow.tv/episodes/2015_03_25-ssl_in_the_wild" rel="nofollow">talked about</a> using LibreSSL in FreeBSD for all your ports</li>
<li>One of the problems that was mentioned is that some ports are configured improperly, and end up linking against the OpenSSL in the base system even when you tell them not to</li>
<li>This blog post shows how to completely strip OpenSSL out of the <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> build jails, something that&#39;s a lot more difficult than you&#39;d think</li>
<li>If you&#39;re a port maintainer, pay close attention to this post, and get your ports fixed to adhere to the make.conf options properly
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142755452428573&w=2" rel="nofollow">HAMMER and GPT in OpenBSD</a></h3>

<ul>
<li>Someone, presumably a Google Summer of Code student, wrote in to the lists about his <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">HAMMER FS</a> porting proposal</li>
<li>He outlined the entire process and estimated timetable, including what would be supported and which aspects were beyond the scope of his work (like the clustering stuff)</li>
<li>There&#39;s no word yet on if it will be accepted, but it&#39;s an interesting idea to explore, especially when you consider that HAMMER really only has one developer</li>
<li>In more disk-related news, <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">Ken Westerback</a> has been committing quite a lot of <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=gpt&q=b" rel="nofollow">GPT-related fixes</a> recently</li>
<li>Full GPT support will most likely be finished before 5.8, but anything involving HAMMER FS is still anyone&#39;s guess
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20e30p4qf" rel="nofollow">Morgan writes in</a></li>
<li><a href="http://slexy.org/view/s20clKByMP" rel="nofollow">Dustin writes in</a></li>
<li><a href="http://slexy.org/view/s20aBlmaT5" rel="nofollow">Stan writes in</a></li>
<li><a href="http://slexy.org/view/s2ufFrZY9y" rel="nofollow">Mica writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-April/055281.html" rel="nofollow">Developers in freefall</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142786808725483&w=4" rel="nofollow">Xorg thieves pt. 1</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142790740405547&w=4" rel="nofollow">Xorg thieves pt. 2</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>82: SSL in the Wild</title>
  <link>https://www.bsdnow.tv/82</link>
  <guid isPermaLink="false">530c2987-381d-4c49-bfb9-b78872dd2e03</guid>
  <pubDate>Wed, 25 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/530c2987-381d-4c49-bfb9-b78872dd2e03.mp3" length="63405364" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:03</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He's been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://2015.eurobsdcon.org/call-for-papers/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2015 call for papers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The call for papers has been announced for the next &lt;a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon&lt;/a&gt;, which is set to be held in Sweden this year&lt;/li&gt;
&lt;li&gt;According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April&lt;/li&gt;
&lt;li&gt;If giving a full talk isn't your thing, there's also a call for tutorials - if you're comfortable teaching other people about something BSD-related, this could be a great thing too&lt;/li&gt;
&lt;li&gt;You're not limited to one proposal - several speakers gave multiple in 2014 - so don't hesitate if you've got more than one thing you'd like to talk about&lt;/li&gt;
&lt;li&gt;We'd like to see a more balanced conference schedule than BSDCan's having this year, but that requires effort on both sides - if you're doing &lt;em&gt;anything&lt;/em&gt; cool with &lt;em&gt;any&lt;/em&gt; BSD, we'd encourage you submit a proposal (or two)&lt;/li&gt;
&lt;li&gt;Check the announcement for all the specific details and requirements&lt;/li&gt;
&lt;li&gt;If your talk gets accepted, the conference even pays for your travel expenses
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/making-security-sausage" target="_blank" rel="nofollow noopener"&gt;Making security sausage&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD&lt;/li&gt;
&lt;li&gt;"Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!"&lt;/li&gt;
&lt;li&gt;The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review&lt;/li&gt;
&lt;li&gt;It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug&lt;/li&gt;
&lt;li&gt;Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions&lt;/li&gt;
&lt;li&gt;The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them&lt;/li&gt;
&lt;li&gt;Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute&lt;/li&gt;
&lt;li&gt;It was because of this that FreeBSD actually had to release &lt;a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" target="_blank" rel="nofollow noopener"&gt;a security update to their security update&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;He concludes with "My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note 'oh, and some security too' creates downstream mayhem."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD on the server, a sysadmin speaks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More BSD content is appearing on mainstream technology sites, and, &lt;strong&gt;more importantly&lt;/strong&gt;, BSD Now is being mentioned&lt;/li&gt;
&lt;li&gt;ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)&lt;/li&gt;
&lt;li&gt;They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor&lt;/li&gt;
&lt;li&gt;It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers&lt;/li&gt;
&lt;li&gt;If you've been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" target="_blank" rel="nofollow noopener"&gt;NetBSD ported to Hardkernel ODROID-C1&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the &lt;a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" target="_blank" rel="nofollow noopener"&gt;Hardkernel ODROID-C1&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35&lt;/li&gt;
&lt;li&gt;There's a special kernel config file for this board's hardware, available in both -current and the upcoming 7.0&lt;/li&gt;
&lt;li&gt;More info can be found on &lt;a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" target="_blank" rel="nofollow noopener"&gt;their wiki page&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;After this was written, basic framebuffer console support was &lt;a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" target="_blank" rel="nofollow noopener"&gt;also committed&lt;/a&gt;, allowing a developer to &lt;a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" target="_blank" rel="nofollow noopener"&gt;run XFCE&lt;/a&gt; on the device
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Bernard Spil - &lt;a href="mailto:brnrd@freebsd.org" target="_blank" rel="nofollow noopener"&gt;brnrd@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/sp1l" target="_blank" rel="nofollow noopener"&gt;@sp1l&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;LibreSSL adoption &lt;a href="https://wiki.freebsd.org/LibreSSL" target="_blank" rel="nofollow noopener"&gt;in FreeBSD ports&lt;/a&gt; and the wider software ecosystem&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" target="_blank" rel="nofollow noopener"&gt;Monitoring pf logs with Gource&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're &lt;a href="http://www.bsdnow.tv/tutorials/pf" target="_blank" rel="nofollow noopener"&gt;using pf&lt;/a&gt; on any of the BSDs, maybe you've gotten bored of grepping logs and want to do something more fancy&lt;/li&gt;
&lt;li&gt;This article will show you how to get set up with Gource for a cinematic-like experience&lt;/li&gt;
&lt;li&gt;If you've never heard of Gource, it's "an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories"&lt;/li&gt;
&lt;li&gt;When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic&lt;/li&gt;
&lt;li&gt;One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend's phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=381573" target="_blank" rel="nofollow noopener"&gt;pkgng 1.5.0 alpha1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1&lt;/li&gt;
&lt;li&gt;This update introduces support for provides/requires, something that we've been wanting for a long time&lt;/li&gt;
&lt;li&gt;It will also now print which package is the reason for direct dependency change&lt;/li&gt;
&lt;li&gt;Another interesting addition is the "pkg -r" switch, allowing cross installation of packages&lt;/li&gt;
&lt;li&gt;Remember this isn't the stable version, so maybe don't upgrade to it just yet on any production systems&lt;/li&gt;
&lt;li&gt;DragonFly will also likely pick up this update once it's marked stable
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://devio.us/%7Ebcallah/rcos2015.pdf" target="_blank" rel="nofollow noopener"&gt;Welcome to OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned last week that our listener Brian was giving a talk in the Troy, New York area&lt;/li&gt;
&lt;li&gt;The slides from that talk are now online, and they've been generating quite a bit of &lt;a href="https://news.ycombinator.com/item?id=9240533" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; &lt;a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" target="_blank" rel="nofollow noopener"&gt;online&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;It's simply titled "Welcome to OpenBSD" and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)&lt;/li&gt;
&lt;li&gt;Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved&lt;/li&gt;
&lt;li&gt;As you may know, NetBSD has almost 60 &lt;a href="https://www.netbsd.org/ports/" target="_blank" rel="nofollow noopener"&gt;supported platforms&lt;/a&gt; and their slogan is "&lt;em&gt;of course&lt;/em&gt; it runs NetBSD" - Brian says, with &lt;a href="http://www.openbsd.org/plat.html" target="_blank" rel="nofollow noopener"&gt;17 platforms&lt;/a&gt; over 13 CPU architectures, "it &lt;em&gt;probably&lt;/em&gt; runs OpenBSD"&lt;/li&gt;
&lt;li&gt;No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet&lt;/li&gt;
&lt;li&gt;Try to guess which font he used...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 252&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;And somehow Brian has snuck himself into &lt;em&gt;another&lt;/em&gt; news item this week&lt;/li&gt;
&lt;li&gt;He makes an appearance in the latest episode of &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;BSD Talk&lt;/a&gt;, where he chats with Will about running a BSD-based shell provider&lt;/li&gt;
&lt;li&gt;If that sounds familiar, it's probably because &lt;a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" target="_blank" rel="nofollow noopener"&gt;we did the same thing&lt;/a&gt;, albeit with a different member of their team&lt;/li&gt;
&lt;li&gt;In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people&lt;/li&gt;
&lt;li&gt;They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2O81pixhq" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2dhr2WfVc" target="_blank" rel="nofollow noopener"&gt;Stefan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Kisq2EqT" target="_blank" rel="nofollow noopener"&gt;Possnfiffer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Xr0e5YAJ" target="_blank" rel="nofollow noopener"&gt;Ruudsch writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Xz7BNoJE" target="_blank" rel="nofollow noopener"&gt;Shane writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" target="_blank" rel="nofollow noopener"&gt;Accidental support&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142686812913221&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Larry's tears&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" target="_blank" rel="nofollow noopener"&gt;The boy who sailed with BSD&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgng, poudriere, eurobsdcon, 2015, mg, emacs, libressl, openssl, ports, tls, heartbleed, freak attack, pkgng, hardkernel, gource</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Bernard Spil about wider adoption of LibreSSL in other communities. He&#39;s been doing a lot of work with FreeBSD ports specifically, but also working with upstream projects. As usual, all this weeks news and answers to your questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://2015.eurobsdcon.org/call-for-papers/" rel="nofollow">EuroBSDCon 2015 call for papers</a></h3>

<ul>
<li>The call for papers has been announced for the next <a href="http://www.bsdnow.tv/episodes/2014_12_03-conference-connoisseur" rel="nofollow">EuroBSDCon</a>, which is set to be held in Sweden this year</li>
<li>According to their site, the call for presentation proposals period will start on Monday the 23rd of March until Friday the 17th of April</li>
<li>If giving a full talk isn&#39;t your thing, there&#39;s also a call for tutorials - if you&#39;re comfortable teaching other people about something BSD-related, this could be a great thing too</li>
<li>You&#39;re not limited to one proposal - several speakers gave multiple in 2014 - so don&#39;t hesitate if you&#39;ve got more than one thing you&#39;d like to talk about</li>
<li>We&#39;d like to see a more balanced conference schedule than BSDCan&#39;s having this year, but that requires effort on both sides - if you&#39;re doing <em>anything</em> cool with <em>any</em> BSD, we&#39;d encourage you submit a proposal (or two)</li>
<li>Check the announcement for all the specific details and requirements</li>
<li>If your talk gets accepted, the conference even pays for your travel expenses
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/making-security-sausage" rel="nofollow">Making security sausage</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a new blog post up, detailing his experiences with some recent security patches both in and out of OpenBSD</li>
<li>&quot;Unfortunately, I wrote the tool used for signing patches which somehow turned into a responsibility for also creating the inputs to be signed. That was not the plan!&quot;</li>
<li>The post first takes us through a few OpenBSD errata patches, explaining how some can get fixed very quickly, but others are more complicated and need a bit more review</li>
<li>It also covers security in upstream codebases, and how upstream projects sometimes treat security issues as any other bug</li>
<li>Following that, it leads to the topic of FreeType - and a much more complicated problem with backporting patches between versions</li>
<li>The recent OpenSSL vulnerabilities were also mentioned, with an interesting story to go along with them</li>
<li>Just 45 minutes before the agreed-upon announcement, OpenBSD devs found a problem with the patch OpenSSL planned to release - it had to be redone at the last minute</li>
<li>It was because of this that FreeBSD actually had to release <a href="https://lists.freebsd.org/pipermail/freebsd-security-notifications/2015-March/000237.html" rel="nofollow">a security update to their security update</a></li>
<li>He concludes with &quot;My number one wish would be that every project provide small patches for security issues. Dropping enormous feature releases along with a note &#39;oh, and some security too&#39; creates downstream mayhem.&quot;
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/67420-running-freebsd-on-the-server-a-sysadmin-speaks" rel="nofollow">Running FreeBSD on the server, a sysadmin speaks</a></h3>

<ul>
<li>More BSD content is appearing on mainstream technology sites, and, <strong>more importantly</strong>, BSD Now is being mentioned</li>
<li>ITWire recently did an interview with Allan about running FreeBSD on servers (possibly to go with their earlier interview with Kris about desktop usage)</li>
<li>They discuss some of the advantages BSD brings to the table for sysadmins that might be used to Linux or some other UNIX flavor</li>
<li>It also covers specific features like jails, ZFS, long-term support, automating tasks and even… what to name your computers</li>
<li>If you&#39;ve been considering switching your servers over from Linux to FreeBSD, but maybe wanted to hear some first-hand experience, this is the article for you
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_ported_to_hardkernel_odroid" rel="nofollow">NetBSD ported to Hardkernel ODROID-C1</a></h3>

<ul>
<li>In their never-ending quest to run on every new board that comes out, NetBSD has been ported to the <a href="http://www.hardkernel.com/main/products/prdt_info.php?g_code=G141578608433" rel="nofollow">Hardkernel ODROID-C1</a></li>
<li>This one features a quad-core ARMv7 CPU at 1.5GHz, has a gig of ram and gigabit ethernet... all for just $35</li>
<li>There&#39;s a special kernel config file for this board&#39;s hardware, available in both -current and the upcoming 7.0</li>
<li>More info can be found on <a href="https://wiki.netbsd.org/ports/evbarm/odroid-c1/" rel="nofollow">their wiki page</a></li>
<li>After this was written, basic framebuffer console support was <a href="http://mail-index.netbsd.org/source-changes/2015/03/21/msg064156.html" rel="nofollow">also committed</a>, allowing a developer to <a href="https://pbs.twimg.com/media/CAqU5CnWEAAEhH2.png:large" rel="nofollow">run XFCE</a> on the device
***</li>
</ul>

<h2>Interview - Bernard Spil - <a href="mailto:brnrd@freebsd.org" rel="nofollow">brnrd@freebsd.org</a> / <a href="https://twitter.com/sp1l" rel="nofollow">@sp1l</a></h2>

<p>LibreSSL adoption <a href="https://wiki.freebsd.org/LibreSSL" rel="nofollow">in FreeBSD ports</a> and the wider software ecosystem</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/monitoring-pf-logs-gource" rel="nofollow">Monitoring pf logs with Gource</a></h3>

<ul>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">using pf</a> on any of the BSDs, maybe you&#39;ve gotten bored of grepping logs and want to do something more fancy</li>
<li>This article will show you how to get set up with Gource for a cinematic-like experience</li>
<li>If you&#39;ve never heard of Gource, it&#39;s &quot;an OpenGL-based 3D visualization tool intended for visualizing activity on source control repositories&quot;</li>
<li>When you put all the tools together, you can end up with some pretty eye-catching animations of your firewall traffic</li>
<li>One of our listeners wrote in to say that he set this up and, almost immediately, noticed his girlfriend&#39;s phone had been compromised - graphical representations of traffic could be useful for detecting suspicious network activity
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=381573" rel="nofollow">pkgng 1.5.0 alpha1 released</a></h3>

<ul>
<li>The development version of pkgng was updated to 1.4.99.14, or 1.5.0 alpha1</li>
<li>This update introduces support for provides/requires, something that we&#39;ve been wanting for a long time</li>
<li>It will also now print which package is the reason for direct dependency change</li>
<li>Another interesting addition is the &quot;pkg -r&quot; switch, allowing cross installation of packages</li>
<li>Remember this isn&#39;t the stable version, so maybe don&#39;t upgrade to it just yet on any production systems</li>
<li>DragonFly will also likely pick up this update once it&#39;s marked stable
***</li>
</ul>

<h3><a href="http://devio.us/%7Ebcallah/rcos2015.pdf" rel="nofollow">Welcome to OpenBSD</a></h3>

<ul>
<li>We mentioned last week that our listener Brian was giving a talk in the Troy, New York area</li>
<li>The slides from that talk are now online, and they&#39;ve been generating quite a bit of <a href="https://news.ycombinator.com/item?id=9240533" rel="nofollow">discussion</a> <a href="https://www.reddit.com/r/openbsd/comments/2ztokc/welcome_to_openbsd/" rel="nofollow">online</a></li>
<li>It&#39;s simply titled &quot;Welcome to OpenBSD&quot; and gives the reader an introduction to the OS (and how easy it is to get involved with contributing)</li>
<li>Topics include a quick history of the project, who the developers are and what they do, some proactive security techniques and finally how to get involved</li>
<li>As you may know, NetBSD has almost 60 <a href="https://www.netbsd.org/ports/" rel="nofollow">supported platforms</a> and their slogan is &quot;<em>of course</em> it runs NetBSD&quot; - Brian says, with <a href="http://www.openbsd.org/plat.html" rel="nofollow">17 platforms</a> over 13 CPU architectures, &quot;it <em>probably</em> runs OpenBSD&quot;</li>
<li>No matter which BSD you might be interested in, these slides are a great read, especially for any beginners looking to get their feet wet</li>
<li>Try to guess which font he used...
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2015/03/bsdtalk252-devious-with-brian-callahan.html" rel="nofollow">BSDTalk episode 252</a></h3>

<ul>
<li>And somehow Brian has snuck himself into <em>another</em> news item this week</li>
<li>He makes an appearance in the latest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSD Talk</a>, where he chats with Will about running a BSD-based shell provider</li>
<li>If that sounds familiar, it&#39;s probably because <a href="http://www.bsdnow.tv/episodes/2014_06_18-devious_methods" rel="nofollow">we did the same thing</a>, albeit with a different member of their team</li>
<li>In this interview, they discuss what a shell provider does, hardware requirements and how to weed out the spammers in favor of real people</li>
<li>They also talk a bit about the community aspect of a shared server, as opposed to just running a virtual machine by yourself
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2O81pixhq" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s2dhr2WfVc" rel="nofollow">Stefan writes in</a></li>
<li><a href="http://slexy.org/view/s2Kisq2EqT" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s2Xr0e5YAJ" rel="nofollow">Ruudsch writes in</a></li>
<li><a href="http://slexy.org/view/s2Xz7BNoJE" rel="nofollow">Shane writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-March/069679.html" rel="nofollow">Accidental support</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142686812913221&w=2" rel="nofollow">Larry&#39;s tears</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hardware/2015-March/007625.html" rel="nofollow">The boy who sailed with BSD</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>81: Puffy in a Box</title>
  <link>https://www.bsdnow.tv/81</link>
  <guid isPermaLink="false">a8a11e67-acad-44db-b8d9-840c53f401f9</guid>
  <pubDate>Wed, 18 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a8a11e67-acad-44db-b8d9-840c53f401f9.mp3" length="62032180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back from AsiaBSDCon! This week on the show, we'll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They're getting BSD in the hands of Windows admins who don't even realize it. We also have all this week's news and answer to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" target="_blank" rel="nofollow noopener"&gt;Using OpenBGPD to distribute pf table updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For those not familiar, &lt;a href="https://en.wikipedia.org/wiki/OpenBGPD" target="_blank" rel="nofollow noopener"&gt;OpenBGPD&lt;/a&gt; is a daemon for the &lt;a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" target="_blank" rel="nofollow noopener"&gt;Border Gateway Protocol&lt;/a&gt; - a way for routers on the internet to discover and exchange routes to different addresses&lt;/li&gt;
&lt;li&gt;This post, inspired by &lt;a href="https://www.youtube.com/watch?v=Vet0eQB00X0" target="_blank" rel="nofollow noopener"&gt;a talk about using BGP to distribute spam lists&lt;/a&gt;, details how to use the protocol to distribute some other useful lists and information&lt;/li&gt;
&lt;li&gt;It begins with "One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems."&lt;/li&gt;
&lt;li&gt;If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files&lt;/li&gt;
&lt;li&gt;OpenBGPD is part of the OpenBSD base system, but there's also an unofficial port &lt;a href="https://www.freshports.org/net/openbgpd/" target="_blank" rel="nofollow noopener"&gt;to FreeBSD&lt;/a&gt; and a "work in progress" &lt;a href="http://pkgsrc.se/wip/openbgpd" target="_blank" rel="nofollow noopener"&gt;pkgsrc version&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" target="_blank" rel="nofollow noopener"&gt;Mounting removable media with autofs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has a new article in the "FreeBSD from the trenches" series, this time about the sponsored &lt;a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&amp;amp;sektion=5" target="_blank" rel="nofollow noopener"&gt;autofs&lt;/a&gt; tool&lt;/li&gt;
&lt;li&gt;It's written by one of the autofs developers, and he details his work on creating and using the utility&lt;/li&gt;
&lt;li&gt;"The purpose of autofs(5) is to mount filesystems on access, in a way that's transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes."&lt;/li&gt;
&lt;li&gt;He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives&lt;/li&gt;
&lt;li&gt;It ends with a real-world example of something we're all probably familiar with: plugging in USB drives and watching the magic happen&lt;/li&gt;
&lt;li&gt;There's also some more advanced bonus material on GEOM classes and all the more technical details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" target="_blank" rel="nofollow noopener"&gt;The Tor Browser on BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Tor Project has provided a "&lt;a href="https://www.torproject.org/projects/torbrowser/design/" target="_blank" rel="nofollow noopener"&gt;browser bundle&lt;/a&gt;" for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source&lt;/li&gt;
&lt;li&gt;Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost &lt;/li&gt;
&lt;li&gt;It has, however, only been released for Windows, OS X and Linux - no BSD version&lt;/li&gt;
&lt;li&gt;"[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves."&lt;/li&gt;
&lt;li&gt;Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started&lt;/li&gt;
&lt;li&gt;If you've got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.8 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Continuing their "tick tock" pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it's a major upgrade, focused on new features (we like those better of course)&lt;/li&gt;
&lt;li&gt;Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability&lt;/li&gt;
&lt;li&gt;This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints&lt;/li&gt;
&lt;li&gt;Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys&lt;/li&gt;
&lt;li&gt;You can now require multiple, different public keys to be verified for a user to authenticate (useful if you're extra paranoid or don't have 100% confidence in any single key type)&lt;/li&gt;
&lt;li&gt;The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon&lt;/li&gt;
&lt;li&gt;Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at AsiaBSDCon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you'd expect&lt;/li&gt;
&lt;li&gt;It covers their BoF session, the six NetBSD-related presentations and finally their "work in progress" session&lt;/li&gt;
&lt;li&gt;There was a grand total of &lt;a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" target="_blank" rel="nofollow noopener"&gt;34 different NetBSD gadgets&lt;/a&gt; on display at the event
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Lawrence Teo - &lt;a href="mailto:lteo@openbsd.org" target="_blank" rel="nofollow noopener"&gt;lteo@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/lteo" target="_blank" rel="nofollow noopener"&gt;@lteo&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD &lt;a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" target="_blank" rel="nofollow noopener"&gt;at Calyptix&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" target="_blank" rel="nofollow noopener"&gt;HardenedBSD introduces Integriforce&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A little bit of background on this one first: NetBSD has something called &lt;a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" target="_blank" rel="nofollow noopener"&gt;veriexec&lt;/a&gt;, used for &lt;a href="http://wiki.netbsd.org/guide/veriexec/" target="_blank" rel="nofollow noopener"&gt;checking file integrity&lt;/a&gt; at the kernel level&lt;/li&gt;
&lt;li&gt;By doing it at the kernel level, similar to &lt;a href="https://en.wikipedia.org/wiki/Securelevel" target="_blank" rel="nofollow noopener"&gt;securelevels&lt;/a&gt;, it offers some level of protection even when the root account is compromised&lt;/li&gt;
&lt;li&gt;HardenedBSD has introduced a similar mechanism into their "secadm" utility&lt;/li&gt;
&lt;li&gt;You can list binaries in the config file that you want to be protected from changes, then specify whether those &lt;a href="http://i.imgur.com/wHp2eAN.png" target="_blank" rel="nofollow noopener"&gt;can't be run&lt;/a&gt; at all, or if they just print a warning&lt;/li&gt;
&lt;li&gt;They're looking for some more extensive testing of this new feature
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150305100712&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;More s2k15 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A couple more Australian hackathon reports have poured in since the last time&lt;/li&gt;
&lt;li&gt;The first comes from Jonathan Gray, who's done a lot of graphics-related work in OpenBSD recently&lt;/li&gt;
&lt;li&gt;He worked on getting some newer "Southern Islands" and "Graphics Core Next" AMD GPUs working, as well as some OpenGL and DRM-related things&lt;/li&gt;
&lt;li&gt;Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in &lt;a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" target="_blank" rel="nofollow noopener"&gt;mandoc&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ted Unangst also &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150307165135&amp;amp;mode=flat" target="_blank" rel="nofollow noopener"&gt;sent in a report&lt;/a&gt; to detail what he hacked on at the event&lt;/li&gt;
&lt;li&gt;With a strong focus on improving SMP scalability, he tackled the virtual memory layer&lt;/li&gt;
&lt;li&gt;His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8&lt;/li&gt;
&lt;li&gt;All the trip reports are &lt;strong&gt;much&lt;/strong&gt; more detailed than our short summaries, so give them a read if you're interested in all the technicalities
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2015/03/10/15733.html" target="_blank" rel="nofollow noopener"&gt;DragonFly 4.0.4 and IPFW3&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4&lt;/li&gt;
&lt;li&gt;It includes a minor &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" target="_blank" rel="nofollow noopener"&gt;list of fixes&lt;/a&gt;, some of which include a HAMMER FS history fix, removing the no-longer-needed "new xorg" and "with kms" variables and a few LAGG fixes&lt;/li&gt;
&lt;li&gt;There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version&lt;/li&gt;
&lt;li&gt;Shortly after it was released, their new IPFW2 firewall was &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" target="_blank" rel="nofollow noopener"&gt;added to the tree&lt;/a&gt; and subsequently renamed to &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" target="_blank" rel="nofollow noopener"&gt;IPFW3&lt;/a&gt; (since it's technically the third revision)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" target="_blank" rel="nofollow noopener"&gt;NetBSD gets Raspberry Pi 2 support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD has announced initial support for the &lt;a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" target="_blank" rel="nofollow noopener"&gt;second revision&lt;/a&gt; of the ever-popular Raspberry Pi board&lt;/li&gt;
&lt;li&gt;There are -current snapshots available for download, and multiprocessor support is also on the way&lt;/li&gt;
&lt;li&gt;The NetBSD wiki page about the Raspberry Pi also has some &lt;a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" target="_blank" rel="nofollow noopener"&gt;more information&lt;/a&gt; and an installation guide&lt;/li&gt;
&lt;li&gt;The usual &lt;a href="https://news.ycombinator.com/item?id=9172100" target="_blank" rel="nofollow noopener"&gt;Hacker News discussion&lt;/a&gt; on the subject&lt;/li&gt;
&lt;li&gt;If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://puffysecurity.com/wiki/openikedoffshore.html" target="_blank" rel="nofollow noopener"&gt;OpenIKED as a VPN gateway&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In our first discussion segment, we talked about a few different ways to tunnel your traffic&lt;/li&gt;
&lt;li&gt;While we've done full tutorials on things like &lt;a href="http://www.bsdnow.tv/tutorials/stunnel" target="_blank" rel="nofollow noopener"&gt;SSH tunnels&lt;/a&gt;, &lt;a href="http://www.bsdnow.tv/tutorials/openvpn" target="_blank" rel="nofollow noopener"&gt;OpenVPN&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/tutorials/tor" target="_blank" rel="nofollow noopener"&gt;Tor&lt;/a&gt;, we haven't talked a whole lot about OpenBSD's IPSEC suite&lt;/li&gt;
&lt;li&gt;This article should help fill that gap - it walks you through the complete IKED setup&lt;/li&gt;
&lt;li&gt;From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide's got it all
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21G9TWALE" target="_blank" rel="nofollow noopener"&gt;Gary writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s206aZrxOi" target="_blank" rel="nofollow noopener"&gt;Robert writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s28Um5R7LG" target="_blank" rel="nofollow noopener"&gt;Joris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yAJsl1Es" target="_blank" rel="nofollow noopener"&gt;Mike writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21dMAE55M" target="_blank" rel="nofollow noopener"&gt;Anders writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142577632205484&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Can you hear me now&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" target="_blank" rel="nofollow noopener"&gt;He must be GNU here&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142593175408756&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;I've seen some...&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, calyptix, router, gateway, pfsense, opnsense, smb, asiabsdcon, 2015, openbgpd, openiked, hardenedbsd, tor, vpn, autofs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week on the show, we&#39;ll be talking to Lawrence Teo about how Calyptix uses OpenBSD in their line of commercial routers. They&#39;re getting BSD in the hands of Windows admins who don&#39;t even realize it. We also have all this week&#39;s news and answer to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbgpd-distribute-pf-table-updates-your-servers" rel="nofollow">Using OpenBGPD to distribute pf table updates</a></h3>

<ul>
<li>For those not familiar, <a href="https://en.wikipedia.org/wiki/OpenBGPD" rel="nofollow">OpenBGPD</a> is a daemon for the <a href="https://en.wikipedia.org/wiki/Border_Gateway_Protocol" rel="nofollow">Border Gateway Protocol</a> - a way for routers on the internet to discover and exchange routes to different addresses</li>
<li>This post, inspired by <a href="https://www.youtube.com/watch?v=Vet0eQB00X0" rel="nofollow">a talk about using BGP to distribute spam lists</a>, details how to use the protocol to distribute some other useful lists and information</li>
<li>It begins with &quot;One of the challenges faced when managing our OpenBSD firewalls is the distribution of IPs to pf tables without manually modifying /etc/pf.conf on each of the firewalls every time. This task becomes quite tedious, specifically when you want to distribute different types of changes to different systems (eg administrative IPs to a firewall and spammer IPs to a mail server), or if you need to distribute real time blacklists to a large number of systems.&quot;</li>
<li>If you manage a lot of BSD boxes, this might be an interesting alternative to some of the other ways to distribute configuration files</li>
<li>OpenBGPD is part of the OpenBSD base system, but there&#39;s also an unofficial port <a href="https://www.freshports.org/net/openbgpd/" rel="nofollow">to FreeBSD</a> and a &quot;work in progress&quot; <a href="http://pkgsrc.se/wip/openbgpd" rel="nofollow">pkgsrc version</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2015/03/freebsd-from-trenches-using-autofs5-to_13.html" rel="nofollow">Mounting removable media with autofs</a></h3>

<ul>
<li>The FreeBSD foundation has a new article in the &quot;FreeBSD from the trenches&quot; series, this time about the sponsored <a href="https://www.freebsd.org/cgi/man.cgi?query=autofs&sektion=5" rel="nofollow">autofs</a> tool</li>
<li>It&#39;s written by one of the autofs developers, and he details his work on creating and using the utility</li>
<li>&quot;The purpose of autofs(5) is to mount filesystems on access, in a way that&#39;s transparent to the application. In other words, filesystems get mounted when they are first accessed, and then unmounted after some time passes.&quot;</li>
<li>He talks about all the components that need to work together for smooth operation, how to configure it and how to enable it by default for removable drives</li>
<li>It ends with a real-world example of something we&#39;re all probably familiar with: plugging in USB drives and watching the magic happen</li>
<li>There&#39;s also some more advanced bonus material on GEOM classes and all the more technical details
***</li>
</ul>

<h3><a href="http://trac.haqistan.net/blog/adventures-ports-tor-browser" rel="nofollow">The Tor Browser on BSD</a></h3>

<ul>
<li>The Tor Project has provided a &quot;<a href="https://www.torproject.org/projects/torbrowser/design/" rel="nofollow">browser bundle</a>&quot; for a long time, which is more or less a repackaged Firefox with many security and privacy-related settings preconfigured and some patches applied to the source</li>
<li>Just tunneling your browser through a transparent Tor proxy is not safe enough - many things can lead to passive fingerprinting or, even worse, anonymity being completely lost </li>
<li>It has, however, only been released for Windows, OS X and Linux - no BSD version</li>
<li>&quot;[...] we are pushing back against an emerging monoculture, and this is always a healthy thing. Monocultures are dangerous for many reasons, most importantly to themselves.&quot;</li>
<li>Some work has begun to get a working port on BSD going, and this document tells about the process and how it all got started</li>
<li>If you&#39;ve got porting skills, or are interested in online privacy, any help would be appreciated of course (see the post for details on getting involved)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2015-March/033686.html" rel="nofollow">OpenSSH 6.8 released</a></h3>

<ul>
<li>Continuing their &quot;tick tock&quot; pattern of releases alternating between new features and bugfixes, the OpenSSH team has released 6.8 - it&#39;s a major upgrade, focused on new features (we like those better of course)</li>
<li>Most of the codebase has gone through refactoring, making it easier for regression tests and improving the general readability</li>
<li>This release adds support for SHA256-hashed, base64-encoded host key fingerprints, as well as making that the default - a big step up from the previously hex-encoded MD5 fingerprints</li>
<li>Experimental host key rotation support also makes it debut, allowing for easy in-place upgrading of old keys to newer (or refreshed) keys</li>
<li>You can now require multiple, different public keys to be verified for a user to authenticate (useful if you&#39;re extra paranoid or don&#39;t have 100% confidence in any single key type)</li>
<li>The native version will be in OpenBSD 5.7, and the portable version should hit a ports tree near you soon</li>
<li>Speaking of the portable version, it now has a configure option to build without OpenSSL or LibreSSL, but doing so limits you to Ed25519 key types and ChaCha20 and AES-CTR ciphers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/03/15/msg000682.html" rel="nofollow">NetBSD at AsiaBSDCon</a></h3>

<ul>
<li>The NetBSD guys already have a wrap-up of the recent event, complete with all the pictures and weird devices you&#39;d expect</li>
<li>It covers their BoF session, the six NetBSD-related presentations and finally their &quot;work in progress&quot; session</li>
<li>There was a grand total of <a href="https://docs.google.com/spreadsheets/d/14q6zJK5PjlMoSeBV5HBiEik5LkqlrcrbSxPoxVKKlec/edit#gid=0" rel="nofollow">34 different NetBSD gadgets</a> on display at the event
***</li>
</ul>

<h2>Interview - Lawrence Teo - <a href="mailto:lteo@openbsd.org" rel="nofollow">lteo@openbsd.org</a> / <a href="https://twitter.com/lteo" rel="nofollow">@lteo</a></h2>

<p>OpenBSD <a href="http://www.nycbsdcon.org/2010/presentations/lteo-nycbsdcon2010.pdf" rel="nofollow">at Calyptix</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2015-03-11/call-testing-secadm-integriforce" rel="nofollow">HardenedBSD introduces Integriforce</a></h3>

<ul>
<li>A little bit of background on this one first: NetBSD has something called <a href="https://www.netbsd.org/docs/guide/en/chap-veriexec.html" rel="nofollow">veriexec</a>, used for <a href="http://wiki.netbsd.org/guide/veriexec/" rel="nofollow">checking file integrity</a> at the kernel level</li>
<li>By doing it at the kernel level, similar to <a href="https://en.wikipedia.org/wiki/Securelevel" rel="nofollow">securelevels</a>, it offers some level of protection even when the root account is compromised</li>
<li>HardenedBSD has introduced a similar mechanism into their &quot;secadm&quot; utility</li>
<li>You can list binaries in the config file that you want to be protected from changes, then specify whether those <a href="http://i.imgur.com/wHp2eAN.png" rel="nofollow">can&#39;t be run</a> at all, or if they just print a warning</li>
<li>They&#39;re looking for some more extensive testing of this new feature
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150305100712&mode=flat" rel="nofollow">More s2k15 hackathon reports</a></h3>

<ul>
<li>A couple more Australian hackathon reports have poured in since the last time</li>
<li>The first comes from Jonathan Gray, who&#39;s done a lot of graphics-related work in OpenBSD recently</li>
<li>He worked on getting some newer &quot;Southern Islands&quot; and &quot;Graphics Core Next&quot; AMD GPUs working, as well as some OpenGL and DRM-related things</li>
<li>Also on his todo list was to continue hitting various parts of the tree with American Fuzzy Lop, which ended up fixing a few crashes in <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a></li>
<li>Ted Unangst also <a href="http://undeadly.org/cgi?action=article&sid=20150307165135&mode=flat" rel="nofollow">sent in a report</a> to detail what he hacked on at the event</li>
<li>With a strong focus on improving SMP scalability, he tackled the virtual memory layer</li>
<li>His goal was to speed up some syscalls that are used heavily during code compilation, much of which will probably end up in 5.8</li>
<li>All the trip reports are <strong>much</strong> more detailed than our short summaries, so give them a read if you&#39;re interested in all the technicalities
***</li>
</ul>

<h3><a href="https://www.dragonflydigest.com/2015/03/10/15733.html" rel="nofollow">DragonFly 4.0.4 and IPFW3</a></h3>

<ul>
<li>DragonFly BSD has put out a small point release to the 4.x branch, 4.0.4</li>
<li>It includes a minor <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418098.html" rel="nofollow">list of fixes</a>, some of which include a HAMMER FS history fix, removing the no-longer-needed &quot;new xorg&quot; and &quot;with kms&quot; variables and a few LAGG fixes</li>
<li>There was also a bug in the installer that prevented the rescue image from being installed correctly, which also gets fixed in this version</li>
<li>Shortly after it was released, their new IPFW2 firewall was <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418133.html" rel="nofollow">added to the tree</a> and subsequently renamed to <a href="http://lists.dragonflybsd.org/pipermail/commits/2015-March/418160.html" rel="nofollow">IPFW3</a> (since it&#39;s technically the third revision)
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_2_support_added" rel="nofollow">NetBSD gets Raspberry Pi 2 support</a></h3>

<ul>
<li>NetBSD has announced initial support for the <a href="http://www.raspberrypi.org/products/raspberry-pi-2-model-b/" rel="nofollow">second revision</a> of the ever-popular Raspberry Pi board</li>
<li>There are -current snapshots available for download, and multiprocessor support is also on the way</li>
<li>The NetBSD wiki page about the Raspberry Pi also has some <a href="https://wiki.netbsd.org/ports/evbarm/raspberry_pi/" rel="nofollow">more information</a> and an installation guide</li>
<li>The usual <a href="https://news.ycombinator.com/item?id=9172100" rel="nofollow">Hacker News discussion</a> on the subject</li>
<li>If anyone has one of these little boards, let us know - maybe write up a blog post about your experience with BSD on it
***</li>
</ul>

<h3><a href="http://puffysecurity.com/wiki/openikedoffshore.html" rel="nofollow">OpenIKED as a VPN gateway</a></h3>

<ul>
<li>In our first discussion segment, we talked about a few different ways to tunnel your traffic</li>
<li>While we&#39;ve done full tutorials on things like <a href="http://www.bsdnow.tv/tutorials/stunnel" rel="nofollow">SSH tunnels</a>, <a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">OpenVPN</a> and <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor</a>, we haven&#39;t talked a whole lot about OpenBSD&#39;s IPSEC suite</li>
<li>This article should help fill that gap - it walks you through the complete IKED setup</li>
<li>From creating the public key infrastructure to configuring the firewall to configuring both the VPN server and client, this guide&#39;s got it all
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G9TWALE" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s206aZrxOi" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s28Um5R7LG" rel="nofollow">Joris writes in</a></li>
<li><a href="http://slexy.org/view/s2yAJsl1Es" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21dMAE55M" rel="nofollow">Anders writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142577632205484&w=2" rel="nofollow">Can you hear me now</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047207.html" rel="nofollow">He must be GNU here</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142593175408756&w=2" rel="nofollow">I&#39;ve seen some...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>80: The PC-BSD Tour II</title>
  <link>https://www.bsdnow.tv/80</link>
  <guid isPermaLink="false">42370236-9013-44ce-882f-6e1b829bbca8</guid>
  <pubDate>Wed, 11 Mar 2015 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/42370236-9013-44ce-882f-6e1b829bbca8.mp3" length="57728596" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're away at AsiaBSDCon this week, but we've still got a packed episode for you. First up is a sequel to the "PC-BSD tour" segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation's 15th anniversary. We'll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're away at AsiaBSDCon this week, but we've still got a packed episode for you. First up is a sequel to the "PC-BSD tour" segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation's 15th anniversary. We'll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Special segment&lt;/h2&gt;

&lt;p&gt;Demystifying Boot Environments in PC-BSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Justin Gibbs - &lt;a href="mailto:gibbs@freebsd.org" target="_blank" rel="nofollow noopener"&gt;gibbs@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/freebsdfndation" target="_blank" rel="nofollow noopener"&gt;@freebsdfndation&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The FreeBSD foundation's 15th anniversary&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Discussion&lt;/h2&gt;

&lt;p&gt;The story of PC-BSD&lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, asiabsdcon, 2015, freebsd foundation, president, anniversary, walkthrough, tour, guide, pkgng, boot environments, zfs</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re away at AsiaBSDCon this week, but we&#39;ve still got a packed episode for you. First up is a sequel to the &quot;PC-BSD tour&quot; segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation&#39;s 15th anniversary. We&#39;ll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Special segment</h2>

<p>Demystifying Boot Environments in PC-BSD</p>

<hr>

<h2>Interview - Justin Gibbs - <a href="mailto:gibbs@freebsd.org" rel="nofollow">gibbs@freebsd.org</a> / <a href="https://twitter.com/freebsdfndation" rel="nofollow">@freebsdfndation</a></h2>

<p>The FreeBSD foundation&#39;s 15th anniversary</p>

<hr>

<h2>Discussion</h2>

<p>The story of PC-BSD</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re away at AsiaBSDCon this week, but we&#39;ve still got a packed episode for you. First up is a sequel to the &quot;PC-BSD tour&quot; segment from a while back, highlighting how ZFS boot environments work. After that, Justin Gibbs joins us to talk about the FreeBSD foundation&#39;s 15th anniversary. We&#39;ll return next week with a normal episode of BSD Now - which is of course, the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Special segment</h2>

<p>Demystifying Boot Environments in PC-BSD</p>

<hr>

<h2>Interview - Justin Gibbs - <a href="mailto:gibbs@freebsd.org" rel="nofollow">gibbs@freebsd.org</a> / <a href="https://twitter.com/freebsdfndation" rel="nofollow">@freebsdfndation</a></h2>

<p>The FreeBSD foundation&#39;s 15th anniversary</p>

<hr>

<h2>Discussion</h2>

<p>The story of PC-BSD</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>79: Just Add QEMU</title>
  <link>https://www.bsdnow.tv/79</link>
  <guid isPermaLink="false">cb3fc5ef-1795-4d76-8b42-56a205255a03</guid>
  <pubDate>Wed, 04 Mar 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cb3fc5ef-1795-4d76-8b42-56a205255a03.mp3" length="60830644" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this time on the show, we'll be talking to Sean Bruno. He's been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We've also got answers to viewer-submitted questions and all this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2015.asiabsdcon.org/timetable.html.en" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon 2015 schedule&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up&lt;/li&gt;
&lt;li&gt;This year's conference will be between 12-15 March at the Tokyo University of Science in Japan&lt;/li&gt;
&lt;li&gt;The first and second days are for tutorials, as well as the developer summit and vendor summit&lt;/li&gt;
&lt;li&gt;Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again&lt;/li&gt;
&lt;li&gt;Not counting the ones that have yet to be revealed (as of the day we're recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD&lt;/li&gt;
&lt;li&gt;Summaries of all the presentations are on the timetable page if you scroll down a bit
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation updates and more&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation&lt;/a&gt; has posted a number of things this week, the first of which is their February 2015 status update&lt;/li&gt;
&lt;li&gt;It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform&lt;/li&gt;
&lt;li&gt;There's a FOSDEM recap and another update of their fundraising goal for 2015&lt;/li&gt;
&lt;li&gt;They also have two new blog posts: &lt;a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" target="_blank" rel="nofollow noopener"&gt;a trip report from SCALE13x&lt;/a&gt; and a featured "&lt;a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD in the trenches&lt;/a&gt;" article about how a small typo caused a lot of ZFS chaos in the cluster&lt;/li&gt;
&lt;li&gt;"Then panic ensued.  The machine didn't panic -- I did."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142523501726732&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD improves browser security&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;No matter what OS you run on your desktop, the most likely entry point for an exploit these days is &lt;em&gt;almost certainly&lt;/em&gt; the web browser&lt;/li&gt;
&lt;li&gt;Ted Unangst writes in to the OpenBSD misc list to introduce a new project he's working on, simply titled "improving browser security"&lt;/li&gt;
&lt;li&gt;He gives some background on the &lt;a href="https://en.wikipedia.org/wiki/W%5EX" target="_blank" rel="nofollow noopener"&gt;W&lt;sup&gt;X&lt;/sup&gt; memory protection&lt;/a&gt; in the base system, but also mentions that some applications in ports don't adhere to it&lt;/li&gt;
&lt;li&gt;For it to be enforced globally instead of just recommended, at least one browser (or specifically, one &lt;a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" target="_blank" rel="nofollow noopener"&gt;JIT&lt;/a&gt; engine) needs to be fixed to use it&lt;/li&gt;
&lt;li&gt;"A system that is 'all W&lt;sup&gt;X&lt;/sup&gt; except where it's not' is the same as a system that's not W&lt;sup&gt;X.&lt;/sup&gt; We've worked hard to provide a secure foundation for programs; we'd like to see them take advantage of it."&lt;/li&gt;
&lt;li&gt;The work is being supported by the &lt;a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" target="_blank" rel="nofollow noopener"&gt;OpenBSD foundation&lt;/a&gt;, and we'll keep you updated on this undertaking as more news about it is released&lt;/li&gt;
&lt;li&gt;There's also some discussion &lt;a href="https://news.ycombinator.com/item?id=9128360" target="_blank" rel="nofollow noopener"&gt;on Hacker News&lt;/a&gt; &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150303075848&amp;amp;mode=expanded" target="_blank" rel="nofollow noopener"&gt;and Undeadly&lt;/a&gt; about it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference 2015 Tokyo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo&lt;/li&gt;
&lt;li&gt;There's even a &lt;a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" target="_blank" rel="nofollow noopener"&gt;spreadsheet&lt;/a&gt; of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)&lt;/li&gt;
&lt;li&gt;If you just can't get enough strange devices running BSD, check the mailing list post for lots of pictures&lt;/li&gt;
&lt;li&gt;Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we'll run into them
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Sean Bruno - &lt;a href="mailto:sbruno@freebsd.org" target="_blank" rel="nofollow noopener"&gt;sbruno@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/franknbeans" target="_blank" rel="nofollow noopener"&gt;@franknbeans&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Cross-compiling packages with &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere&lt;/a&gt; and QEMU&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://crypto-bone.com/what.html" target="_blank" rel="nofollow noopener"&gt;The Crypto Bone&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Crypto Bone is a new &lt;a href="http://www.crypto-bone.com/" target="_blank" rel="nofollow noopener"&gt;device&lt;/a&gt; that's aimed at making encryption and secure communications &lt;a href="http://crypto-bone.com/cbb-usersview.html" target="_blank" rel="nofollow noopener"&gt;easier&lt;/a&gt; and more accessible&lt;/li&gt;
&lt;li&gt;Under the hood, it's actually just a &lt;a href="http://beagleboard.org/bone" target="_blank" rel="nofollow noopener"&gt;Beaglebone&lt;/a&gt; board, running stock OpenBSD with a few extra packages&lt;/li&gt;
&lt;li&gt;It includes a &lt;a href="http://crypto-bone.com/release/root/var/www/apache/html/" target="_blank" rel="nofollow noopener"&gt;web interface&lt;/a&gt; for configuring keys and secure tunnels&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://crypto-bone.com/release/root/" target="_blank" rel="nofollow noopener"&gt;source code&lt;/a&gt; is freely available for anyone interested in hacking on it (or auditing the crypto), and there's &lt;a href="http://crypto-bone.com/cbb-technicalview.html" target="_blank" rel="nofollow noopener"&gt;a technical overview&lt;/a&gt; of how everything works on their site&lt;/li&gt;
&lt;li&gt;If you don't want to teach your mom how to use PGP, buy her one of these(?)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" target="_blank" rel="nofollow noopener"&gt;BSD in the 2015 Google Summer of Code&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For those who don't know, GSoC is a way for students to get paid to work on a coding project for an open source organization&lt;/li&gt;
&lt;li&gt;Good news: both FreeBSD and OpenBSD were &lt;a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" target="_blank" rel="nofollow noopener"&gt;accepted&lt;/a&gt; for the 2015 event&lt;/li&gt;
&lt;li&gt;FreeBSD has &lt;a href="https://wiki.freebsd.org/SummerOfCodeIdeas" target="_blank" rel="nofollow noopener"&gt;a wiki page&lt;/a&gt; of ideas for people to work on&lt;/li&gt;
&lt;li&gt;OpenBSD also has &lt;a href="http://www.openbsdfoundation.org/gsoc2015.html" target="_blank" rel="nofollow noopener"&gt;an ideas page&lt;/a&gt; where you can see some of the initial things that might be interesting&lt;/li&gt;
&lt;li&gt;If you're a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it&lt;/li&gt;
&lt;li&gt;Who knows, you may even &lt;a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" target="_blank" rel="nofollow noopener"&gt;end up on the show&lt;/a&gt; if you work on a cool project&lt;/li&gt;
&lt;li&gt;GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you'd like to hack on
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1588" target="_blank" rel="nofollow noopener"&gt;pfSense 2.3 roadmap&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The pfSense team has posted a new blog entry, detailing some of their plans for future versions&lt;/li&gt;
&lt;li&gt;PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions&lt;/li&gt;
&lt;li&gt;PBIs are scheduled to be replaced with native pkgng packages&lt;/li&gt;
&lt;li&gt;Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely&lt;/li&gt;
&lt;li&gt;Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" target="_blank" rel="nofollow noopener"&gt;PCBSD 10.1.2 security features&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post&lt;/li&gt;
&lt;li&gt;A new "personacrypt" utility is introduced, which allows for easy encryption and management of external drives for your home directory&lt;/li&gt;
&lt;li&gt;Going along with this, it also has a "stealth mode" that allows for one-time temporary home directories (but it doesn't self-destruct, don't worry)&lt;/li&gt;
&lt;li&gt;The LibreSSL integration also continues, and now packages will be built with it by default&lt;/li&gt;
&lt;li&gt;If you're using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update&lt;/li&gt;
&lt;li&gt;They've also been working on introducing some new options to enable tunneling your traffic through Tor&lt;/li&gt;
&lt;li&gt;There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week&lt;/li&gt;
&lt;li&gt;A small disclaimer: remember that &lt;strong&gt;many&lt;/strong&gt; things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity&lt;/li&gt;
&lt;li&gt;Look forward to Kris wearing a &lt;a href="https://www.torproject.org/getinvolved/tshirt.html" target="_blank" rel="nofollow noopener"&gt;Tor shirt&lt;/a&gt; in future episodes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ofBPRT5n" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s26LsYcoJF" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s28Rho0jvL" target="_blank" rel="nofollow noopener"&gt;Van writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21AkGbniU" target="_blank" rel="nofollow noopener"&gt;Stu writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" target="_blank" rel="nofollow noopener"&gt;H&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" target="_blank" rel="nofollow noopener"&gt;Pay up, mister Free&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" target="_blank" rel="nofollow noopener"&gt;Heritage protected&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" target="_blank" rel="nofollow noopener"&gt;Blind leading the blind&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" target="_blank" rel="nofollow noopener"&gt;What are the chances&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, qemu, mips, arm, poudriere, packages, scale13x, asiabsdcon 2015, tor, tails, w^m, browser, exploit</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this time on the show, we&#39;ll be talking to Sean Bruno. He&#39;s been using poudriere and QEMU to cross compile binary packages, and has some interesting stories to tell about it. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2015.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon 2015 schedule</a></h3>

<ul>
<li>Almost immediately after we finished recording an episode last week, the 2015 AsiaBSDCon schedule went up</li>
<li>This year&#39;s conference will be between 12-15 March at the Tokyo University of Science in Japan</li>
<li>The first and second days are for tutorials, as well as the developer summit and vendor summit</li>
<li>Days four and five are the main event with the presentations, which Kris and Allan both made the cut for once again</li>
<li>Not counting the ones that have yet to be revealed (as of the day we&#39;re recording this), there will be thirty-six different talks in all - four BSD-neutral, four NetBSD, six OpenBSD and twenty-two FreeBSD</li>
<li>Summaries of all the presentations are on the timetable page if you scroll down a bit
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2015febupdate.pdf" rel="nofollow">FreeBSD foundation updates and more</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">FreeBSD foundation</a> has posted a number of things this week, the first of which is their February 2015 status update</li>
<li>It provides some updates on the funded projects, including PCI express hotplugging and FreeBSD on the POWER8 platform</li>
<li>There&#39;s a FOSDEM recap and another update of their fundraising goal for 2015</li>
<li>They also have two new blog posts: <a href="http://freebsdfoundation.blogspot.com/2015/02/scale-13x-trip-report-michael-dexter.html" rel="nofollow">a trip report from SCALE13x</a> and a featured &quot;<a href="http://freebsdfoundation.blogspot.com/2015/02/freebsd-from-trenches-zfs-and-how-to.html" rel="nofollow">FreeBSD in the trenches</a>&quot; article about how a small typo caused a lot of ZFS chaos in the cluster</li>
<li>&quot;Then panic ensued.  The machine didn&#39;t panic -- I did.&quot;
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142523501726732&w=2" rel="nofollow">OpenBSD improves browser security</a></h3>

<ul>
<li>No matter what OS you run on your desktop, the most likely entry point for an exploit these days is <em>almost certainly</em> the web browser</li>
<li>Ted Unangst writes in to the OpenBSD misc list to introduce a new project he&#39;s working on, simply titled &quot;improving browser security&quot;</li>
<li>He gives some background on the <a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">W<sup>X</sup> memory protection</a> in the base system, but also mentions that some applications in ports don&#39;t adhere to it</li>
<li>For it to be enforced globally instead of just recommended, at least one browser (or specifically, one <a href="https://en.wikipedia.org/wiki/Just-in-time_compilation" rel="nofollow">JIT</a> engine) needs to be fixed to use it</li>
<li>&quot;A system that is &#39;all W<sup>X</sup> except where it&#39;s not&#39; is the same as a system that&#39;s not W<sup>X.</sup> We&#39;ve worked hard to provide a secure foundation for programs; we&#39;d like to see them take advantage of it.&quot;</li>
<li>The work is being supported by the <a href="http://www.bsdnow.tv/episodes/2015_02_25-from_the_foundation_2" rel="nofollow">OpenBSD foundation</a>, and we&#39;ll keep you updated on this undertaking as more news about it is released</li>
<li>There&#39;s also some discussion <a href="https://news.ycombinator.com/item?id=9128360" rel="nofollow">on Hacker News</a> <a href="http://undeadly.org/cgi?action=article&sid=20150303075848&mode=expanded" rel="nofollow">and Undeadly</a> about it
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/28/msg000680.html" rel="nofollow">NetBSD at Open Source Conference 2015 Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group has once again invaded a conference, this time in Tokyo</li>
<li>There&#39;s even a <a href="https://docs.google.com/spreadsheets/d/1DTJbESfnOUgOiVkFG8vsrxTq6oCGRpf8PkRcMkhWYWQ/edit#gid=0" rel="nofollow">spreadsheet</a> of all the different platforms they were showing off at the booth (mostly ARM, MIPS, PowerPC and Landisk this time around)</li>
<li>If you just can&#39;t get enough strange devices running BSD, check the mailing list post for lots of pictures</li>
<li>Their next target is, as you might guess, AsiaBSDCon 2015 - maybe we&#39;ll run into them
***</li>
</ul>

<h2>Interview - Sean Bruno - <a href="mailto:sbruno@freebsd.org" rel="nofollow">sbruno@freebsd.org</a> / <a href="https://twitter.com/franknbeans" rel="nofollow">@franknbeans</a></h2>

<p>Cross-compiling packages with <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a> and QEMU</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://crypto-bone.com/what.html" rel="nofollow">The Crypto Bone</a></h3>

<ul>
<li>The Crypto Bone is a new <a href="http://www.crypto-bone.com/" rel="nofollow">device</a> that&#39;s aimed at making encryption and secure communications <a href="http://crypto-bone.com/cbb-usersview.html" rel="nofollow">easier</a> and more accessible</li>
<li>Under the hood, it&#39;s actually just a <a href="http://beagleboard.org/bone" rel="nofollow">Beaglebone</a> board, running stock OpenBSD with a few extra packages</li>
<li>It includes a <a href="http://crypto-bone.com/release/root/var/www/apache/html/" rel="nofollow">web interface</a> for configuring keys and secure tunnels</li>
<li>The <a href="http://crypto-bone.com/release/root/" rel="nofollow">source code</a> is freely available for anyone interested in hacking on it (or auditing the crypto), and there&#39;s <a href="http://crypto-bone.com/cbb-technicalview.html" rel="nofollow">a technical overview</a> of how everything works on their site</li>
<li>If you don&#39;t want to teach your mom how to use PGP, buy her one of these(?)
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/document/show/gsoc_program/google/gsoc2015/about_page" rel="nofollow">BSD in the 2015 Google Summer of Code</a></h3>

<ul>
<li>For those who don&#39;t know, GSoC is a way for students to get paid to work on a coding project for an open source organization</li>
<li>Good news: both FreeBSD and OpenBSD were <a href="https://www.google-melange.com/gsoc/org/list/public/google/gsoc2015" rel="nofollow">accepted</a> for the 2015 event</li>
<li>FreeBSD has <a href="https://wiki.freebsd.org/SummerOfCodeIdeas" rel="nofollow">a wiki page</a> of ideas for people to work on</li>
<li>OpenBSD also has <a href="http://www.openbsdfoundation.org/gsoc2015.html" rel="nofollow">an ideas page</a> where you can see some of the initial things that might be interesting</li>
<li>If you&#39;re a student looking to get involved with BSD development, this might be a great opportunity to even get paid to do it</li>
<li>Who knows, you may even <a href="http://www.bsdnow.tv/episodes/2015_01_07-system_disaster" rel="nofollow">end up on the show</a> if you work on a cool project</li>
<li>GSoC will be accepting idea proposals starting March 16th, so you have some time to think about what you&#39;d like to hack on
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1588" rel="nofollow">pfSense 2.3 roadmap</a></h3>

<ul>
<li>The pfSense team has posted a new blog entry, detailing some of their plans for future versions</li>
<li>PPTP will finally be deprecated, PHP will be updated to 5.6 and other packages will also get updated to newer versions</li>
<li>PBIs are scheduled to be replaced with native pkgng packages</li>
<li>Version 3.0, something coming much later, will be a major rewrite that gets rid of PHP entirely</li>
<li>Their ultimate goal is for pfSense to be a package you can install atop of a regular FreeBSD install, rather than a repackaged distribution
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/03/a-look-at-the-upcoming-features-for-10-1-2/" rel="nofollow">PCBSD 10.1.2 security features</a></h3>

<ul>
<li>PCBSD 10.1.2 will include a number of cool security features, some of which are detailed in a new blog post</li>
<li>A new &quot;personacrypt&quot; utility is introduced, which allows for easy encryption and management of external drives for your home directory</li>
<li>Going along with this, it also has a &quot;stealth mode&quot; that allows for one-time temporary home directories (but it doesn&#39;t self-destruct, don&#39;t worry)</li>
<li>The LibreSSL integration also continues, and now packages will be built with it by default</li>
<li>If you&#39;re using the Life Preserver utility for backups, it will encrypt the remote copy of your files in the next update</li>
<li>They&#39;ve also been working on introducing some new options to enable tunneling your traffic through Tor</li>
<li>There will now be a fully-transparent proxy option that utilizes the switch to IPFW we mentioned last week</li>
<li>A small disclaimer: remember that <strong>many</strong> things can expose your true IP when using Tor, so use this option at your own risk if you require full anonymity</li>
<li>Look forward to Kris wearing a <a href="https://www.torproject.org/getinvolved/tshirt.html" rel="nofollow">Tor shirt</a> in future episodes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ofBPRT5n" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s26LsYcoJF" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s28Rho0jvL" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s21AkGbniU" rel="nofollow">Stu writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-February/098183.html" rel="nofollow">H</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-chat/2015-February/007024.html" rel="nofollow">Pay up, mister Free</a></li>
<li><a href="https://www.mail-archive.com/tech%40openbsd.org/msg22663.html" rel="nofollow">Heritage protected</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264466.html" rel="nofollow">Blind leading the blind</a></li>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068682.html" rel="nofollow">What are the chances</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>78: From the Foundation (Part 2)</title>
  <link>https://www.bsdnow.tv/78</link>
  <guid isPermaLink="false">6999608e-fe27-4efa-96b0-eb1e928acf0a</guid>
  <pubDate>Wed, 25 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6999608e-fe27-4efa-96b0-eb1e928acf0a.mp3" length="50146996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:38</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We've also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2015/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2015 schedule&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well&lt;/li&gt;
&lt;li&gt;Just a reminder: it's going to be held on June 12th and 13th at the University of Ottawa in Canada&lt;/li&gt;
&lt;li&gt;This year's conference will have a massive &lt;strong&gt;fifty&lt;/strong&gt; talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)&lt;/li&gt;
&lt;li&gt;Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  "birds of a feather" gatherings&lt;/li&gt;
&lt;li&gt;In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks&lt;/li&gt;
&lt;li&gt;That's not the &lt;a href="https://twitter.com/bsdcan/status/570394627158773760" target="_blank" rel="nofollow noopener"&gt;ideal balance&lt;/a&gt; we'd hope for, but &lt;a href="https://twitter.com/bsdcan/status/570398181864972288" target="_blank" rel="nofollow noopener"&gt;BSDCan says&lt;/a&gt; they'll try to improve that next year&lt;/li&gt;
&lt;li&gt;Those numbers are based on the speaker's background, or any past presentations, for the few whose actual topic wasn't made obvious from the title (so there may be a small margin of error)&lt;/li&gt;
&lt;li&gt;Michael Lucas (who's on the BSDCan board) wrote up &lt;a href="http://blather.michaelwlucas.com/archives/2325" target="_blank" rel="nofollow noopener"&gt;a blog post&lt;/a&gt; about the proposals and rejections this year&lt;/li&gt;
&lt;li&gt;If you can't make it this year, don't worry, we'll be sure to announce the recordings when they're made available&lt;/li&gt;
&lt;li&gt;We also &lt;a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" target="_blank" rel="nofollow noopener"&gt;interviewed Dan Langille&lt;/a&gt; about the conference and what to expect this year, so check that out too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" target="_blank" rel="nofollow noopener"&gt;SSL interception with relayd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was a lot of commotion recently about &lt;a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" target="_blank" rel="nofollow noopener"&gt;superfish&lt;/a&gt;, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements&lt;/li&gt;
&lt;li&gt;If you're running &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" target="_blank" rel="nofollow noopener"&gt;relayd&lt;/a&gt;, you can mimic this &lt;em&gt;evil&lt;/em&gt; setup on your own networks (just for testing of course…)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener"&gt;Reyk Floeter&lt;/a&gt;, the guy who wrote relayd, came up a blog post about how to do &lt;a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" target="_blank" rel="nofollow noopener"&gt;just that&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;It starts off with some backstory and some of the things relayd is capable of&lt;/li&gt;
&lt;li&gt;relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL&lt;/li&gt;
&lt;li&gt;When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario&lt;/li&gt;
&lt;li&gt;The post is very long, with lots of &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=135887624714548&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;details&lt;/a&gt; and some sample config files - the whole nine yards
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=77.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.1.6.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OPNsense team has released yet another version in rapid succession, but this one has some big changes&lt;/li&gt;
&lt;li&gt;It's now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)&lt;/li&gt;
&lt;li&gt;This version also features a new tool for easily upgrading between versions, simply called "opnsense-update" (similar to freebsd-update)&lt;/li&gt;
&lt;li&gt;It also includes &lt;strong&gt;security&lt;/strong&gt; fixes &lt;a href="https://kb.isc.org/article/AA-01235" target="_blank" rel="nofollow noopener"&gt;for BIND&lt;/a&gt; &lt;a href="http://php.net/ChangeLog-5.php#5.6.6" target="_blank" rel="nofollow noopener"&gt;and PHP&lt;/a&gt;, as well as some other assorted bug fixes&lt;/li&gt;
&lt;li&gt;The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)&lt;/li&gt;
&lt;li&gt;With the news of m0n0wall shutting down last week, they've also released bare minimum hardware specifications required to run OPNsense on embedded devices&lt;/li&gt;
&lt;li&gt;Encouraged by last week's mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental &lt;a href="https://forum.opnsense.org/index.php?topic=78.0" target="_blank" rel="nofollow noopener"&gt;images built against LibreSSL&lt;/a&gt; for testing (and have instructions on how to switch over without reinstalling)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD on a Minnowboard Max&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;What would our show be without at least one story about someone installing BSD on a weird device&lt;/li&gt;
&lt;li&gt;For once, it's actually not NetBSD…&lt;/li&gt;
&lt;li&gt;This article is about the &lt;a href="http://www.minnowboard.org/meet-minnowboard-max/" target="_blank" rel="nofollow noopener"&gt;minnowboard max&lt;/a&gt;, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi&lt;/li&gt;
&lt;li&gt;It's using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)&lt;/li&gt;
&lt;li&gt;The author describes his entirely solid-state setup, noting that there's virtually no noise, no concern about hard drives dying and very reasonable power usage&lt;/li&gt;
&lt;li&gt;You'll find instructions on how to get OpenBSD installed and going throughout the rest of the article&lt;/li&gt;
&lt;li&gt;Have a look at the spec sheet if you're interested, they make for cool little BSD boxes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" target="_blank" rel="nofollow noopener"&gt;Netmap for 40gbit NICs in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he's just committed&lt;/li&gt;
&lt;li&gt;The ixl(4) driver, that's one for the X1710 40-gigabit card, now has netmap support&lt;/li&gt;
&lt;li&gt;It's currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too&lt;/li&gt;
&lt;li&gt;This should make for some serious packet-pushing power&lt;/li&gt;
&lt;li&gt;If you have any network hardware like this, he would appreciate testing for the new code
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ken Westerback - &lt;a href="mailto:directors@openbsdfoundation.org" target="_blank" rel="nofollow noopener"&gt;directors@openbsdfoundation.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.openbsdfoundation.org/donations.html" target="_blank" rel="nofollow noopener"&gt;The OpenBSD foundation&lt;/a&gt;'s activities&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150221222235" target="_blank" rel="nofollow noopener"&gt;s2k15 hackathon report: dhclient/dhcpd/fdisk&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to&lt;/li&gt;
&lt;li&gt;Ken was also busy, getting a few networking-related things fixed and improved in the base system&lt;/li&gt;
&lt;li&gt;He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd&lt;/li&gt;
&lt;li&gt;The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it&lt;/li&gt;
&lt;li&gt;There's apparently plans for "dhclientng" - presumably a big improvement (rewrite?) of dhclient
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/bsdtutorial/videos" target="_blank" rel="nofollow noopener"&gt;FreeBSD beginner video series&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD&lt;/li&gt;
&lt;li&gt;We usually assume that people who watch the show are already familiar with basic concepts, but they'd be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand&lt;/li&gt;
&lt;li&gt;So far, he's covered &lt;a href="https://www.youtube.com/watch?v=D26rOHkI-iE" target="_blank" rel="nofollow noopener"&gt;how to get FreeBSD&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=PCyYW19bPDU" target="_blank" rel="nofollow noopener"&gt;an introduction to installing in VirtualBox&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=HCE89kObutA" target="_blank" rel="nofollow noopener"&gt;a simple installation&lt;/a&gt; or a more in-depth &lt;a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" target="_blank" rel="nofollow noopener"&gt;manual installation&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=6YJhdOGjN50" target="_blank" rel="nofollow noopener"&gt;navigating the filesystem&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" target="_blank" rel="nofollow noopener"&gt;basic ssh use&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=ioB73i7QUjI" target="_blank" rel="nofollow noopener"&gt;managing users and groups&lt;/a&gt; and finally some &lt;a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" target="_blank" rel="nofollow noopener"&gt;basic editing&lt;/a&gt; &lt;a href="https://www.youtube.com/watch?v=16FNtCj-uS4" target="_blank" rel="nofollow noopener"&gt;with vi&lt;/a&gt; and a few other topics&lt;/li&gt;
&lt;li&gt;Everyone's gotta start somewhere and, with a little bit of initial direction, today's newbies could be tomorrow's developers&lt;/li&gt;
&lt;li&gt;It should be an ongoing series with more topics to come
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" target="_blank" rel="nofollow noopener"&gt;NetBSD tests: zero unexpected failures&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NetBSD guys have a new blog post up about their &lt;a href="http://wiki.netbsd.org/tutorials/atf/" target="_blank" rel="nofollow noopener"&gt;testing suite&lt;/a&gt; for all the CPU architectures&lt;/li&gt;
&lt;li&gt;They've finally gotten the number of "expected" failures down to zero on a few select architectures&lt;/li&gt;
&lt;li&gt;Results are &lt;a href="http://releng.netbsd.org/test-results.html" target="_blank" rel="nofollow noopener"&gt;published&lt;/a&gt; on a special release engineering page, so you can have a look if you're interested&lt;/li&gt;
&lt;li&gt;The rest of the post links to the "top performers" (ones with less than ten failure) in the -current branch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" target="_blank" rel="nofollow noopener"&gt;PCBSD switches to IPFW&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PCBSD crew continues their recent series of switching between major competing features&lt;/li&gt;
&lt;li&gt;This time, they've switched the default firewall away from PF to FreeBSD's native IPFW firewall&lt;/li&gt;
&lt;li&gt;Look forward to Kris wearing a "keep calm and use IPFW" shir- wait
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21U6Ln6wC" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Kp0xdfIb" target="_blank" rel="nofollow noopener"&gt;Dan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216DcA8DP" target="_blank" rel="nofollow noopener"&gt;Florian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s271iJjqtQ" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21zerHI9P" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142454205416445&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;VCS flamebait&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" target="_blank" rel="nofollow noopener"&gt;Hidden agenda&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openbsd foundation, donations, openssh, funding, hackathon, gsoc, core infrastructure initiative, linux foundation, charity, lenovo, superfish, relayd, opnsense, soekris</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We&#39;ve also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 schedule</a></h3>

<ul>
<li>The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well</li>
<li>Just a reminder: it&#39;s going to be held on June 12th and 13th at the University of Ottawa in Canada</li>
<li>This year&#39;s conference will have a massive <strong>fifty</strong> talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)</li>
<li>Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  &quot;birds of a feather&quot; gatherings</li>
<li>In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks</li>
<li>That&#39;s not the <a href="https://twitter.com/bsdcan/status/570394627158773760" rel="nofollow">ideal balance</a> we&#39;d hope for, but <a href="https://twitter.com/bsdcan/status/570398181864972288" rel="nofollow">BSDCan says</a> they&#39;ll try to improve that next year</li>
<li>Those numbers are based on the speaker&#39;s background, or any past presentations, for the few whose actual topic wasn&#39;t made obvious from the title (so there may be a small margin of error)</li>
<li>Michael Lucas (who&#39;s on the BSDCan board) wrote up <a href="http://blather.michaelwlucas.com/archives/2325" rel="nofollow">a blog post</a> about the proposals and rejections this year</li>
<li>If you can&#39;t make it this year, don&#39;t worry, we&#39;ll be sure to announce the recordings when they&#39;re made available</li>
<li>We also <a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" rel="nofollow">interviewed Dan Langille</a> about the conference and what to expect this year, so check that out too
***</li>
</ul>

<h3><a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" rel="nofollow">SSL interception with relayd</a></h3>

<ul>
<li>There was a lot of commotion recently about <a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" rel="nofollow">superfish</a>, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements</li>
<li>If you&#39;re running <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" rel="nofollow">relayd</a>, you can mimic this <em>evil</em> setup on your own networks (just for testing of course…)</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, the guy who wrote relayd, came up a blog post about how to do <a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" rel="nofollow">just that</a></li>
<li>It starts off with some backstory and some of the things relayd is capable of</li>
<li>relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL</li>
<li>When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario</li>
<li>The post is very long, with lots of <a href="https://www.marc.info/?l=openbsd-tech&m=135887624714548&w=2" rel="nofollow">details</a> and some sample config files - the whole nine yards
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=77.0" rel="nofollow">OPNsense 15.1.6.1 released</a></h3>

<ul>
<li>The OPNsense team has released yet another version in rapid succession, but this one has some big changes</li>
<li>It&#39;s now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)</li>
<li>This version also features a new tool for easily upgrading between versions, simply called &quot;opnsense-update&quot; (similar to freebsd-update)</li>
<li>It also includes <strong>security</strong> fixes <a href="https://kb.isc.org/article/AA-01235" rel="nofollow">for BIND</a> <a href="http://php.net/ChangeLog-5.php#5.6.6" rel="nofollow">and PHP</a>, as well as some other assorted bug fixes</li>
<li>The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)</li>
<li>With the news of m0n0wall shutting down last week, they&#39;ve also released bare minimum hardware specifications required to run OPNsense on embedded devices</li>
<li>Encouraged by last week&#39;s mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental <a href="https://forum.opnsense.org/index.php?topic=78.0" rel="nofollow">images built against LibreSSL</a> for testing (and have instructions on how to switch over without reinstalling)
***</li>
</ul>

<h3><a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" rel="nofollow">OpenBSD on a Minnowboard Max</a></h3>

<ul>
<li>What would our show be without at least one story about someone installing BSD on a weird device</li>
<li>For once, it&#39;s actually not NetBSD…</li>
<li>This article is about the <a href="http://www.minnowboard.org/meet-minnowboard-max/" rel="nofollow">minnowboard max</a>, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi</li>
<li>It&#39;s using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)</li>
<li>The author describes his entirely solid-state setup, noting that there&#39;s virtually no noise, no concern about hard drives dying and very reasonable power usage</li>
<li>You&#39;ll find instructions on how to get OpenBSD installed and going throughout the rest of the article</li>
<li>Have a look at the spec sheet if you&#39;re interested, they make for cool little BSD boxes
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" rel="nofollow">Netmap for 40gbit NICs in FreeBSD</a></h3>

<ul>
<li>Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he&#39;s just committed</li>
<li>The ixl(4) driver, that&#39;s one for the X1710 40-gigabit card, now has netmap support</li>
<li>It&#39;s currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too</li>
<li>This should make for some serious packet-pushing power</li>
<li>If you have any network hardware like this, he would appreciate testing for the new code
***</li>
</ul>

<h2>Interview - Ken Westerback - <a href="mailto:directors@openbsdfoundation.org" rel="nofollow">directors@openbsdfoundation.org</a></h2>

<p><a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">The OpenBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150221222235" rel="nofollow">s2k15 hackathon report: dhclient/dhcpd/fdisk</a></h3>

<ul>
<li>The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to</li>
<li>Ken was also busy, getting a few networking-related things fixed and improved in the base system</li>
<li>He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd</li>
<li>The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it</li>
<li>There&#39;s apparently plans for &quot;dhclientng&quot; - presumably a big improvement (rewrite?) of dhclient
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/bsdtutorial/videos" rel="nofollow">FreeBSD beginner video series</a></h3>

<ul>
<li>A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD</li>
<li>We usually assume that people who watch the show are already familiar with basic concepts, but they&#39;d be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand</li>
<li>So far, he&#39;s covered <a href="https://www.youtube.com/watch?v=D26rOHkI-iE" rel="nofollow">how to get FreeBSD</a>, <a href="https://www.youtube.com/watch?v=PCyYW19bPDU" rel="nofollow">an introduction to installing in VirtualBox</a>, <a href="https://www.youtube.com/watch?v=HCE89kObutA" rel="nofollow">a simple installation</a> or a more in-depth <a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" rel="nofollow">manual installation</a>, <a href="https://www.youtube.com/watch?v=6YJhdOGjN50" rel="nofollow">navigating the filesystem</a>, <a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" rel="nofollow">basic ssh use</a>, <a href="https://www.youtube.com/watch?v=ioB73i7QUjI" rel="nofollow">managing users and groups</a> and finally some <a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" rel="nofollow">basic editing</a> <a href="https://www.youtube.com/watch?v=16FNtCj-uS4" rel="nofollow">with vi</a> and a few other topics</li>
<li>Everyone&#39;s gotta start somewhere and, with a little bit of initial direction, today&#39;s newbies could be tomorrow&#39;s developers</li>
<li>It should be an ongoing series with more topics to come
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" rel="nofollow">NetBSD tests: zero unexpected failures</a></h3>

<ul>
<li>The NetBSD guys have a new blog post up about their <a href="http://wiki.netbsd.org/tutorials/atf/" rel="nofollow">testing suite</a> for all the CPU architectures</li>
<li>They&#39;ve finally gotten the number of &quot;expected&quot; failures down to zero on a few select architectures</li>
<li>Results are <a href="http://releng.netbsd.org/test-results.html" rel="nofollow">published</a> on a special release engineering page, so you can have a look if you&#39;re interested</li>
<li>The rest of the post links to the &quot;top performers&quot; (ones with less than ten failure) in the -current branch
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" rel="nofollow">PCBSD switches to IPFW</a></h3>

<ul>
<li>The PCBSD crew continues their recent series of switching between major competing features</li>
<li>This time, they&#39;ve switched the default firewall away from PF to FreeBSD&#39;s native IPFW firewall</li>
<li>Look forward to Kris wearing a &quot;keep calm and use IPFW&quot; shir- wait
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21U6Ln6wC" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Kp0xdfIb" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s216DcA8DP" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s271iJjqtQ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21zerHI9P" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142454205416445&w=2" rel="nofollow">VCS flamebait</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" rel="nofollow">Hidden agenda</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we continue our two-part series on the activities of various BSD foundations. Ken Westerback joins us today to talk all about the OpenBSD foundation and what it is they do. We&#39;ve also got answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2015/schedule/" rel="nofollow">BSDCan 2015 schedule</a></h3>

<ul>
<li>The list of presentations for the upcoming BSDCan conference has been posted, and the time schedule should be up shortly as well</li>
<li>Just a reminder: it&#39;s going to be held on June 12th and 13th at the University of Ottawa in Canada</li>
<li>This year&#39;s conference will have a massive <strong>fifty</strong> talks, split up between four tracks instead of three (but unfortunately a person can only be in one place at a time)</li>
<li>Both Allan and Kris had at least one presentation accepted, and Allan will also be leading a few  &quot;birds of a feather&quot; gatherings</li>
<li>In total, there will be three NetBSD talks, five OpenBSD talks, eight BSD-neutral talks, thirty-five FreeBSD talks and no DragonFly talks</li>
<li>That&#39;s not the <a href="https://twitter.com/bsdcan/status/570394627158773760" rel="nofollow">ideal balance</a> we&#39;d hope for, but <a href="https://twitter.com/bsdcan/status/570398181864972288" rel="nofollow">BSDCan says</a> they&#39;ll try to improve that next year</li>
<li>Those numbers are based on the speaker&#39;s background, or any past presentations, for the few whose actual topic wasn&#39;t made obvious from the title (so there may be a small margin of error)</li>
<li>Michael Lucas (who&#39;s on the BSDCan board) wrote up <a href="http://blather.michaelwlucas.com/archives/2325" rel="nofollow">a blog post</a> about the proposals and rejections this year</li>
<li>If you can&#39;t make it this year, don&#39;t worry, we&#39;ll be sure to announce the recordings when they&#39;re made available</li>
<li>We also <a href="http://www.bsdnow.tv/episodes/2014_12_31-daemons_in_the_north" rel="nofollow">interviewed Dan Langille</a> about the conference and what to expect this year, so check that out too
***</li>
</ul>

<h3><a href="http://www.reykfloeter.com/post/41814177050/relayd-ssl-interception" rel="nofollow">SSL interception with relayd</a></h3>

<ul>
<li>There was a lot of commotion recently about <a href="http://www.forbes.com/sites/thomasbrewster/2015/02/19/superfish-need-to-know/" rel="nofollow">superfish</a>, a way that Lenovo was intercepting HTTPS traffic and injecting advertisements</li>
<li>If you&#39;re running <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/relayd.8" rel="nofollow">relayd</a>, you can mimic this <em>evil</em> setup on your own networks (just for testing of course…)</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, the guy who wrote relayd, came up a blog post about how to do <a href="https://gist.github.com/reyk/4b42858d1eab3825f9bc#file-relayd-superfish-conf" rel="nofollow">just that</a></li>
<li>It starts off with some backstory and some of the things relayd is capable of</li>
<li>relayd can run as an SSL server to terminate SSL connections and forward them as plain TCP and, conversely, run as an SSL client to terminal plain TCP connections and tunnel them through SSL</li>
<li>When you combine these two, you end up with possibilities to filter between SSL connections, effectively creating a MITM scenario</li>
<li>The post is very long, with lots of <a href="https://www.marc.info/?l=openbsd-tech&m=135887624714548&w=2" rel="nofollow">details</a> and some sample config files - the whole nine yards
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=77.0" rel="nofollow">OPNsense 15.1.6.1 released</a></h3>

<ul>
<li>The OPNsense team has released yet another version in rapid succession, but this one has some big changes</li>
<li>It&#39;s now based on FreeBSD 10.1, with all the latest security patches and driver updates (as well as some in-house patches)</li>
<li>This version also features a new tool for easily upgrading between versions, simply called &quot;opnsense-update&quot; (similar to freebsd-update)</li>
<li>It also includes <strong>security</strong> fixes <a href="https://kb.isc.org/article/AA-01235" rel="nofollow">for BIND</a> <a href="http://php.net/ChangeLog-5.php#5.6.6" rel="nofollow">and PHP</a>, as well as some other assorted bug fixes</li>
<li>The installation images have been laid out in a clean way: standard CD and USB images that default to VGA, as well as USB images that default to a console output (for things like Soekris and PCEngines APU boards that only have serial ports)</li>
<li>With the news of m0n0wall shutting down last week, they&#39;ve also released bare minimum hardware specifications required to run OPNsense on embedded devices</li>
<li>Encouraged by last week&#39;s mention of PCBSD trying to cut ties with OpenSSL, OPNsense is also now providing experimental <a href="https://forum.opnsense.org/index.php?topic=78.0" rel="nofollow">images built against LibreSSL</a> for testing (and have instructions on how to switch over without reinstalling)
***</li>
</ul>

<h3><a href="http://www.countersiege.com/2015/02/22/minnowboard_max_openbsd.html" rel="nofollow">OpenBSD on a Minnowboard Max</a></h3>

<ul>
<li>What would our show be without at least one story about someone installing BSD on a weird device</li>
<li>For once, it&#39;s actually not NetBSD…</li>
<li>This article is about the <a href="http://www.minnowboard.org/meet-minnowboard-max/" rel="nofollow">minnowboard max</a>, a very small X86-based motherboard that looks vaguely similar to a Raspberry Pi</li>
<li>It&#39;s using an Atom CPU instead of ARM, so overall application compatibility should be a bit better (and it even has AES-NI, so crypto performance will be much better than a normal Atom)</li>
<li>The author describes his entirely solid-state setup, noting that there&#39;s virtually no noise, no concern about hard drives dying and very reasonable power usage</li>
<li>You&#39;ll find instructions on how to get OpenBSD installed and going throughout the rest of the article</li>
<li>Have a look at the spec sheet if you&#39;re interested, they make for cool little BSD boxes
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054717.html" rel="nofollow">Netmap for 40gbit NICs in FreeBSD</a></h3>

<ul>
<li>Luigi Rizzo posted an announcement to the -current mailing list, detailing some of the work he&#39;s just committed</li>
<li>The ixl(4) driver, that&#39;s one for the X1710 40-gigabit card, now has netmap support</li>
<li>It&#39;s currently in 11-CURRENT, but he says it works in 10-STABLE and will be committed there too</li>
<li>This should make for some serious packet-pushing power</li>
<li>If you have any network hardware like this, he would appreciate testing for the new code
***</li>
</ul>

<h2>Interview - Ken Westerback - <a href="mailto:directors@openbsdfoundation.org" rel="nofollow">directors@openbsdfoundation.org</a></h2>

<p><a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">The OpenBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150221222235" rel="nofollow">s2k15 hackathon report: dhclient/dhcpd/fdisk</a></h3>

<ul>
<li>The second trip report from the recent OpenBSD hackathon has been published, from the very same guy we just talked to</li>
<li>Ken was also busy, getting a few networking-related things fixed and improved in the base system</li>
<li>He wrote a few new small additions for dhclient and beefed up the privsep security, as well as some fixes for tcpdump and dhcpd</li>
<li>The fdisk tool also got worked on a bit, enabling OpenBSD to properly wipe GPT tables on a previously-formatted disk so you can do a normal install on it</li>
<li>There&#39;s apparently plans for &quot;dhclientng&quot; - presumably a big improvement (rewrite?) of dhclient
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/bsdtutorial/videos" rel="nofollow">FreeBSD beginner video series</a></h3>

<ul>
<li>A new series of videos has started on YouTube, aimed at helping total beginners learn about FreeBSD</li>
<li>We usually assume that people who watch the show are already familiar with basic concepts, but they&#39;d be a great introduction to any of your friends that are looking to get started with BSD and need a helping hand</li>
<li>So far, he&#39;s covered <a href="https://www.youtube.com/watch?v=D26rOHkI-iE" rel="nofollow">how to get FreeBSD</a>, <a href="https://www.youtube.com/watch?v=PCyYW19bPDU" rel="nofollow">an introduction to installing in VirtualBox</a>, <a href="https://www.youtube.com/watch?v=HCE89kObutA" rel="nofollow">a simple installation</a> or a more in-depth <a href="https://www.youtube.com/watch?v=OwqCjz9Fgao" rel="nofollow">manual installation</a>, <a href="https://www.youtube.com/watch?v=6YJhdOGjN50" rel="nofollow">navigating the filesystem</a>, <a href="https://www.youtube.com/watch?v=Yl5Bg2qz21I" rel="nofollow">basic ssh use</a>, <a href="https://www.youtube.com/watch?v=ioB73i7QUjI" rel="nofollow">managing users and groups</a> and finally some <a href="https://www.youtube.com/watch?v=VxxbO-gt9FA" rel="nofollow">basic editing</a> <a href="https://www.youtube.com/watch?v=16FNtCj-uS4" rel="nofollow">with vi</a> and a few other topics</li>
<li>Everyone&#39;s gotta start somewhere and, with a little bit of initial direction, today&#39;s newbies could be tomorrow&#39;s developers</li>
<li>It should be an ongoing series with more topics to come
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/regular_test_runs_down_to" rel="nofollow">NetBSD tests: zero unexpected failures</a></h3>

<ul>
<li>The NetBSD guys have a new blog post up about their <a href="http://wiki.netbsd.org/tutorials/atf/" rel="nofollow">testing suite</a> for all the CPU architectures</li>
<li>They&#39;ve finally gotten the number of &quot;expected&quot; failures down to zero on a few select architectures</li>
<li>Results are <a href="http://releng.netbsd.org/test-results.html" rel="nofollow">published</a> on a special release engineering page, so you can have a look if you&#39;re interested</li>
<li>The rest of the post links to the &quot;top performers&quot; (ones with less than ten failure) in the -current branch
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/b80f78d8a5d002396c28ac0e5fd6f69699beaace" rel="nofollow">PCBSD switches to IPFW</a></h3>

<ul>
<li>The PCBSD crew continues their recent series of switching between major competing features</li>
<li>This time, they&#39;ve switched the default firewall away from PF to FreeBSD&#39;s native IPFW firewall</li>
<li>Look forward to Kris wearing a &quot;keep calm and use IPFW&quot; shir- wait
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21U6Ln6wC" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Kp0xdfIb" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s216DcA8DP" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s271iJjqtQ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s21zerHI9P" rel="nofollow">Chris writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142454205416445&w=2" rel="nofollow">VCS flamebait</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-gnome/2015-February/031561.html" rel="nofollow">Hidden agenda</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>77: Noah's L2ARC</title>
  <link>https://www.bsdnow.tv/77</link>
  <guid isPermaLink="false">7f831a01-7c9e-48e5-8400-717e0198fc07</guid>
  <pubDate>Wed, 18 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/7f831a01-7c9e-48e5-8400-717e0198fc07.mp3" length="62093524" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be chatting with Alex Reece and Matt Ahrens about what's new in the world of OpenZFS. After that, we're starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:14</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be chatting with Alex Reece and Matt Ahrens about what's new in the world of OpenZFS. After that, we're starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://changelog.complete.org/archives/9317-has-linux-lost-its-way-comments-prompt-a-debian-developer-to-revisit-freebsd-after-20-years" target="_blank" rel="nofollow noopener"&gt;Revisiting FreeBSD after 20 years&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With comments like "has Linux lost its way?" floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades&lt;/li&gt;
&lt;li&gt;This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly - not just praise this time&lt;/li&gt;
&lt;li&gt;He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL&lt;/li&gt;
&lt;li&gt;On the topic of jails, he summarizes: "Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time."&lt;/li&gt;
&lt;li&gt;The post also goes through the "just plain different" aspects of a complete OS vs. a distribution of various things pieced together&lt;/li&gt;
&lt;li&gt;Finally, he includes some things he wasn't so happy about: subpar laptop support, virtualization being a bit behind, a &lt;em&gt;myriad&lt;/em&gt; of complaints about pkgng and a few other things&lt;/li&gt;
&lt;li&gt;There was some &lt;a href="https://news.ycombinator.com/item?id=9063216" target="_blank" rel="nofollow noopener"&gt;decent discussion&lt;/a&gt; on Hacker News about this article too, with counterpoints from both sides
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20150218085759" target="_blank" rel="nofollow noopener"&gt;s2k15 hackathon report: network stack SMP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted&lt;/li&gt;
&lt;li&gt;One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack&lt;/li&gt;
&lt;li&gt;If you're not familiar with him, he gave a &lt;a href="http://www.openbsd.org/papers/tamingdragons.pdf" target="_blank" rel="nofollow noopener"&gt;presentation&lt;/a&gt; at EuroBSDCon last year, titled &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" target="_blank" rel="nofollow noopener"&gt;Taming OpenBSD Network Stack Dragons&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the &lt;a href="https://en.wikipedia.org/wiki/Giant_lock" target="_blank" rel="nofollow noopener"&gt;big lock&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Hopefully more trip reports will be sent in during the coming weeks&lt;/li&gt;
&lt;li&gt;Most of the big code changes should probably appear after the 5.7-release testing period
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.tumfatig.net/20150215/bind-nsd-unbound-openbsd-5-6/" target="_blank" rel="nofollow noopener"&gt;From BIND to NSD and Unbound&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've been running a DNS server on any of the BSDs, you've probably noticed a semi-recent trend: BIND being replaced with Unbound&lt;/li&gt;
&lt;li&gt;BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative&lt;/li&gt;
&lt;li&gt;OpenBSD goes a step further, also including NSD in the base system, whereas you'll need to install that from ports on FreeBSD&lt;/li&gt;
&lt;li&gt;Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons &lt;/li&gt;
&lt;li&gt;This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound&lt;/li&gt;
&lt;li&gt;All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://m0n0.ch/wall/end_announcement.php" target="_blank" rel="nofollow noopener"&gt;m0n0wall calls it quits&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The original, classic BSD firewall distribution &lt;a href="https://en.wikipedia.org/wiki/M0n0wall" target="_blank" rel="nofollow noopener"&gt;m0n0wall&lt;/a&gt; has finally decided to close up shop&lt;/li&gt;
&lt;li&gt;For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or &lt;strong&gt;even a floppy disk&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;It started over twelve years ago, which is pretty amazing when you consider that's around half of FreeBSD itself's lifespan&lt;/li&gt;
&lt;li&gt;The project was probably a lot of people's first encounter with BSD in any form&lt;/li&gt;
&lt;li&gt;If you were a m0n0wall user, fear not, you've got &lt;em&gt;plenty&lt;/em&gt; of choices for a potential replacement: doing it yourself with something like &lt;a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt; or &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;OpenBSD&lt;/a&gt;, or going the premade route with something like &lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;pfSense&lt;/a&gt;, &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;OPNsense&lt;/a&gt; or the &lt;a href="http://www.bsdnow.tv/episodes/2014_10_22-dont_buy_a_router" target="_blank" rel="nofollow noopener"&gt;BSD Router Project&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The founder's announcement includes these closing words: "m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can."&lt;/li&gt;
&lt;li&gt;While m0n0wall didn't get a lot of on-air mention, surely a lot of our listeners will remember it fondly
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Alex Reece &amp;amp; Matt Ahrens - &lt;a href="mailto:alex@delphix.com" target="_blank" rel="nofollow noopener"&gt;alex@delphix.com&lt;/a&gt; &amp;amp; &lt;a href="mailto:matt@delphix.com" target="_blank" rel="nofollow noopener"&gt;matt@delphix.com&lt;/a&gt; / &lt;a href="https://twitter.com/openzfs" target="_blank" rel="nofollow noopener"&gt;@openzfs&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;What's new in OpenZFS&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/patching-obsd" target="_blank" rel="nofollow noopener"&gt;Making your first patch (OpenBSD)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.echothrust.com/blogs/using-openbsd-and-vxlan-overlay-remote-lans" target="_blank" rel="nofollow noopener"&gt;Overlaying remote LANs with OpenBSD's VXLAN&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Have you ever wanted to "merge" multiple remote LANs? OpenBSD's &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/vxlan.4" target="_blank" rel="nofollow noopener"&gt;vxlan(4)&lt;/a&gt; is exactly what you need&lt;/li&gt;
&lt;li&gt;This article talks about using it to connect two virtualized infrastructures on different ESXi servers&lt;/li&gt;
&lt;li&gt;It gives a bit of networking background first, in case you're not quite up to speed on all this stuff&lt;/li&gt;
&lt;li&gt;This tool opens up a lot of very cool possibilities, even possibly doing a "remote" LAN party&lt;/li&gt;
&lt;li&gt;Be sure to check the &lt;a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon talk&lt;/a&gt; about VXLANs if you haven't already
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lukewolf.blogspot.com/2015/02/a-prediction-2020-year-of-pc-bsd-on.html" target="_blank" rel="nofollow noopener"&gt;2020, year of the PCBSD desktop&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post about BSD on the desktop, straight from a KDE developer&lt;/li&gt;
&lt;li&gt;He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux's desktop market share (small as it may be)&lt;/li&gt;
&lt;li&gt;With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option&lt;/li&gt;
&lt;li&gt;ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one&lt;/li&gt;
&lt;li&gt;There was also some &lt;a href="http://bsd.slashdot.org/story/15/02/16/2355236/pc-bsd-set-for-serious-growth" target="_blank" rel="nofollow noopener"&gt;discussion on Slashdot&lt;/a&gt; that might be worth reading
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2015/02/hostkey-rotation-redux.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH host key rotation, redux&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned the new OpenSSH host key rotation and other goodies in &lt;a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" target="_blank" rel="nofollow noopener"&gt;a previous episode&lt;/a&gt;, but things have changed a little bit since then&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;djm&lt;/a&gt; says "almost immediately after smugly declaring 'mission accomplished', the bug reports started rolling in."&lt;/li&gt;
&lt;li&gt;There were some initial complaints from developers about the new options, and a serious bug shortly thereafter&lt;/li&gt;
&lt;li&gt;After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests&lt;/li&gt;
&lt;li&gt;Most importantly, the bigger big fix was described as: "a malicious server (say, "host-a") could advertise the public key of another server (say, "host-b"). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide."&lt;/li&gt;
&lt;li&gt;None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/pcbsd/pcbsd/commit/6ede13117dcee1272d7a7060b16818506874286e" target="_blank" rel="nofollow noopener"&gt;PCBSD tries out LibreSSL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PCBSD users may soon be seeing a lot less security problems because of two recent changes&lt;/li&gt;
&lt;li&gt;After switching over to OpenNTPD &lt;a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" target="_blank" rel="nofollow noopener"&gt;last week&lt;/a&gt;, PCBSD decides to give the &lt;a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" target="_blank" rel="nofollow noopener"&gt;portable LibreSSL&lt;/a&gt; a try too&lt;/li&gt;
&lt;li&gt;Note that this is only for the packages built from ports, not the base system unfortunately&lt;/li&gt;
&lt;li&gt;They're not the first ones to do this - OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD's ports are built against it&lt;/li&gt;
&lt;li&gt;A good &lt;a href="https://github.com/pcbsd/freebsd-ports/commit/2eee669f4d6ab9a641162ecda29b62ab921438eb" target="_blank" rel="nofollow noopener"&gt;number of patches&lt;/a&gt; are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla&lt;/li&gt;
&lt;li&gt;Look forward to Kris wearing a "&lt;a href="https://www.openbsdstore.com/cgi-bin/live/ecommerce.pl?site=shop_openbsdeurope_com&amp;amp;state=item&amp;amp;dept_id=01&amp;amp;sub_dept_id=01&amp;amp;product_id=TSHIRTOSSL" target="_blank" rel="nofollow noopener"&gt;keep calm and abandon OpenSSL&lt;/a&gt;" shirt in the near future
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s28nyJ5omV" target="_blank" rel="nofollow noopener"&gt;Benjamin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2wYUmUmh0" target="_blank" rel="nofollow noopener"&gt;Mike writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2BAKAQvMt" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068405.html" target="_blank" rel="nofollow noopener"&gt;Debian&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054580.html" target="_blank" rel="nofollow noopener"&gt;Dejavu&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-February/207475.html" target="_blank" rel="nofollow noopener"&gt;Package gone missing&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, raid, openzfs, illumos, solaris, openindiana, opensolaris, omnios, smartos, m0n0wall, opnsense, rng, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Alex Reece and Matt Ahrens about what&#39;s new in the world of OpenZFS. After that, we&#39;re starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://changelog.complete.org/archives/9317-has-linux-lost-its-way-comments-prompt-a-debian-developer-to-revisit-freebsd-after-20-years" rel="nofollow">Revisiting FreeBSD after 20 years</a></h3>

<ul>
<li>With comments like &quot;has Linux lost its way?&quot; floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades</li>
<li>This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly - not just praise this time</li>
<li>He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL</li>
<li>On the topic of jails, he summarizes: &quot;Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time.&quot;</li>
<li>The post also goes through the &quot;just plain different&quot; aspects of a complete OS vs. a distribution of various things pieced together</li>
<li>Finally, he includes some things he wasn&#39;t so happy about: subpar laptop support, virtualization being a bit behind, a <em>myriad</em> of complaints about pkgng and a few other things</li>
<li>There was some <a href="https://news.ycombinator.com/item?id=9063216" rel="nofollow">decent discussion</a> on Hacker News about this article too, with counterpoints from both sides
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150218085759" rel="nofollow">s2k15 hackathon report: network stack SMP</a></h3>

<ul>
<li>The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted</li>
<li>One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack</li>
<li>If you&#39;re not familiar with him, he gave a <a href="http://www.openbsd.org/papers/tamingdragons.pdf" rel="nofollow">presentation</a> at EuroBSDCon last year, titled <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a></li>
<li>Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the <a href="https://en.wikipedia.org/wiki/Giant_lock" rel="nofollow">big lock</a></li>
<li>Hopefully more trip reports will be sent in during the coming weeks</li>
<li>Most of the big code changes should probably appear after the 5.7-release testing period
***</li>
</ul>

<h3><a href="https://www.tumfatig.net/20150215/bind-nsd-unbound-openbsd-5-6/" rel="nofollow">From BIND to NSD and Unbound</a></h3>

<ul>
<li>If you&#39;ve been running a DNS server on any of the BSDs, you&#39;ve probably noticed a semi-recent trend: BIND being replaced with Unbound</li>
<li>BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative</li>
<li>OpenBSD goes a step further, also including NSD in the base system, whereas you&#39;ll need to install that from ports on FreeBSD</li>
<li>Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons </li>
<li>This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound</li>
<li>All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it...
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/end_announcement.php" rel="nofollow">m0n0wall calls it quits</a></h3>

<ul>
<li>The original, classic BSD firewall distribution <a href="https://en.wikipedia.org/wiki/M0n0wall" rel="nofollow">m0n0wall</a> has finally decided to close up shop</li>
<li>For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or <strong>even a floppy disk</strong></li>
<li>It started over twelve years ago, which is pretty amazing when you consider that&#39;s around half of FreeBSD itself&#39;s lifespan</li>
<li>The project was probably a lot of people&#39;s first encounter with BSD in any form</li>
<li>If you were a m0n0wall user, fear not, you&#39;ve got <em>plenty</em> of choices for a potential replacement: doing it yourself with something like <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a>, or going the premade route with something like <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a>, <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> or the <a href="http://www.bsdnow.tv/episodes/2014_10_22-dont_buy_a_router" rel="nofollow">BSD Router Project</a></li>
<li>The founder&#39;s announcement includes these closing words: &quot;m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can.&quot;</li>
<li>While m0n0wall didn&#39;t get a lot of on-air mention, surely a lot of our listeners will remember it fondly
***</li>
</ul>

<h2>Interview - Alex Reece &amp; Matt Ahrens - <a href="mailto:alex@delphix.com" rel="nofollow">alex@delphix.com</a> &amp; <a href="mailto:matt@delphix.com" rel="nofollow">matt@delphix.com</a> / <a href="https://twitter.com/openzfs" rel="nofollow">@openzfs</a></h2>

<p>What&#39;s new in OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/patching-obsd" rel="nofollow">Making your first patch (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbsd-and-vxlan-overlay-remote-lans" rel="nofollow">Overlaying remote LANs with OpenBSD&#39;s VXLAN</a></h3>

<ul>
<li>Have you ever wanted to &quot;merge&quot; multiple remote LANs? OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/vxlan.4" rel="nofollow">vxlan(4)</a> is exactly what you need</li>
<li>This article talks about using it to connect two virtualized infrastructures on different ESXi servers</li>
<li>It gives a bit of networking background first, in case you&#39;re not quite up to speed on all this stuff</li>
<li>This tool opens up a lot of very cool possibilities, even possibly doing a &quot;remote&quot; LAN party</li>
<li>Be sure to check the <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">AsiaBSDCon talk</a> about VXLANs if you haven&#39;t already
***</li>
</ul>

<h3><a href="http://lukewolf.blogspot.com/2015/02/a-prediction-2020-year-of-pc-bsd-on.html" rel="nofollow">2020, year of the PCBSD desktop</a></h3>

<ul>
<li>Here we have a blog post about BSD on the desktop, straight from a KDE developer</li>
<li>He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux&#39;s desktop market share (small as it may be)</li>
<li>With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option</li>
<li>ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one</li>
<li>There was also some <a href="http://bsd.slashdot.org/story/15/02/16/2355236/pc-bsd-set-for-serious-growth" rel="nofollow">discussion on Slashdot</a> that might be worth reading
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2015/02/hostkey-rotation-redux.html" rel="nofollow">OpenSSH host key rotation, redux</a></h3>

<ul>
<li>We mentioned the new OpenSSH host key rotation and other goodies in <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">a previous episode</a>, but things have changed a little bit since then</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">djm</a> says &quot;almost immediately after smugly declaring &#39;mission accomplished&#39;, the bug reports started rolling in.&quot;</li>
<li>There were some initial complaints from developers about the new options, and a serious bug shortly thereafter</li>
<li>After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests</li>
<li>Most importantly, the bigger big fix was described as: &quot;a malicious server (say, &quot;host-a&quot;) could advertise the public key of another server (say, &quot;host-b&quot;). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide.&quot;</li>
<li>None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/6ede13117dcee1272d7a7060b16818506874286e" rel="nofollow">PCBSD tries out LibreSSL</a></h3>

<ul>
<li>PCBSD users may soon be seeing a lot less security problems because of two recent changes</li>
<li>After switching over to OpenNTPD <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">last week</a>, PCBSD decides to give the <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">portable LibreSSL</a> a try too</li>
<li>Note that this is only for the packages built from ports, not the base system unfortunately</li>
<li>They&#39;re not the first ones to do this - OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD&#39;s ports are built against it</li>
<li>A good <a href="https://github.com/pcbsd/freebsd-ports/commit/2eee669f4d6ab9a641162ecda29b62ab921438eb" rel="nofollow">number of patches</a> are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla</li>
<li>Look forward to Kris wearing a &quot;<a href="https://www.openbsdstore.com/cgi-bin/live/ecommerce.pl?site=shop_openbsdeurope_com&state=item&dept_id=01&sub_dept_id=01&product_id=TSHIRTOSSL" rel="nofollow">keep calm and abandon OpenSSL</a>&quot; shirt in the near future
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28nyJ5omV" rel="nofollow">Benjamin writes in</a></li>
<li><a href="http://slexy.org/view/s2wYUmUmh0" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s2BAKAQvMt" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068405.html" rel="nofollow">Debian</a> <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054580.html" rel="nofollow">Dejavu</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2015-February/207475.html" rel="nofollow">Package gone missing</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be chatting with Alex Reece and Matt Ahrens about what&#39;s new in the world of OpenZFS. After that, we&#39;re starting a new tutorial series on submitting your first patch. All the latest BSD news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://changelog.complete.org/archives/9317-has-linux-lost-its-way-comments-prompt-a-debian-developer-to-revisit-freebsd-after-20-years" rel="nofollow">Revisiting FreeBSD after 20 years</a></h3>

<ul>
<li>With comments like &quot;has Linux lost its way?&quot; floating around, a Debian developer was prompted to revisit FreeBSD after nearly two decades</li>
<li>This blog post goes through his experiences trying out a modern BSD variant, and includes the good, the bad and the ugly - not just praise this time</li>
<li>He loves ZFS and the beadm tool, and finds the FreeBSD implementation to be much more stable than ZoL</li>
<li>On the topic of jails, he summarizes: &quot;Linux has tried so hard to get this right, and fallen on its face so many times, a person just wants to take pity sometimes. We’ve had linux-vserver, openvz, lxc, and still none of them match what FreeBSD jails have done for a long time.&quot;</li>
<li>The post also goes through the &quot;just plain different&quot; aspects of a complete OS vs. a distribution of various things pieced together</li>
<li>Finally, he includes some things he wasn&#39;t so happy about: subpar laptop support, virtualization being a bit behind, a <em>myriad</em> of complaints about pkgng and a few other things</li>
<li>There was some <a href="https://news.ycombinator.com/item?id=9063216" rel="nofollow">decent discussion</a> on Hacker News about this article too, with counterpoints from both sides
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20150218085759" rel="nofollow">s2k15 hackathon report: network stack SMP</a></h3>

<ul>
<li>The first trip report from the recent OpenBSD hackathon in Australia has finally been submitted</li>
<li>One of the themes of this hackathon was SMP (symmetric multiprocessing) improvement, and Martin Pieuchot did some hacking on the network stack</li>
<li>If you&#39;re not familiar with him, he gave a <a href="http://www.openbsd.org/papers/tamingdragons.pdf" rel="nofollow">presentation</a> at EuroBSDCon last year, titled <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a></li>
<li>Teaming up with David Gwynne, they worked on getting some bits of the networking code out of the <a href="https://en.wikipedia.org/wiki/Giant_lock" rel="nofollow">big lock</a></li>
<li>Hopefully more trip reports will be sent in during the coming weeks</li>
<li>Most of the big code changes should probably appear after the 5.7-release testing period
***</li>
</ul>

<h3><a href="https://www.tumfatig.net/20150215/bind-nsd-unbound-openbsd-5-6/" rel="nofollow">From BIND to NSD and Unbound</a></h3>

<ul>
<li>If you&#39;ve been running a DNS server on any of the BSDs, you&#39;ve probably noticed a semi-recent trend: BIND being replaced with Unbound</li>
<li>BIND was ripped out in FreeBSD 10.0 and will be gone in OpenBSD 5.7, but both systems include Unbound now as an alternative</li>
<li>OpenBSD goes a step further, also including NSD in the base system, whereas you&#39;ll need to install that from ports on FreeBSD</li>
<li>Instead of one daemon doing everything like BIND tried to do, this new setup splits the authoritative nameserver and the caching resolver into two separate daemons </li>
<li>This post takes you through the transitional phase of going from a single BIND setup to a combination of NSD and Unbound</li>
<li>All in all, everyone wins here, as there will be a lot less security advisories in both BSDs because of it...
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/end_announcement.php" rel="nofollow">m0n0wall calls it quits</a></h3>

<ul>
<li>The original, classic BSD firewall distribution <a href="https://en.wikipedia.org/wiki/M0n0wall" rel="nofollow">m0n0wall</a> has finally decided to close up shop</li>
<li>For those unfamiliar, m0n0wall was a FreeBSD-based firewall project that put a lot of focus on embedded devices: running from a CF card, CD, USB drive or <strong>even a floppy disk</strong></li>
<li>It started over twelve years ago, which is pretty amazing when you consider that&#39;s around half of FreeBSD itself&#39;s lifespan</li>
<li>The project was probably a lot of people&#39;s first encounter with BSD in any form</li>
<li>If you were a m0n0wall user, fear not, you&#39;ve got <em>plenty</em> of choices for a potential replacement: doing it yourself with something like <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a>, or going the premade route with something like <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a>, <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> or the <a href="http://www.bsdnow.tv/episodes/2014_10_22-dont_buy_a_router" rel="nofollow">BSD Router Project</a></li>
<li>The founder&#39;s announcement includes these closing words: &quot;m0n0wall has served as the seed for several other well known open source projects, like pfSense, FreeNAS and AskoziaPBX. The newest offspring, OPNsense, aims to continue the open source spirit of m0n0wall while updating the technology to be ready for the future. In my view, it is the perfect way to bring the m0n0wall idea into 2015, and I encourage all current m0n0wall users to check out OPNsense and contribute if they can.&quot;</li>
<li>While m0n0wall didn&#39;t get a lot of on-air mention, surely a lot of our listeners will remember it fondly
***</li>
</ul>

<h2>Interview - Alex Reece &amp; Matt Ahrens - <a href="mailto:alex@delphix.com" rel="nofollow">alex@delphix.com</a> &amp; <a href="mailto:matt@delphix.com" rel="nofollow">matt@delphix.com</a> / <a href="https://twitter.com/openzfs" rel="nofollow">@openzfs</a></h2>

<p>What&#39;s new in OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/patching-obsd" rel="nofollow">Making your first patch (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.echothrust.com/blogs/using-openbsd-and-vxlan-overlay-remote-lans" rel="nofollow">Overlaying remote LANs with OpenBSD&#39;s VXLAN</a></h3>

<ul>
<li>Have you ever wanted to &quot;merge&quot; multiple remote LANs? OpenBSD&#39;s <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/vxlan.4" rel="nofollow">vxlan(4)</a> is exactly what you need</li>
<li>This article talks about using it to connect two virtualized infrastructures on different ESXi servers</li>
<li>It gives a bit of networking background first, in case you&#39;re not quite up to speed on all this stuff</li>
<li>This tool opens up a lot of very cool possibilities, even possibly doing a &quot;remote&quot; LAN party</li>
<li>Be sure to check the <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">AsiaBSDCon talk</a> about VXLANs if you haven&#39;t already
***</li>
</ul>

<h3><a href="http://lukewolf.blogspot.com/2015/02/a-prediction-2020-year-of-pc-bsd-on.html" rel="nofollow">2020, year of the PCBSD desktop</a></h3>

<ul>
<li>Here we have a blog post about BSD on the desktop, straight from a KDE developer</li>
<li>He predicts that PCBSD is going to take off before the year 2020, possibly even overtaking Linux&#39;s desktop market share (small as it may be)</li>
<li>With PCBSD making a preconfigured FreeBSD desktop a reality, and the new KMS work, the author is impressed with how far BSD has come as a viable desktop option</li>
<li>ZFS and easy-to-use boot environments top the list of things he says differentiate the BSD desktop experience from the Linux one</li>
<li>There was also some <a href="http://bsd.slashdot.org/story/15/02/16/2355236/pc-bsd-set-for-serious-growth" rel="nofollow">discussion on Slashdot</a> that might be worth reading
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2015/02/hostkey-rotation-redux.html" rel="nofollow">OpenSSH host key rotation, redux</a></h3>

<ul>
<li>We mentioned the new OpenSSH host key rotation and other goodies in <a href="http://www.bsdnow.tv/episodes/2015_02_04-from_the_foundation_1" rel="nofollow">a previous episode</a>, but things have changed a little bit since then</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">djm</a> says &quot;almost immediately after smugly declaring &#39;mission accomplished&#39;, the bug reports started rolling in.&quot;</li>
<li>There were some initial complaints from developers about the new options, and a serious bug shortly thereafter</li>
<li>After going back to the drawing board, he refactored some of the new code (and API) and added some more regression tests</li>
<li>Most importantly, the bigger big fix was described as: &quot;a malicious server (say, &quot;host-a&quot;) could advertise the public key of another server (say, &quot;host-b&quot;). Then, when the client subsequently connects back to host-a, instead of answering the connection as usual itself, host-a could proxy the connection to host-b. This would cause the user to connect to host-b when they think they are connecting to host-a, which is a violation of the authentication the host key is supposed to provide.&quot;</li>
<li>None of this code has been in a formal OpenSSH release just yet, but hopefully it will soon
***</li>
</ul>

<h3><a href="https://github.com/pcbsd/pcbsd/commit/6ede13117dcee1272d7a7060b16818506874286e" rel="nofollow">PCBSD tries out LibreSSL</a></h3>

<ul>
<li>PCBSD users may soon be seeing a lot less security problems because of two recent changes</li>
<li>After switching over to OpenNTPD <a href="http://www.bsdnow.tv/episodes/2015_02_11-time_for_a_change" rel="nofollow">last week</a>, PCBSD decides to give the <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">portable LibreSSL</a> a try too</li>
<li>Note that this is only for the packages built from ports, not the base system unfortunately</li>
<li>They&#39;re not the first ones to do this - OPNsense has been experimenting with replacing OpenSSL in their ports tree for a little while now, and of course all of OpenBSD&#39;s ports are built against it</li>
<li>A good <a href="https://github.com/pcbsd/freebsd-ports/commit/2eee669f4d6ab9a641162ecda29b62ab921438eb" rel="nofollow">number of patches</a> are still not committed in vanilla FreeBSD ports, so they had to borrow some from Bugzilla</li>
<li>Look forward to Kris wearing a &quot;<a href="https://www.openbsdstore.com/cgi-bin/live/ecommerce.pl?site=shop_openbsdeurope_com&state=item&dept_id=01&sub_dept_id=01&product_id=TSHIRTOSSL" rel="nofollow">keep calm and abandon OpenSSL</a>&quot; shirt in the near future
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28nyJ5omV" rel="nofollow">Benjamin writes in</a></li>
<li><a href="http://slexy.org/view/s2wYUmUmh0" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s2BAKAQvMt" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/068405.html" rel="nofollow">Debian</a> <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054580.html" rel="nofollow">Dejavu</a></li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2015-February/207475.html" rel="nofollow">Package gone missing</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>76: Time for a Change</title>
  <link>https://www.bsdnow.tv/76</link>
  <guid isPermaLink="false">b872a625-f3d6-477b-b162-fd4248aef998</guid>
  <pubDate>Wed, 11 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b872a625-f3d6-477b-b162-fd4248aef998.mp3" length="64285204" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:29:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, we'll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we'll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" target="_blank" rel="nofollow noopener"&gt;Strange timer bug in FreeBSD 11&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" target="_blank" rel="nofollow noopener"&gt;Peter Wemm&lt;/a&gt; wrote in to the FreeBSD -CURRENT mailing list with an interesting observation&lt;/li&gt;
&lt;li&gt;Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime&lt;/li&gt;
&lt;li&gt;This meant things like cron and sleep would break, TCP/IP wouldn't time out or resend packets, a lot of things would break&lt;/li&gt;
&lt;li&gt;A workaround until it was fixed was to reboot every 24 days, but this is BSD we're talking about - uptime is our game&lt;/li&gt;
&lt;li&gt;An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap&lt;/li&gt;
&lt;li&gt;Peter disagreed and &lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" target="_blank" rel="nofollow noopener"&gt;gave some background&lt;/a&gt;, offering a different patch to &lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" target="_blank" rel="nofollow noopener"&gt;fix&lt;/a&gt; the issue and &lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" target="_blank" rel="nofollow noopener"&gt;detect it early&lt;/a&gt; if it happens again&lt;/li&gt;
&lt;li&gt;Ultimately, the problem was traced back to an issue with a recent clang import&lt;/li&gt;
&lt;li&gt;It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://technoquarter.blogspot.com/p/series.html" target="_blank" rel="nofollow noopener"&gt;An OpenBSD mail server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There's been a recent influx of blog posts about building a BSD mail server for some reason&lt;/li&gt;
&lt;li&gt;In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux&lt;/li&gt;
&lt;li&gt;In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin&lt;/li&gt;
&lt;li&gt;It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd&lt;/li&gt;
&lt;li&gt;That means this is more of a "complete solution" - right down to what the end users see&lt;/li&gt;
&lt;li&gt;The series is split up into categories so it's very easy to follow along step-by-step
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" target="_blank" rel="nofollow noopener"&gt;How DragonFlyBSD uses git&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code&lt;/li&gt;
&lt;li&gt;In a &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" target="_blank" rel="nofollow noopener"&gt;series&lt;/a&gt; of &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" target="_blank" rel="nofollow noopener"&gt;posts&lt;/a&gt;, Matthew Dillon (the project lead) details their internal setup&lt;/li&gt;
&lt;li&gt;They're using vanilla git over ssh, with the developers' accounts set to git-only (no shell access)&lt;/li&gt;
&lt;li&gt;The maintainers of the server are the only ones with shell access available&lt;/li&gt;
&lt;li&gt;He also details how a cron job syncs from the master to a public box that anyone can check out code from&lt;/li&gt;
&lt;li&gt;It would be interesting to hear about how other BSD projects manage their master source repository
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" target="_blank" rel="nofollow noopener"&gt;Why not try PCBSD?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;ITwire, another more mainstream tech site, published a recent article about switching to PCBSD&lt;/li&gt;
&lt;li&gt;They interview a guy named Kris that we've never heard of before&lt;/li&gt;
&lt;li&gt;In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same&lt;/li&gt;
&lt;li&gt;"With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD."&lt;/li&gt;
&lt;li&gt;If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Henning Brauer - &lt;a href="mailto:henning@openbsd.org" target="_blank" rel="nofollow noopener"&gt;henning@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/henningbrauer" target="_blank" rel="nofollow noopener"&gt;@henningbrauer&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://openntpd.org/" target="_blank" rel="nofollow noopener"&gt;OpenNTPD&lt;/a&gt; and its portable variant&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142356166731390&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Authenticated time in OpenNTPD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated &lt;em&gt;already&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;While at the hackathon, some developers came up with an &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142355043928397&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;alternate way&lt;/a&gt; to get authenticated NTP responses&lt;/li&gt;
&lt;li&gt;You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool&lt;/li&gt;
&lt;li&gt;OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header&lt;/li&gt;
&lt;li&gt;It's not intended to be a direct time source, just a constraint to keep things within reason&lt;/li&gt;
&lt;li&gt;If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363215730069&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Henning&lt;/a&gt; and &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142363400330522&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Theo&lt;/a&gt; also weigh in to give some of the backstory on the idea&lt;/li&gt;
&lt;li&gt;Lots more detail can be found in Reyk's email explaining the new feature (and it's optional of course)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference 2015 Oita and Hamanako&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It's been a while since we've featured one of these trip reports, but the Japanese NetBSD users group is still doing them&lt;/li&gt;
&lt;li&gt;This time the conferences were in Oita &lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" target="_blank" rel="nofollow noopener"&gt;and Hamanako&lt;/a&gt;, Japan&lt;/li&gt;
&lt;li&gt;Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices&lt;/li&gt;
&lt;li&gt;As always, they took lots of pictures from the event of NetBSD on all these weird machines
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" target="_blank" rel="nofollow noopener"&gt;Poudriere in a jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A common question we get about our &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere tutorial&lt;/a&gt; is "how do I run it in a jail?" - this blog post is about exactly that&lt;/li&gt;
&lt;li&gt;It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" target="_blank" rel="nofollow noopener"&gt;Bruteblock, another way to stop bruteforce&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf's built-in rate limiting&lt;/li&gt;
&lt;li&gt;Bruteblock is a similar tool, but it's not just for ssh logins - it can do a number of other services&lt;/li&gt;
&lt;li&gt;It can also work directly with IPFW, which is a plus if you're using that as your firewall&lt;/li&gt;
&lt;li&gt;Add a few lines to your syslog.conf and bruteblock will get executed automatically&lt;/li&gt;
&lt;li&gt;The rest of the article takes you through the different settings you can configure for blocking
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142325218626853&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;New iwm(4) driver and cross-polination&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD guys recently imported a new "iwm" driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)&lt;/li&gt;
&lt;li&gt;NetBSD wasted no time in &lt;a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" target="_blank" rel="nofollow noopener"&gt;porting it over&lt;/a&gt;, giving a bit of interesting backstory&lt;/li&gt;
&lt;li&gt;According to &lt;a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" target="_blank" rel="nofollow noopener"&gt;Antti Kantee&lt;/a&gt;, "it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace"&lt;/li&gt;
&lt;li&gt;Both projects would appreciate further testing if you have the hardware and can provide useful bug reports&lt;/li&gt;
&lt;li&gt;Maybe FreeBSD and DragonFly will port it over too, or come up with something that's partially based on the code
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" target="_blank" rel="nofollow noopener"&gt;PCBSD current images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The first PCBSD -CURRENT images should be available this weekend&lt;/li&gt;
&lt;li&gt;This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates&lt;/li&gt;
&lt;li&gt;For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2E4NbJwzs" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2FkxcSYKy" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s217EgA1JC" target="_blank" rel="nofollow noopener"&gt;Charlie writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21vlCbGDt" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" target="_blank" rel="nofollow noopener"&gt;A systematic effort&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" target="_blank" rel="nofollow noopener"&gt;GCC's lunch&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=142331891908776&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Hopes and dreams&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Discussion&lt;/h2&gt;

&lt;h3&gt;Comparison of ways to securely tunnel your traffic&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://openvpn.net/index.php/open-source.html" target="_blank" rel="nofollow noopener"&gt;OpenVPN&lt;/a&gt;, &lt;a href="http://www.openiked.org/" target="_blank" rel="nofollow noopener"&gt;OpenBSD IKED&lt;/a&gt;, &lt;a href="https://www.freebsd.org/doc/handbook/ipsec.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD IPSEC&lt;/a&gt;, &lt;a href="http://www.openssh.com/" target="_blank" rel="nofollow noopener"&gt;OpenSSH&lt;/a&gt;, &lt;a href="https://www.torproject.org/" target="_blank" rel="nofollow noopener"&gt;Tor&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ntp, ntpd, ntimed, openntpd, time keeping, stratum, ipsec, openvpn, ssh, openiked, ike, tor, tunneling, bhws, afl-fuzz, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we&#39;ll be talking to Henning Brauer about OpenNTPD and its recently revived portable version. After that, we&#39;ll be discussing different ways to securely tunnel your traffic: specifically OpenVPN, IPSEC, SSH and Tor. All that and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054295.html" rel="nofollow">Strange timer bug in FreeBSD 11</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_24-beastly_infrastructure" rel="nofollow">Peter Wemm</a> wrote in to the FreeBSD -CURRENT mailing list with an interesting observation</li>
<li>Running the latest development code in the infrastructure, the clock would stop keeping time after 24 days of uptime</li>
<li>This meant things like cron and sleep would break, TCP/IP wouldn&#39;t time out or resend packets, a lot of things would break</li>
<li>A workaround until it was fixed was to reboot every 24 days, but this is BSD we&#39;re talking about - uptime is our game</li>
<li>An initial proposal was adding a CFLAG to the build options which makes makes signed arithmetic wrap</li>
<li>Peter disagreed and <a href="https://lists.freebsd.org/pipermail/freebsd-current/2015-February/054320.html" rel="nofollow">gave some background</a>, offering a different patch to <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067827.html" rel="nofollow">fix</a> the issue and <a href="https://lists.freebsd.org/pipermail/svn-src-head/2015-February/067828.html" rel="nofollow">detect it early</a> if it happens again</li>
<li>Ultimately, the problem was traced back to an issue with a recent clang import</li>
<li>It only affected -CURRENT, not -RELEASE or -STABLE, but was definitely a bizarre bug to track down
***</li>
</ul>

<h3><a href="http://technoquarter.blogspot.com/p/series.html" rel="nofollow">An OpenBSD mail server</a></h3>

<ul>
<li>There&#39;s been a recent influx of blog posts about building a BSD mail server for some reason</li>
<li>In this fancy series of posts, the author sets up OpenSMTPD in its native OpenBSD home, whereas previous posts have been aimed at FreeBSD and Linux</li>
<li>In addition to the usual steps, this one also covers DKIMproxy, ClamAV for scanning attachments, Dovecot for IMAP and also multiple choices of spam filtering: spamd or SpamAssassin</li>
<li>It also shows you how to set up Roundcube for building a web interface, using the new in-base httpd</li>
<li>That means this is more of a &quot;complete solution&quot; - right down to what the end users see</li>
<li>The series is split up into categories so it&#39;s very easy to follow along step-by-step
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207421.html" rel="nofollow">How DragonFlyBSD uses git</a></h3>

<ul>
<li>DragonFlyBSD, along with PCBSD and EdgeBSD, uses git as its version control system for the system source code</li>
<li>In a <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207422.html" rel="nofollow">series</a> of <a href="http://lists.dragonflybsd.org/pipermail/users/2015-January/207424.html" rel="nofollow">posts</a>, Matthew Dillon (the project lead) details their internal setup</li>
<li>They&#39;re using vanilla git over ssh, with the developers&#39; accounts set to git-only (no shell access)</li>
<li>The maintainers of the server are the only ones with shell access available</li>
<li>He also details how a cron job syncs from the master to a public box that anyone can check out code from</li>
<li>It would be interesting to hear about how other BSD projects manage their master source repository
***</li>
</ul>

<h3><a href="http://www.itwire.com/business-it-news/open-source/66900-fed-up-with-systemd-and-linux?-why-not-try-pc-bsd" rel="nofollow">Why not try PCBSD?</a></h3>

<ul>
<li>ITwire, another more mainstream tech site, published a recent article about switching to PCBSD</li>
<li>They interview a guy named Kris that we&#39;ve never heard of before</li>
<li>In the article, they touch on how easy it can potentially be for Linux users looking to switch over to the BSD side - lots of applications are exactly the same</li>
<li>&quot;With the growing adoption of systemd, dissatisfaction with Linux has reached proportions not seen in recent years, to the extent that people have started talking of switching to FreeBSD.&quot;</li>
<li>If you have some friends who complain to you about systemd all the time, this might be a good article to show them
***</li>
</ul>

<h2>Interview - Henning Brauer - <a href="mailto:henning@openbsd.org" rel="nofollow">henning@openbsd.org</a> / <a href="https://twitter.com/henningbrauer" rel="nofollow">@henningbrauer</a></h2>

<p><a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> and its portable variant</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142356166731390&w=2" rel="nofollow">Authenticated time in OpenNTPD</a></h3>

<ul>
<li>We recorded that interview with Henning just a few days ago, and it looks like part of it may be outdated <em>already</em></li>
<li>While at the hackathon, some developers came up with an <a href="https://www.marc.info/?l=openbsd-cvs&m=142355043928397&w=2" rel="nofollow">alternate way</a> to get authenticated NTP responses</li>
<li>You can now add an HTTPS URL to your ntpd.conf in addition to the time server pool</li>
<li>OpenNTPD will query it (over TLS, with CA verification) and look at the date sent in the HTTPS header</li>
<li>It&#39;s not intended to be a direct time source, just a constraint to keep things within reason</li>
<li>If you receive regular NTP packets that are way off from the TLS packet, those will be discarded and the server(s) marked as invalid</li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=142363215730069&w=2" rel="nofollow">Henning</a> and <a href="https://www.marc.info/?l=openbsd-tech&m=142363400330522&w=2" rel="nofollow">Theo</a> also weigh in to give some of the backstory on the idea</li>
<li>Lots more detail can be found in Reyk&#39;s email explaining the new feature (and it&#39;s optional of course)
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/08/msg000678.html" rel="nofollow">NetBSD at Open Source Conference 2015 Oita and Hamanako</a></h3>

<ul>
<li>It&#39;s been a while since we&#39;ve featured one of these trip reports, but the Japanese NetBSD users group is still doing them</li>
<li>This time the conferences were in Oita <a href="https://mail-index.netbsd.org/netbsd-advocacy/2015/02/11/msg000679.html" rel="nofollow">and Hamanako</a>, Japan</li>
<li>Machines running NetBSD included the CubieBoard2 Allwinner A20, Raspberry Pi and Banana Pi, Sharp NetWalker and a couple Zaurus devices</li>
<li>As always, they took lots of pictures from the event of NetBSD on all these weird machines
***</li>
</ul>

<h3><a href="http://www.tobeannounced.org/2015/02/poudriere-in-a-jail/" rel="nofollow">Poudriere in a jail</a></h3>

<ul>
<li>A common question we get about our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a> is &quot;how do I run it in a jail?&quot; - this blog post is about exactly that</li>
<li>It takes you through the networking setup, zpool setup, nginx setup, making the jail and finally poking the right holes in the jail to allow poudriere to work its magic
***</li>
</ul>

<h3><a href="http://easyos.net/articles/bsd/freebsd/bruteblock_protection_against_bruteforce_attacks_in_ssh" rel="nofollow">Bruteblock, another way to stop bruteforce</a></h3>

<ul>
<li>We&#39;ve mentioned a few different ways to stop ssh bruteforce attempts in the past: fail2ban, denyhosts, or even just with pf&#39;s built-in rate limiting</li>
<li>Bruteblock is a similar tool, but it&#39;s not just for ssh logins - it can do a number of other services</li>
<li>It can also work directly with IPFW, which is a plus if you&#39;re using that as your firewall</li>
<li>Add a few lines to your syslog.conf and bruteblock will get executed automatically</li>
<li>The rest of the article takes you through the different settings you can configure for blocking
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=142325218626853&w=2" rel="nofollow">New iwm(4) driver and cross-polination</a></h3>

<ul>
<li>The OpenBSD guys recently imported a new &quot;iwm&quot; driver for newer Intel 7260 wireless cards (commonly found in Thinkpads)</li>
<li>NetBSD wasted no time in <a href="https://mail-index.netbsd.org/source-changes/2015/02/07/msg062979.html" rel="nofollow">porting it over</a>, giving a bit of interesting backstory</li>
<li>According to <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, &quot;it was created for OpenBSD by writing and porting a NetBSD driver which was developed in a rump kernel in Linux userspace&quot;</li>
<li>Both projects would appreciate further testing if you have the hardware and can provide useful bug reports</li>
<li>Maybe FreeBSD and DragonFly will port it over too, or come up with something that&#39;s partially based on the code
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/pc-bsd-11-0-current-images-now-available/" rel="nofollow">PCBSD current images</a></h3>

<ul>
<li>The first PCBSD -CURRENT images should be available this weekend</li>
<li>This image will be tagged 11.0-CURRENTFEB2015, with planned monthly updates</li>
<li>For the more adventurous this will allow testing both FreeBSD and PCBSD bleeding edge
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2E4NbJwzs" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2FkxcSYKy" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s217EgA1JC" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21vlCbGDt" rel="nofollow">Ben writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00360.html" rel="nofollow">A systematic effort</a></li>
<li><a href="https://lists.gnu.org/archive/html/emacs-devel/2015-02/msg00457.html" rel="nofollow">GCC&#39;s lunch</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=142331891908776&w=2" rel="nofollow">Hopes and dreams</a>
***</li>
</ul>

<h2>Discussion</h2>

<h3>Comparison of ways to securely tunnel your traffic</h3>

<ul>
<li><a href="https://openvpn.net/index.php/open-source.html" rel="nofollow">OpenVPN</a>, <a href="http://www.openiked.org/" rel="nofollow">OpenBSD IKED</a>, <a href="https://www.freebsd.org/doc/handbook/ipsec.html" rel="nofollow">FreeBSD IPSEC</a>, <a href="http://www.openssh.com/" rel="nofollow">OpenSSH</a>, <a href="https://www.torproject.org/" rel="nofollow">Tor</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>75: From the Foundation (Part 1)</title>
  <link>https://www.bsdnow.tv/75</link>
  <guid isPermaLink="false">34bf4647-35b0-4919-9b96-c12799506f14</guid>
  <pubDate>Wed, 04 Feb 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/34bf4647-35b0-4919-9b96-c12799506f14.mp3" length="61549780" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we'll talk about what all they've been up to lately. All this week's news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:25:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we'll talk about what all they've been up to lately. All this week's news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" target="_blank" rel="nofollow noopener"&gt;Key rotation in OpenSSH 6.8&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt; posted a new blog entry about one of the features in the upcoming OpenSSH 6.8&lt;/li&gt;
&lt;li&gt;Times changes, key types change, problems are found with old algorithms and we switch to new ones&lt;/li&gt;
&lt;li&gt;In OpenSSH (and the SSH protocol) however, there hasn't been an easy way to rotate host keys... until now&lt;/li&gt;
&lt;li&gt;With this change, when you connect to a server, it will log &lt;em&gt;all&lt;/em&gt; the server's public keys in your known_hosts file, instead of just the first one used during the key exchange&lt;/li&gt;
&lt;li&gt;Keys that are in your known_hosts file but not on the server will get automatically removed&lt;/li&gt;
&lt;li&gt;This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often&lt;/li&gt;
&lt;li&gt;There are some instructions in the blog post for how you'll be able to rotate host keys and eventually phase out the older ones - it's really simple&lt;/li&gt;
&lt;li&gt;There are a lot of big changes coming in OpenSSH 6.8, so we'll be sure to cover them all when it's released
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" target="_blank" rel="nofollow noopener"&gt;NetBSD Banana Pi images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about the &lt;a href="http://www.bananapi.org/p/product.html" target="_blank" rel="nofollow noopener"&gt;Banana Pi&lt;/a&gt; a bit before - it's a small ARM board that's comparable to the popular Raspberry Pi&lt;/li&gt;
&lt;li&gt;Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices&lt;/li&gt;
&lt;li&gt;There are even a set of prebuilt pkgsrc packages, so you won't have to compile everything initially&lt;/li&gt;
&lt;li&gt;The email includes some steps to get everything working and an overview of what comes with the image&lt;/li&gt;
&lt;li&gt;Also check &lt;a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" target="_blank" rel="nofollow noopener"&gt;the wiki page&lt;/a&gt; for some related boards and further instructions on getting set up&lt;/li&gt;
&lt;li&gt;On a related note, NetBSD also recently &lt;a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" target="_blank" rel="nofollow noopener"&gt;got GPU acceleration working&lt;/a&gt; for the Raspberry Pi (which is a first for their ARM port)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142255048510669&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LibreSSL shirts and other BSD goodies&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've been keeping up with the LibreSSL saga and want a shirt to show your support, they're finally available to buy online&lt;/li&gt;
&lt;li&gt;There are two versions, either "&lt;a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" target="_blank" rel="nofollow noopener"&gt;keep calm and use LibreSSL&lt;/a&gt;" or the slightly more snarky "&lt;a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" target="_blank" rel="nofollow noopener"&gt;keep calm and abandon OpenSSL&lt;/a&gt;"&lt;/li&gt;
&lt;li&gt;While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too&lt;/li&gt;
&lt;li&gt;You can get some FreeBSD, &lt;a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" target="_blank" rel="nofollow noopener"&gt;PCBSD&lt;/a&gt; and FreeNAS &lt;a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" target="_blank" rel="nofollow noopener"&gt;stuff&lt;/a&gt; from the &lt;a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" target="_blank" rel="nofollow noopener"&gt;FreeBSD mall site&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD recently launched their &lt;a href="https://www.openbsdstore.com" target="_blank" rel="nofollow noopener"&gt;new store&lt;/a&gt;, but the selection is still a bit limited right now&lt;/li&gt;
&lt;li&gt;NetBSD has a &lt;a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" target="_blank" rel="nofollow noopener"&gt;couple places&lt;/a&gt; where you can buy shirts and other apparel with the flag logo on it&lt;/li&gt;
&lt;li&gt;We couldn't find any DragonFlyBSD shirts unfortunately, which is a shame since &lt;a href="http://www.dragonflybsd.org/images/small_logo.png" target="_blank" rel="nofollow noopener"&gt;their logo&lt;/a&gt; is pretty cool&lt;/li&gt;
&lt;li&gt;Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forum.opnsense.org/index.php?topic=35.0" target="_blank" rel="nofollow noopener"&gt;OPNsense 15.1.4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OPNsense guys have been hard at work since &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;we spoke to them&lt;/a&gt;, fixing lots of bugs and keeping everything up to date&lt;/li&gt;
&lt;li&gt;A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven't updated it &lt;strong&gt;again&lt;/strong&gt; by the time this airs)&lt;/li&gt;
&lt;li&gt;This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes&lt;/li&gt;
&lt;li&gt;They're doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change&lt;/li&gt;
&lt;li&gt;A developer has also posted an interesting write-up titled "&lt;a href="http://lastsummer.de/development-workflow-in-opnsense/" target="_blank" rel="nofollow noopener"&gt;Development Workflow in OPNsense&lt;/a&gt;"&lt;/li&gt;
&lt;li&gt;If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ed Maste - &lt;a href="mailto:board@freebsdfoundation.org" target="_blank" rel="nofollow noopener"&gt;board@freebsdfoundation.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.freebsdfoundation.org/donate" target="_blank" rel="nofollow noopener"&gt;The FreeBSD foundation&lt;/a&gt;'s activities&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" target="_blank" rel="nofollow noopener"&gt;Rolling with OpenBSD snapshots&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the cool things about the -current branch of OpenBSD is that it doesn't require any compiling&lt;/li&gt;
&lt;li&gt;There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture&lt;/li&gt;
&lt;li&gt;This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding&lt;/li&gt;
&lt;li&gt;This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness&lt;/li&gt;
&lt;li&gt;After using -current for seven weeks, the author comes to the conclusion that it's not as unstable as people might think&lt;/li&gt;
&lt;li&gt;He's now helping test out patches and new ports since he's running the same code as the developers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" target="_blank" rel="nofollow noopener"&gt;Signing pkgsrc packages&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As of the time this show airs, the official &lt;a href="http://www.bsdnow.tv/tutorials/pkgsrc" target="_blank" rel="nofollow noopener"&gt;pkgsrc&lt;/a&gt; packages aren't cryptographically signed&lt;/li&gt;
&lt;li&gt;Someone from Joyent has been working on that, since they'd like to sign their pkgsrc packages for SmartOS&lt;/li&gt;
&lt;li&gt;Using GNUPG pulled in a lot of dependencies, and they're trying to keep the bootstrapping process minimal&lt;/li&gt;
&lt;li&gt;Instead, they're using netpgpverify, a fork of NetBSD's &lt;a href="https://en.wikipedia.org/wiki/Netpgp" target="_blank" rel="nofollow noopener"&gt;netpgp&lt;/a&gt; utility&lt;/li&gt;
&lt;li&gt;Maybe someday this will become the official way to sign packages in NetBSD?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD support model changes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Starting with 11.0-RELEASE, which won't be for a few months probably, FreeBSD releases are going to have a different support model&lt;/li&gt;
&lt;li&gt;The plan is to move "from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime"&lt;/li&gt;
&lt;li&gt;There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets&lt;/li&gt;
&lt;li&gt;This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them&lt;/li&gt;
&lt;li&gt;Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD, Dovecot and SpamAssassin&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've been talking about setting up your own BSD-based mail server on the last couple episodes&lt;/li&gt;
&lt;li&gt;Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering&lt;/li&gt;
&lt;li&gt;A &lt;strong&gt;lot&lt;/strong&gt; of people &lt;a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" target="_blank" rel="nofollow noopener"&gt;regularly ask the developers&lt;/a&gt; how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets&lt;/li&gt;
&lt;li&gt;In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked&lt;/li&gt;
&lt;li&gt;Just be sure to replace those "apt-get" commands and "eth0" interface names with something a bit more sane…&lt;/li&gt;
&lt;li&gt;In related news, OpenSMTPD has got some interesting new features &lt;a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" target="_blank" rel="nofollow noopener"&gt;coming soon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They're also planning to &lt;a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" target="_blank" rel="nofollow noopener"&gt;switch to LibreSSL by default&lt;/a&gt; for the portable version
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 on the Thinkpad T400&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400&lt;/li&gt;
&lt;li&gt;Like most of the ones we've mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do&lt;/li&gt;
&lt;li&gt;This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager&lt;/li&gt;
&lt;li&gt;If you're a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you&lt;/li&gt;
&lt;li&gt;The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/02/1810/" target="_blank" rel="nofollow noopener"&gt;PC-BSD 10.1.1 Released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Automatic background updater now in&lt;/li&gt;
&lt;li&gt;Shiny new Qt5 utils&lt;/li&gt;
&lt;li&gt;OVA files for VM’s&lt;/li&gt;
&lt;li&gt;Full disk encryption with GELI v7
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2MsjllAyU" target="_blank" rel="nofollow noopener"&gt;Camio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20eYELsAg" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Y2GN1az" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20ARVQ1T6" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt; (&lt;a href="http://slexy.org/view/s212XezEYt" target="_blank" rel="nofollow noopener"&gt;TJ's lengthy reply&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2DRgEv4j8" target="_blank" rel="nofollow noopener"&gt;Christopher writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" target="_blank" rel="nofollow noopener"&gt;Special Instructions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" target="_blank" rel="nofollow noopener"&gt;Pretending to be a VT220&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, ed25519, banana pi, opnsense, libressl, t400, opensmtpd, dovecot, mail server, spamassassin, foundation, donations</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we&#39;ll talk about what all they&#39;ve been up to lately. All this week&#39;s news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" rel="nofollow">Key rotation in OpenSSH 6.8</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> posted a new blog entry about one of the features in the upcoming OpenSSH 6.8</li>
<li>Times changes, key types change, problems are found with old algorithms and we switch to new ones</li>
<li>In OpenSSH (and the SSH protocol) however, there hasn&#39;t been an easy way to rotate host keys... until now</li>
<li>With this change, when you connect to a server, it will log <em>all</em> the server&#39;s public keys in your known_hosts file, instead of just the first one used during the key exchange</li>
<li>Keys that are in your known_hosts file but not on the server will get automatically removed</li>
<li>This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often</li>
<li>There are some instructions in the blog post for how you&#39;ll be able to rotate host keys and eventually phase out the older ones - it&#39;s really simple</li>
<li>There are a lot of big changes coming in OpenSSH 6.8, so we&#39;ll be sure to cover them all when it&#39;s released
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" rel="nofollow">NetBSD Banana Pi images</a></h3>

<ul>
<li>We&#39;ve talked about the <a href="http://www.bananapi.org/p/product.html" rel="nofollow">Banana Pi</a> a bit before - it&#39;s a small ARM board that&#39;s comparable to the popular Raspberry Pi</li>
<li>Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices</li>
<li>There are even a set of prebuilt pkgsrc packages, so you won&#39;t have to compile everything initially</li>
<li>The email includes some steps to get everything working and an overview of what comes with the image</li>
<li>Also check <a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" rel="nofollow">the wiki page</a> for some related boards and further instructions on getting set up</li>
<li>On a related note, NetBSD also recently <a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" rel="nofollow">got GPU acceleration working</a> for the Raspberry Pi (which is a first for their ARM port)
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142255048510669&w=2" rel="nofollow">LibreSSL shirts and other BSD goodies</a></h3>

<ul>
<li>If you&#39;ve been keeping up with the LibreSSL saga and want a shirt to show your support, they&#39;re finally available to buy online</li>
<li>There are two versions, either &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" rel="nofollow">keep calm and use LibreSSL</a>&quot; or the slightly more snarky &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" rel="nofollow">keep calm and abandon OpenSSL</a>&quot;</li>
<li>While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too</li>
<li>You can get some FreeBSD, <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" rel="nofollow">PCBSD</a> and FreeNAS <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" rel="nofollow">stuff</a> from the <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" rel="nofollow">FreeBSD mall site</a></li>
<li>OpenBSD recently launched their <a href="https://www.openbsdstore.com" rel="nofollow">new store</a>, but the selection is still a bit limited right now</li>
<li>NetBSD has a <a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" rel="nofollow">couple places</a> where you can buy shirts and other apparel with the flag logo on it</li>
<li>We couldn&#39;t find any DragonFlyBSD shirts unfortunately, which is a shame since <a href="http://www.dragonflybsd.org/images/small_logo.png" rel="nofollow">their logo</a> is pretty cool</li>
<li>Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=35.0" rel="nofollow">OPNsense 15.1.4 released</a></h3>

<ul>
<li>The OPNsense guys have been hard at work since <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">we spoke to them</a>, fixing lots of bugs and keeping everything up to date</li>
<li>A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven&#39;t updated it <strong>again</strong> by the time this airs)</li>
<li>This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes</li>
<li>They&#39;re doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change</li>
<li>A developer has also posted an interesting write-up titled &quot;<a href="http://lastsummer.de/development-workflow-in-opnsense/" rel="nofollow">Development Workflow in OPNsense</a>&quot;</li>
<li>If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***</li>
</ul>

<h2>Interview - Ed Maste - <a href="mailto:board@freebsdfoundation.org" rel="nofollow">board@freebsdfoundation.org</a></h2>

<p><a href="https://www.freebsdfoundation.org/donate" rel="nofollow">The FreeBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" rel="nofollow">Rolling with OpenBSD snapshots</a></h3>

<ul>
<li>One of the cool things about the -current branch of OpenBSD is that it doesn&#39;t require any compiling</li>
<li>There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture</li>
<li>This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding</li>
<li>This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness</li>
<li>After using -current for seven weeks, the author comes to the conclusion that it&#39;s not as unstable as people might think</li>
<li>He&#39;s now helping test out patches and new ports since he&#39;s running the same code as the developers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" rel="nofollow">Signing pkgsrc packages</a></h3>

<ul>
<li>As of the time this show airs, the official <a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">pkgsrc</a> packages aren&#39;t cryptographically signed</li>
<li>Someone from Joyent has been working on that, since they&#39;d like to sign their pkgsrc packages for SmartOS</li>
<li>Using GNUPG pulled in a lot of dependencies, and they&#39;re trying to keep the bootstrapping process minimal</li>
<li>Instead, they&#39;re using netpgpverify, a fork of NetBSD&#39;s <a href="https://en.wikipedia.org/wiki/Netpgp" rel="nofollow">netpgp</a> utility</li>
<li>Maybe someday this will become the official way to sign packages in NetBSD?
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" rel="nofollow">FreeBSD support model changes</a></h3>

<ul>
<li>Starting with 11.0-RELEASE, which won&#39;t be for a few months probably, FreeBSD releases are going to have a different support model</li>
<li>The plan is to move &quot;from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime&quot;</li>
<li>There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets</li>
<li>This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them</li>
<li>Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***</li>
</ul>

<h3><a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" rel="nofollow">OpenSMTPD, Dovecot and SpamAssassin</a></h3>

<ul>
<li>We&#39;ve been talking about setting up your own BSD-based mail server on the last couple episodes</li>
<li>Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering</li>
<li>A <strong>lot</strong> of people <a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" rel="nofollow">regularly ask the developers</a> how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets</li>
<li>In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked</li>
<li>Just be sure to replace those &quot;apt-get&quot; commands and &quot;eth0&quot; interface names with something a bit more sane…</li>
<li>In related news, OpenSMTPD has got some interesting new features <a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" rel="nofollow">coming soon</a></li>
<li>They&#39;re also planning to <a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" rel="nofollow">switch to LibreSSL by default</a> for the portable version
***</li>
</ul>

<h3><a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" rel="nofollow">FreeBSD 10 on the Thinkpad T400</a></h3>

<ul>
<li>BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400</li>
<li>Like most of the ones we&#39;ve mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do</li>
<li>This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager</li>
<li>If you&#39;re a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you</li>
<li>The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/1810/" rel="nofollow">PC-BSD 10.1.1 Released</a></h3>

<ul>
<li>Automatic background updater now in</li>
<li>Shiny new Qt5 utils</li>
<li>OVA files for VM’s</li>
<li>Full disk encryption with GELI v7
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MsjllAyU" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s20eYELsAg" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s20Y2GN1az" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20ARVQ1T6" rel="nofollow">Sean writes in</a> (<a href="http://slexy.org/view/s212XezEYt" rel="nofollow">TJ&#39;s lengthy reply</a>)</li>
<li><a href="http://slexy.org/view/s2DRgEv4j8" rel="nofollow">Christopher writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" rel="nofollow">Special Instructions</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" rel="nofollow">Pretending to be a VT220</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be starting a two-part series detailing the activities of various BSD foundations. Ed Maste from the FreeBSD foundation will be joining us this time, and we&#39;ll talk about what all they&#39;ve been up to lately. All this week&#39;s news and answers to viewer-submitted questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.djm.net.au/2015/02/key-rotation-in-openssh-68.html" rel="nofollow">Key rotation in OpenSSH 6.8</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> posted a new blog entry about one of the features in the upcoming OpenSSH 6.8</li>
<li>Times changes, key types change, problems are found with old algorithms and we switch to new ones</li>
<li>In OpenSSH (and the SSH protocol) however, there hasn&#39;t been an easy way to rotate host keys... until now</li>
<li>With this change, when you connect to a server, it will log <em>all</em> the server&#39;s public keys in your known_hosts file, instead of just the first one used during the key exchange</li>
<li>Keys that are in your known_hosts file but not on the server will get automatically removed</li>
<li>This fixes the problem of old servers still authenticating with ancient DSA or small RSA keys, as well as providing a way for the server to rotate keys every so often</li>
<li>There are some instructions in the blog post for how you&#39;ll be able to rotate host keys and eventually phase out the older ones - it&#39;s really simple</li>
<li>There are a lot of big changes coming in OpenSSH 6.8, so we&#39;ll be sure to cover them all when it&#39;s released
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/port-arm/2015/01/30/msg002809.html" rel="nofollow">NetBSD Banana Pi images</a></h3>

<ul>
<li>We&#39;ve talked about the <a href="http://www.bananapi.org/p/product.html" rel="nofollow">Banana Pi</a> a bit before - it&#39;s a small ARM board that&#39;s comparable to the popular Raspberry Pi</li>
<li>Some NetBSD -current images were posted on the mailing list, so now you can get some BSD action on one of these little devices</li>
<li>There are even a set of prebuilt pkgsrc packages, so you won&#39;t have to compile everything initially</li>
<li>The email includes some steps to get everything working and an overview of what comes with the image</li>
<li>Also check <a href="https://wiki.netbsd.org/ports/evbarm/allwinner/" rel="nofollow">the wiki page</a> for some related boards and further instructions on getting set up</li>
<li>On a related note, NetBSD also recently <a href="https://blog.netbsd.org/tnf/entry/raspberry_pi_gpu_acceleration_in" rel="nofollow">got GPU acceleration working</a> for the Raspberry Pi (which is a first for their ARM port)
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-misc&m=142255048510669&w=2" rel="nofollow">LibreSSL shirts and other BSD goodies</a></h3>

<ul>
<li>If you&#39;ve been keeping up with the LibreSSL saga and want a shirt to show your support, they&#39;re finally available to buy online</li>
<li>There are two versions, either &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTLSSL.jpg" rel="nofollow">keep calm and use LibreSSL</a>&quot; or the slightly more snarky &quot;<a href="https://shop.openbsdeurope.com/images/shop_openbsdeurope_com/products/large/TSHIRTOSSL.jpg" rel="nofollow">keep calm and abandon OpenSSL</a>&quot;</li>
<li>While on the topic, we thought it would be good to make people aware of shirts for other BSD projects too</li>
<li>You can get some FreeBSD, <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=pc-bsd" rel="nofollow">PCBSD</a> and FreeNAS <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=shirts" rel="nofollow">stuff</a> from the <a href="https://www.freebsdmall.com/cgi-bin/fm/scan/fi=prod_bsd/se=tshirt" rel="nofollow">FreeBSD mall site</a></li>
<li>OpenBSD recently launched their <a href="https://www.openbsdstore.com" rel="nofollow">new store</a>, but the selection is still a bit limited right now</li>
<li>NetBSD has a <a href="https://www.netbsd.org/gallery/devotionalia.html#cafepress" rel="nofollow">couple places</a> where you can buy shirts and other apparel with the flag logo on it</li>
<li>We couldn&#39;t find any DragonFlyBSD shirts unfortunately, which is a shame since <a href="http://www.dragonflybsd.org/images/small_logo.png" rel="nofollow">their logo</a> is pretty cool</li>
<li>Profits from the sale of the gear go back to the projects, so pick up some swag and support your BSD of choice (and of course wear them at any Linux events you happen to go to)
***</li>
</ul>

<h3><a href="https://forum.opnsense.org/index.php?topic=35.0" rel="nofollow">OPNsense 15.1.4 released</a></h3>

<ul>
<li>The OPNsense guys have been hard at work since <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">we spoke to them</a>, fixing lots of bugs and keeping everything up to date</li>
<li>A number of versions have come out since then, with 15.1.4 being the latest (assuming they haven&#39;t updated it <strong>again</strong> by the time this airs)</li>
<li>This version includes the latest round of FreeBSD kernel security patches, as well as minor SSL and GUI fixes</li>
<li>They&#39;re doing a great job of getting upstream fixes pushed out to users quickly, a very welcome change</li>
<li>A developer has also posted an interesting write-up titled &quot;<a href="http://lastsummer.de/development-workflow-in-opnsense/" rel="nofollow">Development Workflow in OPNsense</a>&quot;</li>
<li>If any of our listeners are trying OPNsense as their gateway firewall, let us know how you like it
***</li>
</ul>

<h2>Interview - Ed Maste - <a href="mailto:board@freebsdfoundation.org" rel="nofollow">board@freebsdfoundation.org</a></h2>

<p><a href="https://www.freebsdfoundation.org/donate" rel="nofollow">The FreeBSD foundation</a>&#39;s activities</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://homing-on-code.blogspot.com/2015/02/rolling-with-snapshots.html" rel="nofollow">Rolling with OpenBSD snapshots</a></h3>

<ul>
<li>One of the cool things about the -current branch of OpenBSD is that it doesn&#39;t require any compiling</li>
<li>There are signed binary snapshots being continuously re-rolled and posted on the FTP sites for every architecture</li>
<li>This provides an easy method to get onboard with the latest features, and you can also easily upgrade between them without reformatting or rebuilding</li>
<li>This blog post will walk you through the process of using snapshots to stay on the bleeding edge of OpenBSD goodness</li>
<li>After using -current for seven weeks, the author comes to the conclusion that it&#39;s not as unstable as people might think</li>
<li>He&#39;s now helping test out patches and new ports since he&#39;s running the same code as the developers
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/tech-pkg/2015/02/02/msg014224.html" rel="nofollow">Signing pkgsrc packages</a></h3>

<ul>
<li>As of the time this show airs, the official <a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">pkgsrc</a> packages aren&#39;t cryptographically signed</li>
<li>Someone from Joyent has been working on that, since they&#39;d like to sign their pkgsrc packages for SmartOS</li>
<li>Using GNUPG pulled in a lot of dependencies, and they&#39;re trying to keep the bootstrapping process minimal</li>
<li>Instead, they&#39;re using netpgpverify, a fork of NetBSD&#39;s <a href="https://en.wikipedia.org/wiki/Netpgp" rel="nofollow">netpgp</a> utility</li>
<li>Maybe someday this will become the official way to sign packages in NetBSD?
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2015-February/001624.html" rel="nofollow">FreeBSD support model changes</a></h3>

<ul>
<li>Starting with 11.0-RELEASE, which won&#39;t be for a few months probably, FreeBSD releases are going to have a different support model</li>
<li>The plan is to move &quot;from a point release-based support model to a set of releases from a branch with a guaranteed support lifetime&quot;</li>
<li>There will now be a five-year lifespan for each major release, regardless of how many minor point releases it gets</li>
<li>This new model should reduce the turnaround time for errata and security patches, since there will be a lot less work involved to build and verify them</li>
<li>Lots more detail can be found in the mailing list post, including some important changes to the -STABLE branch, so give it a read
***</li>
</ul>

<h3><a href="http://guillaumevincent.com/2015/01/31/OpenSMTPD-Dovecot-SpamAssassin.html" rel="nofollow">OpenSMTPD, Dovecot and SpamAssassin</a></h3>

<ul>
<li>We&#39;ve been talking about setting up your own BSD-based mail server on the last couple episodes</li>
<li>Here we have another post from a user setting up OpenSMTPD, including Dovecot for IMAP and SpamAssassin for spam filtering</li>
<li>A <strong>lot</strong> of people <a href="http://permalink.gmane.org/gmane.mail.opensmtpd.general/2265" rel="nofollow">regularly ask the developers</a> how to combine OpenSMTPD with spam filtering, and this post should finally reveal the dark secrets</li>
<li>In addition, it also covers SSL certificates, PKI and setting up MX records - some things that previous posts have lacked</li>
<li>Just be sure to replace those &quot;apt-get&quot; commands and &quot;eth0&quot; interface names with something a bit more sane…</li>
<li>In related news, OpenSMTPD has got some interesting new features <a href="http://article.gmane.org/gmane.mail.opensmtpd.general/2272" rel="nofollow">coming soon</a></li>
<li>They&#39;re also planning to <a href="https://github.com/OpenSMTPD/OpenSMTPD/issues/534" rel="nofollow">switch to LibreSSL by default</a> for the portable version
***</li>
</ul>

<h3><a href="http://lastsummer.de/freebsd-desktop-on-the-t400/" rel="nofollow">FreeBSD 10 on the Thinkpad T400</a></h3>

<ul>
<li>BSD laptop articles are becoming popular it seems - this one is about FreeBSD on a T400</li>
<li>Like most of the ones we&#39;ve mentioned before, it shows you how to get a BSD desktop set up with all the little tweaks you might not think to do</li>
<li>This one differs in that it takes a more minimal approach to graphics: instead of a full-featured environment like XFCE or KDE, it uses the i3 tiling window manager</li>
<li>If you&#39;re a commandline junkie that basically just uses X11 to run more than one terminal at once, this might be an ideal setup for you</li>
<li>The post also includes some bits about the DRM and KMS in the 10.x branch, as well as vt
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/02/1810/" rel="nofollow">PC-BSD 10.1.1 Released</a></h3>

<ul>
<li>Automatic background updater now in</li>
<li>Shiny new Qt5 utils</li>
<li>OVA files for VM’s</li>
<li>Full disk encryption with GELI v7
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2MsjllAyU" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s20eYELsAg" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s20Y2GN1az" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20ARVQ1T6" rel="nofollow">Sean writes in</a> (<a href="http://slexy.org/view/s212XezEYt" rel="nofollow">TJ&#39;s lengthy reply</a>)</li>
<li><a href="http://slexy.org/view/s2DRgEv4j8" rel="nofollow">Christopher writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-February/264010.html" rel="nofollow">Special Instructions</a></li>
<li><a href="https://mail-index.netbsd.org/netbsd-users/2015/01/19/msg015669.html" rel="nofollow">Pretending to be a VT220</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>74: That Sly MINIX</title>
  <link>https://www.bsdnow.tv/74</link>
  <guid isPermaLink="false">6e3c9361-afc5-4f27-b2de-a33a6ac82db5</guid>
  <pubDate>Wed, 28 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6e3c9361-afc5-4f27-b2de-a33a6ac82db5.mp3" length="54813172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we've got something a little bit different for you. We'll be talking with Andrew Tanenbaum, the creator of MINIX. They've recently imported parts of NetBSD into their OS, and we'll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:16:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we've got something a little bit different for you. We'll be talking with Andrew Tanenbaum, the creator of MINIX. They've recently imported parts of NetBSD into their OS, and we'll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/" target="_blank" rel="nofollow noopener"&gt;The missing EuroBSDCon videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Some of the missing videos from EuroBSDCon 2014 &lt;a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" target="_blank" rel="nofollow noopener"&gt;we mentioned before&lt;/a&gt; have mysteriously appeared&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" target="_blank" rel="nofollow noopener"&gt;Jordan Hubbard&lt;/a&gt;, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4" target="_blank" rel="nofollow noopener"&gt;FreeBSD, looking forward to another 10 years&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lourival Viera Neto, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4" target="_blank" rel="nofollow noopener"&gt;NPF scripting with Lua&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Kris Moore, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4" target="_blank" rel="nofollow noopener"&gt;Snapshots, replication and boot environments&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Andy Tanenbaum, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4" target="_blank" rel="nofollow noopener"&gt;A reimplementation of NetBSD based on a microkernel&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" target="_blank" rel="nofollow noopener"&gt;Kirk McKusick&lt;/a&gt;, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4" target="_blank" rel="nofollow noopener"&gt;An introduction to FreeBSD's implementation of ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Emannuel Dreyfus, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4" target="_blank" rel="nofollow noopener"&gt;FUSE and beyond, bridging filesystems&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" target="_blank" rel="nofollow noopener"&gt;John-Mark Gurney&lt;/a&gt;, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4" target="_blank" rel="nofollow noopener"&gt;Optimizing GELI performance&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Unfortunately, there are still about six talks missing… and no ETA
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://gist.github.com/mpasternacki/974e29d1e3865e940c53" target="_blank" rel="nofollow noopener"&gt;FreeBSD on a MacBook Pro (or two)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've got a couple posts about running FreeBSD on a MacBook Pro this week&lt;/li&gt;
&lt;li&gt;In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™&lt;/li&gt;
&lt;li&gt;Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier&lt;/li&gt;
&lt;li&gt;He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step&lt;/li&gt;
&lt;li&gt;He's still not quite to that point yet, but documents his experiments with BSD as a desktop&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html" target="_blank" rel="nofollow noopener"&gt;second article&lt;/a&gt; also documents an ex-Linux user switching over to BSD for their desktop&lt;/li&gt;
&lt;li&gt;It &lt;a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html" target="_blank" rel="nofollow noopener"&gt;also covers&lt;/a&gt; power management, bluetooth and trackpad setup&lt;/li&gt;
&lt;li&gt;On the topic of Gentoo, "Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down"&lt;/li&gt;
&lt;li&gt;Check out both articles if you've been considering running FreeBSD on a MacBook
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142136923124184&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Remote logging over TLS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time&lt;/li&gt;
&lt;li&gt;That feature can be very useful, especially for forensics purposes - it's much harder for an attacker to hide their activities if the logs aren't on the same server&lt;/li&gt;
&lt;li&gt;The problem is, of course, that it's &lt;a href="https://en.wikipedia.org/wiki/Syslog#Protocol" target="_blank" rel="nofollow noopener"&gt;sent in cleartext&lt;/a&gt;, unless you tunnel it over SSH or use some kind of third party wrapper&lt;/li&gt;
&lt;li&gt;With a few &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142160989610410&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recent commits&lt;/a&gt;, OpenBSD's syslogd now supports sending logs over TLS natively, including X509 certificate verification&lt;/li&gt;
&lt;li&gt;By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain &lt;em&gt;outside&lt;/em&gt; of the chroot?&lt;/li&gt;
&lt;li&gt;That problem &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142188450524692&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;was also conquered&lt;/a&gt;, by loading the CA chain &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191799331938&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;directly from memory&lt;/a&gt;, so the entire process &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191819131993&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;can be run in the chroot&lt;/a&gt; without issue&lt;/li&gt;
&lt;li&gt;Some of the privsep verifcation code even &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142191878632141&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;made its way into&lt;/a&gt; LibreSSL right afterwards&lt;/li&gt;
&lt;li&gt;If you haven't set up remote logging before, now might be an interesting time to try it out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=wwbO4eTieQY" target="_blank" rel="nofollow noopener"&gt;FreeBSD, not a Linux distro&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;George Neville-Neil gave a presentation recently, titled "FreeBSD: not a Linux distro"&lt;/li&gt;
&lt;li&gt;It's meant to be an introduction to new users that might've heard about FreeBSD, but aren't familiar with any BSD history&lt;/li&gt;
&lt;li&gt;He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options&lt;/li&gt;
&lt;li&gt;There's even an interesting "thirty years in three minutes" segment&lt;/li&gt;
&lt;li&gt;It's not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)&lt;/li&gt;
&lt;li&gt;We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products&lt;/li&gt;
&lt;li&gt;This might be a good video to show your friends or potential employer if you're looking to introduce FreeBSD to them 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/long-term-support-considered-harmful" target="_blank" rel="nofollow noopener"&gt;Long-term support considered harmful&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was recently a &lt;a href="https://www.marc.info/?l=bugtraq&amp;amp;m=142237866420639&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;pretty horrible bug&lt;/a&gt; in GNU's libc (BSDs aren't affected, don't worry)&lt;/li&gt;
&lt;li&gt;Aside from the severity of the actual problem, the fix was &lt;a href="https://code.google.com/p/chromium/issues/detail?id=364511" target="_blank" rel="nofollow noopener"&gt;delayed&lt;/a&gt; for quite a long time, leaving people vulnerable&lt;/li&gt;
&lt;li&gt;Ted Unangst writes a post about how this &lt;a href="https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1" target="_blank" rel="nofollow noopener"&gt;idea of long-term support&lt;/a&gt; could actually be harmful in the long run, and compares it to how OpenBSD does things&lt;/li&gt;
&lt;li&gt;OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes&lt;/li&gt;
&lt;li&gt;He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date&lt;/li&gt;
&lt;li&gt;"Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early."&lt;/li&gt;
&lt;li&gt;There was also &lt;a href="https://lobste.rs/s/a4iijx/long_term_support_considered_harmful" target="_blank" rel="nofollow noopener"&gt;some&lt;/a&gt; &lt;a href="https://news.ycombinator.com/item?id=8954737" target="_blank" rel="nofollow noopener"&gt;discussion&lt;/a&gt; about the article you can check out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Andrew Tanenbaum - &lt;a href="mailto:info@minix3.org" target="_blank" rel="nofollow noopener"&gt;info@minix3.org&lt;/a&gt; / &lt;a href="https://twitter.com/minix3" target="_blank" rel="nofollow noopener"&gt;@minix3&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;MINIX's integration of NetBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.undeadly.org/cgi?action=article&amp;amp;sid=20150121093259" target="_blank" rel="nofollow noopener"&gt;Using AFL on OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about &lt;a href="http://lcamtuf.coredump.cx/afl/" target="_blank" rel="nofollow noopener"&gt;American Fuzzy Lop&lt;/a&gt; a bit on a previous episode, and how some OpenBSD devs &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=afl&amp;amp;q=b" target="_blank" rel="nofollow noopener"&gt;are using it&lt;/a&gt; to catch and fix new bugs&lt;/li&gt;
&lt;li&gt;Undeadly has a cool guide on how you can get started with fuzzing&lt;/li&gt;
&lt;li&gt;It's a little on the advanced side, but if you're interested in programming or diagnosing crashes, it'll be a really interesting article to read&lt;/li&gt;
&lt;li&gt;Lots of recent CVEs in other open source projects are attributed to fuzzing - it's a great way to stress test your software
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/" target="_blank" rel="nofollow noopener"&gt;Lumina 0.8.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released&lt;/li&gt;
&lt;li&gt;This update includes some new plugins, lots of bugfixes and even "quality-of-life improvements"&lt;/li&gt;
&lt;li&gt;There's a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options&lt;/li&gt;
&lt;li&gt;You can get it in PCBSD's edge repo or install it through regular ports (on FreeBSD, OpenBSD &lt;em&gt;or&lt;/em&gt; DragonFly!)&lt;/li&gt;
&lt;li&gt;If you haven't seen our episode about Lumina, where we interview the developer and show you a tour of its features, &lt;a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" target="_blank" rel="nofollow noopener"&gt;gotta go watch it&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html" target="_blank" rel="nofollow noopener"&gt;My first OpenBSD port&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The author of the "Code Rot &amp;amp; Why I Chose OpenBSD" article has a new post up, this time about ports&lt;/li&gt;
&lt;li&gt;He recently made his first port and got it into the tree, so he talks about the whole process from start to finish&lt;/li&gt;
&lt;li&gt;After learning some of the basics and becoming comfortable running -current, he noticed there wasn't a port for the "Otter" web browser&lt;/li&gt;
&lt;li&gt;At that point he did what you're &lt;em&gt;supposed to do&lt;/em&gt; in that situation, and started working on it himself&lt;/li&gt;
&lt;li&gt;OpenBSD has a great &lt;a href="http://www.openbsd.org/faq/ports/" target="_blank" rel="nofollow noopener"&gt;porter's handbook&lt;/a&gt; that he referenced throughout the process&lt;/li&gt;
&lt;li&gt;Long story short, his browser of choice is in the official ports collection and now he's the maintainer (and gets to deal with any bug reports, of course)&lt;/li&gt;
&lt;li&gt;If some software you use isn't available for whatever BSD you're using, you could be the one to make it happen
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/" target="_blank" rel="nofollow noopener"&gt;How to slide with DragonFly&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFly BSD has a new HAMMER FS utility called "Slider"&lt;/li&gt;
&lt;li&gt;It's used to easily browse through file history and undelete files - imagine something like a commandline version of Apple's Time Machine&lt;/li&gt;
&lt;li&gt;They have a pretty comprehensive guide on how to use it on their wiki page&lt;/li&gt;
&lt;li&gt;If you're using HAMMER FS, this is a really handy tool to have, check it out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD with Dovecot and Salt&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three&lt;/li&gt;
&lt;li&gt;This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment&lt;/li&gt;
&lt;li&gt;Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan&lt;/li&gt;
&lt;li&gt;"Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with"&lt;/li&gt;
&lt;li&gt;Check it out if you've been thinking about configuring your first mail server on any of the BSDs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20q2fSfEO" target="_blank" rel="nofollow noopener"&gt;Christopher writes in&lt;/a&gt; (&lt;a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os" target="_blank" rel="nofollow noopener"&gt;handbook section&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2zGvAczeN" target="_blank" rel="nofollow noopener"&gt;Mark writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Dn2Tey8" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s215nxxrtF" target="_blank" rel="nofollow noopener"&gt;Stefano writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20cwezc9l" target="_blank" rel="nofollow noopener"&gt;Matthew writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142194821910087&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Not that interested actually&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html" target="_blank" rel="nofollow noopener"&gt;This guy again&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html" target="_blank" rel="nofollow noopener"&gt;Yep, this is the place&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, minix, minix3, userland, pkgsrc, afl, american fuzzy lop, fuzzing, hammerfs, hammer fs, slider, eurobsdcon, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ve got something a little bit different for you. We&#39;ll be talking with Andrew Tanenbaum, the creator of MINIX. They&#39;ve recently imported parts of NetBSD into their OS, and we&#39;ll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/" rel="nofollow">The missing EuroBSDCon videos</a></h3>

<ul>
<li>Some of the missing videos from EuroBSDCon 2014 <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">we mentioned before</a> have mysteriously appeared</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4" rel="nofollow">FreeBSD, looking forward to another 10 years</a></li>
<li>Lourival Viera Neto, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4" rel="nofollow">NPF scripting with Lua</a></li>
<li>Kris Moore, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4" rel="nofollow">Snapshots, replication and boot environments</a></li>
<li>Andy Tanenbaum, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4" rel="nofollow">A reimplementation of NetBSD based on a microkernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4" rel="nofollow">An introduction to FreeBSD&#39;s implementation of ZFS</a></li>
<li>Emannuel Dreyfus, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4" rel="nofollow">FUSE and beyond, bridging filesystems</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">John-Mark Gurney</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4" rel="nofollow">Optimizing GELI performance</a></li>
<li>Unfortunately, there are still about six talks missing… and no ETA
***</li>
</ul>

<h3><a href="https://gist.github.com/mpasternacki/974e29d1e3865e940c53" rel="nofollow">FreeBSD on a MacBook Pro (or two)</a></h3>

<ul>
<li>We&#39;ve got a couple posts about running FreeBSD on a MacBook Pro this week</li>
<li>In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™</li>
<li>Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier</li>
<li>He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step</li>
<li>He&#39;s still not quite to that point yet, but documents his experiments with BSD as a desktop</li>
<li>The <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html" rel="nofollow">second article</a> also documents an ex-Linux user switching over to BSD for their desktop</li>
<li>It <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html" rel="nofollow">also covers</a> power management, bluetooth and trackpad setup</li>
<li>On the topic of Gentoo, &quot;Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down&quot;</li>
<li>Check out both articles if you&#39;ve been considering running FreeBSD on a MacBook
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142136923124184&w=2" rel="nofollow">Remote logging over TLS</a></h3>

<ul>
<li>In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time</li>
<li>That feature can be very useful, especially for forensics purposes - it&#39;s much harder for an attacker to hide their activities if the logs aren&#39;t on the same server</li>
<li>The problem is, of course, that it&#39;s <a href="https://en.wikipedia.org/wiki/Syslog#Protocol" rel="nofollow">sent in cleartext</a>, unless you tunnel it over SSH or use some kind of third party wrapper</li>
<li>With a few <a href="https://www.marc.info/?l=openbsd-cvs&m=142160989610410&w=2" rel="nofollow">recent commits</a>, OpenBSD&#39;s syslogd now supports sending logs over TLS natively, including X509 certificate verification</li>
<li>By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain <em>outside</em> of the chroot?</li>
<li>That problem <a href="https://www.marc.info/?l=openbsd-tech&m=142188450524692&w=2" rel="nofollow">was also conquered</a>, by loading the CA chain <a href="https://www.marc.info/?l=openbsd-cvs&m=142191799331938&w=2" rel="nofollow">directly from memory</a>, so the entire process <a href="https://www.marc.info/?l=openbsd-cvs&m=142191819131993&w=2" rel="nofollow">can be run in the chroot</a> without issue</li>
<li>Some of the privsep verifcation code even <a href="https://www.marc.info/?l=openbsd-cvs&m=142191878632141&w=2" rel="nofollow">made its way into</a> LibreSSL right afterwards</li>
<li>If you haven&#39;t set up remote logging before, now might be an interesting time to try it out
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wwbO4eTieQY" rel="nofollow">FreeBSD, not a Linux distro</a></h3>

<ul>
<li>George Neville-Neil gave a presentation recently, titled &quot;FreeBSD: not a Linux distro&quot;</li>
<li>It&#39;s meant to be an introduction to new users that might&#39;ve heard about FreeBSD, but aren&#39;t familiar with any BSD history</li>
<li>He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options</li>
<li>There&#39;s even an interesting &quot;thirty years in three minutes&quot; segment</li>
<li>It&#39;s not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)</li>
<li>We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products</li>
<li>This might be a good video to show your friends or potential employer if you&#39;re looking to introduce FreeBSD to them 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/long-term-support-considered-harmful" rel="nofollow">Long-term support considered harmful</a></h3>

<ul>
<li>There was recently a <a href="https://www.marc.info/?l=bugtraq&m=142237866420639&w=2" rel="nofollow">pretty horrible bug</a> in GNU&#39;s libc (BSDs aren&#39;t affected, don&#39;t worry)</li>
<li>Aside from the severity of the actual problem, the fix was <a href="https://code.google.com/p/chromium/issues/detail?id=364511" rel="nofollow">delayed</a> for quite a long time, leaving people vulnerable</li>
<li>Ted Unangst writes a post about how this <a href="https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1" rel="nofollow">idea of long-term support</a> could actually be harmful in the long run, and compares it to how OpenBSD does things</li>
<li>OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes</li>
<li>He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date</li>
<li>&quot;Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early.&quot;</li>
<li>There was also <a href="https://lobste.rs/s/a4iijx/long_term_support_considered_harmful" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=8954737" rel="nofollow">discussion</a> about the article you can check out
***</li>
</ul>

<h2>Interview - Andrew Tanenbaum - <a href="mailto:info@minix3.org" rel="nofollow">info@minix3.org</a> / <a href="https://twitter.com/minix3" rel="nofollow">@minix3</a></h2>

<p>MINIX&#39;s integration of NetBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.undeadly.org/cgi?action=article&sid=20150121093259" rel="nofollow">Using AFL on OpenBSD</a></h3>

<ul>
<li>We&#39;ve talked about <a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a> a bit on a previous episode, and how some OpenBSD devs <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">are using it</a> to catch and fix new bugs</li>
<li>Undeadly has a cool guide on how you can get started with fuzzing</li>
<li>It&#39;s a little on the advanced side, but if you&#39;re interested in programming or diagnosing crashes, it&#39;ll be a really interesting article to read</li>
<li>Lots of recent CVEs in other open source projects are attributed to fuzzing - it&#39;s a great way to stress test your software
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/" rel="nofollow">Lumina 0.8.1 released</a></h3>

<ul>
<li>A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released</li>
<li>This update includes some new plugins, lots of bugfixes and even &quot;quality-of-life improvements&quot;</li>
<li>There&#39;s a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options</li>
<li>You can get it in PCBSD&#39;s edge repo or install it through regular ports (on FreeBSD, OpenBSD <em>or</em> DragonFly!)</li>
<li>If you haven&#39;t seen our episode about Lumina, where we interview the developer and show you a tour of its features, <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">gotta go watch it</a>
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html" rel="nofollow">My first OpenBSD port</a></h3>

<ul>
<li>The author of the &quot;Code Rot &amp; Why I Chose OpenBSD&quot; article has a new post up, this time about ports</li>
<li>He recently made his first port and got it into the tree, so he talks about the whole process from start to finish</li>
<li>After learning some of the basics and becoming comfortable running -current, he noticed there wasn&#39;t a port for the &quot;Otter&quot; web browser</li>
<li>At that point he did what you&#39;re <em>supposed to do</em> in that situation, and started working on it himself</li>
<li>OpenBSD has a great <a href="http://www.openbsd.org/faq/ports/" rel="nofollow">porter&#39;s handbook</a> that he referenced throughout the process</li>
<li>Long story short, his browser of choice is in the official ports collection and now he&#39;s the maintainer (and gets to deal with any bug reports, of course)</li>
<li>If some software you use isn&#39;t available for whatever BSD you&#39;re using, you could be the one to make it happen
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/" rel="nofollow">How to slide with DragonFly</a></h3>

<ul>
<li>DragonFly BSD has a new HAMMER FS utility called &quot;Slider&quot;</li>
<li>It&#39;s used to easily browse through file history and undelete files - imagine something like a commandline version of Apple&#39;s Time Machine</li>
<li>They have a pretty comprehensive guide on how to use it on their wiki page</li>
<li>If you&#39;re using HAMMER FS, this is a really handy tool to have, check it out
***</li>
</ul>

<h3><a href="https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/" rel="nofollow">OpenSMTPD with Dovecot and Salt</a></h3>

<ul>
<li>We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three</li>
<li>This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment</li>
<li>Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan</li>
<li>&quot;Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with&quot;</li>
<li>Check it out if you&#39;ve been thinking about configuring your first mail server on any of the BSDs
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20q2fSfEO" rel="nofollow">Christopher writes in</a> (<a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os" rel="nofollow">handbook section</a>)</li>
<li><a href="http://slexy.org/view/s2zGvAczeN" rel="nofollow">Mark writes in</a></li>
<li><a href="http://slexy.org/view/s21Dn2Tey8" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s215nxxrtF" rel="nofollow">Stefano writes in</a></li>
<li><a href="http://slexy.org/view/s20cwezc9l" rel="nofollow">Matthew writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142194821910087&w=2" rel="nofollow">Not that interested actually</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html" rel="nofollow">This guy again</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html" rel="nofollow">Yep, this is the place</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ve got something a little bit different for you. We&#39;ll be talking with Andrew Tanenbaum, the creator of MINIX. They&#39;ve recently imported parts of NetBSD into their OS, and we&#39;ll find out how and why that came about. As always, all the latest news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/" rel="nofollow">The missing EuroBSDCon videos</a></h3>

<ul>
<li>Some of the missing videos from EuroBSDCon 2014 <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">we mentioned before</a> have mysteriously appeared</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/01.Keynote%20-%20FreeBSD:%20looking%20forward%20to%20another%2010%20years%20-%20Jordan%20Hubbard.mp4" rel="nofollow">FreeBSD, looking forward to another 10 years</a></li>
<li>Lourival Viera Neto, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/06.NFS%20scripting%20with%20Lua%20-%20Lourival%20Viera%20Neto.mp4" rel="nofollow">NPF scripting with Lua</a></li>
<li>Kris Moore, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/02.Snapshots,%20replication%20and%20boot%20environments%20-%20Kris%20Moore.mp4" rel="nofollow">Snapshots, replication and boot environments</a></li>
<li>Andy Tanenbaum, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/07.A%20reimplementation%20of%20NetBSD%20based%20on%20a%20microkernel%20-%20Andy%20Tanenbaum.mp4" rel="nofollow">A reimplementation of NetBSD based on a microkernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/03.An%20introduction%20to%20the%20implementation%20of%20ZFS%20-%20Kirk%20McKusick.mp4" rel="nofollow">An introduction to FreeBSD&#39;s implementation of ZFS</a></li>
<li>Emannuel Dreyfus, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/05.FUSE%20and%20beyond:%20bridging%20filesystems%20-%20Emannuel%20Dreyfus.mp4" rel="nofollow">FUSE and beyond, bridging filesystems</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">John-Mark Gurney</a>, <a href="https://va.ludost.net/files/eurobsdcon/2014/Vitosha/03.Saturday/04.Optimizing%20GELI%20performance%20-%20John-Mark%20Gurney.mp4" rel="nofollow">Optimizing GELI performance</a></li>
<li>Unfortunately, there are still about six talks missing… and no ETA
***</li>
</ul>

<h3><a href="https://gist.github.com/mpasternacki/974e29d1e3865e940c53" rel="nofollow">FreeBSD on a MacBook Pro (or two)</a></h3>

<ul>
<li>We&#39;ve got a couple posts about running FreeBSD on a MacBook Pro this week</li>
<li>In the first one, the author talks a bit about trying to run Linux on his laptop for quite a while, going back and forth between it and something that Just Works™</li>
<li>Eventually he came full circle, and the focus on using only GUI tools got in the way, instead of making things easier</li>
<li>He works on a lot of FreeBSD-related software, so switching to it for a desktop seems to be the obvious next step</li>
<li>He&#39;s still not quite to that point yet, but documents his experiments with BSD as a desktop</li>
<li>The <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-13-late.html" rel="nofollow">second article</a> also documents an ex-Linux user switching over to BSD for their desktop</li>
<li>It <a href="http://blog.foxkit.us/2015/01/freebsd-on-apple-macbook-pro-82-now.html" rel="nofollow">also covers</a> power management, bluetooth and trackpad setup</li>
<li>On the topic of Gentoo, &quot;Underneath the beautiful and easy-to-use Portage system lies the same glibc, the same turmoil over a switch to a less-than-ideal init system, and the same kernel-level bugs that bring my productivity down&quot;</li>
<li>Check out both articles if you&#39;ve been considering running FreeBSD on a MacBook
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142136923124184&w=2" rel="nofollow">Remote logging over TLS</a></h3>

<ul>
<li>In most of the BSDs, syslogd has been able to remotely send logs to another server for a long time</li>
<li>That feature can be very useful, especially for forensics purposes - it&#39;s much harder for an attacker to hide their activities if the logs aren&#39;t on the same server</li>
<li>The problem is, of course, that it&#39;s <a href="https://en.wikipedia.org/wiki/Syslog#Protocol" rel="nofollow">sent in cleartext</a>, unless you tunnel it over SSH or use some kind of third party wrapper</li>
<li>With a few <a href="https://www.marc.info/?l=openbsd-cvs&m=142160989610410&w=2" rel="nofollow">recent commits</a>, OpenBSD&#39;s syslogd now supports sending logs over TLS natively, including X509 certificate verification</li>
<li>By default, syslogd runs as an unprivileged user in a chroot on OpenBSD, so there were some initial concerns about certificate verification - how does that user access the CA chain <em>outside</em> of the chroot?</li>
<li>That problem <a href="https://www.marc.info/?l=openbsd-tech&m=142188450524692&w=2" rel="nofollow">was also conquered</a>, by loading the CA chain <a href="https://www.marc.info/?l=openbsd-cvs&m=142191799331938&w=2" rel="nofollow">directly from memory</a>, so the entire process <a href="https://www.marc.info/?l=openbsd-cvs&m=142191819131993&w=2" rel="nofollow">can be run in the chroot</a> without issue</li>
<li>Some of the privsep verifcation code even <a href="https://www.marc.info/?l=openbsd-cvs&m=142191878632141&w=2" rel="nofollow">made its way into</a> LibreSSL right afterwards</li>
<li>If you haven&#39;t set up remote logging before, now might be an interesting time to try it out
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=wwbO4eTieQY" rel="nofollow">FreeBSD, not a Linux distro</a></h3>

<ul>
<li>George Neville-Neil gave a presentation recently, titled &quot;FreeBSD: not a Linux distro&quot;</li>
<li>It&#39;s meant to be an introduction to new users that might&#39;ve heard about FreeBSD, but aren&#39;t familiar with any BSD history</li>
<li>He goes through some of that history, and talks about what FreeBSD is and why you might want to use it over other options</li>
<li>There&#39;s even an interesting &quot;thirty years in three minutes&quot; segment</li>
<li>It&#39;s not just a history lesson though, he talks about some of the current features and even some new things coming in the next version(s)</li>
<li>We also learn about filesystems, jails, capsicum, clang, dtrace and the various big companies using FreeBSD in their products</li>
<li>This might be a good video to show your friends or potential employer if you&#39;re looking to introduce FreeBSD to them 
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/long-term-support-considered-harmful" rel="nofollow">Long-term support considered harmful</a></h3>

<ul>
<li>There was recently a <a href="https://www.marc.info/?l=bugtraq&m=142237866420639&w=2" rel="nofollow">pretty horrible bug</a> in GNU&#39;s libc (BSDs aren&#39;t affected, don&#39;t worry)</li>
<li>Aside from the severity of the actual problem, the fix was <a href="https://code.google.com/p/chromium/issues/detail?id=364511" rel="nofollow">delayed</a> for quite a long time, leaving people vulnerable</li>
<li>Ted Unangst writes a post about how this <a href="https://plus.google.com/u/0/+ArtoPekkanen/posts/88jk5ggXYts?cfem=1" rel="nofollow">idea of long-term support</a> could actually be harmful in the long run, and compares it to how OpenBSD does things</li>
<li>OpenBSD releases a new version every six months, and only the two most recent releases get support and security fixes</li>
<li>He describes this as both a good thing and a bad thing: all the bugs in the ecosystem get flushed out within a year, but it forces people to stay (relatively) up-to-date</li>
<li>&quot;Upgrades only get harder and more painful (and more fragile) the longer one goes between them. More changes, more damage. Frequent upgrades amortize the cost and ensure that regressions are caught early.&quot;</li>
<li>There was also <a href="https://lobste.rs/s/a4iijx/long_term_support_considered_harmful" rel="nofollow">some</a> <a href="https://news.ycombinator.com/item?id=8954737" rel="nofollow">discussion</a> about the article you can check out
***</li>
</ul>

<h2>Interview - Andrew Tanenbaum - <a href="mailto:info@minix3.org" rel="nofollow">info@minix3.org</a> / <a href="https://twitter.com/minix3" rel="nofollow">@minix3</a></h2>

<p>MINIX&#39;s integration of NetBSD</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.undeadly.org/cgi?action=article&sid=20150121093259" rel="nofollow">Using AFL on OpenBSD</a></h3>

<ul>
<li>We&#39;ve talked about <a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a> a bit on a previous episode, and how some OpenBSD devs <a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">are using it</a> to catch and fix new bugs</li>
<li>Undeadly has a cool guide on how you can get started with fuzzing</li>
<li>It&#39;s a little on the advanced side, but if you&#39;re interested in programming or diagnosing crashes, it&#39;ll be a really interesting article to read</li>
<li>Lots of recent CVEs in other open source projects are attributed to fuzzing - it&#39;s a great way to stress test your software
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/lumina-desktop-0-8-1-released/" rel="nofollow">Lumina 0.8.1 released</a></h3>

<ul>
<li>A new version of Lumina, the BSD-licensed desktop environment from PCBSD, has been released</li>
<li>This update includes some new plugins, lots of bugfixes and even &quot;quality-of-life improvements&quot;</li>
<li>There&#39;s a new audio player desktop plugin, a button to easily minimize all windows at once and some cool new customization options</li>
<li>You can get it in PCBSD&#39;s edge repo or install it through regular ports (on FreeBSD, OpenBSD <em>or</em> DragonFly!)</li>
<li>If you haven&#39;t seen our episode about Lumina, where we interview the developer and show you a tour of its features, <a href="http://www.bsdnow.tv/episodes/2014_09_10-luminary_environment" rel="nofollow">gotta go watch it</a>
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/my-first-openbsd-port.html" rel="nofollow">My first OpenBSD port</a></h3>

<ul>
<li>The author of the &quot;Code Rot &amp; Why I Chose OpenBSD&quot; article has a new post up, this time about ports</li>
<li>He recently made his first port and got it into the tree, so he talks about the whole process from start to finish</li>
<li>After learning some of the basics and becoming comfortable running -current, he noticed there wasn&#39;t a port for the &quot;Otter&quot; web browser</li>
<li>At that point he did what you&#39;re <em>supposed to do</em> in that situation, and started working on it himself</li>
<li>OpenBSD has a great <a href="http://www.openbsd.org/faq/ports/" rel="nofollow">porter&#39;s handbook</a> that he referenced throughout the process</li>
<li>Long story short, his browser of choice is in the official ports collection and now he&#39;s the maintainer (and gets to deal with any bug reports, of course)</li>
<li>If some software you use isn&#39;t available for whatever BSD you&#39;re using, you could be the one to make it happen
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/docs/howtos/howtoslide/" rel="nofollow">How to slide with DragonFly</a></h3>

<ul>
<li>DragonFly BSD has a new HAMMER FS utility called &quot;Slider&quot;</li>
<li>It&#39;s used to easily browse through file history and undelete files - imagine something like a commandline version of Apple&#39;s Time Machine</li>
<li>They have a pretty comprehensive guide on how to use it on their wiki page</li>
<li>If you&#39;re using HAMMER FS, this is a really handy tool to have, check it out
***</li>
</ul>

<h3><a href="https://blog.al-shami.net/2015/01/howto-small-mail-server-with-salt-dovecot-and-opensmtpd/" rel="nofollow">OpenSMTPD with Dovecot and Salt</a></h3>

<ul>
<li>We recently had a feedback question about which mail servers you can use on BSD - Postfix, Exim and OpenSMTPD being the big three</li>
<li>This blog post details how to set up OpenSMTPD, including Dovecot for IMAP and Salt for quick and easy deployment</li>
<li>Intrigued by it becoming the default MTA in OpenBSD, the author decided to give it a try after being a long-time Postfix fan</li>
<li>&quot;Small, fast, stable, and very easy to customize, no more ugly m4 macros to deal with&quot;</li>
<li>Check it out if you&#39;ve been thinking about configuring your first mail server on any of the BSDs
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20q2fSfEO" rel="nofollow">Christopher writes in</a> (<a href="https://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/jails-ezjail.html#jails-ezjail-update-os" rel="nofollow">handbook section</a>)</li>
<li><a href="http://slexy.org/view/s2zGvAczeN" rel="nofollow">Mark writes in</a></li>
<li><a href="http://slexy.org/view/s21Dn2Tey8" rel="nofollow">Kevin writes in</a></li>
<li><a href="http://slexy.org/view/s215nxxrtF" rel="nofollow">Stefano writes in</a></li>
<li><a href="http://slexy.org/view/s20cwezc9l" rel="nofollow">Matthew writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142194821910087&w=2" rel="nofollow">Not that interested actually</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-jail/2015-January/002742.html" rel="nofollow">This guy again</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2015-January/024888.html" rel="nofollow">Yep, this is the place</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>73: Pipe Dreams</title>
  <link>https://www.bsdnow.tv/73</link>
  <guid isPermaLink="false">bca95163-7c0b-4440-902b-594ea8c61554</guid>
  <pubDate>Wed, 21 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/bca95163-7c0b-4440-902b-594ea8c61554.mp3" length="65969428" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be chatting with David Maxwell, a former NetBSD security officer. He's got an interesting project called Pipecut that takes a whole new approach to the commandline. We've also got answers to viewer-submitted questions and all this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:31:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show we'll be chatting with David Maxwell, a former NetBSD security officer. He's got an interesting project called Pipecut that takes a whole new approach to the commandline. We've also got answers to viewer-submitted questions and all this week's headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.digitalocean.com/" title="DigitalOcean" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2014-10-2014-12.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD quarterly status report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD team has posted an updated on some of their activities between October and December of 2014&lt;/li&gt;
&lt;li&gt;They put a big focus on compatibility with other systems: the Linux emulation layer, &lt;a href="http://www.bsdnow.tv/tutorials/bhyve" target="_blank" rel="nofollow noopener"&gt;bhyve&lt;/a&gt;, WINE and Xen all got some nice improvements&lt;/li&gt;
&lt;li&gt;As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure&lt;/li&gt;
&lt;li&gt;The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs&lt;/li&gt;
&lt;li&gt;FreeBSD's forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)&lt;/li&gt;
&lt;li&gt;Git was promoted from beta to an officially-supported version control system (Kris is happy)&lt;/li&gt;
&lt;li&gt;The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints&lt;/li&gt;
&lt;li&gt;Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more "cloud" services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements&lt;/li&gt;
&lt;li&gt;Check out the full report for all the details that we didn't cover
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/" target="_blank" rel="nofollow noopener"&gt;OpenBSD package signature audit&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"Linux Audit" is a website focused on auditing and hardening systems, as well as educating people about securing their boxes&lt;/li&gt;
&lt;li&gt;They recently did an article about OpenBSD, specifically their &lt;a href="http://www.bsdnow.tv/tutorials/ports-obsd" target="_blank" rel="nofollow noopener"&gt;ports and package system&lt;/a&gt; and signing infrastructure&lt;/li&gt;
&lt;li&gt;The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed&lt;/li&gt;
&lt;li&gt;Package signature formats and public key distribution methods are also touched on&lt;/li&gt;
&lt;li&gt;After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future&lt;/li&gt;
&lt;li&gt;If you haven't seen &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;our episode about signify&lt;/a&gt; with Ted Unangst, that would be a great one to check out after reading this
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd" target="_blank" rel="nofollow noopener"&gt;Replacing a Linux router with BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one&lt;/li&gt;
&lt;li&gt;The poster begins with "I'm in the camp that doesn't trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I'd run Windows NT, not Linux. So I've decided to migrate my homebrew router/firewall/samba server to one of the BSDs."&lt;/li&gt;
&lt;li&gt;A lot of people were quick to recommend &lt;a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" target="_blank" rel="nofollow noopener"&gt;OPNsense&lt;/a&gt; and pfSense, being that they're very easy to administer (requiring basically no BSD knowledge at all)&lt;/li&gt;
&lt;li&gt;Other commenters suggested a more hands-on approach, setting one up yourself with &lt;a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt; or &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;OpenBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;If you've been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through&lt;/li&gt;
&lt;li&gt;Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you'll have to wade through some of that to get to the good information
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL in FreeBSD and OPNsense&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)&lt;/li&gt;
&lt;li&gt;The reasoning being that updates in base &lt;a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" target="_blank" rel="nofollow noopener"&gt;tend to lag behind&lt;/a&gt;, whereas the port can be updated for security very quickly&lt;/li&gt;
&lt;li&gt;OPNsense developers are &lt;a href="https://twitter.com/fitchitis/status/555625679614521345" target="_blank" rel="nofollow noopener"&gt;looking into&lt;/a&gt;  &lt;a href="http://forum.opnsense.org/index.php?topic=21.0" target="_blank" rel="nofollow noopener"&gt;switching away&lt;/a&gt; from OpenSSL to &lt;a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" target="_blank" rel="nofollow noopener"&gt;LibreSSL's portable version&lt;/a&gt;, for both their ports and base system, which would be a pretty huge differentiator for their project&lt;/li&gt;
&lt;li&gt;Some ports &lt;a href="https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&amp;amp;query_format=advanced&amp;amp;short_desc=libressl&amp;amp;short_desc_type=allwordssubstr" target="_blank" rel="nofollow noopener"&gt;still need fixing&lt;/a&gt; to be compatible though, particularly &lt;a href="https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057" target="_blank" rel="nofollow noopener"&gt;a few&lt;/a&gt; &lt;a href="https://github.com/pyca/cryptography/issues/928" target="_blank" rel="nofollow noopener"&gt;python-related&lt;/a&gt; ones&lt;/li&gt;
&lt;li&gt;If you're a FreeBSD ports person, get involved and help squash some of the last remaining bugs&lt;/li&gt;
&lt;li&gt;A lot of the work has already been done &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/" target="_blank" rel="nofollow noopener"&gt;in OpenBSD's ports tree&lt;/a&gt; - some patches just need to be adopted&lt;/li&gt;
&lt;li&gt;More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you're using it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - David Maxwell - &lt;a href="mailto:david@netbsd.org" target="_blank" rel="nofollow noopener"&gt;david@netbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/david_w_maxwell" target="_blank" rel="nofollow noopener"&gt;@david_w_maxwell&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" target="_blank" rel="nofollow noopener"&gt;Pipecut&lt;/a&gt;, text processing, commandline wizardry&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/3ofcoins/jetpack" target="_blank" rel="nofollow noopener"&gt;Jetpack, a new jail container system&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new project was launched to adapt FreeBSD jails to the "app container specification"&lt;/li&gt;
&lt;li&gt;While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker&lt;/li&gt;
&lt;li&gt;It's a similar project to &lt;a href="https://github.com/pannon/iocage" target="_blank" rel="nofollow noopener"&gt;iocage&lt;/a&gt; or &lt;a href="https://github.com/ployground/bsdploy" target="_blank" rel="nofollow noopener"&gt;bsdploy&lt;/a&gt;, which we haven't talked a whole lot about&lt;/li&gt;
&lt;li&gt;There was also &lt;a href="https://news.ycombinator.com/item?id=8893630" target="_blank" rel="nofollow noopener"&gt;some discussion&lt;/a&gt; about it on Hacker News
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/BSD/comments/2szofc" target="_blank" rel="nofollow noopener"&gt;Separating base and package binaries&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;All of the main BSDs make a strong separation between the base system and third party software&lt;/li&gt;
&lt;li&gt;This is in contrast to Linux where there's no real concept of a "base system" - more recently, some distros have even merged all the binaries into a single directory&lt;/li&gt;
&lt;li&gt;A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies&lt;/li&gt;
&lt;li&gt;Read the comments for the full explanation, but having things separated really helps keep things organized
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=277487" target="_blank" rel="nofollow noopener"&gt;Updated i915kms driver for FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward&lt;/li&gt;
&lt;li&gt;It doesn't introduce Haswell support just yet, but was required before the Haswell bits can be added
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/" target="_blank" rel="nofollow noopener"&gt;Year of the OpenBSD desktop&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have an article about using OpenBSD as a daily driver for regular desktop usage&lt;/li&gt;
&lt;li&gt;The author says he "ran fifty thousand different distributions, never being satisfied"&lt;/li&gt;
&lt;li&gt;After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook&lt;/li&gt;
&lt;li&gt;He also used FreeBSD between versions 7 and 9, finding a "a mostly harmonious environment," but regressions lead him to give up on desktop *nix once again&lt;/li&gt;
&lt;li&gt;Starting with 2015, he's back and is using OpenBSD on a Thinkpad x201&lt;/li&gt;
&lt;li&gt;The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup&lt;/li&gt;
&lt;li&gt;He apparently used &lt;a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" target="_blank" rel="nofollow noopener"&gt;our desktop tutorial&lt;/a&gt; - thanks for watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html" target="_blank" rel="nofollow noopener"&gt;Unattended FreeBSD installation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE&lt;/li&gt;
&lt;li&gt;His goal was to have a setup similar to Redhat's "kickstart" or &lt;a href="http://www.bsdnow.tv/tutorials/autoinstall" target="_blank" rel="nofollow noopener"&gt;OpenBSD's autoinstall&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The article shows you how to set up DHCP and TFTP, with no NFS share setup required&lt;/li&gt;
&lt;li&gt;He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20UsZjN4h" target="_blank" rel="nofollow noopener"&gt;Robert writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s219cMQz3U" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2EkzMUMyb" target="_blank" rel="nofollow noopener"&gt;l33tname writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2nq6L6H1n" target="_blank" rel="nofollow noopener"&gt;Charlie writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21EGqUYLd" target="_blank" rel="nofollow noopener"&gt;Eric writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=142159202606668&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Clowning around&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html" target="_blank" rel="nofollow noopener"&gt;Better than succeeding in this case&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pipecut, david maxwell, commandline, shell, libressl, router, pf, cryptography, router, openssl, bhyve, digitalocean</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be chatting with David Maxwell, a former NetBSD security officer. He&#39;s got an interesting project called Pipecut that takes a whole new approach to the commandline. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-10-2014-12.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted an updated on some of their activities between October and December of 2014</li>
<li>They put a big focus on compatibility with other systems: the Linux emulation layer, <a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">bhyve</a>, WINE and Xen all got some nice improvements</li>
<li>As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure</li>
<li>The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs</li>
<li>FreeBSD&#39;s forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)</li>
<li>Git was promoted from beta to an officially-supported version control system (Kris is happy)</li>
<li>The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints</li>
<li>Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more &quot;cloud&quot; services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements</li>
<li>Check out the full report for all the details that we didn&#39;t cover
***</li>
</ul>

<h3><a href="http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/" rel="nofollow">OpenBSD package signature audit</a></h3>

<ul>
<li>&quot;Linux Audit&quot; is a website focused on auditing and hardening systems, as well as educating people about securing their boxes</li>
<li>They recently did an article about OpenBSD, specifically their <a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">ports and package system</a> and signing infrastructure</li>
<li>The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed</li>
<li>Package signature formats and public key distribution methods are also touched on</li>
<li>After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future</li>
<li>If you haven&#39;t seen <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">our episode about signify</a> with Ted Unangst, that would be a great one to check out after reading this
***</li>
</ul>

<h3><a href="http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd" rel="nofollow">Replacing a Linux router with BSD</a></h3>

<ul>
<li>There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one</li>
<li>The poster begins with &quot;I&#39;m in the camp that doesn&#39;t trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I&#39;d run Windows NT, not Linux. So I&#39;ve decided to migrate my homebrew router/firewall/samba server to one of the BSDs.&quot;</li>
<li>A lot of people were quick to recommend <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> and pfSense, being that they&#39;re very easy to administer (requiring basically no BSD knowledge at all)</li>
<li>Other commenters suggested a more hands-on approach, setting one up yourself with <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a></li>
<li>If you&#39;ve been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through</li>
<li>Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you&#39;ll have to wade through some of that to get to the good information
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html" rel="nofollow">LibreSSL in FreeBSD and OPNsense</a></h3>

<ul>
<li>A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)</li>
<li>The reasoning being that updates in base <a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" rel="nofollow">tend to lag behind</a>, whereas the port can be updated for security very quickly</li>
<li>OPNsense developers are <a href="https://twitter.com/fitchitis/status/555625679614521345" rel="nofollow">looking into</a>  <a href="http://forum.opnsense.org/index.php?topic=21.0" rel="nofollow">switching away</a> from OpenSSL to <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">LibreSSL&#39;s portable version</a>, for both their ports and base system, which would be a pretty huge differentiator for their project</li>
<li>Some ports <a href="https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&query_format=advanced&short_desc=libressl&short_desc_type=allwordssubstr" rel="nofollow">still need fixing</a> to be compatible though, particularly <a href="https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057" rel="nofollow">a few</a> <a href="https://github.com/pyca/cryptography/issues/928" rel="nofollow">python-related</a> ones</li>
<li>If you&#39;re a FreeBSD ports person, get involved and help squash some of the last remaining bugs</li>
<li>A lot of the work has already been done <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/" rel="nofollow">in OpenBSD&#39;s ports tree</a> - some patches just need to be adopted</li>
<li>More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you&#39;re using it
***</li>
</ul>

<h2>Interview - David Maxwell - <a href="mailto:david@netbsd.org" rel="nofollow">david@netbsd.org</a> / <a href="https://twitter.com/david_w_maxwell" rel="nofollow">@david_w_maxwell</a></h2>

<p><a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">Pipecut</a>, text processing, commandline wizardry</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow">Jetpack, a new jail container system</a></h3>

<ul>
<li>A new project was launched to adapt FreeBSD jails to the &quot;app container specification&quot;</li>
<li>While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker</li>
<li>It&#39;s a similar project to <a href="https://github.com/pannon/iocage" rel="nofollow">iocage</a> or <a href="https://github.com/ployground/bsdploy" rel="nofollow">bsdploy</a>, which we haven&#39;t talked a whole lot about</li>
<li>There was also <a href="https://news.ycombinator.com/item?id=8893630" rel="nofollow">some discussion</a> about it on Hacker News
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2szofc" rel="nofollow">Separating base and package binaries</a></h3>

<ul>
<li>All of the main BSDs make a strong separation between the base system and third party software</li>
<li>This is in contrast to Linux where there&#39;s no real concept of a &quot;base system&quot; - more recently, some distros have even merged all the binaries into a single directory</li>
<li>A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies</li>
<li>Read the comments for the full explanation, but having things separated really helps keep things organized
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=277487" rel="nofollow">Updated i915kms driver for FreeBSD</a></h3>

<ul>
<li>This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward</li>
<li>It doesn&#39;t introduce Haswell support just yet, but was required before the Haswell bits can be added
***</li>
</ul>

<h3><a href="http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/" rel="nofollow">Year of the OpenBSD desktop</a></h3>

<ul>
<li>Here we have an article about using OpenBSD as a daily driver for regular desktop usage</li>
<li>The author says he &quot;ran fifty thousand different distributions, never being satisfied&quot;</li>
<li>After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook</li>
<li>He also used FreeBSD between versions 7 and 9, finding a &quot;a mostly harmonious environment,&quot; but regressions lead him to give up on desktop *nix once again</li>
<li>Starting with 2015, he&#39;s back and is using OpenBSD on a Thinkpad x201</li>
<li>The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup</li>
<li>He apparently used <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">our desktop tutorial</a> - thanks for watching!
***</li>
</ul>

<h3><a href="http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html" rel="nofollow">Unattended FreeBSD installation</a></h3>

<ul>
<li>A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE</li>
<li>His goal was to have a setup similar to Redhat&#39;s &quot;kickstart&quot; or <a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">OpenBSD&#39;s autoinstall</a></li>
<li>The article shows you how to set up DHCP and TFTP, with no NFS share setup required</li>
<li>He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20UsZjN4h" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s219cMQz3U" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2EkzMUMyb" rel="nofollow">l33tname writes in</a></li>
<li><a href="http://slexy.org/view/s2nq6L6H1n" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21EGqUYLd" rel="nofollow">Eric writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142159202606668&w=2" rel="nofollow">Clowning around</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html" rel="nofollow">Better than succeeding in this case</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be chatting with David Maxwell, a former NetBSD security officer. He&#39;s got an interesting project called Pipecut that takes a whole new approach to the commandline. We&#39;ve also got answers to viewer-submitted questions and all this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/1.png" alt="iXsystems - Enterprise Servers and Storage for Open Source" /></a><a href="http://www.digitalocean.com/" title="DigitalOcean"><img src="/images/2.png" alt="DigitalOcean - Simple Cloud Hosting, Built for Developers" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/3.png" alt="Tarsnap - Online Backups for the Truly Paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-10-2014-12.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>The FreeBSD team has posted an updated on some of their activities between October and December of 2014</li>
<li>They put a big focus on compatibility with other systems: the Linux emulation layer, <a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">bhyve</a>, WINE and Xen all got some nice improvements</li>
<li>As always, the report has lots of updates from the various teams working on different parts of the OS and ports infrastructure</li>
<li>The release engineering team got 10.1 out the door, the ports team shuffled a few members in and out and continued working on closing more PRs</li>
<li>FreeBSD&#39;s forums underwent a huge change, and discussion about the new support model for release cycles continues (hopefully taking effect after 11.0 is released)</li>
<li>Git was promoted from beta to an officially-supported version control system (Kris is happy)</li>
<li>The core team is also assembling a new QA team to ensure better code quality in critical areas, such as security and release engineering, after getting a number of complaints</li>
<li>Other notable entries include: lots of bhyve fixes, Clang/LLVM being updated to 3.5.0, ongoing work to the external toolchain, adding FreeBSD support to more &quot;cloud&quot; services, pkgng updates, work on SecureBoot, more ARM support and graphics stack improvements</li>
<li>Check out the full report for all the details that we didn&#39;t cover
***</li>
</ul>

<h3><a href="http://linux-audit.com/vulnerabilities-and-digital-signatures-for-openbsd-software-packages/" rel="nofollow">OpenBSD package signature audit</a></h3>

<ul>
<li>&quot;Linux Audit&quot; is a website focused on auditing and hardening systems, as well as educating people about securing their boxes</li>
<li>They recently did an article about OpenBSD, specifically their <a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">ports and package system</a> and signing infrastructure</li>
<li>The author gives a little background on the difference between ports and binary packages, then goes through the technical details of how releases and packages are cryptographically signed</li>
<li>Package signature formats and public key distribution methods are also touched on</li>
<li>After some heckling, the author of the post said he plans to write more BSD security articles, so look forward to them in the future</li>
<li>If you haven&#39;t seen <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">our episode about signify</a> with Ted Unangst, that would be a great one to check out after reading this
***</li>
</ul>

<h3><a href="http://ask.slashdot.org/story/15/01/15/1547209/ask-slashdot-migrating-a-router-from-linux-to-bsd" rel="nofollow">Replacing a Linux router with BSD</a></h3>

<ul>
<li>There was recently a Slashdot discussion about migrating a Linux-based router to a BSD-based one</li>
<li>The poster begins with &quot;I&#39;m in the camp that doesn&#39;t trust systemd. You can discuss the technical merits of all init solutions all you want, but if I wanted to run Windows NT I&#39;d run Windows NT, not Linux. So I&#39;ve decided to migrate my homebrew router/firewall/samba server to one of the BSDs.&quot;</li>
<li>A lot of people were quick to recommend <a href="http://www.bsdnow.tv/episodes/2015_01_14-common_sense_approach" rel="nofollow">OPNsense</a> and pfSense, being that they&#39;re very easy to administer (requiring basically no BSD knowledge at all)</li>
<li>Other commenters suggested a more hands-on approach, setting one up yourself with <a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">FreeBSD</a> or <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD</a></li>
<li>If you&#39;ve been thinking about moving some routers over from Linux or other commercial solution, this might be a good discussion to read through</li>
<li>Unfortunately, a lot of the comments are just Linux users bickering about systemd, so you&#39;ll have to wade through some of that to get to the good information
***</li>
</ul>

<h3><a href="http://bsdxbsdx.blogspot.com/2015/01/switching-to-openssl-from-ports-in.html" rel="nofollow">LibreSSL in FreeBSD and OPNsense</a></h3>

<ul>
<li>A FreeBSD sysadmin has started documenting his experience replacing OpenSSL in the base system with the one from ports (and also experimenting with LibreSSL)</li>
<li>The reasoning being that updates in base <a href="http://www.openbsd.org/papers/eurobsdcon2014-libressl.html" rel="nofollow">tend to lag behind</a>, whereas the port can be updated for security very quickly</li>
<li>OPNsense developers are <a href="https://twitter.com/fitchitis/status/555625679614521345" rel="nofollow">looking into</a>  <a href="http://forum.opnsense.org/index.php?topic=21.0" rel="nofollow">switching away</a> from OpenSSL to <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">LibreSSL&#39;s portable version</a>, for both their ports and base system, which would be a pretty huge differentiator for their project</li>
<li>Some ports <a href="https://bugs.freebsd.org/bugzilla/buglist.cgi?order=Importance&query_format=advanced&short_desc=libressl&short_desc_type=allwordssubstr" rel="nofollow">still need fixing</a> to be compatible though, particularly <a href="https://github.com/opnsense/ports/commit/c15af648e9d5fcecf0ae666292e8f41c08979057" rel="nofollow">a few</a> <a href="https://github.com/pyca/cryptography/issues/928" rel="nofollow">python-related</a> ones</li>
<li>If you&#39;re a FreeBSD ports person, get involved and help squash some of the last remaining bugs</li>
<li>A lot of the work has already been done <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/ports/" rel="nofollow">in OpenBSD&#39;s ports tree</a> - some patches just need to be adopted</li>
<li>More and more upstream projects are incorporating LibreSSL patches in their code - let your favorite software vendor know that you&#39;re using it
***</li>
</ul>

<h2>Interview - David Maxwell - <a href="mailto:david@netbsd.org" rel="nofollow">david@netbsd.org</a> / <a href="https://twitter.com/david_w_maxwell" rel="nofollow">@david_w_maxwell</a></h2>

<p><a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">Pipecut</a>, text processing, commandline wizardry</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/3ofcoins/jetpack" rel="nofollow">Jetpack, a new jail container system</a></h3>

<ul>
<li>A new project was launched to adapt FreeBSD jails to the &quot;app container specification&quot;</li>
<li>While still pretty experimental in terms of the development phase, this might be something to show your Linux friends who are in love with docker</li>
<li>It&#39;s a similar project to <a href="https://github.com/pannon/iocage" rel="nofollow">iocage</a> or <a href="https://github.com/ployground/bsdploy" rel="nofollow">bsdploy</a>, which we haven&#39;t talked a whole lot about</li>
<li>There was also <a href="https://news.ycombinator.com/item?id=8893630" rel="nofollow">some discussion</a> about it on Hacker News
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2szofc" rel="nofollow">Separating base and package binaries</a></h3>

<ul>
<li>All of the main BSDs make a strong separation between the base system and third party software</li>
<li>This is in contrast to Linux where there&#39;s no real concept of a &quot;base system&quot; - more recently, some distros have even merged all the binaries into a single directory</li>
<li>A user asks the community about the BSD way of doing it, trying to find out the advantages and disadvantages of both hierarchies</li>
<li>Read the comments for the full explanation, but having things separated really helps keep things organized
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=277487" rel="nofollow">Updated i915kms driver for FreeBSD</a></h3>

<ul>
<li>This update brings the FreeBSD code closer inline with the Linux code, to make it easier to update going forward</li>
<li>It doesn&#39;t introduce Haswell support just yet, but was required before the Haswell bits can be added
***</li>
</ul>

<h3><a href="http://zacbrown.org/2015/01/18/openbsd-as-a-desktop/" rel="nofollow">Year of the OpenBSD desktop</a></h3>

<ul>
<li>Here we have an article about using OpenBSD as a daily driver for regular desktop usage</li>
<li>The author says he &quot;ran fifty thousand different distributions, never being satisfied&quot;</li>
<li>After dealing with the problems of Linux and fragmentation, he eventually gave up and bought a Macbook</li>
<li>He also used FreeBSD between versions 7 and 9, finding a &quot;a mostly harmonious environment,&quot; but regressions lead him to give up on desktop *nix once again</li>
<li>Starting with 2015, he&#39;s back and is using OpenBSD on a Thinkpad x201</li>
<li>The rest of the article covers some of his configuration tweaks and gives an overall conclusion on his current setup</li>
<li>He apparently used <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">our desktop tutorial</a> - thanks for watching!
***</li>
</ul>

<h3><a href="http://louwrentius.com/freebsd-101-unattended-install-over-pxe-http-no-nfs.html" rel="nofollow">Unattended FreeBSD installation</a></h3>

<ul>
<li>A new BSD user was looking to get some more experience, so he documented how to install FreeBSD over PXE</li>
<li>His goal was to have a setup similar to Redhat&#39;s &quot;kickstart&quot; or <a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">OpenBSD&#39;s autoinstall</a></li>
<li>The article shows you how to set up DHCP and TFTP, with no NFS share setup required</li>
<li>He also gives a mention to mfsbsd, showing how you can customize its startup script to do most of the work for you
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20UsZjN4h" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s219cMQz3U" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2EkzMUMyb" rel="nofollow">l33tname writes in</a></li>
<li><a href="http://slexy.org/view/s2nq6L6H1n" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s21EGqUYLd" rel="nofollow">Eric writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=142159202606668&w=2" rel="nofollow">Clowning around</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097734.html" rel="nofollow">Better than succeeding in this case</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>72: Common *Sense Approach</title>
  <link>https://www.bsdnow.tv/72</link>
  <guid isPermaLink="false">efe89103-4a81-4974-89f3-cb650975dace</guid>
  <pubDate>Wed, 14 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/efe89103-4a81-4974-89f3-cb650975dace.mp3" length="57654580" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We'll learn some of the backstory and see what they've got planned for the future. We've also got all this week's news and answers to all your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Be your own VPN provider with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don't trust any VPN company?&lt;/li&gt;
&lt;li&gt;It's easy for anyone to say "of course we don't run a modified version of OpenVPN that logs all your traffic... what are you talking about?"&lt;/li&gt;
&lt;li&gt;The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk&lt;/li&gt;
&lt;li&gt;With this guide, you'll be able to cut out the middleman and create your own VPN, using OpenBSD&lt;/li&gt;
&lt;li&gt;It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" target="_blank" rel="nofollow noopener"&gt;FreeBSD vs Gentoo comparison&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software&lt;/li&gt;
&lt;li&gt;This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems&lt;/li&gt;
&lt;li&gt;The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things&lt;/li&gt;
&lt;li&gt;If you're a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=142120787308107&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Kernel W&lt;sup&gt;X&lt;/sup&gt; in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;W&lt;sup&gt;X,&lt;/sup&gt; "&lt;a href="https://en.wikipedia.org/wiki/W%5EX" target="_blank" rel="nofollow noopener"&gt;Write XOR Execute&lt;/a&gt;," is a security feature of OpenBSD with a rather strange-looking name&lt;/li&gt;
&lt;li&gt;It's meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time&lt;/li&gt;
&lt;li&gt;This helps prevent some types of buffer overflows: code injected into it &lt;em&gt;won't&lt;/em&gt; execute, but &lt;em&gt;will&lt;/em&gt; crash the program (quite obviously the lesser of the two evils)&lt;/li&gt;
&lt;li&gt;Through some recent work, OpenBSD's kernel now has no part of the address space without this feature - whereas it was only enabled in the userland &lt;a href="http://www.openbsd.org/papers/ru13-deraadt/" target="_blank" rel="nofollow noopener"&gt;previously&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Doing this incorrectly in the kernel could lead to &lt;strong&gt;far worse&lt;/strong&gt; consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that's been in the works for a while&lt;/li&gt;
&lt;li&gt;More technical details can be found in some &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141917924602780&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recent CVS commits&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" target="_blank" rel="nofollow noopener"&gt;Building an IPFW-based router&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've covered building &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;routers with PF&lt;/a&gt; many times before, but what about &lt;a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" target="_blank" rel="nofollow noopener"&gt;IPFW&lt;/a&gt;?&lt;/li&gt;
&lt;li&gt;A certain host of a certain podcast decided it was finally time to replace his &lt;a href="https://github.com/jduck/asus-cmd" target="_blank" rel="nofollow noopener"&gt;disappointing&lt;/a&gt; consumer router with something BSD-based&lt;/li&gt;
&lt;li&gt;In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall&lt;/li&gt;
&lt;li&gt;He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit&lt;/li&gt;
&lt;li&gt;If you're an IPFW fan and are thinking about putting together a new router, give this post a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jos Schellevis - &lt;a href="mailto:project@opnsense.org" target="_blank" rel="nofollow noopener"&gt;project@opnsense.org&lt;/a&gt; / &lt;a href="https://twitter.com/opnsense" target="_blank" rel="nofollow noopener"&gt;@opnsense&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The birth of &lt;a href="http://opnsense.org" target="_blank" rel="nofollow noopener"&gt;OPNsense&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" target="_blank" rel="nofollow noopener"&gt;On profiling HTTP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd, who &lt;a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" target="_blank" rel="nofollow noopener"&gt;we've had on the show before&lt;/a&gt;, has been doing some more ultra-high performance testing&lt;/li&gt;
&lt;li&gt;Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools&lt;/li&gt;
&lt;li&gt;According to him, it's "not very pretty"&lt;/li&gt;
&lt;li&gt;He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process&lt;/li&gt;
&lt;li&gt;You can check out his new code &lt;a href="https://github.com/erikarn/libevhtp-http/" target="_blank" rel="nofollow noopener"&gt;on Github&lt;/a&gt; right now
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&amp;amp;t=8846" target="_blank" rel="nofollow noopener"&gt;Using divert(4) to reduce attacks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We talked about using &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" target="_blank" rel="nofollow noopener"&gt;divert(4)&lt;/a&gt; with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)&lt;/li&gt;
&lt;li&gt;It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you're running&lt;/li&gt;
&lt;li&gt;PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won't work&lt;/li&gt;
&lt;li&gt;The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious&lt;/li&gt;
&lt;li&gt;Consider setting this up to reduce the attack spam in your logs if you run public services
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" target="_blank" rel="nofollow noopener"&gt;ChaCha20 patchset for GELI&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;disk encryption&lt;/a&gt; system&lt;/li&gt;
&lt;li&gt;There are also some benchmarks that look pretty good in terms of performance&lt;/li&gt;
&lt;li&gt;Currently, GELI defaults to AES &lt;a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" target="_blank" rel="nofollow noopener"&gt;in XTS mode&lt;/a&gt; with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)&lt;/li&gt;
&lt;li&gt;There's &lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" target="_blank" rel="nofollow noopener"&gt;some discussion&lt;/a&gt; going on about whether a &lt;a href="https://en.wikipedia.org/wiki/Stream_cipher" target="_blank" rel="nofollow noopener"&gt;stream cipher&lt;/a&gt; is &lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" target="_blank" rel="nofollow noopener"&gt;suitable or not&lt;/a&gt; for disk encryption though, so this might not be a match made in heaven just yet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" target="_blank" rel="nofollow noopener"&gt;PCBSD update system enhancements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The PCBSD update utility has gotten an update itself, now supporting automatic upgrades&lt;/li&gt;
&lt;li&gt;You can choose what parts of your system you want to let it automatically handle (packages, security updates)&lt;/li&gt;
&lt;li&gt;The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality&lt;/li&gt;
&lt;li&gt;There's also a new graphical frontend available for it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2XJhAsffU" target="_blank" rel="nofollow noopener"&gt;Mat writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20qnSHujZ" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21O0MShqi" target="_blank" rel="nofollow noopener"&gt;Andy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2LutVQOXN" target="_blank" rel="nofollow noopener"&gt;Beau writes in&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Esexdrc" target="_blank" rel="nofollow noopener"&gt;Kutay writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" target="_blank" rel="nofollow noopener"&gt;Wait, a real one?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=142125454022458&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;What's that glowing...&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, opnsense, pfsense, m0n0wall, firewall, gateway, router, php, fork, deciso, netgate, portage, owncloud, soekris, apu, pcengines, alix, vpn, ipfw</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking to Jos Schellevis about OPNsense, a new firewall project that was forked from pfSense. We&#39;ll learn some of the backstory and see what they&#39;ve got planned for the future. We&#39;ve also got all this week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://networkfilter.blogspot.com/2015/01/be-your-own-vpn-provider-with-openbsd.html" rel="nofollow">Be your own VPN provider with OpenBSD</a></h3>

<ul>
<li>We&#39;ve covered how to build a BSD-based gateway that tunnels all your traffic through a VPN in the past - but what if you don&#39;t trust any VPN company?</li>
<li>It&#39;s easy for anyone to say &quot;of course we don&#39;t run a modified version of OpenVPN that logs all your traffic... what are you talking about?&quot;</li>
<li>The VPN provider might also be slow to apply security patches, putting you and the rest of the users at risk</li>
<li>With this guide, you&#39;ll be able to cut out the middleman and create your own VPN, using OpenBSD</li>
<li>It covers topics such as protecting your server, securing DNS lookups, configuring the firewall properly, general security practices and of course actually setting up the VPN
***</li>
</ul>

<h3><a href="http://www.iwillfolo.com/2015/01/comparison-gentoo-vs-freebsd-tweak-tweak-little-star/" rel="nofollow">FreeBSD vs Gentoo comparison</a></h3>

<ul>
<li>People coming over from Linux will sometimes compare FreeBSD to Gentoo, mostly because of the ports-like portage system for installing software</li>
<li>This article takes that notion and goes much more in-depth, with lots more comparisons between the two systems</li>
<li>The author mentions that the installers are very different, ports and portage have many subtle differences and a few other things</li>
<li>If you&#39;re a curious Gentoo user considering FreeBSD, this might be a good article to check out to learn a bit more
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=142120787308107&w=2" rel="nofollow">Kernel W<sup>X</sup> in OpenBSD</a></h3>

<ul>
<li>W<sup>X,</sup> &quot;<a href="https://en.wikipedia.org/wiki/W%5EX" rel="nofollow">Write XOR Execute</a>,&quot; is a security feature of OpenBSD with a rather strange-looking name</li>
<li>It&#39;s meant to be an exploit mitigation technique, disallowing pages in the address space of a process to be both writable and executable at the same time</li>
<li>This helps prevent some types of buffer overflows: code injected into it <em>won&#39;t</em> execute, but <em>will</em> crash the program (quite obviously the lesser of the two evils)</li>
<li>Through some recent work, OpenBSD&#39;s kernel now has no part of the address space without this feature - whereas it was only enabled in the userland <a href="http://www.openbsd.org/papers/ru13-deraadt/" rel="nofollow">previously</a></li>
<li>Doing this incorrectly in the kernel could lead to <strong>far worse</strong> consequences, and is a lot harder to debug, so this is a pretty huge accomplishment that&#39;s been in the works for a while</li>
<li>More technical details can be found in some <a href="https://www.marc.info/?l=openbsd-cvs&m=141917924602780&w=2" rel="nofollow">recent CVS commits</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/using-trueos-as-a-ipfw-based-home-router/" rel="nofollow">Building an IPFW-based router</a></h3>

<ul>
<li>We&#39;ve covered building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">routers with PF</a> many times before, but what about <a href="https://www.freebsd.org/doc/handbook/firewalls-ipfw.html" rel="nofollow">IPFW</a>?</li>
<li>A certain host of a certain podcast decided it was finally time to replace his <a href="https://github.com/jduck/asus-cmd" rel="nofollow">disappointing</a> consumer router with something BSD-based</li>
<li>In this blog post, Kris details his experience building and configuring a new router for his home, using IPFW as the firewall</li>
<li>He covers in-kernel NAT and NATD, installing a DHCP server from packages and even touches on NAT reflection a bit</li>
<li>If you&#39;re an IPFW fan and are thinking about putting together a new router, give this post a read
***</li>
</ul>

<h2>Interview - Jos Schellevis - <a href="mailto:project@opnsense.org" rel="nofollow">project@opnsense.org</a> / <a href="https://twitter.com/opnsense" rel="nofollow">@opnsense</a></h2>

<p>The birth of <a href="http://opnsense.org" rel="nofollow">OPNsense</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://adrianchadd.blogspot.com/2015/01/on-profiling-http-or-god-damnit-people.html" rel="nofollow">On profiling HTTP</a></h3>

<ul>
<li>Adrian Chadd, who <a href="http://www.bsdnow.tv/episodes/2014_09_17-the_promised_wlan" rel="nofollow">we&#39;ve had on the show before</a>, has been doing some more ultra-high performance testing</li>
<li>Faced with the problem of how to generate a massive amount of HTTP traffic, he looked into the current state of benchmarking tools</li>
<li>According to him, it&#39;s &quot;not very pretty&quot;</li>
<li>He decided to work on a new tool to benchmark huge amounts of web traffic, and the rest of this post describes the whole process</li>
<li>You can check out his new code <a href="https://github.com/erikarn/libevhtp-http/" rel="nofollow">on Github</a> right now
***</li>
</ul>

<h3><a href="http://daemonforums.org/showthread.php?s=db0dd79ca26eb645eadd2d8abd267cae&t=8846" rel="nofollow">Using divert(4) to reduce attacks</a></h3>

<ul>
<li>We talked about using <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man4/divert.4" rel="nofollow">divert(4)</a> with PF last week, and this post is a good follow-up to that introduction (though unrelated to that series)</li>
<li>It talks about how you can use divert, combined with some blacklists, to reduce attacks on whatever public services you&#39;re running</li>
<li>PF has good built-in rate limiting for abusive IPs that hit rapidly, but when they attack slowly over a longer period of time, that won&#39;t work</li>
<li>The Composite Blocking List is a public DNS blocklist, operated alongside Spamhaus, that contains many IPs known to be malicious</li>
<li>Consider setting this up to reduce the attack spam in your logs if you run public services
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046814.html" rel="nofollow">ChaCha20 patchset for GELI</a></h3>

<ul>
<li>A user has posted a patch to the freebsd-hackers list that adds ChaCha support to GELI, the <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">disk encryption</a> system</li>
<li>There are also some benchmarks that look pretty good in terms of performance</li>
<li>Currently, GELI defaults to AES <a href="https://en.wikipedia.org/wiki/Disk_encryption_theory#XEX-based_tweaked-codebook_mode_with_ciphertext_stealing_.28XTS.29" rel="nofollow">in XTS mode</a> with a few tweakable options (but also supports Blowfish, Camellia and Triple DES)</li>
<li>There&#39;s <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046824.html" rel="nofollow">some discussion</a> going on about whether a <a href="https://en.wikipedia.org/wiki/Stream_cipher" rel="nofollow">stream cipher</a> is <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2015-January/046834.html" rel="nofollow">suitable or not</a> for disk encryption though, so this might not be a match made in heaven just yet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2015/01/new-update-gui-for-pc-bsd-automatic-updates/" rel="nofollow">PCBSD update system enhancements</a></h3>

<ul>
<li>The PCBSD update utility has gotten an update itself, now supporting automatic upgrades</li>
<li>You can choose what parts of your system you want to let it automatically handle (packages, security updates)</li>
<li>The update system uses ZFS and Boot Environments for safe updating and bypasses some dubious pkgng functionality</li>
<li>There&#39;s also a new graphical frontend available for it
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XJhAsffU" rel="nofollow">Mat writes in</a></li>
<li><a href="http://slexy.org/view/s20qnSHujZ" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s21O0MShqi" rel="nofollow">Andy writes in</a></li>
<li><a href="http://slexy.org/view/s2LutVQOXN" rel="nofollow">Beau writes in</a> </li>
<li><a href="http://slexy.org/view/s21Esexdrc" rel="nofollow">Kutay writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.mail-archive.com/advocacy@openbsd.org/msg02249.html" rel="nofollow">Wait, a real one?</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=142125454022458&w=2" rel="nofollow">What&#39;s that glowing...</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>71: System Disaster</title>
  <link>https://www.bsdnow.tv/71</link>
  <guid isPermaLink="false">b9b0efcb-197e-4dfc-a239-5ae487a72e51</guid>
  <pubDate>Wed, 07 Jan 2015 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b9b0efcb-197e-4dfc-a239-5ae487a72e51.mp3" length="48002836" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:06:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don't worry, systemd is not being ported to BSD! We're still safe! We've also got all the week's news and answers to your emails, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://opnsense.org/" target="_blank" rel="nofollow noopener"&gt;Introducing OPNsense, a pfSense fork&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OPNsense is a new BSD-based firewall project that was &lt;a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" target="_blank" rel="nofollow noopener"&gt;recently started&lt;/a&gt;, forked from the pfSense codebase&lt;/li&gt;
&lt;li&gt;Even though it's just been announced, they already have a formal release based on FreeBSD 10 (pfSense's latest stable release is based on 8.3)&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" target="_blank" rel="nofollow noopener"&gt;core team&lt;/a&gt; includes a well-known DragonFlyBSD developer&lt;/li&gt;
&lt;li&gt;You can check out their code &lt;a href="https://github.com/opnsense" target="_blank" rel="nofollow noopener"&gt;on Github&lt;/a&gt; now, or download an image and try it out - &lt;a href="mailto:feedback@bsdnow.tv" target="_blank" rel="nofollow noopener"&gt;let us know&lt;/a&gt; if you do and what you think about it&lt;/li&gt;
&lt;li&gt;They also have a nice wiki and some &lt;a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" target="_blank" rel="nofollow noopener"&gt;instructions on getting started&lt;/a&gt; for new users&lt;/li&gt;
&lt;li&gt;We plan on having them on the show &lt;strong&gt;next week&lt;/strong&gt; to learn a bit more about how the project got started and why you might want to use it - stay tuned
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Code rot and why I chose OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post about rotting codebases - a core banking system in this example&lt;/li&gt;
&lt;li&gt;The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project&lt;/li&gt;
&lt;li&gt;He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born&lt;/li&gt;
&lt;li&gt;Instead of just bikeshedding like the rest of the internet, OpenBSD "silently started putting the beast into shape" as he puts it&lt;/li&gt;
&lt;li&gt;The article continues on to mention OpenBSD's code review process, and how it catches any bugs so we don't have more heartbleeds&lt;/li&gt;
&lt;li&gt;"In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That's so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily."&lt;/li&gt;
&lt;li&gt;It's a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says "In summary, I'm learning more than ever - computing is fun again"&lt;/li&gt;
&lt;li&gt;Look for the phrase "Getting Started" in the blog post for a nice little gem
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" target="_blank" rel="nofollow noopener"&gt;ZFS vs HAMMER FS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the topics we've seen come up from time to time is how &lt;a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener"&gt;FreeBSD's ZFS&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/tutorials/hammer" target="_blank" rel="nofollow noopener"&gt;DragonFly's HAMMER FS&lt;/a&gt; compare to each other&lt;/li&gt;
&lt;li&gt;They both have a lot of features that traditional filesystems lack&lt;/li&gt;
&lt;li&gt;A forum thread was opened for discussion about them both and what they're typically used for&lt;/li&gt;
&lt;li&gt;It compares resource requirements, ideal hardware and pros/cons of each&lt;/li&gt;
&lt;li&gt;Hopefully someone will do another new comparison when HAMMER 2 is finished&lt;/li&gt;
&lt;li&gt;This is not to be confused with the &lt;a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" target="_blank" rel="nofollow noopener"&gt;other "hammer" filesystem&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" target="_blank" rel="nofollow noopener"&gt;Portable OpenNTPD revived&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With ISC's NTPd having so many security vulnerabilities recently, people need an alternative &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;NTP daemon&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD has developed &lt;a href="http://openntpd.org/" target="_blank" rel="nofollow noopener"&gt;OpenNTPD&lt;/a&gt; since 2004, but the portable version for other operating systems hasn't been actively maintained in a few years&lt;/li&gt;
&lt;li&gt;The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version&lt;/li&gt;
&lt;li&gt;Brent Cook, who we've &lt;a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" target="_blank" rel="nofollow noopener"&gt;had on the show before&lt;/a&gt; to talk about LibreSSL, decided it was time to fix this&lt;/li&gt;
&lt;li&gt;While looking through the code, he also found &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" target="_blank" rel="nofollow noopener"&gt;some fixes&lt;/a&gt; for the native version as well&lt;/li&gt;
&lt;li&gt;You can grab it from &lt;a href="https://github.com/openntpd-portable/openntpd-portable" target="_blank" rel="nofollow noopener"&gt;Github&lt;/a&gt; now, or just wait for &lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" target="_blank" rel="nofollow noopener"&gt;the updated release&lt;/a&gt; to hit the repos of your OS of choice
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ian Sutton - &lt;a href="mailto:ian@kremlin.cc" target="_blank" rel="nofollow noopener"&gt;ian@kremlin.cc&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" target="_blank" rel="nofollow noopener"&gt;BSD replacements&lt;/a&gt; for &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856" target="_blank" rel="nofollow noopener"&gt;systemd dependencies&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/freebsd/pkg/pull/1113" target="_blank" rel="nofollow noopener"&gt;pkgng adds OS X support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD's next-gen &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;package manager&lt;/a&gt; has just added support for Mac OS X&lt;/li&gt;
&lt;li&gt;Why would you want that? Well.. we don't really know, but it's cool&lt;/li&gt;
&lt;li&gt;The author of the patch &lt;a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" target="_blank" rel="nofollow noopener"&gt;may have some insight&lt;/a&gt; about what his goal is though&lt;/li&gt;
&lt;li&gt;This could open up the door for a cross-platform pkgng solution, similar to NetBSD's pkgsrc&lt;/li&gt;
&lt;li&gt;There's also the possibility of pkgng being used as a packaging format for MacPorts in the future&lt;/li&gt;
&lt;li&gt;While we're on the topic of pkgng, you can also watch &lt;a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" target="_blank" rel="nofollow noopener"&gt;bapt&lt;/a&gt;'s latest presentation about it from ruBSD 2014 - "&lt;a href="http://is.gd/4AvUwt" target="_blank" rel="nofollow noopener"&gt;four years of pkg&lt;/a&gt;"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" target="_blank" rel="nofollow noopener"&gt;Secure secure shell&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Almost everyone watching BSD Now probably &lt;a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener"&gt;uses OpenSSH&lt;/a&gt; and has set up a server at one point or another&lt;/li&gt;
&lt;li&gt;This guide provides a list of best practices beyond the typical "disable root login and use keys" advice you'll often hear&lt;/li&gt;
&lt;li&gt;It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use&lt;/li&gt;
&lt;li&gt;There are also good explanations for all the choices, based both on history and probability&lt;/li&gt;
&lt;li&gt;Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled&lt;/li&gt;
&lt;li&gt;We've also got &lt;a href="http://ssh-comparison.quendi.de/comparison.html" target="_blank" rel="nofollow noopener"&gt;a handy chart&lt;/a&gt; to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" target="_blank" rel="nofollow noopener"&gt;Dissecting OpenBSD's divert(4)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PF has a cool feature that not a lot of people seem to know about: divert&lt;/li&gt;
&lt;li&gt;It lets you send packets to userspace, allowing you to inspect them a lot easier&lt;/li&gt;
&lt;li&gt;This blog post, the first in a series, details all the cool things you can do with divert and how to use it&lt;/li&gt;
&lt;li&gt;A very common example is with intrusion detection systems like Snort
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" target="_blank" rel="nofollow noopener"&gt;Screen recording on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is a neat article about a topic we don't cover very often: making video content on BSD&lt;/li&gt;
&lt;li&gt;In the post, you'll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg&lt;/li&gt;
&lt;li&gt;There are also notes about getting a USB microphone working, so you can do commentary on whatever you're showing&lt;/li&gt;
&lt;li&gt;It also includes lots of details and helpful screenshots throughout the process&lt;/li&gt;
&lt;li&gt;You should make cool screencasts and send them to us
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Zx0ktmb" target="_blank" rel="nofollow noopener"&gt;Camio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2vVR5Orhh" target="_blank" rel="nofollow noopener"&gt;ezpzy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Ahb5Lxa" target="_blank" rel="nofollow noopener"&gt;Emett writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20oJmveN6" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2cTayMxPk" target="_blank" rel="nofollow noopener"&gt;Laszlo writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" target="_blank" rel="nofollow noopener"&gt;Protocol X97&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141159429123859&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;My thoughts echoed&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" target="_blank" rel="nofollow noopener"&gt;Vulnerability sample&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, systemd, launchd, systembsd, gsoc, google summer of code, ntp, openntpd, opnsense, pfsense, hammer, zfs, gpl, license, macports</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking to Ian Sutton about his new BSD compatibility wrappers for various systemd dependencies. Don&#39;t worry, systemd is not being ported to BSD! We&#39;re still safe! We&#39;ve also got all the week&#39;s news and answers to your emails, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://opnsense.org/" rel="nofollow">Introducing OPNsense, a pfSense fork</a></h3>

<ul>
<li>OPNsense is a new BSD-based firewall project that was <a href="http://www.prnewswire.com/news-releases/deciso-launches-opnsense-a-new-open-source-firewall-initiative-287334371.html" rel="nofollow">recently started</a>, forked from the pfSense codebase</li>
<li>Even though it&#39;s just been announced, they already have a formal release based on FreeBSD 10 (pfSense&#39;s latest stable release is based on 8.3)</li>
<li>The <a href="http://opnsense.org/about/about-opnsense/#opnsense-core-team" rel="nofollow">core team</a> includes a well-known DragonFlyBSD developer</li>
<li>You can check out their code <a href="https://github.com/opnsense" rel="nofollow">on Github</a> now, or download an image and try it out - <a href="mailto:feedback@bsdnow.tv" rel="nofollow">let us know</a> if you do and what you think about it</li>
<li>They also have a nice wiki and some <a href="http://wiki.opnsense.org/index.php/Manual:Installation_and_Initial_Configuration" rel="nofollow">instructions on getting started</a> for new users</li>
<li>We plan on having them on the show <strong>next week</strong> to learn a bit more about how the project got started and why you might want to use it - stay tuned
***</li>
</ul>

<h3><a href="http://homing-on-code.blogspot.com/2015/01/code-rot-openbsd.html" rel="nofollow">Code rot and why I chose OpenBSD</a></h3>

<ul>
<li>Here we have a blog post about rotting codebases - a core banking system in this example</li>
<li>The author tells the story of how his last days spent at the job were mostly removing old, dead code from a giant project</li>
<li>He goes on to compare it to OpenSSL and the hearbleed disaster, from which LibreSSL was born</li>
<li>Instead of just bikeshedding like the rest of the internet, OpenBSD &quot;silently started putting the beast into shape&quot; as he puts it</li>
<li>The article continues on to mention OpenBSD&#39;s code review process, and how it catches any bugs so we don&#39;t have more heartbleeds</li>
<li>&quot;In OpenBSD you are encouraged to run current and the whole team tries its best to make current as stable as it can. You know why? They eat their own dog food. That&#39;s so simple yet so amazing that it blows my mind. Developers actually run OpenBSD on their machines daily.&quot;</li>
<li>It&#39;s a very long and detailed story about how the author has gotten more involved with BSD, learned from the mailing lists and even started contributing back - he says &quot;In summary, I&#39;m learning more than ever - computing is fun again&quot;</li>
<li>Look for the phrase &quot;Getting Started&quot; in the blog post for a nice little gem
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/zfs-vs-hammer.49789/" rel="nofollow">ZFS vs HAMMER FS</a></h3>

<ul>
<li>One of the topics we&#39;ve seen come up from time to time is how <a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">FreeBSD&#39;s ZFS</a> and <a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">DragonFly&#39;s HAMMER FS</a> compare to each other</li>
<li>They both have a lot of features that traditional filesystems lack</li>
<li>A forum thread was opened for discussion about them both and what they&#39;re typically used for</li>
<li>It compares resource requirements, ideal hardware and pros/cons of each</li>
<li>Hopefully someone will do another new comparison when HAMMER 2 is finished</li>
<li>This is not to be confused with the <a href="https://www.youtube.com/watch?v=HBXlVl5Ll6k" rel="nofollow">other &quot;hammer&quot; filesystem</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/tech@openbsd.org/msg21886.html" rel="nofollow">Portable OpenNTPD revived</a></h3>

<ul>
<li>With ISC&#39;s NTPd having so many security vulnerabilities recently, people need an alternative <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP daemon</a></li>
<li>OpenBSD has developed <a href="http://openntpd.org/" rel="nofollow">OpenNTPD</a> since 2004, but the portable version for other operating systems hasn&#39;t been actively maintained in a few years</li>
<li>The older version still works fine, and is in FreeBSD ports and NetBSD pkgsrc, but it would be nice to have some of the newer features and fixes from the native version</li>
<li>Brent Cook, who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_07_30-liberating_ssl" rel="nofollow">had on the show before</a> to talk about LibreSSL, decided it was time to fix this</li>
<li>While looking through the code, he also found <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin/ntpd/?sortby=date#dirlist" rel="nofollow">some fixes</a> for the native version as well</li>
<li>You can grab it from <a href="https://github.com/openntpd-portable/openntpd-portable" rel="nofollow">Github</a> now, or just wait for <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2015-January/097400.html" rel="nofollow">the updated release</a> to hit the repos of your OS of choice
***</li>
</ul>

<h2>Interview - Ian Sutton - <a href="mailto:ian@kremlin.cc" rel="nofollow">ian@kremlin.cc</a></h2>

<p><a href="https://uglyman.kremlin.cc/gitweb/gitweb.cgi?p=systembsd.git;a=summary" rel="nofollow">BSD replacements</a> for <a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">systemd dependencies</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/freebsd/pkg/pull/1113" rel="nofollow">pkgng adds OS X support</a></h3>

<ul>
<li>FreeBSD&#39;s next-gen <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package manager</a> has just added support for Mac OS X</li>
<li>Why would you want that? Well.. we don&#39;t really know, but it&#39;s cool</li>
<li>The author of the patch <a href="https://github.com/freebsd/pkg/pull/1113#issuecomment-68063964" rel="nofollow">may have some insight</a> about what his goal is though</li>
<li>This could open up the door for a cross-platform pkgng solution, similar to NetBSD&#39;s pkgsrc</li>
<li>There&#39;s also the possibility of pkgng being used as a packaging format for MacPorts in the future</li>
<li>While we&#39;re on the topic of pkgng, you can also watch <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a>&#39;s latest presentation about it from ruBSD 2014 - &quot;<a href="http://is.gd/4AvUwt" rel="nofollow">four years of pkg</a>&quot;
***</li>
</ul>

<h3><a href="https://stribika.github.io/2015/01/04/secure-secure-shell.html" rel="nofollow">Secure secure shell</a></h3>

<ul>
<li>Almost everyone watching BSD Now probably <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">uses OpenSSH</a> and has set up a server at one point or another</li>
<li>This guide provides a list of best practices beyond the typical &quot;disable root login and use keys&quot; advice you&#39;ll often hear</li>
<li>It specifically goes in-depth with server and client configuration with the best key types, KEX methods and encryption ciphers to use</li>
<li>There are also good explanations for all the choices, based both on history and probability</li>
<li>Minimal backwards compatibility is kept, but most of the old and insecure stuff gets disabled</li>
<li>We&#39;ve also got <a href="http://ssh-comparison.quendi.de/comparison.html" rel="nofollow">a handy chart</a> to show which SSH implementations support which ciphers, in case you need to support Windows users or people who use weird clients
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2015/01/06/dissecting-openbsds-divert-4-part-1-introduction/" rel="nofollow">Dissecting OpenBSD&#39;s divert(4)</a></h3>

<ul>
<li>PF has a cool feature that not a lot of people seem to know about: divert</li>
<li>It lets you send packets to userspace, allowing you to inspect them a lot easier</li>
<li>This blog post, the first in a series, details all the cool things you can do with divert and how to use it</li>
<li>A very common example is with intrusion detection systems like Snort
***</li>
</ul>

<h3><a href="https://www.banym.de/freebsd/create-a-screen-recording-on-freebsd-with-kdenlive-and-external-usb-mic" rel="nofollow">Screen recording on FreeBSD</a></h3>

<ul>
<li>This is a neat article about a topic we don&#39;t cover very often: making video content on BSD</li>
<li>In the post, you&#39;ll learn how to make screencasts with FreeBSD, using kdenlive and ffmpeg</li>
<li>There are also notes about getting a USB microphone working, so you can do commentary on whatever you&#39;re showing</li>
<li>It also includes lots of details and helpful screenshots throughout the process</li>
<li>You should make cool screencasts and send them to us
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21Zx0ktmb" rel="nofollow">Camio writes in</a></li>
<li><a href="http://slexy.org/view/s2vVR5Orhh" rel="nofollow">ezpzy writes in</a></li>
<li><a href="http://slexy.org/view/s21Ahb5Lxa" rel="nofollow">Emett writes in</a></li>
<li><a href="http://slexy.org/view/s20oJmveN6" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2cTayMxPk" rel="nofollow">Laszlo writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2015-January/263441.html" rel="nofollow">Protocol X97</a></li>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141159429123859&w=2" rel="nofollow">My thoughts echoed</a></li>
<li><a href="http://www.openwall.com/lists/oss-security/2015/01/04/10" rel="nofollow">Vulnerability sample</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>70: Daemons in the North</title>
  <link>https://www.bsdnow.tv/70</link>
  <guid isPermaLink="false">55684d1a-97da-439b-a037-b02c8d49de70</guid>
  <pubDate>Wed, 31 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/55684d1a-97da-439b-a037-b02c8d49de70.mp3" length="60663316" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our last episode of 2014, and we'll be chatting with Dan Langille about the upcoming BSDCan conference. We'll find out what's planned and what sorts of presentations they're looking for. As usual, answers to viewer-submitted questions and all the week's news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's our last episode of 2014, and we'll be chatting with Dan Langille about the upcoming BSDCan conference. We'll find out what's planned and what sorts of presentations they're looking for. As usual, answers to viewer-submitted questions and all the week's news, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.asiabsdcon.org/timetable.html.en" target="_blank" rel="nofollow noopener"&gt;More conference presentation videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Some more of the presentation videos from AsiaBSDCon are appearing online&lt;/li&gt;
&lt;li&gt;Masanobu Saitoh, &lt;a href="https://www.youtube.com/watch?v=ApruZrU5fVs" target="_blank" rel="nofollow noopener"&gt;Developing CPE Routers Based on NetBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener"&gt;Reyk Floeter&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" target="_blank" rel="nofollow noopener"&gt;VXLAN and Cloud-based Networking with OpenBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Jos Jansen, &lt;a href="https://www.youtube.com/watch?v=gOPfRQgTjNo" target="_blank" rel="nofollow noopener"&gt;Adapting OS X to the enterprise&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" target="_blank" rel="nofollow noopener"&gt;Pierre Pronchery&lt;/a&gt; &amp;amp; Guillaume Lasmayous, &lt;a href="https://www.youtube.com/watch?v=vh-TjLUj6os" target="_blank" rel="nofollow noopener"&gt;Carve your NetBSD&lt;/a&gt; &amp;lt;!-- skip to 5:06 for henning trolling --&amp;gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" target="_blank" rel="nofollow noopener"&gt;Colin Percival&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=jzY3m5Kv7Y8" target="_blank" rel="nofollow noopener"&gt;Everything you need to know about cryptography in 1 hour&lt;/a&gt; (not from AsiaBSDCon)&lt;/li&gt;
&lt;li&gt;The "bsdconferences" YouTube channel has quite a lot of interesting &lt;a href="https://www.youtube.com/user/bsdconferences/videos?sort=da&amp;amp;view=0&amp;amp;flow=grid" target="_blank" rel="nofollow noopener"&gt;older BSD talks&lt;/a&gt; too - you may want to go back and watch them if you haven't already
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141922027318727&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD PIE enhancements&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" target="_blank" rel="nofollow noopener"&gt;ASLR&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Position-independent_executable" target="_blank" rel="nofollow noopener"&gt;PIE&lt;/a&gt; are great security features that OpenBSD has had enabled by default for a long time, in both the base system and ports, but they have one inherent problem&lt;/li&gt;
&lt;li&gt;They only work with &lt;em&gt;dynamic&lt;/em&gt; libraries and binaries, so if you have any static binaries, they don't get the same treatment&lt;/li&gt;
&lt;li&gt;For example, the default shells (and many other things in /bin and /sbin) are statically linked&lt;/li&gt;
&lt;li&gt;In the case of the static ones, you can always predict the memory layout, which is very bad and sort of &lt;a href="https://en.wikipedia.org/wiki/Return-oriented_programming" target="_blank" rel="nofollow noopener"&gt;defeats the whole purpose&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;With this and a few &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141927571832106&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;related commits&lt;/a&gt;, OpenBSD fixes this by introducing &lt;strong&gt;static self-relocation&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;More and more CPU architectures are being tested and getting support too; this isn't just for amd64 and i386 - VAX users can rest easy&lt;/li&gt;
&lt;li&gt;It'll be available in 5.7 in May, or you can use a &lt;a href="http://www.openbsd.org/faq/faq5.html#BldBinary" target="_blank" rel="nofollow noopener"&gt;-current snapshot&lt;/a&gt; if you want to get a &lt;em&gt;slice&lt;/em&gt; of the action now
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2014dec-newsletter.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation semi-annual newsletter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation publishes a huge newsletter twice a year, detailing their funded projects and some community activities&lt;/li&gt;
&lt;li&gt;As always, it starts with a letter from the president of the foundation - this time it's about encouraging students and new developers to get involved&lt;/li&gt;
&lt;li&gt;The article also has a fundraising update with a list of sponsored projects, and they note that the donations meter has changed from dollars to number of donors (since they exceeded the goal already)&lt;/li&gt;
&lt;li&gt;You can read summaries of all the BSD conferences of 2014 and see a list of upcoming ones next year too&lt;/li&gt;
&lt;li&gt;There are also sections about the &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal&lt;/a&gt;'s progress, a new staff member and a testimonial from NetApp&lt;/li&gt;
&lt;li&gt;It's a very long report, so dedicate some time to read all the way through it&lt;/li&gt;
&lt;li&gt;This year was pretty great for BSD: both the FreeBSD and OpenBSD foundations exceeded their goals and the NetBSD foundation came really close too&lt;/li&gt;
&lt;li&gt;As we go into 2015, consider donating to &lt;a href="https://www.freebsdfoundation.org/donate" target="_blank" rel="nofollow noopener"&gt;whichever&lt;/a&gt; &lt;a href="http://www.openbsdfoundation.org/donations.html" target="_blank" rel="nofollow noopener"&gt;BSD&lt;/a&gt; &lt;a href="https://www.netbsd.org/donations/" target="_blank" rel="nofollow noopener"&gt;you&lt;/a&gt; &lt;a href="http://www.dragonflybsd.org/donations/" target="_blank" rel="nofollow noopener"&gt;use&lt;/a&gt;, it really can make a difference
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141920089614758&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;Modernizing OpenSSH fingerprints&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;When you connect to a server for the first time, you'll get what's called a fingerprint of the host's public key - this is used to verify that you're actually talking to the same server you intended to&lt;/li&gt;
&lt;li&gt;Up until now, the key fingerprints have been an MD5 hash, displayed as hex&lt;/li&gt;
&lt;li&gt;This &lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033117.html" target="_blank" rel="nofollow noopener"&gt;can be problematic&lt;/a&gt;, especially for larger key types like RSA that give lots of wiggle room for collisions, as an attacker could generate a fake host key that gives the same MD5 string as the one you wanted to connect to&lt;/li&gt;
&lt;li&gt;This new change replaces the default MD5 and hex with a base64-encoded SHA256 fingerprint&lt;/li&gt;
&lt;li&gt;You can add a "FingerprintHash" line in your ssh_config to force using only the new type&lt;/li&gt;
&lt;li&gt;There's also a &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141923470520906&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;new option&lt;/a&gt; to require users to authenticate with &lt;strong&gt;more than one&lt;/strong&gt; public key, so you can really lock down login access to your servers - also useful if you're not 100% confident in any single key type&lt;/li&gt;
&lt;li&gt;The new options should be in the upcoming 6.8 release
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Dan Langille - &lt;a href="mailto:info@bsdcan.org" target="_blank" rel="nofollow noopener"&gt;info@bsdcan.org&lt;/a&gt; / &lt;a href="https://twitter.com/bsdcan" target="_blank" rel="nofollow noopener"&gt;@bsdcan&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Plans for the BSDCan 2015 conference&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/bsdphk/Ntimed" target="_blank" rel="nofollow noopener"&gt;Introducing ntimed, a new NTP daemon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As we've mentioned before in &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;our tutorials&lt;/a&gt;, there are two main daemons for the Network Time Protocol - ISC's NTPd and OpenBSD's OpenNTPD&lt;/li&gt;
&lt;li&gt;With all the recent security problems with ISC's NTPd, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" target="_blank" rel="nofollow noopener"&gt;Poul-Henning Kamp&lt;/a&gt; has been working on a third NTP daemon&lt;/li&gt;
&lt;li&gt;It's called "ntimed" and you can try out a preview version of it right now - it's &lt;a href="https://www.freshports.org/net/ntimed/" target="_blank" rel="nofollow noopener"&gt;in FreeBSD ports&lt;/a&gt; or on Github&lt;/li&gt;
&lt;li&gt;PHK also has a few &lt;a href="http://phk.freebsd.dk/time/" target="_blank" rel="nofollow noopener"&gt;blog entries&lt;/a&gt; about the project, including status updates
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mdocml.bsd.lv/openbsd_projects.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD-maintained projects list&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was recently a read on the &lt;a href="https://www.marc.info/?t=141961588200003&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;misc mailing list&lt;/a&gt; asking about different projects started by OpenBSD developers&lt;/li&gt;
&lt;li&gt;The initial list had marks for which software had portable versions to other operating systems (OpenSSH being the most popular example)&lt;/li&gt;
&lt;li&gt;A developer compiled a new list from all of the replies to that thread into a nice organized webpage&lt;/li&gt;
&lt;li&gt;Most people are only familiar with things like OpenSSH, OpenSMTPD, OpenNTPD and more recently LibreSSL, but there are quite a lot more&lt;/li&gt;
&lt;li&gt;This page also serves as a good history lesson for BSD in general: FreeBSD and others have ported some things over, while a couple OpenBSD tools were born from forks of FreeBSD tools (mergemaster, pkg tools, portscout)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://forums.freebsd.org/threads/howto-monitor-network-traffic-with-netflow-nfdump-nfsen-on-freebsd.49724/" target="_blank" rel="nofollow noopener"&gt;Monitoring network traffic with FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've ever been curious about monitoring network traffic on your FreeBSD boxes, this forum post may be exactly the thing for you&lt;/li&gt;
&lt;li&gt;It'll show you how to combine the Netflow, NfDump and NfSen suite of tools to get some pretty detailed network stats (and of course put them into a fancy webpage)&lt;/li&gt;
&lt;li&gt;This is especially useful for finding out what was going on at a certain point in time, for example if you had a traffic spike
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.protoc.org/blog/2014/12/22/trapping-spammers-with-the-openbsd-spam-deferral-daemon" target="_blank" rel="nofollow noopener"&gt;Trapping spammers with spamd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is a blog post about OpenBSD's &lt;a href="https://en.wikipedia.org/wiki/Spamd" target="_blank" rel="nofollow noopener"&gt;spamd&lt;/a&gt; - a spam email deferral daemon - and how to use it for your mail&lt;/li&gt;
&lt;li&gt;It gives some background on the greylisting approach to spam, rather than just a typical host blacklist&lt;/li&gt;
&lt;li&gt;"Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will "temporarily reject" any email from a sender it does not recognize. If the sender re-attempts mail delivery at a later time, the sender may be allowed to continue the mail delivery conversation."&lt;/li&gt;
&lt;li&gt;The post also shows how to combine it with PF and other tools for a pretty fancy mail setup&lt;/li&gt;
&lt;li&gt;You can find spamd in the OpenBSD &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/spamd.8" target="_blank" rel="nofollow noopener"&gt;base system&lt;/a&gt;, or use it &lt;a href="https://www.freshports.org/mail/spamd" target="_blank" rel="nofollow noopener"&gt;with FreeBSD&lt;/a&gt; &lt;a href="http://pkgsrc.se/mail/spamd" target="_blank" rel="nofollow noopener"&gt;or NetBSD&lt;/a&gt; via ports and pkgsrc&lt;/li&gt;
&lt;li&gt;You might also want to go back and listen to &lt;a href="https://archive.org/details/bsdtalk068" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 68&lt;/a&gt;, where Will talks to Bob Beck about spamd
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20rUK9XVJ" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20nfzIuT2" target="_blank" rel="nofollow noopener"&gt;Brandon writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20wCBhFLO" target="_blank" rel="nofollow noopener"&gt;Anders writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20xGrBIyl" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2QHRaiZJW" target="_blank" rel="nofollow noopener"&gt;Kyle writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141903858708123&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;NTP code comparison&lt;/a&gt; - &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141905854411370&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;192870 vs. 2898&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-December/046741.html" target="_blank" rel="nofollow noopener"&gt;NICs have feelings too&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-ports&amp;amp;m=141998130824977&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Just think about it&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bsdcan, call for papers, conference, talk, presentation, vxlan, static, pie, openssh, ntimed, ntp, openntpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our last episode of 2014, and we&#39;ll be chatting with Dan Langille about the upcoming BSDCan conference. We&#39;ll find out what&#39;s planned and what sorts of presentations they&#39;re looking for. As usual, answers to viewer-submitted questions and all the week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">More conference presentation videos</a></h3>

<ul>
<li>Some more of the presentation videos from AsiaBSDCon are appearing online</li>
<li>Masanobu Saitoh, <a href="https://www.youtube.com/watch?v=ApruZrU5fVs" rel="nofollow">Developing CPE Routers Based on NetBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">VXLAN and Cloud-based Networking with OpenBSD</a></li>
<li>Jos Jansen, <a href="https://www.youtube.com/watch?v=gOPfRQgTjNo" rel="nofollow">Adapting OS X to the enterprise</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" rel="nofollow">Pierre Pronchery</a> &amp; Guillaume Lasmayous, <a href="https://www.youtube.com/watch?v=vh-TjLUj6os" rel="nofollow">Carve your NetBSD</a> &lt;!-- skip to 5:06 for henning trolling --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>, <a href="https://www.youtube.com/watch?v=jzY3m5Kv7Y8" rel="nofollow">Everything you need to know about cryptography in 1 hour</a> (not from AsiaBSDCon)</li>
<li>The &quot;bsdconferences&quot; YouTube channel has quite a lot of interesting <a href="https://www.youtube.com/user/bsdconferences/videos?sort=da&view=0&flow=grid" rel="nofollow">older BSD talks</a> too - you may want to go back and watch them if you haven&#39;t already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141922027318727&w=2" rel="nofollow">OpenBSD PIE enhancements</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a> and <a href="https://en.wikipedia.org/wiki/Position-independent_executable" rel="nofollow">PIE</a> are great security features that OpenBSD has had enabled by default for a long time, in both the base system and ports, but they have one inherent problem</li>
<li>They only work with <em>dynamic</em> libraries and binaries, so if you have any static binaries, they don&#39;t get the same treatment</li>
<li>For example, the default shells (and many other things in /bin and /sbin) are statically linked</li>
<li>In the case of the static ones, you can always predict the memory layout, which is very bad and sort of <a href="https://en.wikipedia.org/wiki/Return-oriented_programming" rel="nofollow">defeats the whole purpose</a></li>
<li>With this and a few <a href="https://www.marc.info/?l=openbsd-cvs&m=141927571832106&w=2" rel="nofollow">related commits</a>, OpenBSD fixes this by introducing <strong>static self-relocation</strong></li>
<li>More and more CPU architectures are being tested and getting support too; this isn&#39;t just for amd64 and i386 - VAX users can rest easy</li>
<li>It&#39;ll be available in 5.7 in May, or you can use a <a href="http://www.openbsd.org/faq/faq5.html#BldBinary" rel="nofollow">-current snapshot</a> if you want to get a <em>slice</em> of the action now
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2014dec-newsletter.html" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation publishes a huge newsletter twice a year, detailing their funded projects and some community activities</li>
<li>As always, it starts with a letter from the president of the foundation - this time it&#39;s about encouraging students and new developers to get involved</li>
<li>The article also has a fundraising update with a list of sponsored projects, and they note that the donations meter has changed from dollars to number of donors (since they exceeded the goal already)</li>
<li>You can read summaries of all the BSD conferences of 2014 and see a list of upcoming ones next year too</li>
<li>There are also sections about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a>&#39;s progress, a new staff member and a testimonial from NetApp</li>
<li>It&#39;s a very long report, so dedicate some time to read all the way through it</li>
<li>This year was pretty great for BSD: both the FreeBSD and OpenBSD foundations exceeded their goals and the NetBSD foundation came really close too</li>
<li>As we go into 2015, consider donating to <a href="https://www.freebsdfoundation.org/donate" rel="nofollow">whichever</a> <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">BSD</a> <a href="https://www.netbsd.org/donations/" rel="nofollow">you</a> <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">use</a>, it really can make a difference
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141920089614758&w=4" rel="nofollow">Modernizing OpenSSH fingerprints</a></h3>

<ul>
<li>When you connect to a server for the first time, you&#39;ll get what&#39;s called a fingerprint of the host&#39;s public key - this is used to verify that you&#39;re actually talking to the same server you intended to</li>
<li>Up until now, the key fingerprints have been an MD5 hash, displayed as hex</li>
<li>This <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033117.html" rel="nofollow">can be problematic</a>, especially for larger key types like RSA that give lots of wiggle room for collisions, as an attacker could generate a fake host key that gives the same MD5 string as the one you wanted to connect to</li>
<li>This new change replaces the default MD5 and hex with a base64-encoded SHA256 fingerprint</li>
<li>You can add a &quot;FingerprintHash&quot; line in your ssh_config to force using only the new type</li>
<li>There&#39;s also a <a href="https://www.marc.info/?l=openbsd-cvs&m=141923470520906&w=2" rel="nofollow">new option</a> to require users to authenticate with <strong>more than one</strong> public key, so you can really lock down login access to your servers - also useful if you&#39;re not 100% confident in any single key type</li>
<li>The new options should be in the upcoming 6.8 release
***</li>
</ul>

<h2>Interview - Dan Langille - <a href="mailto:info@bsdcan.org" rel="nofollow">info@bsdcan.org</a> / <a href="https://twitter.com/bsdcan" rel="nofollow">@bsdcan</a></h2>

<p>Plans for the BSDCan 2015 conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/bsdphk/Ntimed" rel="nofollow">Introducing ntimed, a new NTP daemon</a></h3>

<ul>
<li>As we&#39;ve mentioned before in <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">our tutorials</a>, there are two main daemons for the Network Time Protocol - ISC&#39;s NTPd and OpenBSD&#39;s OpenNTPD</li>
<li>With all the recent security problems with ISC&#39;s NTPd, <a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">Poul-Henning Kamp</a> has been working on a third NTP daemon</li>
<li>It&#39;s called &quot;ntimed&quot; and you can try out a preview version of it right now - it&#39;s <a href="https://www.freshports.org/net/ntimed/" rel="nofollow">in FreeBSD ports</a> or on Github</li>
<li>PHK also has a few <a href="http://phk.freebsd.dk/time/" rel="nofollow">blog entries</a> about the project, including status updates
***</li>
</ul>

<h3><a href="http://mdocml.bsd.lv/openbsd_projects.html" rel="nofollow">OpenBSD-maintained projects list</a></h3>

<ul>
<li>There was recently a read on the <a href="https://www.marc.info/?t=141961588200003&r=1&w=2" rel="nofollow">misc mailing list</a> asking about different projects started by OpenBSD developers</li>
<li>The initial list had marks for which software had portable versions to other operating systems (OpenSSH being the most popular example)</li>
<li>A developer compiled a new list from all of the replies to that thread into a nice organized webpage</li>
<li>Most people are only familiar with things like OpenSSH, OpenSMTPD, OpenNTPD and more recently LibreSSL, but there are quite a lot more</li>
<li>This page also serves as a good history lesson for BSD in general: FreeBSD and others have ported some things over, while a couple OpenBSD tools were born from forks of FreeBSD tools (mergemaster, pkg tools, portscout)
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/howto-monitor-network-traffic-with-netflow-nfdump-nfsen-on-freebsd.49724/" rel="nofollow">Monitoring network traffic with FreeBSD</a></h3>

<ul>
<li>If you&#39;ve ever been curious about monitoring network traffic on your FreeBSD boxes, this forum post may be exactly the thing for you</li>
<li>It&#39;ll show you how to combine the Netflow, NfDump and NfSen suite of tools to get some pretty detailed network stats (and of course put them into a fancy webpage)</li>
<li>This is especially useful for finding out what was going on at a certain point in time, for example if you had a traffic spike
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/12/22/trapping-spammers-with-the-openbsd-spam-deferral-daemon" rel="nofollow">Trapping spammers with spamd</a></h3>

<ul>
<li>This is a blog post about OpenBSD&#39;s <a href="https://en.wikipedia.org/wiki/Spamd" rel="nofollow">spamd</a> - a spam email deferral daemon - and how to use it for your mail</li>
<li>It gives some background on the greylisting approach to spam, rather than just a typical host blacklist</li>
<li>&quot;Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will &quot;temporarily reject&quot; any email from a sender it does not recognize. If the sender re-attempts mail delivery at a later time, the sender may be allowed to continue the mail delivery conversation.&quot;</li>
<li>The post also shows how to combine it with PF and other tools for a pretty fancy mail setup</li>
<li>You can find spamd in the OpenBSD <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/spamd.8" rel="nofollow">base system</a>, or use it <a href="https://www.freshports.org/mail/spamd" rel="nofollow">with FreeBSD</a> <a href="http://pkgsrc.se/mail/spamd" rel="nofollow">or NetBSD</a> via ports and pkgsrc</li>
<li>You might also want to go back and listen to <a href="https://archive.org/details/bsdtalk068" rel="nofollow">BSDTalk episode 68</a>, where Will talks to Bob Beck about spamd
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20rUK9XVJ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20nfzIuT2" rel="nofollow">Brandon writes in</a></li>
<li><a href="http://slexy.org/view/s20wCBhFLO" rel="nofollow">Anders writes in</a></li>
<li><a href="http://slexy.org/view/s20xGrBIyl" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2QHRaiZJW" rel="nofollow">Kyle writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141903858708123&w=2" rel="nofollow">NTP code comparison</a> - <a href="https://www.marc.info/?l=openbsd-tech&m=141905854411370&w=2" rel="nofollow">192870 vs. 2898</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-December/046741.html" rel="nofollow">NICs have feelings too</a></li>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=141998130824977&w=2" rel="nofollow">Just think about it</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our last episode of 2014, and we&#39;ll be chatting with Dan Langille about the upcoming BSDCan conference. We&#39;ll find out what&#39;s planned and what sorts of presentations they&#39;re looking for. As usual, answers to viewer-submitted questions and all the week&#39;s news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">More conference presentation videos</a></h3>

<ul>
<li>Some more of the presentation videos from AsiaBSDCon are appearing online</li>
<li>Masanobu Saitoh, <a href="https://www.youtube.com/watch?v=ApruZrU5fVs" rel="nofollow">Developing CPE Routers Based on NetBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">Reyk Floeter</a>, <a href="https://www.youtube.com/watch?v=ufeEP_hzFN0" rel="nofollow">VXLAN and Cloud-based Networking with OpenBSD</a></li>
<li>Jos Jansen, <a href="https://www.youtube.com/watch?v=gOPfRQgTjNo" rel="nofollow">Adapting OS X to the enterprise</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" rel="nofollow">Pierre Pronchery</a> &amp; Guillaume Lasmayous, <a href="https://www.youtube.com/watch?v=vh-TjLUj6os" rel="nofollow">Carve your NetBSD</a> &lt;!-- skip to 5:06 for henning trolling --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>, <a href="https://www.youtube.com/watch?v=jzY3m5Kv7Y8" rel="nofollow">Everything you need to know about cryptography in 1 hour</a> (not from AsiaBSDCon)</li>
<li>The &quot;bsdconferences&quot; YouTube channel has quite a lot of interesting <a href="https://www.youtube.com/user/bsdconferences/videos?sort=da&view=0&flow=grid" rel="nofollow">older BSD talks</a> too - you may want to go back and watch them if you haven&#39;t already
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141922027318727&w=2" rel="nofollow">OpenBSD PIE enhancements</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">ASLR</a> and <a href="https://en.wikipedia.org/wiki/Position-independent_executable" rel="nofollow">PIE</a> are great security features that OpenBSD has had enabled by default for a long time, in both the base system and ports, but they have one inherent problem</li>
<li>They only work with <em>dynamic</em> libraries and binaries, so if you have any static binaries, they don&#39;t get the same treatment</li>
<li>For example, the default shells (and many other things in /bin and /sbin) are statically linked</li>
<li>In the case of the static ones, you can always predict the memory layout, which is very bad and sort of <a href="https://en.wikipedia.org/wiki/Return-oriented_programming" rel="nofollow">defeats the whole purpose</a></li>
<li>With this and a few <a href="https://www.marc.info/?l=openbsd-cvs&m=141927571832106&w=2" rel="nofollow">related commits</a>, OpenBSD fixes this by introducing <strong>static self-relocation</strong></li>
<li>More and more CPU architectures are being tested and getting support too; this isn&#39;t just for amd64 and i386 - VAX users can rest easy</li>
<li>It&#39;ll be available in 5.7 in May, or you can use a <a href="http://www.openbsd.org/faq/faq5.html#BldBinary" rel="nofollow">-current snapshot</a> if you want to get a <em>slice</em> of the action now
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2014dec-newsletter.html" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation publishes a huge newsletter twice a year, detailing their funded projects and some community activities</li>
<li>As always, it starts with a letter from the president of the foundation - this time it&#39;s about encouraging students and new developers to get involved</li>
<li>The article also has a fundraising update with a list of sponsored projects, and they note that the donations meter has changed from dollars to number of donors (since they exceeded the goal already)</li>
<li>You can read summaries of all the BSD conferences of 2014 and see a list of upcoming ones next year too</li>
<li>There are also sections about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a>&#39;s progress, a new staff member and a testimonial from NetApp</li>
<li>It&#39;s a very long report, so dedicate some time to read all the way through it</li>
<li>This year was pretty great for BSD: both the FreeBSD and OpenBSD foundations exceeded their goals and the NetBSD foundation came really close too</li>
<li>As we go into 2015, consider donating to <a href="https://www.freebsdfoundation.org/donate" rel="nofollow">whichever</a> <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">BSD</a> <a href="https://www.netbsd.org/donations/" rel="nofollow">you</a> <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">use</a>, it really can make a difference
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&m=141920089614758&w=4" rel="nofollow">Modernizing OpenSSH fingerprints</a></h3>

<ul>
<li>When you connect to a server for the first time, you&#39;ll get what&#39;s called a fingerprint of the host&#39;s public key - this is used to verify that you&#39;re actually talking to the same server you intended to</li>
<li>Up until now, the key fingerprints have been an MD5 hash, displayed as hex</li>
<li>This <a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033117.html" rel="nofollow">can be problematic</a>, especially for larger key types like RSA that give lots of wiggle room for collisions, as an attacker could generate a fake host key that gives the same MD5 string as the one you wanted to connect to</li>
<li>This new change replaces the default MD5 and hex with a base64-encoded SHA256 fingerprint</li>
<li>You can add a &quot;FingerprintHash&quot; line in your ssh_config to force using only the new type</li>
<li>There&#39;s also a <a href="https://www.marc.info/?l=openbsd-cvs&m=141923470520906&w=2" rel="nofollow">new option</a> to require users to authenticate with <strong>more than one</strong> public key, so you can really lock down login access to your servers - also useful if you&#39;re not 100% confident in any single key type</li>
<li>The new options should be in the upcoming 6.8 release
***</li>
</ul>

<h2>Interview - Dan Langille - <a href="mailto:info@bsdcan.org" rel="nofollow">info@bsdcan.org</a> / <a href="https://twitter.com/bsdcan" rel="nofollow">@bsdcan</a></h2>

<p>Plans for the BSDCan 2015 conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/bsdphk/Ntimed" rel="nofollow">Introducing ntimed, a new NTP daemon</a></h3>

<ul>
<li>As we&#39;ve mentioned before in <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">our tutorials</a>, there are two main daemons for the Network Time Protocol - ISC&#39;s NTPd and OpenBSD&#39;s OpenNTPD</li>
<li>With all the recent security problems with ISC&#39;s NTPd, <a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">Poul-Henning Kamp</a> has been working on a third NTP daemon</li>
<li>It&#39;s called &quot;ntimed&quot; and you can try out a preview version of it right now - it&#39;s <a href="https://www.freshports.org/net/ntimed/" rel="nofollow">in FreeBSD ports</a> or on Github</li>
<li>PHK also has a few <a href="http://phk.freebsd.dk/time/" rel="nofollow">blog entries</a> about the project, including status updates
***</li>
</ul>

<h3><a href="http://mdocml.bsd.lv/openbsd_projects.html" rel="nofollow">OpenBSD-maintained projects list</a></h3>

<ul>
<li>There was recently a read on the <a href="https://www.marc.info/?t=141961588200003&r=1&w=2" rel="nofollow">misc mailing list</a> asking about different projects started by OpenBSD developers</li>
<li>The initial list had marks for which software had portable versions to other operating systems (OpenSSH being the most popular example)</li>
<li>A developer compiled a new list from all of the replies to that thread into a nice organized webpage</li>
<li>Most people are only familiar with things like OpenSSH, OpenSMTPD, OpenNTPD and more recently LibreSSL, but there are quite a lot more</li>
<li>This page also serves as a good history lesson for BSD in general: FreeBSD and others have ported some things over, while a couple OpenBSD tools were born from forks of FreeBSD tools (mergemaster, pkg tools, portscout)
***</li>
</ul>

<h3><a href="https://forums.freebsd.org/threads/howto-monitor-network-traffic-with-netflow-nfdump-nfsen-on-freebsd.49724/" rel="nofollow">Monitoring network traffic with FreeBSD</a></h3>

<ul>
<li>If you&#39;ve ever been curious about monitoring network traffic on your FreeBSD boxes, this forum post may be exactly the thing for you</li>
<li>It&#39;ll show you how to combine the Netflow, NfDump and NfSen suite of tools to get some pretty detailed network stats (and of course put them into a fancy webpage)</li>
<li>This is especially useful for finding out what was going on at a certain point in time, for example if you had a traffic spike
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/12/22/trapping-spammers-with-the-openbsd-spam-deferral-daemon" rel="nofollow">Trapping spammers with spamd</a></h3>

<ul>
<li>This is a blog post about OpenBSD&#39;s <a href="https://en.wikipedia.org/wiki/Spamd" rel="nofollow">spamd</a> - a spam email deferral daemon - and how to use it for your mail</li>
<li>It gives some background on the greylisting approach to spam, rather than just a typical host blacklist</li>
<li>&quot;Greylisting is a method of defending e-mail users against spam. A mail transfer agent (MTA) using greylisting will &quot;temporarily reject&quot; any email from a sender it does not recognize. If the sender re-attempts mail delivery at a later time, the sender may be allowed to continue the mail delivery conversation.&quot;</li>
<li>The post also shows how to combine it with PF and other tools for a pretty fancy mail setup</li>
<li>You can find spamd in the OpenBSD <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/spamd.8" rel="nofollow">base system</a>, or use it <a href="https://www.freshports.org/mail/spamd" rel="nofollow">with FreeBSD</a> <a href="http://pkgsrc.se/mail/spamd" rel="nofollow">or NetBSD</a> via ports and pkgsrc</li>
<li>You might also want to go back and listen to <a href="https://archive.org/details/bsdtalk068" rel="nofollow">BSDTalk episode 68</a>, where Will talks to Bob Beck about spamd
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20rUK9XVJ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20nfzIuT2" rel="nofollow">Brandon writes in</a></li>
<li><a href="http://slexy.org/view/s20wCBhFLO" rel="nofollow">Anders writes in</a></li>
<li><a href="http://slexy.org/view/s20xGrBIyl" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2QHRaiZJW" rel="nofollow">Kyle writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141903858708123&w=2" rel="nofollow">NTP code comparison</a> - <a href="https://www.marc.info/?l=openbsd-tech&m=141905854411370&w=2" rel="nofollow">192870 vs. 2898</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-December/046741.html" rel="nofollow">NICs have feelings too</a></li>
<li><a href="https://www.marc.info/?l=openbsd-ports&m=141998130824977&w=2" rel="nofollow">Just think about it</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>69: Under the Ports Tree</title>
  <link>https://www.bsdnow.tv/69</link>
  <guid isPermaLink="false">0b26db6f-81d9-4338-b84d-c843b9a8b49a</guid>
  <pubDate>Wed, 24 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0b26db6f-81d9-4338-b84d-c843b9a8b49a.mp3" length="52238740" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's a special holiday episode! We asked you guys in the audience to send in the tale of how you first got into BSD, and we're going to share those with everyone today. We'll also be playing two bonus mini-interviews, so get comfy by the fire and listen to some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:12:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's a special holiday episode! We asked you guys in the audience to send in the tale of how you first got into BSD, and we're going to share those with everyone today. We'll also be playing two bonus mini-interviews, so get comfy by the fire and listen to some BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Special segment&lt;/h2&gt;

&lt;h3&gt;How our viewers got into BSD&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Jason's story (&lt;a href="http://slexy.org/view/s207hi9pTo" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;bsdx's story (&lt;a href="http://slexy.org/view/s20cmh0anD" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;David's story (&lt;a href="http://slexy.org/view/s21r4AL53g" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Brad's story (&lt;a href="http://slexy.org/view/s2OqEie53V" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Reese's story (video)&lt;/li&gt;
&lt;li&gt;Bryan's story (video)&lt;/li&gt;
&lt;li&gt;Pete's story (&lt;a href="http://slexy.org/view/s2ve2kfgW7" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Anders' story (&lt;a href="http://slexy.org/view/s20eL5EYMv" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Guillermo's story (&lt;a href="http://slexy.org/view/s20KRuIaks" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Jonathan's story (&lt;a href="http://slexy.org/view/s20IFqrc7O" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Adam's story (&lt;a href="http://slexy.org/view/s2FnnJH9zs" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Chris' story (&lt;a href="http://slexy.org/view/s21GazXKH2" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Tigersharke's story (&lt;a href="http://slexy.org/view/s2iJdLoxzZ" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Roller and Kandie's stories (&lt;a href="http://slexy.org/view/s203RsddHG" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Uwe's story (&lt;a href="http://slexy.org/view/s2gmB5VaS3" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Pascal's story (&lt;a href="http://slexy.org/view/s2PWntJ7Tc" target="_blank" rel="nofollow noopener"&gt;text&lt;/a&gt;) and (&lt;a href="https://i.imgur.com/ekXbDvb.jpg" target="_blank" rel="nofollow noopener"&gt;image&lt;/a&gt;)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Erwin Lansing - &lt;a href="mailto:erwin@freebsd.org" target="_blank" rel="nofollow noopener"&gt;erwin@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD in Europe, getting people involved&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Cristina Vintila - &lt;a href="https://twitter.com/cristina_crow" target="_blank" rel="nofollow noopener"&gt;@cristina_crow&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD conferences&lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, christmas, advocacy, women in technology, language barriers, europe, eurobsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a special holiday episode! We asked you guys in the audience to send in the tale of how you first got into BSD, and we&#39;re going to share those with everyone today. We&#39;ll also be playing two bonus mini-interviews, so get comfy by the fire and listen to some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Special segment</h2>

<h3>How our viewers got into BSD</h3>

<ul>
<li>Jason&#39;s story (<a href="http://slexy.org/view/s207hi9pTo" rel="nofollow">text</a>)</li>
<li>bsdx&#39;s story (<a href="http://slexy.org/view/s20cmh0anD" rel="nofollow">text</a>)</li>
<li>David&#39;s story (<a href="http://slexy.org/view/s21r4AL53g" rel="nofollow">text</a>)</li>
<li>Brad&#39;s story (<a href="http://slexy.org/view/s2OqEie53V" rel="nofollow">text</a>)</li>
<li>Reese&#39;s story (video)</li>
<li>Bryan&#39;s story (video)</li>
<li>Pete&#39;s story (<a href="http://slexy.org/view/s2ve2kfgW7" rel="nofollow">text</a>)</li>
<li>Anders&#39; story (<a href="http://slexy.org/view/s20eL5EYMv" rel="nofollow">text</a>)</li>
<li>Guillermo&#39;s story (<a href="http://slexy.org/view/s20KRuIaks" rel="nofollow">text</a>)</li>
<li>Jonathan&#39;s story (<a href="http://slexy.org/view/s20IFqrc7O" rel="nofollow">text</a>)</li>
<li>Adam&#39;s story (<a href="http://slexy.org/view/s2FnnJH9zs" rel="nofollow">text</a>)</li>
<li>Chris&#39; story (<a href="http://slexy.org/view/s21GazXKH2" rel="nofollow">text</a>)</li>
<li>Tigersharke&#39;s story (<a href="http://slexy.org/view/s2iJdLoxzZ" rel="nofollow">text</a>)</li>
<li>Roller and Kandie&#39;s stories (<a href="http://slexy.org/view/s203RsddHG" rel="nofollow">text</a>)</li>
<li>Uwe&#39;s story (<a href="http://slexy.org/view/s2gmB5VaS3" rel="nofollow">text</a>)</li>
<li>Pascal&#39;s story (<a href="http://slexy.org/view/s2PWntJ7Tc" rel="nofollow">text</a>) and (<a href="https://i.imgur.com/ekXbDvb.jpg" rel="nofollow">image</a>)
***</li>
</ul>

<h2>Interview - Erwin Lansing - <a href="mailto:erwin@freebsd.org" rel="nofollow">erwin@freebsd.org</a></h2>

<p>BSD in Europe, getting people involved</p>

<hr>

<h2>Interview - Cristina Vintila - <a href="https://twitter.com/cristina_crow" rel="nofollow">@cristina_crow</a></h2>

<p>BSD conferences</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a special holiday episode! We asked you guys in the audience to send in the tale of how you first got into BSD, and we&#39;re going to share those with everyone today. We&#39;ll also be playing two bonus mini-interviews, so get comfy by the fire and listen to some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Special segment</h2>

<h3>How our viewers got into BSD</h3>

<ul>
<li>Jason&#39;s story (<a href="http://slexy.org/view/s207hi9pTo" rel="nofollow">text</a>)</li>
<li>bsdx&#39;s story (<a href="http://slexy.org/view/s20cmh0anD" rel="nofollow">text</a>)</li>
<li>David&#39;s story (<a href="http://slexy.org/view/s21r4AL53g" rel="nofollow">text</a>)</li>
<li>Brad&#39;s story (<a href="http://slexy.org/view/s2OqEie53V" rel="nofollow">text</a>)</li>
<li>Reese&#39;s story (video)</li>
<li>Bryan&#39;s story (video)</li>
<li>Pete&#39;s story (<a href="http://slexy.org/view/s2ve2kfgW7" rel="nofollow">text</a>)</li>
<li>Anders&#39; story (<a href="http://slexy.org/view/s20eL5EYMv" rel="nofollow">text</a>)</li>
<li>Guillermo&#39;s story (<a href="http://slexy.org/view/s20KRuIaks" rel="nofollow">text</a>)</li>
<li>Jonathan&#39;s story (<a href="http://slexy.org/view/s20IFqrc7O" rel="nofollow">text</a>)</li>
<li>Adam&#39;s story (<a href="http://slexy.org/view/s2FnnJH9zs" rel="nofollow">text</a>)</li>
<li>Chris&#39; story (<a href="http://slexy.org/view/s21GazXKH2" rel="nofollow">text</a>)</li>
<li>Tigersharke&#39;s story (<a href="http://slexy.org/view/s2iJdLoxzZ" rel="nofollow">text</a>)</li>
<li>Roller and Kandie&#39;s stories (<a href="http://slexy.org/view/s203RsddHG" rel="nofollow">text</a>)</li>
<li>Uwe&#39;s story (<a href="http://slexy.org/view/s2gmB5VaS3" rel="nofollow">text</a>)</li>
<li>Pascal&#39;s story (<a href="http://slexy.org/view/s2PWntJ7Tc" rel="nofollow">text</a>) and (<a href="https://i.imgur.com/ekXbDvb.jpg" rel="nofollow">image</a>)
***</li>
</ul>

<h2>Interview - Erwin Lansing - <a href="mailto:erwin@freebsd.org" rel="nofollow">erwin@freebsd.org</a></h2>

<p>BSD in Europe, getting people involved</p>

<hr>

<h2>Interview - Cristina Vintila - <a href="https://twitter.com/cristina_crow" rel="nofollow">@cristina_crow</a></h2>

<p>BSD conferences</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>68: Just the Essentials</title>
  <link>https://www.bsdnow.tv/68</link>
  <guid isPermaLink="false">d06324f4-7dc5-4b8f-9618-666fe480b68d</guid>
  <pubDate>Wed, 17 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d06324f4-7dc5-4b8f-9618-666fe480b68d.mp3" length="62609620" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Michael Lucas about his newest BSD book, "FreeBSD Mastery: Storage Essentials." It's got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We've also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be talking with Michael Lucas about his newest BSD book, "FreeBSD Mastery: Storage Essentials." It's got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We've also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/channel/UCLy8AikPZfWEmzWxUec69PA/videos" target="_blank" rel="nofollow noopener"&gt;More BSD conference videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned it a few times, but the "New Directions in Operating Systems" conference was held in November in the UK&lt;/li&gt;
&lt;li&gt;The presentations videos are now online, with a few BSD-related talks of interest&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" target="_blank" rel="nofollow noopener"&gt;Antti Kantee&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=GoB73cVyScI" target="_blank" rel="nofollow noopener"&gt;Rump kernels and why / how we got here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Franco Fichtner, &lt;a href="https://www.youtube.com/watch?v=WiMNuGTRgbA" target="_blank" rel="nofollow noopener"&gt;An introduction to userland networking&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" target="_blank" rel="nofollow noopener"&gt;Robert Watson&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=60elN996rtg" target="_blank" rel="nofollow noopener"&gt;New ideas about old OS security&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lots of other interesting, but non-BSD-related, talks were also presented, so check the &lt;a href="https://www.youtube.com/playlist?list=PLmRrx948XMnEUlzKOCYn3AzT8OAInP_5M" target="_blank" rel="nofollow noopener"&gt;full list&lt;/a&gt; if you're interested in operating systems in general&lt;/li&gt;
&lt;li&gt;The 2014 AsiaBSDCon videos are also slowly being uploaded (better late than never)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" target="_blank" rel="nofollow noopener"&gt;Kirk McKusick&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=E04LxKiu79I" target="_blank" rel="nofollow noopener"&gt;An Overview of Security in the FreeBSD Kernel&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" target="_blank" rel="nofollow noopener"&gt;Matthew Ahrens&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=8T9Rh-46jhI" target="_blank" rel="nofollow noopener"&gt;OpenZFS ensures the continued excellence of ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Eric Allman, &lt;a href="https://www.youtube.com/watch?v=o2dmreSy76Q" target="_blank" rel="nofollow noopener"&gt;Bambi Meets Godzilla: They Elope - Open Source Meets the Commercial World&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_12_25-the_gift_of_giving" target="_blank" rel="nofollow noopener"&gt;Scott Long&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=4sZZN8Szh14" target="_blank" rel="nofollow noopener"&gt;Modifying the FreeBSD kernel Netflix streaming servers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" target="_blank" rel="nofollow noopener"&gt;Dru Lavigne&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=z5apZFFvx4k" target="_blank" rel="nofollow noopener"&gt;ZFS for the Masses&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Kris Moore, &lt;a href="https://www.youtube.com/watch?v=w-0PlAVSg5U" target="_blank" rel="nofollow noopener"&gt;Snapshots, Replication, and Boot Environments&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_05_07-lets_get_raid" target="_blank" rel="nofollow noopener"&gt;David Chisnall&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=NLqDAclXMMU" target="_blank" rel="nofollow noopener"&gt;The Future of LLVM in the FreeBSD Toolchain&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Luba Tang, &lt;a href="https://www.youtube.com/watch?v=fWgbBUPMsVw" target="_blank" rel="nofollow noopener"&gt;Bold, fast optimizing linker for BSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_04_23-its_gonna_get_nasty" target="_blank" rel="nofollow noopener"&gt;John Hixson&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=iwF82aep-l8" target="_blank" rel="nofollow noopener"&gt;Introduction to FreeNAS development&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Zbigniew Bodek, &lt;a href="https://www.youtube.com/watch?v=2KLXcyLZ_RE" target="_blank" rel="nofollow noopener"&gt;Transparent Superpages for FreeBSD on ARM&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Michael Dexter, &lt;a href="https://www.youtube.com/watch?v=rjNg1eQ7uAk" target="_blank" rel="nofollow noopener"&gt;Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" target="_blank" rel="nofollow noopener"&gt;Peter Grehan&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=wptkUxJSNMY" target="_blank" rel="nofollow noopener"&gt;Nested Paging in Bhyve&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Martin Matuška, &lt;a href="https://www.youtube.com/watch?v=nb8jB5x0OX4" target="_blank" rel="nofollow noopener"&gt;Deploying FreeBSD systems with Foreman and mfsBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_04_16-certified_package_delivery" target="_blank" rel="nofollow noopener"&gt;James Brown&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=6eKMLuzsTbY" target="_blank" rel="nofollow noopener"&gt;Analysys of BSD Associate Exam Results&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Mindaugas Rasiukevicius, &lt;a href="https://www.youtube.com/watch?v=cgBh0iC9WhM" target="_blank" rel="nofollow noopener"&gt;NPF - progress and perspective&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Luigi Rizzo, &lt;a href="https://www.youtube.com/watch?v=nW8iHgOL9y4" target="_blank" rel="nofollow noopener"&gt;Netmap as a core networking technology&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;Michael W. Lucas&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=o0purspHg-o" target="_blank" rel="nofollow noopener"&gt;Sudo: You're Doing it Wrong&lt;/a&gt; (not from a BSD conference, but still good)&lt;/li&gt;
&lt;li&gt;They should make for some great material to watch during the holidays
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/12/security-openbsd-vs-freebsd.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD vs FreeBSD security features&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;From the author of both the OpenBSD and FreeBSD secure gateway articles we've featured in the past comes a new entry about security&lt;/li&gt;
&lt;li&gt;The article goes through a list of all the security features enabled (and disabled) by default in both FreeBSD and OpenBSD&lt;/li&gt;
&lt;li&gt;It covers a wide range of topics, including: memory protection, randomization, encryption, privilege separation, Capsicum, securelevels, MAC, Jails and chroots, network stack hardening, firewall features and &lt;strong&gt;much more&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;This is definitely one of the most in-depth and complete articles we've seen in a while - the author seems to have done his homework&lt;/li&gt;
&lt;li&gt;If you're looking to secure any sort of BSD box, this post has some very detailed explanations of different exploit mitigation techniques - be sure to read the whole thing&lt;/li&gt;
&lt;li&gt;There are also &lt;a href="http://daemonforums.org/showthread.php?s=16fd0771d929aff294b252924b414f2c&amp;amp;t=8823" target="_blank" rel="nofollow noopener"&gt;some good comments&lt;/a&gt; on DaemonForums &lt;a href="https://lobste.rs/s/e3s9xr/security_openbsd_vs_freebsd" target="_blank" rel="nofollow noopener"&gt;and lobste.rs&lt;/a&gt; that you may want to read 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/12/the-password-you-changed-it-right.html" target="_blank" rel="nofollow noopener"&gt;The password? You changed it, right?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" target="_blank" rel="nofollow noopener"&gt;Peter Hansteen&lt;/a&gt; has a new blog post up, detailing some weird SSH bruteforcing he's seen recently&lt;/li&gt;
&lt;li&gt;He apparently reads his auth logs when he gets bored at an airport&lt;/li&gt;
&lt;li&gt;This new bruteforcing attempt seems to be targetting D-Link devices, as evidenced by the three usernames the bots try to use&lt;/li&gt;
&lt;li&gt;More than 700 IPs have tried to get into Peter's BSD boxes using these names in combination with weak passwords&lt;/li&gt;
&lt;li&gt;Lots more details, including the lists of passwords and IPs, can be found in the full article&lt;/li&gt;
&lt;li&gt;If you're &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;using a BSD router&lt;/a&gt;, things like this can be easily prevented with PF or fail2ban (and you probably don't have a "d-link" user anyway)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.infoworld.com/article/2858288/unix/intro-to-freebsd-for-linux-users.html" target="_blank" rel="nofollow noopener"&gt;Get started with FreeBSD, an intro for Linux users&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another new BSD article on a mainstream technology news site - seems we're getting popular&lt;/li&gt;
&lt;li&gt;This article is written for Linux users who may be considering switching over to BSD and wondering what it's all about&lt;/li&gt;
&lt;li&gt;It details installing FreeBSD 9.3 and getting a basic system setup, while touching on ports and packages, and explaining some terminology along the way&lt;/li&gt;
&lt;li&gt;"Among the legions of Linux users and admins, there seems to be a sort of passive curiosity about FreeBSD and other &lt;em&gt;BSDs. Like commuters on a packed train, they gaze out at a less crowded, vaguely mysterious train heading in a slightly different direction and wonder what traveling on that train might be like"
*&lt;/em&gt;*&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Michael W. Lucas - &lt;a href="mailto:mwlucas@michaelwlucas.com" target="_blank" rel="nofollow noopener"&gt;mwlucas@michaelwlucas.com&lt;/a&gt; / &lt;a href="https://twitter.com/mwlauthor" target="_blank" rel="nofollow noopener"&gt;@mwlauthor&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" target="_blank" rel="nofollow noopener"&gt;FreeBSD Mastery: Storage Essentials&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://poolp.org/0xa86e/Some-OpenSMTPD-overview,-part-3" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD status update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD guys&lt;/a&gt;, particularly Gilles, have posted an update on what they've been up to lately&lt;/li&gt;
&lt;li&gt;As of 5.6, it's become the default MTA in OpenBSD, and sendmail will be totally gone in 5.7&lt;/li&gt;
&lt;li&gt;Email is a much more tricky protocol than you might imagine, and the post goes through some of the weirdness and problems they've had to deal with&lt;/li&gt;
&lt;li&gt;There's also &lt;a href="https://poolp.org/0xa871/The-state-of-filters" target="_blank" rel="nofollow noopener"&gt;another post&lt;/a&gt; that goes into detail on their upcoming filtering API - a feature &lt;strong&gt;many&lt;/strong&gt; have requested&lt;/li&gt;
&lt;li&gt;The API is still being developed, but you can test it out now if you know what you're doing - full details in the article&lt;/li&gt;
&lt;li&gt;OpenSMTPD also has portable versions in FreeBSD ports and NetBSD pkgsrc, so check it out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/svn-src-head/2014-December/065806.html" target="_blank" rel="nofollow noopener"&gt;OpenCrypto changes in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A little while back, &lt;a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" target="_blank" rel="nofollow noopener"&gt;we talked to John-Mark Gurney&lt;/a&gt; about updating FreeBSD's OpenCrypto framework, specifically for IPSEC&lt;/li&gt;
&lt;li&gt;Some of that work has just landed in the -CURRENT branch, and the commit has a bit of details&lt;/li&gt;
&lt;li&gt;The ICM and GCM modes of AES were added, and both include support for AESNI&lt;/li&gt;
&lt;li&gt;There's a new port - "nist-kat" - that can be used to test the new modes of operation&lt;/li&gt;
&lt;li&gt;Some things were fixed in the process as well, including an issue that would leak timing info and result in the ability to forge messages&lt;/li&gt;
&lt;li&gt;Code was also borrowed from both OpenBSD and NetBSD to make this possible
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.protoc.org/blog/2014/11/23/first-thoughts-on-the-new-openbsd-httpd-server/" target="_blank" rel="nofollow noopener"&gt;First thoughts on OpenBSD's httpd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post from a user of OpenBSD's new homegrown web server that made its debut in 5.6&lt;/li&gt;
&lt;li&gt;The author loves that it has proper privilege separation, a very simple config syntax and that it always runs in a chroot&lt;/li&gt;
&lt;li&gt;He also mentions dynamic content hosting with FastCGI, and provides an example of how to set it up&lt;/li&gt;
&lt;li&gt;Be sure to check &lt;a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener"&gt;our interview with Reyk&lt;/a&gt; about the new httpd if you're curious on how it got started&lt;/li&gt;
&lt;li&gt;Also, if you're running the version that came with 5.6, there's &lt;a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig" target="_blank" rel="nofollow noopener"&gt;a huge patch&lt;/a&gt; you can apply to get a lot of the features and fixes from -current without waiting for 5.7
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=B04EuZ9hpAI" target="_blank" rel="nofollow noopener"&gt;Steam on PCBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the most common questions people who want to use BSD as a desktop ask us is "can I run games?" or "can I use steam?"&lt;/li&gt;
&lt;li&gt;Steam through the Linux emulation layer (in FreeBSD) may be possible soon, but it's already possible to use it with WINE&lt;/li&gt;
&lt;li&gt;This video shows how to get Steam set up on PCBSD using the Windows version&lt;/li&gt;
&lt;li&gt;There are also some instructions in the video description to look over&lt;/li&gt;
&lt;li&gt;A &lt;a href="https://www.youtube.com/watch?v=BJ88B8aWdk0" target="_blank" rel="nofollow noopener"&gt;second video&lt;/a&gt; details getting streaming set up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JgqXcw4i" target="_blank" rel="nofollow noopener"&gt;Charlie writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2WormjMCs" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20UmdFrbj" target="_blank" rel="nofollow noopener"&gt;Predrag writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, freebsd mastery, storage essentials, ufs, zfs, disks, book, review, michael lucas, asiabsdcon, operatingsystems.io, opensmtpd, steam</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Michael Lucas about his newest BSD book, &quot;FreeBSD Mastery: Storage Essentials.&quot; It&#39;s got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We&#39;ve also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCLy8AikPZfWEmzWxUec69PA/videos" rel="nofollow">More BSD conference videos</a></h3>

<ul>
<li>We mentioned it a few times, but the &quot;New Directions in Operating Systems&quot; conference was held in November in the UK</li>
<li>The presentations videos are now online, with a few BSD-related talks of interest</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, <a href="https://www.youtube.com/watch?v=GoB73cVyScI" rel="nofollow">Rump kernels and why / how we got here</a></li>
<li>Franco Fichtner, <a href="https://www.youtube.com/watch?v=WiMNuGTRgbA" rel="nofollow">An introduction to userland networking</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">Robert Watson</a>, <a href="https://www.youtube.com/watch?v=60elN996rtg" rel="nofollow">New ideas about old OS security</a></li>
<li>Lots of other interesting, but non-BSD-related, talks were also presented, so check the <a href="https://www.youtube.com/playlist?list=PLmRrx948XMnEUlzKOCYn3AzT8OAInP_5M" rel="nofollow">full list</a> if you&#39;re interested in operating systems in general</li>
<li>The 2014 AsiaBSDCon videos are also slowly being uploaded (better late than never)</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=E04LxKiu79I" rel="nofollow">An Overview of Security in the FreeBSD Kernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matthew Ahrens</a>, <a href="https://www.youtube.com/watch?v=8T9Rh-46jhI" rel="nofollow">OpenZFS ensures the continued excellence of ZFS</a></li>
<li>Eric Allman, <a href="https://www.youtube.com/watch?v=o2dmreSy76Q" rel="nofollow">Bambi Meets Godzilla: They Elope - Open Source Meets the Commercial World</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_25-the_gift_of_giving" rel="nofollow">Scott Long</a>, <a href="https://www.youtube.com/watch?v=4sZZN8Szh14" rel="nofollow">Modifying the FreeBSD kernel Netflix streaming servers</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a>, <a href="https://www.youtube.com/watch?v=z5apZFFvx4k" rel="nofollow">ZFS for the Masses</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=w-0PlAVSg5U" rel="nofollow">Snapshots, Replication, and Boot Environments</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_07-lets_get_raid" rel="nofollow">David Chisnall</a>, <a href="https://www.youtube.com/watch?v=NLqDAclXMMU" rel="nofollow">The Future of LLVM in the FreeBSD Toolchain</a></li>
<li>Luba Tang, <a href="https://www.youtube.com/watch?v=fWgbBUPMsVw" rel="nofollow">Bold, fast optimizing linker for BSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_23-its_gonna_get_nasty" rel="nofollow">John Hixson</a>, <a href="https://www.youtube.com/watch?v=iwF82aep-l8" rel="nofollow">Introduction to FreeNAS development</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=2KLXcyLZ_RE" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>Michael Dexter, <a href="https://www.youtube.com/watch?v=rjNg1eQ7uAk" rel="nofollow">Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">Peter Grehan</a>, <a href="https://www.youtube.com/watch?v=wptkUxJSNMY" rel="nofollow">Nested Paging in Bhyve</a></li>
<li>Martin Matuška, <a href="https://www.youtube.com/watch?v=nb8jB5x0OX4" rel="nofollow">Deploying FreeBSD systems with Foreman and mfsBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_16-certified_package_delivery" rel="nofollow">James Brown</a>, <a href="https://www.youtube.com/watch?v=6eKMLuzsTbY" rel="nofollow">Analysys of BSD Associate Exam Results</a></li>
<li>Mindaugas Rasiukevicius, <a href="https://www.youtube.com/watch?v=cgBh0iC9WhM" rel="nofollow">NPF - progress and perspective</a></li>
<li>Luigi Rizzo, <a href="https://www.youtube.com/watch?v=nW8iHgOL9y4" rel="nofollow">Netmap as a core networking technology</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W. Lucas</a>, <a href="https://www.youtube.com/watch?v=o0purspHg-o" rel="nofollow">Sudo: You&#39;re Doing it Wrong</a> (not from a BSD conference, but still good)</li>
<li>They should make for some great material to watch during the holidays
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/12/security-openbsd-vs-freebsd.html" rel="nofollow">OpenBSD vs FreeBSD security features</a></h3>

<ul>
<li>From the author of both the OpenBSD and FreeBSD secure gateway articles we&#39;ve featured in the past comes a new entry about security</li>
<li>The article goes through a list of all the security features enabled (and disabled) by default in both FreeBSD and OpenBSD</li>
<li>It covers a wide range of topics, including: memory protection, randomization, encryption, privilege separation, Capsicum, securelevels, MAC, Jails and chroots, network stack hardening, firewall features and <strong>much more</strong></li>
<li>This is definitely one of the most in-depth and complete articles we&#39;ve seen in a while - the author seems to have done his homework</li>
<li>If you&#39;re looking to secure any sort of BSD box, this post has some very detailed explanations of different exploit mitigation techniques - be sure to read the whole thing</li>
<li>There are also <a href="http://daemonforums.org/showthread.php?s=16fd0771d929aff294b252924b414f2c&t=8823" rel="nofollow">some good comments</a> on DaemonForums <a href="https://lobste.rs/s/e3s9xr/security_openbsd_vs_freebsd" rel="nofollow">and lobste.rs</a> that you may want to read 
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/12/the-password-you-changed-it-right.html" rel="nofollow">The password? You changed it, right?</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a> has a new blog post up, detailing some weird SSH bruteforcing he&#39;s seen recently</li>
<li>He apparently reads his auth logs when he gets bored at an airport</li>
<li>This new bruteforcing attempt seems to be targetting D-Link devices, as evidenced by the three usernames the bots try to use</li>
<li>More than 700 IPs have tried to get into Peter&#39;s BSD boxes using these names in combination with weak passwords</li>
<li>Lots more details, including the lists of passwords and IPs, can be found in the full article</li>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">using a BSD router</a>, things like this can be easily prevented with PF or fail2ban (and you probably don&#39;t have a &quot;d-link&quot; user anyway)
***</li>
</ul>

<h3><a href="http://www.infoworld.com/article/2858288/unix/intro-to-freebsd-for-linux-users.html" rel="nofollow">Get started with FreeBSD, an intro for Linux users</a></h3>

<ul>
<li>Another new BSD article on a mainstream technology news site - seems we&#39;re getting popular</li>
<li>This article is written for Linux users who may be considering switching over to BSD and wondering what it&#39;s all about</li>
<li>It details installing FreeBSD 9.3 and getting a basic system setup, while touching on ports and packages, and explaining some terminology along the way</li>
<li>&quot;Among the legions of Linux users and admins, there seems to be a sort of passive curiosity about FreeBSD and other <em>BSDs. Like commuters on a packed train, they gaze out at a less crowded, vaguely mysterious train heading in a slightly different direction and wonder what traveling on that train might be like&quot;
*</em>*</li>
</ul>

<h2>Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com" rel="nofollow">mwlucas@michaelwlucas.com</a> / <a href="https://twitter.com/mwlauthor" rel="nofollow">@mwlauthor</a></h2>

<p><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery: Storage Essentials</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://poolp.org/0xa86e/Some-OpenSMTPD-overview,-part-3" rel="nofollow">OpenSMTPD status update</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">OpenSMTPD guys</a>, particularly Gilles, have posted an update on what they&#39;ve been up to lately</li>
<li>As of 5.6, it&#39;s become the default MTA in OpenBSD, and sendmail will be totally gone in 5.7</li>
<li>Email is a much more tricky protocol than you might imagine, and the post goes through some of the weirdness and problems they&#39;ve had to deal with</li>
<li>There&#39;s also <a href="https://poolp.org/0xa871/The-state-of-filters" rel="nofollow">another post</a> that goes into detail on their upcoming filtering API - a feature <strong>many</strong> have requested</li>
<li>The API is still being developed, but you can test it out now if you know what you&#39;re doing - full details in the article</li>
<li>OpenSMTPD also has portable versions in FreeBSD ports and NetBSD pkgsrc, so check it out
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2014-December/065806.html" rel="nofollow">OpenCrypto changes in FreeBSD</a></h3>

<ul>
<li>A little while back, <a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">we talked to John-Mark Gurney</a> about updating FreeBSD&#39;s OpenCrypto framework, specifically for IPSEC</li>
<li>Some of that work has just landed in the -CURRENT branch, and the commit has a bit of details</li>
<li>The ICM and GCM modes of AES were added, and both include support for AESNI</li>
<li>There&#39;s a new port - &quot;nist-kat&quot; - that can be used to test the new modes of operation</li>
<li>Some things were fixed in the process as well, including an issue that would leak timing info and result in the ability to forge messages</li>
<li>Code was also borrowed from both OpenBSD and NetBSD to make this possible
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/11/23/first-thoughts-on-the-new-openbsd-httpd-server/" rel="nofollow">First thoughts on OpenBSD&#39;s httpd</a></h3>

<ul>
<li>Here we have a blog post from a user of OpenBSD&#39;s new homegrown web server that made its debut in 5.6</li>
<li>The author loves that it has proper privilege separation, a very simple config syntax and that it always runs in a chroot</li>
<li>He also mentions dynamic content hosting with FastCGI, and provides an example of how to set it up</li>
<li>Be sure to check <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">our interview with Reyk</a> about the new httpd if you&#39;re curious on how it got started</li>
<li>Also, if you&#39;re running the version that came with 5.6, there&#39;s <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig" rel="nofollow">a huge patch</a> you can apply to get a lot of the features and fixes from -current without waiting for 5.7
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=B04EuZ9hpAI" rel="nofollow">Steam on PCBSD</a></h3>

<ul>
<li>One of the most common questions people who want to use BSD as a desktop ask us is &quot;can I run games?&quot; or &quot;can I use steam?&quot;</li>
<li>Steam through the Linux emulation layer (in FreeBSD) may be possible soon, but it&#39;s already possible to use it with WINE</li>
<li>This video shows how to get Steam set up on PCBSD using the Windows version</li>
<li>There are also some instructions in the video description to look over</li>
<li>A <a href="https://www.youtube.com/watch?v=BJ88B8aWdk0" rel="nofollow">second video</a> details getting streaming set up
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JgqXcw4i" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s2WormjMCs" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20UmdFrbj" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Michael Lucas about his newest BSD book, &quot;FreeBSD Mastery: Storage Essentials.&quot; It&#39;s got lots of great information about the disk subsystems, GEOM, filesystems, you name it. We&#39;ve also got the usual round of news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCLy8AikPZfWEmzWxUec69PA/videos" rel="nofollow">More BSD conference videos</a></h3>

<ul>
<li>We mentioned it a few times, but the &quot;New Directions in Operating Systems&quot; conference was held in November in the UK</li>
<li>The presentations videos are now online, with a few BSD-related talks of interest</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">Antti Kantee</a>, <a href="https://www.youtube.com/watch?v=GoB73cVyScI" rel="nofollow">Rump kernels and why / how we got here</a></li>
<li>Franco Fichtner, <a href="https://www.youtube.com/watch?v=WiMNuGTRgbA" rel="nofollow">An introduction to userland networking</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">Robert Watson</a>, <a href="https://www.youtube.com/watch?v=60elN996rtg" rel="nofollow">New ideas about old OS security</a></li>
<li>Lots of other interesting, but non-BSD-related, talks were also presented, so check the <a href="https://www.youtube.com/playlist?list=PLmRrx948XMnEUlzKOCYn3AzT8OAInP_5M" rel="nofollow">full list</a> if you&#39;re interested in operating systems in general</li>
<li>The 2014 AsiaBSDCon videos are also slowly being uploaded (better late than never)</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=E04LxKiu79I" rel="nofollow">An Overview of Security in the FreeBSD Kernel</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matthew Ahrens</a>, <a href="https://www.youtube.com/watch?v=8T9Rh-46jhI" rel="nofollow">OpenZFS ensures the continued excellence of ZFS</a></li>
<li>Eric Allman, <a href="https://www.youtube.com/watch?v=o2dmreSy76Q" rel="nofollow">Bambi Meets Godzilla: They Elope - Open Source Meets the Commercial World</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_25-the_gift_of_giving" rel="nofollow">Scott Long</a>, <a href="https://www.youtube.com/watch?v=4sZZN8Szh14" rel="nofollow">Modifying the FreeBSD kernel Netflix streaming servers</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a>, <a href="https://www.youtube.com/watch?v=z5apZFFvx4k" rel="nofollow">ZFS for the Masses</a></li>
<li>Kris Moore, <a href="https://www.youtube.com/watch?v=w-0PlAVSg5U" rel="nofollow">Snapshots, Replication, and Boot Environments</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_07-lets_get_raid" rel="nofollow">David Chisnall</a>, <a href="https://www.youtube.com/watch?v=NLqDAclXMMU" rel="nofollow">The Future of LLVM in the FreeBSD Toolchain</a></li>
<li>Luba Tang, <a href="https://www.youtube.com/watch?v=fWgbBUPMsVw" rel="nofollow">Bold, fast optimizing linker for BSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_23-its_gonna_get_nasty" rel="nofollow">John Hixson</a>, <a href="https://www.youtube.com/watch?v=iwF82aep-l8" rel="nofollow">Introduction to FreeNAS development</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=2KLXcyLZ_RE" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>Michael Dexter, <a href="https://www.youtube.com/watch?v=rjNg1eQ7uAk" rel="nofollow">Visualizing Unix: Graphing bhyve, ZFS and PF with Graphite</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_01_15-bhyve_mind" rel="nofollow">Peter Grehan</a>, <a href="https://www.youtube.com/watch?v=wptkUxJSNMY" rel="nofollow">Nested Paging in Bhyve</a></li>
<li>Martin Matuška, <a href="https://www.youtube.com/watch?v=nb8jB5x0OX4" rel="nofollow">Deploying FreeBSD systems with Foreman and mfsBSD</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_16-certified_package_delivery" rel="nofollow">James Brown</a>, <a href="https://www.youtube.com/watch?v=6eKMLuzsTbY" rel="nofollow">Analysys of BSD Associate Exam Results</a></li>
<li>Mindaugas Rasiukevicius, <a href="https://www.youtube.com/watch?v=cgBh0iC9WhM" rel="nofollow">NPF - progress and perspective</a></li>
<li>Luigi Rizzo, <a href="https://www.youtube.com/watch?v=nW8iHgOL9y4" rel="nofollow">Netmap as a core networking technology</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W. Lucas</a>, <a href="https://www.youtube.com/watch?v=o0purspHg-o" rel="nofollow">Sudo: You&#39;re Doing it Wrong</a> (not from a BSD conference, but still good)</li>
<li>They should make for some great material to watch during the holidays
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/12/security-openbsd-vs-freebsd.html" rel="nofollow">OpenBSD vs FreeBSD security features</a></h3>

<ul>
<li>From the author of both the OpenBSD and FreeBSD secure gateway articles we&#39;ve featured in the past comes a new entry about security</li>
<li>The article goes through a list of all the security features enabled (and disabled) by default in both FreeBSD and OpenBSD</li>
<li>It covers a wide range of topics, including: memory protection, randomization, encryption, privilege separation, Capsicum, securelevels, MAC, Jails and chroots, network stack hardening, firewall features and <strong>much more</strong></li>
<li>This is definitely one of the most in-depth and complete articles we&#39;ve seen in a while - the author seems to have done his homework</li>
<li>If you&#39;re looking to secure any sort of BSD box, this post has some very detailed explanations of different exploit mitigation techniques - be sure to read the whole thing</li>
<li>There are also <a href="http://daemonforums.org/showthread.php?s=16fd0771d929aff294b252924b414f2c&t=8823" rel="nofollow">some good comments</a> on DaemonForums <a href="https://lobste.rs/s/e3s9xr/security_openbsd_vs_freebsd" rel="nofollow">and lobste.rs</a> that you may want to read 
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/12/the-password-you-changed-it-right.html" rel="nofollow">The password? You changed it, right?</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a> has a new blog post up, detailing some weird SSH bruteforcing he&#39;s seen recently</li>
<li>He apparently reads his auth logs when he gets bored at an airport</li>
<li>This new bruteforcing attempt seems to be targetting D-Link devices, as evidenced by the three usernames the bots try to use</li>
<li>More than 700 IPs have tried to get into Peter&#39;s BSD boxes using these names in combination with weak passwords</li>
<li>Lots more details, including the lists of passwords and IPs, can be found in the full article</li>
<li>If you&#39;re <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">using a BSD router</a>, things like this can be easily prevented with PF or fail2ban (and you probably don&#39;t have a &quot;d-link&quot; user anyway)
***</li>
</ul>

<h3><a href="http://www.infoworld.com/article/2858288/unix/intro-to-freebsd-for-linux-users.html" rel="nofollow">Get started with FreeBSD, an intro for Linux users</a></h3>

<ul>
<li>Another new BSD article on a mainstream technology news site - seems we&#39;re getting popular</li>
<li>This article is written for Linux users who may be considering switching over to BSD and wondering what it&#39;s all about</li>
<li>It details installing FreeBSD 9.3 and getting a basic system setup, while touching on ports and packages, and explaining some terminology along the way</li>
<li>&quot;Among the legions of Linux users and admins, there seems to be a sort of passive curiosity about FreeBSD and other <em>BSDs. Like commuters on a packed train, they gaze out at a less crowded, vaguely mysterious train heading in a slightly different direction and wonder what traveling on that train might be like&quot;
*</em>*</li>
</ul>

<h2>Interview - Michael W. Lucas - <a href="mailto:mwlucas@michaelwlucas.com" rel="nofollow">mwlucas@michaelwlucas.com</a> / <a href="https://twitter.com/mwlauthor" rel="nofollow">@mwlauthor</a></h2>

<p><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery: Storage Essentials</a></p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://poolp.org/0xa86e/Some-OpenSMTPD-overview,-part-3" rel="nofollow">OpenSMTPD status update</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">OpenSMTPD guys</a>, particularly Gilles, have posted an update on what they&#39;ve been up to lately</li>
<li>As of 5.6, it&#39;s become the default MTA in OpenBSD, and sendmail will be totally gone in 5.7</li>
<li>Email is a much more tricky protocol than you might imagine, and the post goes through some of the weirdness and problems they&#39;ve had to deal with</li>
<li>There&#39;s also <a href="https://poolp.org/0xa871/The-state-of-filters" rel="nofollow">another post</a> that goes into detail on their upcoming filtering API - a feature <strong>many</strong> have requested</li>
<li>The API is still being developed, but you can test it out now if you know what you&#39;re doing - full details in the article</li>
<li>OpenSMTPD also has portable versions in FreeBSD ports and NetBSD pkgsrc, so check it out
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/svn-src-head/2014-December/065806.html" rel="nofollow">OpenCrypto changes in FreeBSD</a></h3>

<ul>
<li>A little while back, <a href="http://www.bsdnow.tv/episodes/2014_10_29-ipsecond_wind" rel="nofollow">we talked to John-Mark Gurney</a> about updating FreeBSD&#39;s OpenCrypto framework, specifically for IPSEC</li>
<li>Some of that work has just landed in the -CURRENT branch, and the commit has a bit of details</li>
<li>The ICM and GCM modes of AES were added, and both include support for AESNI</li>
<li>There&#39;s a new port - &quot;nist-kat&quot; - that can be used to test the new modes of operation</li>
<li>Some things were fixed in the process as well, including an issue that would leak timing info and result in the ability to forge messages</li>
<li>Code was also borrowed from both OpenBSD and NetBSD to make this possible
***</li>
</ul>

<h3><a href="http://www.protoc.org/blog/2014/11/23/first-thoughts-on-the-new-openbsd-httpd-server/" rel="nofollow">First thoughts on OpenBSD&#39;s httpd</a></h3>

<ul>
<li>Here we have a blog post from a user of OpenBSD&#39;s new homegrown web server that made its debut in 5.6</li>
<li>The author loves that it has proper privilege separation, a very simple config syntax and that it always runs in a chroot</li>
<li>He also mentions dynamic content hosting with FastCGI, and provides an example of how to set it up</li>
<li>Be sure to check <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">our interview with Reyk</a> about the new httpd if you&#39;re curious on how it got started</li>
<li>Also, if you&#39;re running the version that came with 5.6, there&#39;s <a href="http://ftp.openbsd.org/pub/OpenBSD/patches/5.6/common/009_httpd.patch.sig" rel="nofollow">a huge patch</a> you can apply to get a lot of the features and fixes from -current without waiting for 5.7
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=B04EuZ9hpAI" rel="nofollow">Steam on PCBSD</a></h3>

<ul>
<li>One of the most common questions people who want to use BSD as a desktop ask us is &quot;can I run games?&quot; or &quot;can I use steam?&quot;</li>
<li>Steam through the Linux emulation layer (in FreeBSD) may be possible soon, but it&#39;s already possible to use it with WINE</li>
<li>This video shows how to get Steam set up on PCBSD using the Windows version</li>
<li>There are also some instructions in the video description to look over</li>
<li>A <a href="https://www.youtube.com/watch?v=BJ88B8aWdk0" rel="nofollow">second video</a> details getting streaming set up
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JgqXcw4i" rel="nofollow">Charlie writes in</a></li>
<li><a href="http://slexy.org/view/s2WormjMCs" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20UmdFrbj" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>67: Must Be Rigged</title>
  <link>https://www.bsdnow.tv/67</link>
  <guid isPermaLink="false">5e135afe-0a75-46d6-b995-ae5d3ca228ba</guid>
  <pubDate>Wed, 10 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/5e135afe-0a75-46d6-b995-ae5d3ca228ba.mp3" length="58310356" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show, we've got an interview with Patrick Wildt, one of the developers of Bitrig. We'll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We've also got all the week's news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://article.gmane.org/gmane.os.bitrig.devel/6" target="_blank" rel="nofollow noopener"&gt;Bitrig 1.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you haven't heard of it, &lt;a href="https://www.bitrig.org/" target="_blank" rel="nofollow noopener"&gt;Bitrig&lt;/a&gt; is a fork of OpenBSD that started a couple years ago&lt;/li&gt;
&lt;li&gt;According to &lt;a href="https://github.com/bitrig/bitrig/wiki/Faq" target="_blank" rel="nofollow noopener"&gt;their FAQ&lt;/a&gt;, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support&lt;/li&gt;
&lt;li&gt;They've finally announced their first official release, 1.0&lt;/li&gt;
&lt;li&gt;This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version&lt;/li&gt;
&lt;li&gt;It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background&lt;/li&gt;
&lt;li&gt;One of the developers &lt;a href="https://news.ycombinator.com/item?id=8701936" target="_blank" rel="nofollow noopener"&gt;answered some questions&lt;/a&gt; about it on Hacker News too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.technewsworld.com/story/81424.html" target="_blank" rel="nofollow noopener"&gt;Is it time to try BSD?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we get a little peek into the Linux world - more and more people are considering switching&lt;/li&gt;
&lt;li&gt;On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD&lt;/li&gt;
&lt;li&gt;People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side&lt;/li&gt;
&lt;li&gt;This article explores some pros and cons of switching, and features opinions of various users
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" target="_blank" rel="nofollow noopener"&gt;Poudriere 3.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the first things we ever covered on the show was &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere&lt;/a&gt;, a tool with a funny name that's used to build binary packages from FreeBSD ports&lt;/li&gt;
&lt;li&gt;It's come a long way since then, and &lt;a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" target="_blank" rel="nofollow noopener"&gt;bdrewery&lt;/a&gt; and &lt;a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" target="_blank" rel="nofollow noopener"&gt;bapt&lt;/a&gt; have just announced a new major version&lt;/li&gt;
&lt;li&gt;This new release features a redesigned web interface to check on the status of your packages&lt;/li&gt;
&lt;li&gt;There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier&lt;/li&gt;
&lt;li&gt;It also introduces a useful new "pkgclean" subcommand to clean out your repository of packages that aren't needed anymore, and poudriere keeps it cleaner by default as well now&lt;/li&gt;
&lt;li&gt;Check the full release notes for all the additions and bug fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" target="_blank" rel="nofollow noopener"&gt;Firewalling with OpenBSD's pf and pfsync&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync&lt;/li&gt;
&lt;li&gt;He uses pf to manage 60 internal networks with a single firewall&lt;/li&gt;
&lt;li&gt;The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated&lt;/li&gt;
&lt;li&gt;It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more&lt;/li&gt;
&lt;li&gt;The second half of the presentation focuses on pfsync and carp for failover and redundancy&lt;/li&gt;
&lt;li&gt;With two BSD boxes running pfsync, you can actually &lt;em&gt;patch your kernel and still stay connected to IRC&lt;/em&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Patrick Wildt - &lt;a href="mailto:patrick@bitrig.org" target="_blank" rel="nofollow noopener"&gt;patrick@bitrig.org&lt;/a&gt; / &lt;a href="https://twitter.com/bitrig" target="_blank" rel="nofollow noopener"&gt;@bitrig&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The initial release of Bitrig&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" target="_blank" rel="nofollow noopener"&gt;Infrastructural enhancements at NYI&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation put up a new blog post detailing some hardware improvements they've recently done&lt;/li&gt;
&lt;li&gt;Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things&lt;/li&gt;
&lt;li&gt;There've been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there&lt;/li&gt;
&lt;li&gt;This blog post goes into detail about how those servers are used and details some of the network topology
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" target="_blank" rel="nofollow noopener"&gt;The long tail of MD5&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD's tree with something more modern&lt;/li&gt;
&lt;li&gt;In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace&lt;/li&gt;
&lt;li&gt;Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141763065223567&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;Some other places&lt;/a&gt; require a bit more care… 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/varialus/" target="_blank" rel="nofollow noopener"&gt;DragonFly cheat sheet&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier&lt;/li&gt;
&lt;li&gt;A user-created "cheat sheet" on the website lists some common answers to beginner questions&lt;/li&gt;
&lt;li&gt;The page features a walkthrough of the installer, some shell tips and workarounds for various issues&lt;/li&gt;
&lt;li&gt;At the end, it also has some things that new users can get involved with to help out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://alxjsn.com/unix/openbsd-laptop/" target="_blank" rel="nofollow noopener"&gt;Experiences with an OpenBSD laptop&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that&lt;/li&gt;
&lt;li&gt;The author got interested in OpenBSD mostly because of the security focus and the fact that it's &lt;em&gt;not&lt;/em&gt; Linux&lt;/li&gt;
&lt;li&gt;In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad&lt;/li&gt;
&lt;li&gt;He even gives us a mention as a good place to learn more about BSD, thanks!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" target="_blank" rel="nofollow noopener"&gt;PC-BSD Updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A call for testing of a new update system has gone out&lt;/li&gt;
&lt;li&gt;Conversion to Qt5 for utils has taken place
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ihSmjpLu" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20JXhXS6o" target="_blank" rel="nofollow noopener"&gt;AJ writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21hfeWB2K" target="_blank" rel="nofollow noopener"&gt;Dan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2k6SmuDGB" target="_blank" rel="nofollow noopener"&gt;Jeff writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141775233603723&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Over 440% faster&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" target="_blank" rel="nofollow noopener"&gt;The&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" target="_blank" rel="nofollow noopener"&gt;PF&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" target="_blank" rel="nofollow noopener"&gt;conundrum&lt;/a&gt; (&lt;strong&gt;edit:&lt;/strong&gt; Allan misspoke about PF performance during this segment, apologies.)&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141807513728073&amp;amp;w=4" target="_blank" rel="nofollow noopener"&gt;Violating&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141807224826859&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;bad standards&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=141798194330985&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;apt-get rid of systemd&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bitrig, fork, clang, llvm, virtualization, poudriere, srand, random, md5, sha512, rand, srand, systemd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got an interview with Patrick Wildt, one of the developers of Bitrig. We&#39;ll find out all the details of their OpenBSD fork, what makes it different and what their plans are going forward. We&#39;ve also got all the week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://article.gmane.org/gmane.os.bitrig.devel/6" rel="nofollow">Bitrig 1.0 released</a></h3>

<ul>
<li>If you haven&#39;t heard of it, <a href="https://www.bitrig.org/" rel="nofollow">Bitrig</a> is a fork of OpenBSD that started a couple years ago</li>
<li>According to <a href="https://github.com/bitrig/bitrig/wiki/Faq" rel="nofollow">their FAQ</a>, some of their goals include: only supporting modern hardware and a limited set of CPU architectures, replacing nearly all GNU tools in base with BSD versions and having better virtualization support</li>
<li>They&#39;ve finally announced their first official release, 1.0</li>
<li>This release introduces support for Clang 3.4, replacing the old GCC, along with libc++ replacing the GNU version</li>
<li>It also includes filesystem journaling, support for GPT and - most importantly - a hacker-style console with green text on black background</li>
<li>One of the developers <a href="https://news.ycombinator.com/item?id=8701936" rel="nofollow">answered some questions</a> about it on Hacker News too
***</li>
</ul>

<h3><a href="http://www.technewsworld.com/story/81424.html" rel="nofollow">Is it time to try BSD?</a></h3>

<ul>
<li>Here we get a little peek into the Linux world - more and more people are considering switching</li>
<li>On a more mainstream tech news site, they have an article about people switching away from Linux and to BSD</li>
<li>People are starting to get even more suspicious of systemd, and lots of drama in the Linux world is leading a whole new group of potential users over to the BSD side</li>
<li>This article explores some pros and cons of switching, and features opinions of various users
***</li>
</ul>

<h3><a href="https://github.com/freebsd/poudriere/wiki/release_notes_31" rel="nofollow">Poudriere 3.1 released</a></h3>

<ul>
<li>One of the first things we ever covered on the show was <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, a tool with a funny name that&#39;s used to build binary packages from FreeBSD ports</li>
<li>It&#39;s come a long way since then, and <a href="http://www.bsdnow.tv/episodes/2014_07_16-network_iodometry" rel="nofollow">bdrewery</a> and <a href="http://www.bsdnow.tv/episodes/2014_01_01-eclipsing_binaries" rel="nofollow">bapt</a> have just announced a new major version</li>
<li>This new release features a redesigned web interface to check on the status of your packages</li>
<li>There are lots of new bulk building options to preserve packages even if some fail to compile - this makes maintaining a production repo much easier</li>
<li>It also introduces a useful new &quot;pkgclean&quot; subcommand to clean out your repository of packages that aren&#39;t needed anymore, and poudriere keeps it cleaner by default as well now</li>
<li>Check the full release notes for all the additions and bug fixes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=mN5E2EYJnrw" rel="nofollow">Firewalling with OpenBSD&#39;s pf and pfsync</a></h3>

<ul>
<li>A talk by David Gwynne from an Australian conference was uploaded, with the subject matter being pf and pfsync</li>
<li>He uses pf to manage 60 internal networks with a single firewall</li>
<li>The talk gives some background on how pf originally came to be and some OpenBSD 101 for the uninitiated</li>
<li>It also touches on different rulesets, use cases, configuration syntax, placing limits on connections, ospf, authpf, segregating VLANs, synproxy handling and a lot more</li>
<li>The second half of the presentation focuses on pfsync and carp for failover and redundancy</li>
<li>With two BSD boxes running pfsync, you can actually <em>patch your kernel and still stay connected to IRC</em>
***</li>
</ul>

<h2>Interview - Patrick Wildt - <a href="mailto:patrick@bitrig.org" rel="nofollow">patrick@bitrig.org</a> / <a href="https://twitter.com/bitrig" rel="nofollow">@bitrig</a></h2>

<p>The initial release of Bitrig</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/12/the-freebsd-cluster-infrastructural.html" rel="nofollow">Infrastructural enhancements at NYI</a></h3>

<ul>
<li>The FreeBSD foundation put up a new blog post detailing some hardware improvements they&#39;ve recently done</li>
<li>Their eastern US colocation is hosted at New York Internet, and is used for FTP mirrors, pkgng mirrors, and also as a place for developers to test things</li>
<li>There&#39;ve been fourteen machines purchased since July, and now FreeBSD boasts a total of sixty-eight physical boxes there</li>
<li>This blog post goes into detail about how those servers are used and details some of the network topology
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/the-long-tail-of-MD5" rel="nofollow">The long tail of MD5</a></h3>

<ul>
<li>Our friend Ted Unangst is on a quest to replace all instances of MD5 in OpenBSD&#39;s tree with something more modern</li>
<li>In this blog post, he goes through some of the different areas where MD5 still lives, and discovers how easy (or impossible) it would be to replace</li>
<li>Through some recent commits, OpenBSD now uses SHA512 in some places that you might not expect</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141763065223567&w=4" rel="nofollow">Some other places</a> require a bit more care… 
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/varialus/" rel="nofollow">DragonFly cheat sheet</a></h3>

<ul>
<li>If you&#39;ve been thinking of trying out DragonFlyBSD lately, this might make the transition a bit easier</li>
<li>A user-created &quot;cheat sheet&quot; on the website lists some common answers to beginner questions</li>
<li>The page features a walkthrough of the installer, some shell tips and workarounds for various issues</li>
<li>At the end, it also has some things that new users can get involved with to help out
***</li>
</ul>

<h3><a href="http://alxjsn.com/unix/openbsd-laptop/" rel="nofollow">Experiences with an OpenBSD laptop</a></h3>

<ul>
<li>A lot of people seem to be interested in trying out some form of BSD on their laptop, and this article details just that</li>
<li>The author got interested in OpenBSD mostly because of the security focus and the fact that it&#39;s <em>not</em> Linux</li>
<li>In this blog post, he goes through the steps of researching, installing, configuring, upgrading and finally actually using it on his Thinkpad</li>
<li>He even gives us a mention as a good place to learn more about BSD, thanks!
***</li>
</ul>

<h3><a href="http://lists.pcbsd.org/pipermail/testing/2014-December/009638.html" rel="nofollow">PC-BSD Updates</a></h3>

<ul>
<li>A call for testing of a new update system has gone out</li>
<li>Conversion to Qt5 for utils has taken place
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ihSmjpLu" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20JXhXS6o" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s21hfeWB2K" rel="nofollow">Dan writes in</a></li>
<li><a href="http://slexy.org/view/s2k6SmuDGB" rel="nofollow">Jeff writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141775233603723&w=2" rel="nofollow">Over 440% faster</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007528.html" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007529.html" rel="nofollow">PF</a> <a href="https://lists.freebsd.org/pipermail/freebsd-pf/2014-December/007543.html" rel="nofollow">conundrum</a> (<strong>edit:</strong> Allan misspoke about PF performance during this segment, apologies.)</li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141807513728073&w=4" rel="nofollow">Violating</a> <a href="https://www.marc.info/?l=openbsd-tech&m=141807224826859&w=2" rel="nofollow">bad standards</a></li>
<li><a href="https://www.marc.info/?l=openbsd-misc&m=141798194330985&w=2" rel="nofollow">apt-get rid of systemd</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>66: Conference Connoisseur</title>
  <link>https://www.bsdnow.tv/66</link>
  <guid isPermaLink="false">e76cf015-25d3-4a75-89c3-629d1f6d9a87</guid>
  <pubDate>Wed, 03 Dec 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e76cf015-25d3-4a75-89c3-629d1f6d9a87.mp3" length="59426068" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we'll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We've also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we'll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We've also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;More BSD presentation videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The MeetBSD video uploading spree continues with a few more talks, maybe this'll be the last batch&lt;/li&gt;
&lt;li&gt;Corey Vixie, &lt;a href="https://www.youtube.com/watch?v=Pbks12Mqpp8" target="_blank" rel="nofollow noopener"&gt;Web Apps in Embedded BSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Allan Jude, &lt;a href="https://www.youtube.com/watch?v=TjP86iWsEzQ" target="_blank" rel="nofollow noopener"&gt;UCL config&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Kip Macy, &lt;a href="https://www.youtube.com/watch?v=P4FRPKj7F80" target="_blank" rel="nofollow noopener"&gt;iflib&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;While we're on the topic of conferences, AsiaBSDCon's CFP was &lt;a href="https://twitter.com/asiabsdcon/status/538352055245492226" target="_blank" rel="nofollow noopener"&gt;extended&lt;/a&gt; by one week&lt;/li&gt;
&lt;li&gt;This year's &lt;a href="https://events.yandex.ru/events/yagosti/rubsd14/" target="_blank" rel="nofollow noopener"&gt;ruBSD&lt;/a&gt; will be on December 13th in Moscow&lt;/li&gt;
&lt;li&gt;Also, the &lt;a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html" target="_blank" rel="nofollow noopener"&gt;BSDCan call for papers&lt;/a&gt; is out, and the event will be in June next year&lt;/li&gt;
&lt;li&gt;Lastly, according to Rick Miller, "A potential vBSDcon 2015 event is being explored though a decision has yet to be made."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/" target="_blank" rel="nofollow noopener"&gt;BSD-powered digital library in Africa&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;You probably haven't heard much about Nzega, Tanzania, but it's an East African country without much internet access&lt;/li&gt;
&lt;li&gt;With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school&lt;/li&gt;
&lt;li&gt;They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)&lt;/li&gt;
&lt;li&gt;The school's workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1486" target="_blank" rel="nofollow noopener"&gt;pfSense 2.2 status update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update&lt;/li&gt;
&lt;li&gt;2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc&lt;/li&gt;
&lt;li&gt;All these things have taken more time than previously expected&lt;/li&gt;
&lt;li&gt;The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/" target="_blank" rel="nofollow noopener"&gt;Recommended hardware threads&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few threads on caught our attention this week, all about hardware recommendations for BSD setups&lt;/li&gt;
&lt;li&gt;In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS&lt;/li&gt;
&lt;li&gt;Everyone gave some good recommendations for low power, Atom-based systems&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://www.marc.info/?t=141694918800006&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;second thread&lt;/a&gt; started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread&lt;/li&gt;
&lt;li&gt;For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the &lt;a href="https://www.reddit.com/r/homelab/comments/24m6tj/" target="_blank" rel="nofollow noopener"&gt;third&lt;/a&gt; and &lt;a href="https://www.reddit.com/r/PFSENSE/comments/2nblgp/" target="_blank" rel="nofollow noopener"&gt;fourth&lt;/a&gt; threads confirming this&lt;/li&gt;
&lt;li&gt;If you're thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Paul Schenkeveld - &lt;a href="mailto:freebsd@psconsult.nl" target="_blank" rel="nofollow noopener"&gt;freebsd@psconsult.nl&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Running a BSD conference&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/freebsd/comments/2nqa60/" target="_blank" rel="nofollow noopener"&gt;From Linux to FreeBSD - for reals&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)&lt;/li&gt;
&lt;li&gt;After being a Linux guy for 20(!) years, he's ready to switch his systems over, and is looking for some helpful guides to transition&lt;/li&gt;
&lt;li&gt;In the comments, a lot of new switchers offer some advice and reading material&lt;/li&gt;
&lt;li&gt;If any of the listeners have some things that were helpful along your switching journey, maybe send 'em this guy's way
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://wiki.xenproject.org/wiki/FreeBSD_Dom0" target="_blank" rel="nofollow noopener"&gt;Running FreeBSD as a Xen Dom0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor&lt;/li&gt;
&lt;li&gt;This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it&lt;/li&gt;
&lt;li&gt;Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)&lt;/li&gt;
&lt;li&gt;The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal" target="_blank" rel="nofollow noopener"&gt;HardenedBSD updates and changes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;a.out is the old executable format for Unix&lt;/li&gt;
&lt;li&gt;The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968&lt;/li&gt;
&lt;li&gt;FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0&lt;/li&gt;
&lt;li&gt;A restriction against NULL mapping was introduced in &lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc" target="_blank" rel="nofollow noopener"&gt;FreeBSD 7&lt;/a&gt; and enabled by default in FreeBSD 8&lt;/li&gt;
&lt;li&gt;However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited&lt;/li&gt;
&lt;li&gt;HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’&lt;/li&gt;
&lt;li&gt;Package building update: &lt;a href="http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance" target="_blank" rel="nofollow noopener"&gt;more consistent repo, no more i386 packages &lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2kVPKICqj" target="_blank" rel="nofollow noopener"&gt;Boris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Fic4dZC" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt; (&lt;b&gt;edit:&lt;/b&gt; adding "tinker panic 0" to the ntp.conf will disable the sanity check)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2zk1Tvfe9" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s22alvJ4mu" target="_blank" rel="nofollow noopener"&gt;Robert writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s203YMc2zL" target="_blank" rel="nofollow noopener"&gt;Jake writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?t=141711266800001&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Real world authpf use&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&amp;amp;r2=373563&amp;amp;pathrev=373564" target="_blank" rel="nofollow noopener"&gt;The&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html" target="_blank" rel="nofollow noopener"&gt;great&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html" target="_blank" rel="nofollow noopener"&gt;perl&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html" target="_blank" rel="nofollow noopener"&gt;event&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html" target="_blank" rel="nofollow noopener"&gt;of&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html" target="_blank" rel="nofollow noopener"&gt;2014&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, eurobsdcon, meetbsd, bsdcan, asiabsdcon, conference, community, organization, foundation, pfsense, soekris, router, alix, apu, netgate, pcengines</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We&#39;ve also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">More BSD presentation videos</a></h3>

<ul>
<li>The MeetBSD video uploading spree continues with a few more talks, maybe this&#39;ll be the last batch</li>
<li>Corey Vixie, <a href="https://www.youtube.com/watch?v=Pbks12Mqpp8" rel="nofollow">Web Apps in Embedded BSD</a></li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=TjP86iWsEzQ" rel="nofollow">UCL config</a></li>
<li>Kip Macy, <a href="https://www.youtube.com/watch?v=P4FRPKj7F80" rel="nofollow">iflib</a></li>
<li>While we&#39;re on the topic of conferences, AsiaBSDCon&#39;s CFP was <a href="https://twitter.com/asiabsdcon/status/538352055245492226" rel="nofollow">extended</a> by one week</li>
<li>This year&#39;s <a href="https://events.yandex.ru/events/yagosti/rubsd14/" rel="nofollow">ruBSD</a> will be on December 13th in Moscow</li>
<li>Also, the <a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html" rel="nofollow">BSDCan call for papers</a> is out, and the event will be in June next year</li>
<li>Lastly, according to Rick Miller, &quot;A potential vBSDcon 2015 event is being explored though a decision has yet to be made.&quot;
***</li>
</ul>

<h3><a href="http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/" rel="nofollow">BSD-powered digital library in Africa</a></h3>

<ul>
<li>You probably haven&#39;t heard much about Nzega, Tanzania, but it&#39;s an East African country without much internet access</li>
<li>With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school</li>
<li>They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)</li>
<li>The school&#39;s workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1486" rel="nofollow">pfSense 2.2 status update</a></h3>

<ul>
<li>With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update</li>
<li>2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc</li>
<li>All these things have taken more time than previously expected</li>
<li>The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/" rel="nofollow">Recommended hardware threads</a></h3>

<ul>
<li>A few threads on caught our attention this week, all about hardware recommendations for BSD setups</li>
<li>In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS</li>
<li>Everyone gave some good recommendations for low power, Atom-based systems</li>
<li>The <a href="https://www.marc.info/?t=141694918800006&r=1&w=2" rel="nofollow">second thread</a> started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread</li>
<li>For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the <a href="https://www.reddit.com/r/homelab/comments/24m6tj/" rel="nofollow">third</a> and <a href="https://www.reddit.com/r/PFSENSE/comments/2nblgp/" rel="nofollow">fourth</a> threads confirming this</li>
<li>If you&#39;re thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***</li>
</ul>

<h2>Interview - Paul Schenkeveld - <a href="mailto:freebsd@psconsult.nl" rel="nofollow">freebsd@psconsult.nl</a></h2>

<p>Running a BSD conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2nqa60/" rel="nofollow">From Linux to FreeBSD - for reals</a></h3>

<ul>
<li>Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)</li>
<li>After being a Linux guy for 20(!) years, he&#39;s ready to switch his systems over, and is looking for some helpful guides to transition</li>
<li>In the comments, a lot of new switchers offer some advice and reading material</li>
<li>If any of the listeners have some things that were helpful along your switching journey, maybe send &#39;em this guy&#39;s way
***</li>
</ul>

<h3><a href="http://wiki.xenproject.org/wiki/FreeBSD_Dom0" rel="nofollow">Running FreeBSD as a Xen Dom0</a></h3>

<ul>
<li>Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor</li>
<li>This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it</li>
<li>Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)</li>
<li>The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal" rel="nofollow">HardenedBSD updates and changes</a></h3>

<ul>
<li>a.out is the old executable format for Unix</li>
<li>The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968</li>
<li>FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0</li>
<li>A restriction against NULL mapping was introduced in <a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc" rel="nofollow">FreeBSD 7</a> and enabled by default in FreeBSD 8</li>
<li>However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited</li>
<li>HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’</li>
<li>Package building update: <a href="http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance" rel="nofollow">more consistent repo, no more i386 packages </a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kVPKICqj" rel="nofollow">Boris writes in</a></li>
<li><a href="http://slexy.org/view/s21Fic4dZC" rel="nofollow">Alex writes in</a> (<b>edit:</b> adding &quot;tinker panic 0&quot; to the ntp.conf will disable the sanity check)</li>
<li><a href="http://slexy.org/view/s2zk1Tvfe9" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s22alvJ4mu" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s203YMc2zL" rel="nofollow">Jake writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141711266800001&r=1&w=2" rel="nofollow">Real world authpf use</a></li>
<li><a href="https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&r2=373563&pathrev=373564" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html" rel="nofollow">great</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html" rel="nofollow">perl</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html" rel="nofollow">event</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html" rel="nofollow">of</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html" rel="nofollow">2014</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we&#39;ll be talking with Paul Schenkeveld, chairman of the EuroBSDCon foundation. He tells us about his experiences running BSD conferences and how regular users can get involved too. We&#39;ve also got answers to all your emails and the latest news, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">More BSD presentation videos</a></h3>

<ul>
<li>The MeetBSD video uploading spree continues with a few more talks, maybe this&#39;ll be the last batch</li>
<li>Corey Vixie, <a href="https://www.youtube.com/watch?v=Pbks12Mqpp8" rel="nofollow">Web Apps in Embedded BSD</a></li>
<li>Allan Jude, <a href="https://www.youtube.com/watch?v=TjP86iWsEzQ" rel="nofollow">UCL config</a></li>
<li>Kip Macy, <a href="https://www.youtube.com/watch?v=P4FRPKj7F80" rel="nofollow">iflib</a></li>
<li>While we&#39;re on the topic of conferences, AsiaBSDCon&#39;s CFP was <a href="https://twitter.com/asiabsdcon/status/538352055245492226" rel="nofollow">extended</a> by one week</li>
<li>This year&#39;s <a href="https://events.yandex.ru/events/yagosti/rubsd14/" rel="nofollow">ruBSD</a> will be on December 13th in Moscow</li>
<li>Also, the <a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2014-December/000135.html" rel="nofollow">BSDCan call for papers</a> is out, and the event will be in June next year</li>
<li>Lastly, according to Rick Miller, &quot;A potential vBSDcon 2015 event is being explored though a decision has yet to be made.&quot;
***</li>
</ul>

<h3><a href="http://peercorpsglobal.org/nzegas-digital-library-becomes-a-reality/" rel="nofollow">BSD-powered digital library in Africa</a></h3>

<ul>
<li>You probably haven&#39;t heard much about Nzega, Tanzania, but it&#39;s an East African country without much internet access</li>
<li>With physical schoolbooks being a rarity there, a few companies helped out to bring some BSD-powered reading material to a local school</li>
<li>They now have a pair of FreeNAS Minis at the center of their local network, with over 80,000 books and accompanying video content stored on them (~5TB of data currently)</li>
<li>The school&#39;s workstations also got wiped and reloaded with FreeBSD, and everyone there seems to really enjoy using it
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1486" rel="nofollow">pfSense 2.2 status update</a></h3>

<ul>
<li>With lots of people asking when the 2.2 release will be done, some pfSense developers decided to provide a status update</li>
<li>2.2 will have a lot of changes: being based on FreeBSD 10.1, Unbound instead of BIND, updating PHP to something recent, including the new(ish) IPSEC stack updates, etc</li>
<li>All these things have taken more time than previously expected</li>
<li>The post also has some interesting graphs showing the ratio of opened and close bugs for the upcoming release
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2n8wrg/bsd_on_mini_itx/" rel="nofollow">Recommended hardware threads</a></h3>

<ul>
<li>A few threads on caught our attention this week, all about hardware recommendations for BSD setups</li>
<li>In the first one, the OP asks about mini-ITX hardware to run a FreeBSD server and NAS</li>
<li>Everyone gave some good recommendations for low power, Atom-based systems</li>
<li>The <a href="https://www.marc.info/?t=141694918800006&r=1&w=2" rel="nofollow">second thread</a> started off asking about which CPU architecture is best for PF on an OpenBSD router, but ended up being another hardware thread</li>
<li>For a router, the ALIX, APU and Soekris boards still seem to be the most popular choices, with the <a href="https://www.reddit.com/r/homelab/comments/24m6tj/" rel="nofollow">third</a> and <a href="https://www.reddit.com/r/PFSENSE/comments/2nblgp/" rel="nofollow">fourth</a> threads confirming this</li>
<li>If you&#39;re thinking about building your first BSD box - server, router, NAS, whatever - these might be some good links to read
***</li>
</ul>

<h2>Interview - Paul Schenkeveld - <a href="mailto:freebsd@psconsult.nl" rel="nofollow">freebsd@psconsult.nl</a></h2>

<p>Running a BSD conference</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2nqa60/" rel="nofollow">From Linux to FreeBSD - for reals</a></h3>

<ul>
<li>Another Linux user is ready to switch to BSD, and takes to Reddit for some community encouragement (seems to be a common thing now)</li>
<li>After being a Linux guy for 20(!) years, he&#39;s ready to switch his systems over, and is looking for some helpful guides to transition</li>
<li>In the comments, a lot of new switchers offer some advice and reading material</li>
<li>If any of the listeners have some things that were helpful along your switching journey, maybe send &#39;em this guy&#39;s way
***</li>
</ul>

<h3><a href="http://wiki.xenproject.org/wiki/FreeBSD_Dom0" rel="nofollow">Running FreeBSD as a Xen Dom0</a></h3>

<ul>
<li>Continuing progress has been made to allow FreeBSD to be a host for the Xen hypervisor</li>
<li>This wiki article explains how to run the Xen branch of FreeBSD and host virtual machines on it</li>
<li>Xen on FreeBSD currently supports PV guests (modified kernels) and HVM (unmodified kernels, uses hardware virtualization features)</li>
<li>The wiki provides instructions for running Debian (PV) and FreeBSD (HVM), and discusses the features that are not finished yet
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-11-18/aout-and-null-mapping-support-removal" rel="nofollow">HardenedBSD updates and changes</a></h3>

<ul>
<li>a.out is the old executable format for Unix</li>
<li>The name stands for assembler output, and was coined by Ken Thompson as the fixed name for output of his PDP-7 assembler in 1968</li>
<li>FreeBSD, on which HardenedBSD is based, switched away from a.out in version 3.0</li>
<li>A restriction against NULL mapping was introduced in <a href="https://www.freebsd.org/security/advisories/FreeBSD-EN-09:05.null.asc" rel="nofollow">FreeBSD 7</a> and enabled by default in FreeBSD 8</li>
<li>However, for reasons of compatibility, it could be switched off, allowing buggy applications to continue to run, at the risk of allowing a kernel bug to be exploited</li>
<li>HardenedBSD has removed the sysctl, making it impossible to run in ‘insecure mode’</li>
<li>Package building update: <a href="http://hardenedbsd.org/article/shawn-webb/2014-11-30/package-building-infrastructure-maintenance" rel="nofollow">more consistent repo, no more i386 packages </a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kVPKICqj" rel="nofollow">Boris writes in</a></li>
<li><a href="http://slexy.org/view/s21Fic4dZC" rel="nofollow">Alex writes in</a> (<b>edit:</b> adding &quot;tinker panic 0&quot; to the ntp.conf will disable the sanity check)</li>
<li><a href="http://slexy.org/view/s2zk1Tvfe9" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s22alvJ4mu" rel="nofollow">Robert writes in</a></li>
<li><a href="http://slexy.org/view/s203YMc2zL" rel="nofollow">Jake writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141711266800001&r=1&w=2" rel="nofollow">Real world authpf use</a></li>
<li><a href="https://svnweb.freebsd.org/ports/head/UPDATING?r1=373564&r2=373563&pathrev=373564" rel="nofollow">The</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096788.html" rel="nofollow">great</a> <a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096799.html" rel="nofollow">perl</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010146.html" rel="nofollow">event</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010149.html" rel="nofollow">of</a> <a href="https://lists.freebsd.org/pipermail/freebsd-perl/2014-November/010167.html" rel="nofollow">2014</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>65: 8,000,000 Mogofoo-ops</title>
  <link>https://www.bsdnow.tv/65</link>
  <guid isPermaLink="false">c905fcf9-ebc6-4a15-8d34-631dc9742cea</guid>
  <pubDate>Wed, 26 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c905fcf9-ebc6-4a15-8d34-631dc9742cea.mp3" length="66537364" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on the show this week, we've got an interview with Brendan Gregg of Netflix. He's got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on the show this week, we've got an interview with Brendan Gregg of Netflix. He's got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week's news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;Even more BSD presentation videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More videos from this year's MeetBSD and OpenZFS devsummit were uploaded since last week&lt;/li&gt;
&lt;li&gt;Robert Ryan, &lt;a href="https://www.youtube.com/watch?v=Rc9k1xEepWU" target="_blank" rel="nofollow noopener"&gt;At the Heart of the Digital Economy&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;FreeNAS &amp;amp; ZFS, The Indestructible Duo - &lt;a href="https://www.youtube.com/watch?v=d1C6DELK7fc" target="_blank" rel="nofollow noopener"&gt;Except for the Hard Drives&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Richard Yao, &lt;a href="https://www.youtube.com/watch?v=PIC0dwLRBZU" target="_blank" rel="nofollow noopener"&gt;libzfs_core and ioctl stabilization&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenZFS, &lt;a href="https://www.youtube.com/watch?v=LmbI7F7XTTc" target="_blank" rel="nofollow noopener"&gt;Company lightning talks&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenZFS, &lt;a href="https://www.youtube.com/watch?v=gPbVPwScMGk" target="_blank" rel="nofollow noopener"&gt;Hackathon Presentation and Awards&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Pavel Zakharov, &lt;a href="https://www.youtube.com/watch?v=_lGOAZFXra8" target="_blank" rel="nofollow noopener"&gt;Fast File Cloning&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Rick Reed, &lt;a href="https://www.youtube.com/watch?v=TneLO5TdW_M" target="_blank" rel="nofollow noopener"&gt;Half a billion unsuspecting FreeBSD users&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Alex Reece &amp;amp; Matt Ahrens, &lt;a href="https://www.youtube.com/watch?v=Xs6MsJ9kKKE" target="_blank" rel="nofollow noopener"&gt;Device Removal&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Chris Side, &lt;a href="https://www.youtube.com/watch?v=RMTxyqcomPA" target="_blank" rel="nofollow noopener"&gt;Channel Programs&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;David Maxwell, &lt;a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" target="_blank" rel="nofollow noopener"&gt;The Unix command pipeline&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Be sure to check out the &lt;strong&gt;giant list of videos&lt;/strong&gt; from &lt;a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" target="_blank" rel="nofollow noopener"&gt;last week's episode&lt;/a&gt; if you haven't seen them already
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2" target="_blank" rel="nofollow noopener"&gt;NetBSD on a Cobalt Qube 2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Cobalt Qube was a very expensive networking appliance around 2000&lt;/li&gt;
&lt;li&gt;In 2014, you can apparently get one of these MIPS-based machines for about forty bucks&lt;/li&gt;
&lt;li&gt;This blog post details getting NetBSD installed and set up on the rare relic of our networking past&lt;/li&gt;
&lt;li&gt;If you're an old-time fan of RISC or MIPS CPUs, this'll be a treat for you&lt;/li&gt;
&lt;li&gt;Lots of great pictures of the hardware too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;w=2&amp;amp;r=1&amp;amp;s=afl&amp;amp;q=b" target="_blank" rel="nofollow noopener"&gt;OpenBSD vs. AFL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In their never-ending security audit, some OpenBSD developers have been &lt;a href="https://twitter.com/damienmiller/status/534156368391831552" target="_blank" rel="nofollow noopener"&gt;hitting various parts of the tree&lt;/a&gt; with a fuzzer&lt;/li&gt;
&lt;li&gt;If you're not familiar, &lt;a href="https://en.wikipedia.org/wiki/Fuzz_testing" target="_blank" rel="nofollow noopener"&gt;fuzzing&lt;/a&gt; is a semi-automated way to test programs for crashes and potential security problems&lt;/li&gt;
&lt;li&gt;The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lcamtuf.coredump.cx/afl/" target="_blank" rel="nofollow noopener"&gt;American Fuzzy Lop&lt;/a&gt;, in particular, has provided some interesting results across various open source projects recently&lt;/li&gt;
&lt;li&gt;So far, it's fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and &lt;a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" target="_blank" rel="nofollow noopener"&gt;mandoc&lt;/a&gt; and &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141646270127039&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;a few other things&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;AFL has an impressive list of CVEs (vulnerabilities) that it's helped developers discover and fix&lt;/li&gt;
&lt;li&gt;It also made its way into OpenBSD ports, FreeBSD ports and NetBSD's pkgsrc very recently, so you can try it out for yourself
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=372768" target="_blank" rel="nofollow noopener"&gt;GNOME 3 hits the FreeBSD ports tree&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While you've been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn't actually hit the FreeBSD ports tree.. until now&lt;/li&gt;
&lt;li&gt;Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD&lt;/li&gt;
&lt;li&gt;Be sure to check the commit message and &lt;a href="http://www.bsdnow.tv/tutorials/ports" target="_blank" rel="nofollow noopener"&gt;/usr/ports/UPDATING&lt;/a&gt; if you're upgrading from GNOME 2&lt;/li&gt;
&lt;li&gt;You might also want to go back and listen to &lt;a href="http://www.bsdnow.tv/episodes/2014_02_26-port_authority" target="_blank" rel="nofollow noopener"&gt;our interview&lt;/a&gt; with Joe Marcus Clark about GNOME's portability
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brendan Gregg - &lt;a href="mailto:bgregg@netflix.com" target="_blank" rel="nofollow noopener"&gt;bgregg@netflix.com&lt;/a&gt; / &lt;a href="https://twitter.com/brendangregg" target="_blank" rel="nofollow noopener"&gt;@brendangregg&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Performance tuning, benchmarks, debugging&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/release40/" target="_blank" rel="nofollow noopener"&gt;DragonFlyBSD 4.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new major version of DragonFly, 4.0.1, was just recently announced&lt;/li&gt;
&lt;li&gt;This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs&lt;/li&gt;
&lt;li&gt;It's also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club&lt;/li&gt;
&lt;li&gt;Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://news.ycombinator.com/item?id=8645443" target="_blank" rel="nofollow noopener"&gt;Can we talk about FreeBSD vs Linux&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once&lt;/li&gt;
&lt;li&gt;Rather than rehashing why one is "better" than the other, it was focused on explaining some of the differences between ecosystems and communities&lt;/li&gt;
&lt;li&gt;If you're one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read&lt;/li&gt;
&lt;li&gt;Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/" target="_blank" rel="nofollow noopener"&gt;OpenBSD IPSEC tunnel guide&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've ever wanted to connect two networks with OpenBSD gateways, this is the article for you&lt;/li&gt;
&lt;li&gt;It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN&lt;/li&gt;
&lt;li&gt;The article also explains some of the basics of IPSEC if you're not familiar with all the terminology, so this isn't just for experts&lt;/li&gt;
&lt;li&gt;Though the article itself is a few years old, it mostly still applies to the latest stuff today&lt;/li&gt;
&lt;li&gt;All the tools used are in the OpenBSD base system, so that's pretty handy too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/docs/ipfw2/" target="_blank" rel="nofollow noopener"&gt;DragonFly starts work on IPFW2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use&lt;/li&gt;
&lt;li&gt;Now it looks like you're going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be "IPFW3")&lt;/li&gt;
&lt;li&gt;Not a whole lot is known yet; it's still in heavy development, but there's a brief &lt;a href="http://www.dragonflybsd.org/docs/ipfw2/#index6h1" target="_blank" rel="nofollow noopener"&gt;roadmap&lt;/a&gt; page with some planned additions&lt;/li&gt;
&lt;li&gt;The guy who's working on this has already agreed to come on the show for an interview, but we're going to give him a chance to get some more work done first&lt;/li&gt;
&lt;li&gt;Expect that sometime next year, once he's made some progress
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2NYgVifXN" target="_blank" rel="nofollow noopener"&gt;Michael writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21X02saI3" target="_blank" rel="nofollow noopener"&gt;Samael writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Dj7zImH" target="_blank" rel="nofollow noopener"&gt;Steven writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s218lXg38C" target="_blank" rel="nofollow noopener"&gt;Remy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20SEuKlaH" target="_blank" rel="nofollow noopener"&gt;Michael writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dtrace, benchmarks, zfs, solaris, pmstat, performance, high availability, ktrace, strace, iops, freenas, ipfw2, gnome3, afl, fuzzing, american fuzzy lop, ipsec, tunnel</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on the show this week, we&#39;ve got an interview with Brendan Gregg of Netflix. He&#39;s got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Even more BSD presentation videos</a></h3>

<ul>
<li>More videos from this year&#39;s MeetBSD and OpenZFS devsummit were uploaded since last week</li>
<li>Robert Ryan, <a href="https://www.youtube.com/watch?v=Rc9k1xEepWU" rel="nofollow">At the Heart of the Digital Economy</a></li>
<li>FreeNAS &amp; ZFS, The Indestructible Duo - <a href="https://www.youtube.com/watch?v=d1C6DELK7fc" rel="nofollow">Except for the Hard Drives</a></li>
<li>Richard Yao, <a href="https://www.youtube.com/watch?v=PIC0dwLRBZU" rel="nofollow">libzfs_core and ioctl stabilization</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=LmbI7F7XTTc" rel="nofollow">Company lightning talks</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=gPbVPwScMGk" rel="nofollow">Hackathon Presentation and Awards</a></li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=_lGOAZFXra8" rel="nofollow">Fast File Cloning</a></li>
<li>Rick Reed, <a href="https://www.youtube.com/watch?v=TneLO5TdW_M" rel="nofollow">Half a billion unsuspecting FreeBSD users</a></li>
<li>Alex Reece &amp; Matt Ahrens, <a href="https://www.youtube.com/watch?v=Xs6MsJ9kKKE" rel="nofollow">Device Removal</a></li>
<li>Chris Side, <a href="https://www.youtube.com/watch?v=RMTxyqcomPA" rel="nofollow">Channel Programs</a></li>
<li>David Maxwell, <a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">The Unix command pipeline</a></li>
<li>Be sure to check out the <strong>giant list of videos</strong> from <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">last week&#39;s episode</a> if you haven&#39;t seen them already
***</li>
</ul>

<h3><a href="http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2" rel="nofollow">NetBSD on a Cobalt Qube 2</a></h3>

<ul>
<li>The Cobalt Qube was a very expensive networking appliance around 2000</li>
<li>In 2014, you can apparently get one of these MIPS-based machines for about forty bucks</li>
<li>This blog post details getting NetBSD installed and set up on the rare relic of our networking past</li>
<li>If you&#39;re an old-time fan of RISC or MIPS CPUs, this&#39;ll be a treat for you</li>
<li>Lots of great pictures of the hardware too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">OpenBSD vs. AFL</a></h3>

<ul>
<li>In their never-ending security audit, some OpenBSD developers have been <a href="https://twitter.com/damienmiller/status/534156368391831552" rel="nofollow">hitting various parts of the tree</a> with a fuzzer</li>
<li>If you&#39;re not familiar, <a href="https://en.wikipedia.org/wiki/Fuzz_testing" rel="nofollow">fuzzing</a> is a semi-automated way to test programs for crashes and potential security problems</li>
<li>The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs</li>
<li><a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a>, in particular, has provided some interesting results across various open source projects recently</li>
<li>So far, it&#39;s fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a> and <a href="https://www.marc.info/?l=openbsd-cvs&m=141646270127039&w=2" rel="nofollow">a few other things</a></li>
<li>AFL has an impressive list of CVEs (vulnerabilities) that it&#39;s helped developers discover and fix</li>
<li>It also made its way into OpenBSD ports, FreeBSD ports and NetBSD&#39;s pkgsrc very recently, so you can try it out for yourself
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=372768" rel="nofollow">GNOME 3 hits the FreeBSD ports tree</a></h3>

<ul>
<li>While you&#39;ve been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn&#39;t actually hit the FreeBSD ports tree.. until now</li>
<li>Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD</li>
<li>Be sure to check the commit message and <a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">/usr/ports/UPDATING</a> if you&#39;re upgrading from GNOME 2</li>
<li>You might also want to go back and listen to <a href="http://www.bsdnow.tv/episodes/2014_02_26-port_authority" rel="nofollow">our interview</a> with Joe Marcus Clark about GNOME&#39;s portability
***</li>
</ul>

<h2>Interview - Brendan Gregg - <a href="mailto:bgregg@netflix.com" rel="nofollow">bgregg@netflix.com</a> / <a href="https://twitter.com/brendangregg" rel="nofollow">@brendangregg</a></h2>

<p>Performance tuning, benchmarks, debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.dragonflybsd.org/release40/" rel="nofollow">DragonFlyBSD 4.0 released</a></h3>

<ul>
<li>A new major version of DragonFly, 4.0.1, was just recently announced</li>
<li>This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs</li>
<li>It&#39;s also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club</li>
<li>Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=8645443" rel="nofollow">Can we talk about FreeBSD vs Linux</a></h3>

<ul>
<li>Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once</li>
<li>Rather than rehashing why one is &quot;better&quot; than the other, it was focused on explaining some of the differences between ecosystems and communities</li>
<li>If you&#39;re one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read</li>
<li>Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***</li>
</ul>

<h3><a href="http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/" rel="nofollow">OpenBSD IPSEC tunnel guide</a></h3>

<ul>
<li>If you&#39;ve ever wanted to connect two networks with OpenBSD gateways, this is the article for you</li>
<li>It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN</li>
<li>The article also explains some of the basics of IPSEC if you&#39;re not familiar with all the terminology, so this isn&#39;t just for experts</li>
<li>Though the article itself is a few years old, it mostly still applies to the latest stuff today</li>
<li>All the tools used are in the OpenBSD base system, so that&#39;s pretty handy too
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/ipfw2/" rel="nofollow">DragonFly starts work on IPFW2</a></h3>

<ul>
<li>DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use</li>
<li>Now it looks like you&#39;re going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be &quot;IPFW3&quot;)</li>
<li>Not a whole lot is known yet; it&#39;s still in heavy development, but there&#39;s a brief <a href="http://www.dragonflybsd.org/docs/ipfw2/#index6h1" rel="nofollow">roadmap</a> page with some planned additions</li>
<li>The guy who&#39;s working on this has already agreed to come on the show for an interview, but we&#39;re going to give him a chance to get some more work done first</li>
<li>Expect that sometime next year, once he&#39;s made some progress
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NYgVifXN" rel="nofollow">Michael writes in</a></li>
<li><a href="http://slexy.org/view/s21X02saI3" rel="nofollow">Samael writes in</a></li>
<li><a href="http://slexy.org/view/s21Dj7zImH" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s218lXg38C" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s20SEuKlaH" rel="nofollow">Michael writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on the show this week, we&#39;ve got an interview with Brendan Gregg of Netflix. He&#39;s got a lot to say about performance tuning and benchmarks, and even some pretty funny stories about how people have done them incorrectly. As always, this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">Even more BSD presentation videos</a></h3>

<ul>
<li>More videos from this year&#39;s MeetBSD and OpenZFS devsummit were uploaded since last week</li>
<li>Robert Ryan, <a href="https://www.youtube.com/watch?v=Rc9k1xEepWU" rel="nofollow">At the Heart of the Digital Economy</a></li>
<li>FreeNAS &amp; ZFS, The Indestructible Duo - <a href="https://www.youtube.com/watch?v=d1C6DELK7fc" rel="nofollow">Except for the Hard Drives</a></li>
<li>Richard Yao, <a href="https://www.youtube.com/watch?v=PIC0dwLRBZU" rel="nofollow">libzfs_core and ioctl stabilization</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=LmbI7F7XTTc" rel="nofollow">Company lightning talks</a></li>
<li>OpenZFS, <a href="https://www.youtube.com/watch?v=gPbVPwScMGk" rel="nofollow">Hackathon Presentation and Awards</a></li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=_lGOAZFXra8" rel="nofollow">Fast File Cloning</a></li>
<li>Rick Reed, <a href="https://www.youtube.com/watch?v=TneLO5TdW_M" rel="nofollow">Half a billion unsuspecting FreeBSD users</a></li>
<li>Alex Reece &amp; Matt Ahrens, <a href="https://www.youtube.com/watch?v=Xs6MsJ9kKKE" rel="nofollow">Device Removal</a></li>
<li>Chris Side, <a href="https://www.youtube.com/watch?v=RMTxyqcomPA" rel="nofollow">Channel Programs</a></li>
<li>David Maxwell, <a href="https://www.youtube.com/watch?v=CZHEZHK4jRc" rel="nofollow">The Unix command pipeline</a></li>
<li>Be sure to check out the <strong>giant list of videos</strong> from <a href="http://www.bsdnow.tv/episodes/2014_11_19-rump_kernels_revisited" rel="nofollow">last week&#39;s episode</a> if you haven&#39;t seen them already
***</li>
</ul>

<h3><a href="http://www.jarredcapellman.com/2014/3/9/NetBSD-and-a-Cobalt-Qube-2" rel="nofollow">NetBSD on a Cobalt Qube 2</a></h3>

<ul>
<li>The Cobalt Qube was a very expensive networking appliance around 2000</li>
<li>In 2014, you can apparently get one of these MIPS-based machines for about forty bucks</li>
<li>This blog post details getting NetBSD installed and set up on the rare relic of our networking past</li>
<li>If you&#39;re an old-time fan of RISC or MIPS CPUs, this&#39;ll be a treat for you</li>
<li>Lots of great pictures of the hardware too
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-cvs&w=2&r=1&s=afl&q=b" rel="nofollow">OpenBSD vs. AFL</a></h3>

<ul>
<li>In their never-ending security audit, some OpenBSD developers have been <a href="https://twitter.com/damienmiller/status/534156368391831552" rel="nofollow">hitting various parts of the tree</a> with a fuzzer</li>
<li>If you&#39;re not familiar, <a href="https://en.wikipedia.org/wiki/Fuzz_testing" rel="nofollow">fuzzing</a> is a semi-automated way to test programs for crashes and potential security problems</li>
<li>The program being subjected to torture gets all sorts of random and invalid input, in the hopes of uncovering overflows and other bugs</li>
<li><a href="http://lcamtuf.coredump.cx/afl/" rel="nofollow">American Fuzzy Lop</a>, in particular, has provided some interesting results across various open source projects recently</li>
<li>So far, it&#39;s fixed some NULL pointer dereferences in OpenSSH, various crashes in tcpdump and <a href="http://www.bsdnow.tv/episodes/2014_11_12-a_mans_man" rel="nofollow">mandoc</a> and <a href="https://www.marc.info/?l=openbsd-cvs&m=141646270127039&w=2" rel="nofollow">a few other things</a></li>
<li>AFL has an impressive list of CVEs (vulnerabilities) that it&#39;s helped developers discover and fix</li>
<li>It also made its way into OpenBSD ports, FreeBSD ports and NetBSD&#39;s pkgsrc very recently, so you can try it out for yourself
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=372768" rel="nofollow">GNOME 3 hits the FreeBSD ports tree</a></h3>

<ul>
<li>While you&#39;ve been able to run GNOME 3 on PC-BSD and OpenBSD for a while, it hasn&#39;t actually hit the FreeBSD ports tree.. until now</li>
<li>Now you can play with GNOME 3 and all its goodies (as well as Cinnamon 2.2, which this also brings in) on vanilla FreeBSD</li>
<li>Be sure to check the commit message and <a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">/usr/ports/UPDATING</a> if you&#39;re upgrading from GNOME 2</li>
<li>You might also want to go back and listen to <a href="http://www.bsdnow.tv/episodes/2014_02_26-port_authority" rel="nofollow">our interview</a> with Joe Marcus Clark about GNOME&#39;s portability
***</li>
</ul>

<h2>Interview - Brendan Gregg - <a href="mailto:bgregg@netflix.com" rel="nofollow">bgregg@netflix.com</a> / <a href="https://twitter.com/brendangregg" rel="nofollow">@brendangregg</a></h2>

<p>Performance tuning, benchmarks, debugging</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.dragonflybsd.org/release40/" rel="nofollow">DragonFlyBSD 4.0 released</a></h3>

<ul>
<li>A new major version of DragonFly, 4.0.1, was just recently announced</li>
<li>This version includes support for Haswell GPUs, lots of SMP improvements (including some in PF) and support for up to 256 CPUs</li>
<li>It&#39;s also the first release to drop support for i386, so it joins PCBSD in the 64 bit-only club</li>
<li>Check the release notes for all the details, including networking and kernel improvements, as well as some crypto changes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=8645443" rel="nofollow">Can we talk about FreeBSD vs Linux</a></h3>

<ul>
<li>Hackernews had a recent thread about discussing Linux vs BSD, and the trolls stayed away for once</li>
<li>Rather than rehashing why one is &quot;better&quot; than the other, it was focused on explaining some of the differences between ecosystems and communities</li>
<li>If you&#39;re one of the many people who watch our show just out of curiosity about the BSD world, this might be a good thread to read</li>
<li>Someone in the comments even gave bsdnow.tv a mention as a good resource to learn, thanks guy
***</li>
</ul>

<h3><a href="http://www.packetmischief.ca/openbsd-ipsec-tunnel-guide/" rel="nofollow">OpenBSD IPSEC tunnel guide</a></h3>

<ul>
<li>If you&#39;ve ever wanted to connect two networks with OpenBSD gateways, this is the article for you</li>
<li>It shows how to set up an IPSEC tunnel between destinations, how to lock it down and how to access all the machines on the other network just like they were on your LAN</li>
<li>The article also explains some of the basics of IPSEC if you&#39;re not familiar with all the terminology, so this isn&#39;t just for experts</li>
<li>Though the article itself is a few years old, it mostly still applies to the latest stuff today</li>
<li>All the tools used are in the OpenBSD base system, so that&#39;s pretty handy too
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/docs/ipfw2/" rel="nofollow">DragonFly starts work on IPFW2</a></h3>

<ul>
<li>DragonFlyBSD, much like FreeBSD, comes with more than one firewall you can use</li>
<li>Now it looks like you&#39;re going to have yet another choice, as someone is working on a fork of IPFW (which is actually already in its second version, so it should be &quot;IPFW3&quot;)</li>
<li>Not a whole lot is known yet; it&#39;s still in heavy development, but there&#39;s a brief <a href="http://www.dragonflybsd.org/docs/ipfw2/#index6h1" rel="nofollow">roadmap</a> page with some planned additions</li>
<li>The guy who&#39;s working on this has already agreed to come on the show for an interview, but we&#39;re going to give him a chance to get some more work done first</li>
<li>Expect that sometime next year, once he&#39;s made some progress
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2NYgVifXN" rel="nofollow">Michael writes in</a></li>
<li><a href="http://slexy.org/view/s21X02saI3" rel="nofollow">Samael writes in</a></li>
<li><a href="http://slexy.org/view/s21Dj7zImH" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s218lXg38C" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s20SEuKlaH" rel="nofollow">Michael writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>64: Rump Kernels Revisited</title>
  <link>https://www.bsdnow.tv/64</link>
  <guid isPermaLink="false">b5100d19-f472-4a18-93f7-72e1494ce394</guid>
  <pubDate>Wed, 19 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b5100d19-f472-4a18-93f7-72e1494ce394.mp3" length="81755572" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with Justin Cormack about NetBSD rump kernels. We'll learn how to run them on other operating systems, what's planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:53:32</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking with Justin Cormack about NetBSD rump kernels. We'll learn how to run them on other operating systems, what's planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/talks-and-schedule/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2014 talks and tutorials&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The 2014 EuroBSDCon videos have been online for over a month, but unannounced - keep in mind these links may be temporary (but we'll mention their new location in a future show and fix the show notes if that's the case)
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Arun Thomas, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/01.BSD-ARM%20Kernel%20Internals%20-%20Arun%20Thomas.mp4" target="_blank" rel="nofollow noopener"&gt;BSD ARM Kernel Internals&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Ted Unangst, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/02.Developing%20Software%20in%20a%20Hostile%20Environment%20-%20Ted%20Unangst.mp4" target="_blank" rel="nofollow noopener"&gt;Developing Software in a Hostile Environment&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Martin Pieuchot, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" target="_blank" rel="nofollow noopener"&gt;Taming OpenBSD Network Stack Dragons&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Henning Brauer, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/04.OpenBGPD%20turns%2010%20years%20-%20%20Henning%20Brauer.mp4" target="_blank" rel="nofollow noopener"&gt;OpenBGPD turns 10 years&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Claudio Jeker, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/05.vscsi(4)%20and%20iscsid%20-%20iSCSI%20initiator%20the%20OpenBSD%20way%20-%20Claudio%20Jeker.mp4" target="_blank" rel="nofollow noopener"&gt;vscsi and iscsid iSCSI initiator the OpenBSD way&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Paul Irofti, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/06.Making%20OpenBSD%20Useful%20on%20the%20Octeon%20Network%20Gear%20-%20Paul%20Irofti.mp4" target="_blank" rel="nofollow noopener"&gt;Making OpenBSD Useful on the Octeon Network Gear&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Baptiste Daroussin, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/01.Cross%20Building%20the%20FreeBSD%20ports%20tree%20-%20Baptiste%20Daroussin.mp4" target="_blank" rel="nofollow noopener"&gt;Cross Building the FreeBSD ports tree&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Boris Astardzhiev, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/02.Smartcom%e2%80%99s%20control%20plane%20software,%20a%20customized%20version%20of%20FreeBSD%20-%20Boris%20Astardzhiev.mp4" target="_blank" rel="nofollow noopener"&gt;Smartcom’s control plane software, a customized version of FreeBSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Michał Dubiel, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/03.OpenStack%20and%20OpenContrail%20for%20FreeBSD%20platform%20-%20Micha%c5%82%20Dubiel.mp4" target="_blank" rel="nofollow noopener"&gt;OpenStack and OpenContrail for FreeBSD platform&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Martin Husemann &amp;amp; Joerg Sonnenberger, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/04.(Tool-)chaining%20the%20Hydra%20The%20ongoing%20quest%20for%20modern%20toolchains%20in%20NetBSD%20-%20Martin%20Huseman%20&amp;amp;%20Joerg%20Sonnenberger.mp4" target="_blank" rel="nofollow noopener"&gt;Tool-chaining the Hydra, the ongoing quest for modern toolchains in NetBSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Taylor R Campbell, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/05.The%20entropic%20principle:%20dev-u%3frandom%20and%20NetBSD%20-%20Taylor%20R%20Campbell.mp4" target="_blank" rel="nofollow noopener"&gt;The entropic principle: /dev/u?random and NetBSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Dag-Erling Smørgrav, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/06.Securing%20sensitive%20&amp;amp;%20restricted%20data%20-%20Dag-Erling%20Sm%c3%b8rgrav.mp4" target="_blank" rel="nofollow noopener"&gt;Securing sensitive &amp;amp; restricted data&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Peter Hansteen, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/01.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" target="_blank" rel="nofollow noopener"&gt;Building The Network You Need&lt;/a&gt; &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/02.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" target="_blank" rel="nofollow noopener"&gt;With PF&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Stefan Sperling, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/03.Subversion%20for%20FreeBSD%20developers%20-%20Stefan%20Sperling.mp4" target="_blank" rel="nofollow noopener"&gt;Subversion for FreeBSD developers&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Peter Hansteen, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/01.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" target="_blank" rel="nofollow noopener"&gt;Transition to&lt;/a&gt; &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/02.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.6&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Ingo Schwarze, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/03.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" target="_blank" rel="nofollow noopener"&gt;Let’s make manuals&lt;/a&gt; &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/04.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" target="_blank" rel="nofollow noopener"&gt;more useful&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Francois Tigeot, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/01.Improving%20DragonFly%e2%80%99s%20performance%20with%20PostgreSQL%20-%20Francois%20Tigeot.mp4" target="_blank" rel="nofollow noopener"&gt;Improving DragonFly’s performance with PostgreSQL&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Justin Cormack, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/02.Running%20Applications%20on%20the%20NetBSD%20Rump%20Kernel%20-%20Justin%20Cormack.mp4" target="_blank" rel="nofollow noopener"&gt;Running Applications on the NetBSD Rump Kernel&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Pierre Pronchery, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/04.EdgeBSD,%20a%20year%20later%20-%20%20Pierre%20Pronchery.mp4" target="_blank" rel="nofollow noopener"&gt;EdgeBSD, a year later&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Peter Hessler, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/05.Using%20routing%20domains%20or%20tables%20in%20a%20production%20network%20-%20%20Peter%20Hessler.mp4" target="_blank" rel="nofollow noopener"&gt;Using routing domains or tables in a production network&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Sean Bruno, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/06.QEMU%20user%20mode%20on%20FreeBSD%20-%20%20Sean%20Bruno.mp4" target="_blank" rel="nofollow noopener"&gt;QEMU user mode on FreeBSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Kristaps Dzonsons, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/01.Bugs%20Ex%20Ante%20-%20Kristaps%20Dzonsons.mp4" target="_blank" rel="nofollow noopener"&gt;Bugs Ex Ante&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Yann Sionneau, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/02.Porting%20NetBSD%20to%20the%20LatticeMico32%20open%20source%20CPU%20-%20Yann%20Sionneau.mp4" target="_blank" rel="nofollow noopener"&gt;Porting NetBSD to the LatticeMico32 open source CPU&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Alexander Nasonov, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/03.JIT%20Code%20Generator%20for%20NetBSD%20-%20Alexander%20Nasonov.mp4" target="_blank" rel="nofollow noopener"&gt;JIT Code Generator for NetBSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Masao Uebayashi, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/04.Porting%20Valgrind%20to%20NetBSD%20and%20OpenBSD%20-%20Masao%20Uebayashi.mp4" target="_blank" rel="nofollow noopener"&gt;Porting Valgrind to NetBSD and OpenBSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Marc Espie, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/05.parallel%20make:%20working%20with%20legacy%20code%20-%20Marc%20Espie.mp4" target="_blank" rel="nofollow noopener"&gt;parallel make, working with legacy code&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Francois Tigeot, &lt;a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/06.Porting%20the%20drm-kms%20graphic%20drivers%20to%20DragonFly%20-%20Francois%20Tigeot.mp4" target="_blank" rel="nofollow noopener"&gt;Porting the drm-kms graphic drivers to DragonFly&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;The following talks (from the Vitosha track room) are all currently missing:&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Jordan Hubbard, FreeBSD, Looking forward to another 10 years (but we have another recording)&lt;/li&gt;
&lt;li&gt;Theo de Raadt, Randomness, how arc4random has grown since 1998 (but we have another recording)&lt;/li&gt;
&lt;li&gt;Kris Moore, Snapshots, Replication, and Boot-Environments&lt;/li&gt;
&lt;li&gt;Kirk McKusick, An Introduction to the Implementation of ZFS&lt;/li&gt;
&lt;li&gt;John-Mark Gurney, Optimizing GELI Performance&lt;/li&gt;
&lt;li&gt;Emmanuel Dreyfus, FUSE and beyond, bridging filesystems&lt;/li&gt;
&lt;li&gt;Lourival Vieira Neto, NPF scripting with Lua&lt;/li&gt;
&lt;li&gt;Andy Tanenbaum, A Reimplementation of NetBSD Based on a Microkernel&lt;/li&gt;
&lt;li&gt;Stefano Garzarella, Software segmentation offloading for FreeBSD&lt;/li&gt;
&lt;li&gt;Ted Unangst, LibreSSL&lt;/li&gt;
&lt;li&gt;Shawn Webb, Introducing ASLR In FreeBSD&lt;/li&gt;
&lt;li&gt;Ed Maste, The LLDB Debugger in FreeBSD&lt;/li&gt;
&lt;li&gt;Philip Guenther, Secure lazy binding
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141614801713457&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD adopts SipHash&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Even more DJB crypto somehow finds its way into OpenBSD's base system&lt;/li&gt;
&lt;li&gt;This time it's &lt;a href="https://131002.net/siphash/" target="_blank" rel="nofollow noopener"&gt;SipHash&lt;/a&gt;, a family of pseudorandom functions that's resistant to hash bucket flooding attacks while still providing good performance&lt;/li&gt;
&lt;li&gt;After an &lt;a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/crypto/siphash.c?rev=1.1&amp;amp;content-type=text/x-cvsweb-markup" target="_blank" rel="nofollow noopener"&gt;initial import&lt;/a&gt; and some &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141604896822253&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;clever early usage&lt;/a&gt;, a few developers agreed that it would be better to use it in a lot more places&lt;/li&gt;
&lt;li&gt;It will now be used in the filesystem, and the plan is to utilize it to protect &lt;strong&gt;all kernel hash functions&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Some &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;other places&lt;/a&gt; that Bernstein's work can be found in OpenBSD include the ChaCha20-Poly1305 authenticated stream cipher and Curve25519 KEX used in SSH, ChaCha20 used in the RNG, and Ed25519 keys used in &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;signify&lt;/a&gt; and SSH
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/10.1R/announce.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.1-RELEASE&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD's &lt;a href="http://www.bsdnow.tv/episodes/2013-09-11_engineering_powder_kegs" target="_blank" rel="nofollow noopener"&gt;release engineering team&lt;/a&gt; likes to troll us by uploading new versions just a few hours after we finish recording an episode&lt;/li&gt;
&lt;li&gt;The first maintenance update for the 10.x branch is out, improving upon a lot of things found in 10.0-RELEASE&lt;/li&gt;
&lt;li&gt;The vt driver was merged from -CURRENT and can now be enabled with a loader.conf switch (and can even be used on a PlayStation 3)&lt;/li&gt;
&lt;li&gt;Bhyve has gotten quite a lot of fixes and improvements from its initial debut in 10.0, including boot support for ZFS&lt;/li&gt;
&lt;li&gt;Lots of new ARM hardware is supported now, including SMP support for most of them&lt;/li&gt;
&lt;li&gt;A new kernel selection menu was added to the loader, so you can switch between newer and older kernels at boot time&lt;/li&gt;
&lt;li&gt;10.1 is the first to support UEFI booting on amd64, which also has serial console support now&lt;/li&gt;
&lt;li&gt;Lots of third party software (OpenSSH, OpenSSL, Unbound..) and drivers have gotten updates to newer versions&lt;/li&gt;
&lt;li&gt;It's a worthy update from 10.0, or a good time to try the 10.x branch if you were avoiding the first .0 release, so &lt;a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.1/" target="_blank" rel="nofollow noopener"&gt;grab an ISO&lt;/a&gt; or &lt;a href="https://www.freebsd.org/cgi/man.cgi?query=freebsd-update" target="_blank" rel="nofollow noopener"&gt;upgrade&lt;/a&gt; today&lt;/li&gt;
&lt;li&gt;Check the &lt;a href="https://www.freebsd.org/releases/10.1R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;detailed release notes&lt;/a&gt; for more information on all the changes&lt;/li&gt;
&lt;li&gt;Also take a look at some of the &lt;a href="https://www.freebsd.org/releases/10.1R/errata.html#open-issues" target="_blank" rel="nofollow noopener"&gt;known problems&lt;/a&gt; to see &lt;a href="https://forums.freebsd.org/threads/segmentation-fault-while-upgrading-from-10-0-release-to-10-1-release.48977/" target="_blank" rel="nofollow noopener"&gt;if&lt;/a&gt; &lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-October/080599.html" target="_blank" rel="nofollow noopener"&gt;you'll&lt;/a&gt; &lt;a href="https://forums.freebsd.org/threads/10-0-10-1-diocaddrule-operation-not-supported-by-device.49016/" target="_blank" rel="nofollow noopener"&gt;be&lt;/a&gt; &lt;a href="https://www.reddit.com/r/freebsd/comments/2mmzzy/101release_restart_problems_anyone/" target="_blank" rel="nofollow noopener"&gt;affected&lt;/a&gt; by any of them&lt;/li&gt;
&lt;li&gt;PC-BSD was also &lt;a href="http://wiki.pcbsd.org/index.php/What%27s_New/10.1" target="_blank" rel="nofollow noopener"&gt;updated accordingly&lt;/a&gt; with some of their own unique features and changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=aWmLWx8ut20" target="_blank" rel="nofollow noopener"&gt;arc4random - Randomization for All Occasions&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Theo de Raadt gave an updated version of his EuroBSDCon presentation at Hackfest 2014 in Quebec&lt;/li&gt;
&lt;li&gt;The presentation is mainly about OpenBSD's arc4random function, and outlines the overall poor state of randomization in the 90s and how it has evolved in OpenBSD over time&lt;/li&gt;
&lt;li&gt;It begins with some interesting history on OpenBSD and how it became a security-focused OS - in 1996, their syslogd got broken into and "suddenly we became interested in security"&lt;/li&gt;
&lt;li&gt;The talk also touches on how low-level changes can shake up the software ecosystem and third party packages that everyone uses&lt;/li&gt;
&lt;li&gt;There's some funny history on the name of the function (being called arc4random despite not using RC4 anymore) and an overall status update on various platforms' usage of it&lt;/li&gt;
&lt;li&gt;Very detailed and informative presentation, and the slides can be found &lt;a href="http://www.openbsd.org/papers/hackfest2014-arc4random/index.html" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;A great quote from the beginning: "We consider ourselves a community of (probably rather strange) people who work on software specifically for the purpose of trying to make it better. We take a 'whole-systems' approach: trying to change everything in the ecosystem that's under our control, trying to see if we can make it better. We gain a lot of strength by being able to throw backwards compatibility out the window. So that means that we're able to do research and the minute that we decide that something isn't right, we'll design an alternative for it and push it in. And if it ends up breaking everybody's machines from the previous stage to the next stage, that's fine because we'll end up in a happier place."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Justin Cormack - &lt;a href="mailto:justin@netbsd.org" target="_blank" rel="nofollow noopener"&gt;justin@netbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/justincormack" target="_blank" rel="nofollow noopener"&gt;@justincormack&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;NetBSD on Xen, rump kernels, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/11/freebsd-foundation-announces-generous.html" target="_blank" rel="nofollow noopener"&gt;The FreeBSD foundation's biggest donation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has a new blog post about the largest donation they've ever gotten&lt;/li&gt;
&lt;li&gt;From the CEO of WhatsApp comes a whopping one million dollars in a single donation&lt;/li&gt;
&lt;li&gt;It also has some comments from the donor about why they use BSD and why it's important to give back&lt;/li&gt;
&lt;li&gt;Be sure to donate to the foundation of whatever BSD you use when you can - every little bit helps, especially for &lt;a href="http://www.openbsd.org/donations.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD&lt;/a&gt;, &lt;a href="https://www.netbsd.org/donations/" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt; and &lt;a href="http://www.dragonflybsd.org/donations/" target="_blank" rel="nofollow noopener"&gt;DragonFly&lt;/a&gt; who don't have huge companies supporting them regularly like FreeBSD does
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://open-zfs.org/wiki/OpenZFS_Developer_Summit" target="_blank" rel="nofollow noopener"&gt;OpenZFS Dev Summit 2014 videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Videos from the recent OpenZFS developer summit are being uploaded, with speakers from different represented platforms and companies
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" target="_blank" rel="nofollow noopener"&gt;Matt Ahrens&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=XnTzbisLYzg" target="_blank" rel="nofollow noopener"&gt;opening keynote&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Raphael Carvalho, &lt;a href="https://www.youtube.com/watch?v=TJLOBLSRoHE" target="_blank" rel="nofollow noopener"&gt;Platform Overview: ZFS on OSv&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Brian Behlendorf, &lt;a href="https://www.youtube.com/watch?v=_MVOpMNV7LY" target="_blank" rel="nofollow noopener"&gt;Platform Overview: ZFS on Linux&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Prakash Surya, &lt;a href="https://www.youtube.com/watch?v=UtlGt3ag0o0" target="_blank" rel="nofollow noopener"&gt;Platform Overview: illumos&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Xin Li, &lt;a href="https://www.youtube.com/watch?v=xO0x5_3A1X4" target="_blank" rel="nofollow noopener"&gt;Platform Overview: FreeBSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;All platforms, &lt;a href="https://www.youtube.com/watch?v=t4UlT0RmSCc" target="_blank" rel="nofollow noopener"&gt;Group Q&amp;amp;A Session&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Dave Pacheco, &lt;a href="https://www.youtube.com/watch?v=BEoCMpdB8WU" target="_blank" rel="nofollow noopener"&gt;Manta&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Saso Kiselkov, &lt;a href="https://www.youtube.com/watch?v=TZF92taa_us" target="_blank" rel="nofollow noopener"&gt;Compression&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" target="_blank" rel="nofollow noopener"&gt;George Wilson&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=deJc0EMKrM4" target="_blank" rel="nofollow noopener"&gt;Performance&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Tim Feldman, &lt;a href="https://www.youtube.com/watch?v=b1yqjV8qemU" target="_blank" rel="nofollow noopener"&gt;Host-Aware SMR&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Pavel Zakharov, &lt;a href="https://www.youtube.com/watch?v=-4c4gsLi1LI" target="_blank" rel="nofollow noopener"&gt;Fast File Cloning&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;The audio is &lt;a href="https://twitter.com/OpenZFS/status/534005125853888512" target="_blank" rel="nofollow noopener"&gt;pretty poor&lt;/a&gt; on all of them unfortunately
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/11/bsdtalk248-dragonflybsd-with-matthew.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk 248&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend Will Backman is still busy getting BSD interviews as well&lt;/li&gt;
&lt;li&gt;This time he sits down with Matthew Dillon, the lead developer of DragonFly BSD&lt;/li&gt;
&lt;li&gt;We've never had Dillon on the show, so you'll definitely want to give this one a listen&lt;/li&gt;
&lt;li&gt;They mainly discuss all the big changes coming in DragonFly's upcoming 4.0 release
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2014 videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The presentations from this year's MeetBSD conference are starting to appear online as well
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" target="_blank" rel="nofollow noopener"&gt;Kirk McKusick&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=DEEr6dT-4uQ" target="_blank" rel="nofollow noopener"&gt;A Narrative History of BSD&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" target="_blank" rel="nofollow noopener"&gt;Jordan Hubbard&lt;/a&gt;, &lt;a href="https://www.youtube.com/watch?v=Mri66Uz6-8Y" target="_blank" rel="nofollow noopener"&gt;FreeBSD: The Next 10 Years&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;Brendan Gregg, &lt;a href="https://www.youtube.com/watch?v=uvKMptfXtdo" target="_blank" rel="nofollow noopener"&gt;Performance Analysis&lt;/a&gt;
&amp;lt;!-- i wonder if freebsdnews will rip our html again and repost it &lt;sup&gt;_^&lt;/sup&gt; --&amp;gt;&lt;/li&gt;
&lt;li&gt;The slides can be found &lt;a href="https://www.meetbsd.com/agenda/" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt; 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20PXjp55N" target="_blank" rel="nofollow noopener"&gt;Dominik writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2LwEYT3bA" target="_blank" rel="nofollow noopener"&gt;Steven writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ubK8vQVt" target="_blank" rel="nofollow noopener"&gt;Florian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216Eq8nFG" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21D2ugDUy" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?t=141600819500004&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Contributing without code&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033176.html" target="_blank" rel="nofollow noopener"&gt;Compression isn't a CRIME&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?t=141616714600001&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Securing web browsers&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, rump kernels, xen, userspace, networking, siphash, 10.1, review, 10.1 review, openzfs, zfs, devsummit, hackfest, arc4random, meetbsd, presentation</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Justin Cormack about NetBSD rump kernels. We&#39;ll learn how to run them on other operating systems, what&#39;s planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and tutorials</a></h3>

<ul>
<li>The 2014 EuroBSDCon videos have been online for over a month, but unannounced - keep in mind these links may be temporary (but we&#39;ll mention their new location in a future show and fix the show notes if that&#39;s the case)
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Arun Thomas, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/01.BSD-ARM%20Kernel%20Internals%20-%20Arun%20Thomas.mp4" rel="nofollow">BSD ARM Kernel Internals</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ted Unangst, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/02.Developing%20Software%20in%20a%20Hostile%20Environment%20-%20Ted%20Unangst.mp4" rel="nofollow">Developing Software in a Hostile Environment</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Pieuchot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Henning Brauer, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/04.OpenBGPD%20turns%2010%20years%20-%20%20Henning%20Brauer.mp4" rel="nofollow">OpenBGPD turns 10 years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Claudio Jeker, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/05.vscsi(4)%20and%20iscsid%20-%20iSCSI%20initiator%20the%20OpenBSD%20way%20-%20Claudio%20Jeker.mp4" rel="nofollow">vscsi and iscsid iSCSI initiator the OpenBSD way</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Paul Irofti, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/06.Making%20OpenBSD%20Useful%20on%20the%20Octeon%20Network%20Gear%20-%20Paul%20Irofti.mp4" rel="nofollow">Making OpenBSD Useful on the Octeon Network Gear</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Baptiste Daroussin, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/01.Cross%20Building%20the%20FreeBSD%20ports%20tree%20-%20Baptiste%20Daroussin.mp4" rel="nofollow">Cross Building the FreeBSD ports tree</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Boris Astardzhiev, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/02.Smartcom%e2%80%99s%20control%20plane%20software,%20a%20customized%20version%20of%20FreeBSD%20-%20Boris%20Astardzhiev.mp4" rel="nofollow">Smartcom’s control plane software, a customized version of FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Michał Dubiel, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/03.OpenStack%20and%20OpenContrail%20for%20FreeBSD%20platform%20-%20Micha%c5%82%20Dubiel.mp4" rel="nofollow">OpenStack and OpenContrail for FreeBSD platform</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Husemann &amp; Joerg Sonnenberger, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/04.(Tool-)chaining%20the%20Hydra%20The%20ongoing%20quest%20for%20modern%20toolchains%20in%20NetBSD%20-%20Martin%20Huseman%20&%20Joerg%20Sonnenberger.mp4" rel="nofollow">Tool-chaining the Hydra, the ongoing quest for modern toolchains in NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Taylor R Campbell, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/05.The%20entropic%20principle:%20dev-u%3frandom%20and%20NetBSD%20-%20Taylor%20R%20Campbell.mp4" rel="nofollow">The entropic principle: /dev/u?random and NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dag-Erling Smørgrav, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/06.Securing%20sensitive%20&%20restricted%20data%20-%20Dag-Erling%20Sm%c3%b8rgrav.mp4" rel="nofollow">Securing sensitive &amp; restricted data</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/01.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">Building The Network You Need</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/02.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">With PF</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Stefan Sperling, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/03.Subversion%20for%20FreeBSD%20developers%20-%20Stefan%20Sperling.mp4" rel="nofollow">Subversion for FreeBSD developers</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/01.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">Transition to</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/02.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">OpenBSD 5.6</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ingo Schwarze, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/03.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">Let’s make manuals</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/04.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">more useful</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/01.Improving%20DragonFly%e2%80%99s%20performance%20with%20PostgreSQL%20-%20Francois%20Tigeot.mp4" rel="nofollow">Improving DragonFly’s performance with PostgreSQL</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Justin Cormack, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/02.Running%20Applications%20on%20the%20NetBSD%20Rump%20Kernel%20-%20Justin%20Cormack.mp4" rel="nofollow">Running Applications on the NetBSD Rump Kernel</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pierre Pronchery, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/04.EdgeBSD,%20a%20year%20later%20-%20%20Pierre%20Pronchery.mp4" rel="nofollow">EdgeBSD, a year later</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hessler, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/05.Using%20routing%20domains%20or%20tables%20in%20a%20production%20network%20-%20%20Peter%20Hessler.mp4" rel="nofollow">Using routing domains or tables in a production network</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Sean Bruno, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/06.QEMU%20user%20mode%20on%20FreeBSD%20-%20%20Sean%20Bruno.mp4" rel="nofollow">QEMU user mode on FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Kristaps Dzonsons, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/01.Bugs%20Ex%20Ante%20-%20Kristaps%20Dzonsons.mp4" rel="nofollow">Bugs Ex Ante</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Yann Sionneau, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/02.Porting%20NetBSD%20to%20the%20LatticeMico32%20open%20source%20CPU%20-%20Yann%20Sionneau.mp4" rel="nofollow">Porting NetBSD to the LatticeMico32 open source CPU</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Alexander Nasonov, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/03.JIT%20Code%20Generator%20for%20NetBSD%20-%20Alexander%20Nasonov.mp4" rel="nofollow">JIT Code Generator for NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Masao Uebayashi, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/04.Porting%20Valgrind%20to%20NetBSD%20and%20OpenBSD%20-%20Masao%20Uebayashi.mp4" rel="nofollow">Porting Valgrind to NetBSD and OpenBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Marc Espie, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/05.parallel%20make:%20working%20with%20legacy%20code%20-%20Marc%20Espie.mp4" rel="nofollow">parallel make, working with legacy code</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/06.Porting%20the%20drm-kms%20graphic%20drivers%20to%20DragonFly%20-%20Francois%20Tigeot.mp4" rel="nofollow">Porting the drm-kms graphic drivers to DragonFly</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><strong>The following talks (from the Vitosha track room) are all currently missing:</strong></li>
<li>Jordan Hubbard, FreeBSD, Looking forward to another 10 years (but we have another recording)</li>
<li>Theo de Raadt, Randomness, how arc4random has grown since 1998 (but we have another recording)</li>
<li>Kris Moore, Snapshots, Replication, and Boot-Environments</li>
<li>Kirk McKusick, An Introduction to the Implementation of ZFS</li>
<li>John-Mark Gurney, Optimizing GELI Performance</li>
<li>Emmanuel Dreyfus, FUSE and beyond, bridging filesystems</li>
<li>Lourival Vieira Neto, NPF scripting with Lua</li>
<li>Andy Tanenbaum, A Reimplementation of NetBSD Based on a Microkernel</li>
<li>Stefano Garzarella, Software segmentation offloading for FreeBSD</li>
<li>Ted Unangst, LibreSSL</li>
<li>Shawn Webb, Introducing ASLR In FreeBSD</li>
<li>Ed Maste, The LLDB Debugger in FreeBSD</li>
<li>Philip Guenther, Secure lazy binding
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=141614801713457&w=2" rel="nofollow">OpenBSD adopts SipHash</a></h3>

<ul>
<li>Even more DJB crypto somehow finds its way into OpenBSD&#39;s base system</li>
<li>This time it&#39;s <a href="https://131002.net/siphash/" rel="nofollow">SipHash</a>, a family of pseudorandom functions that&#39;s resistant to hash bucket flooding attacks while still providing good performance</li>
<li>After an <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/crypto/siphash.c?rev=1.1&content-type=text/x-cvsweb-markup" rel="nofollow">initial import</a> and some <a href="https://www.marc.info/?l=openbsd-cvs&m=141604896822253&w=2" rel="nofollow">clever early usage</a>, a few developers agreed that it would be better to use it in a lot more places</li>
<li>It will now be used in the filesystem, and the plan is to utilize it to protect <strong>all kernel hash functions</strong></li>
<li>Some <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">other places</a> that Bernstein&#39;s work can be found in OpenBSD include the ChaCha20-Poly1305 authenticated stream cipher and Curve25519 KEX used in SSH, ChaCha20 used in the RNG, and Ed25519 keys used in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">signify</a> and SSH
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.1R/announce.html" rel="nofollow">FreeBSD 10.1-RELEASE</a></h3>

<ul>
<li>FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2013-09-11_engineering_powder_kegs" rel="nofollow">release engineering team</a> likes to troll us by uploading new versions just a few hours after we finish recording an episode</li>
<li>The first maintenance update for the 10.x branch is out, improving upon a lot of things found in 10.0-RELEASE</li>
<li>The vt driver was merged from -CURRENT and can now be enabled with a loader.conf switch (and can even be used on a PlayStation 3)</li>
<li>Bhyve has gotten quite a lot of fixes and improvements from its initial debut in 10.0, including boot support for ZFS</li>
<li>Lots of new ARM hardware is supported now, including SMP support for most of them</li>
<li>A new kernel selection menu was added to the loader, so you can switch between newer and older kernels at boot time</li>
<li>10.1 is the first to support UEFI booting on amd64, which also has serial console support now</li>
<li>Lots of third party software (OpenSSH, OpenSSL, Unbound..) and drivers have gotten updates to newer versions</li>
<li>It&#39;s a worthy update from 10.0, or a good time to try the 10.x branch if you were avoiding the first .0 release, so <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.1/" rel="nofollow">grab an ISO</a> or <a href="https://www.freebsd.org/cgi/man.cgi?query=freebsd-update" rel="nofollow">upgrade</a> today</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.1R/relnotes.html" rel="nofollow">detailed release notes</a> for more information on all the changes</li>
<li>Also take a look at some of the <a href="https://www.freebsd.org/releases/10.1R/errata.html#open-issues" rel="nofollow">known problems</a> to see <a href="https://forums.freebsd.org/threads/segmentation-fault-while-upgrading-from-10-0-release-to-10-1-release.48977/" rel="nofollow">if</a> <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-October/080599.html" rel="nofollow">you&#39;ll</a> <a href="https://forums.freebsd.org/threads/10-0-10-1-diocaddrule-operation-not-supported-by-device.49016/" rel="nofollow">be</a> <a href="https://www.reddit.com/r/freebsd/comments/2mmzzy/101release_restart_problems_anyone/" rel="nofollow">affected</a> by any of them</li>
<li>PC-BSD was also <a href="http://wiki.pcbsd.org/index.php/What%27s_New/10.1" rel="nofollow">updated accordingly</a> with some of their own unique features and changes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=aWmLWx8ut20" rel="nofollow">arc4random - Randomization for All Occasions</a></h3>

<ul>
<li>Theo de Raadt gave an updated version of his EuroBSDCon presentation at Hackfest 2014 in Quebec</li>
<li>The presentation is mainly about OpenBSD&#39;s arc4random function, and outlines the overall poor state of randomization in the 90s and how it has evolved in OpenBSD over time</li>
<li>It begins with some interesting history on OpenBSD and how it became a security-focused OS - in 1996, their syslogd got broken into and &quot;suddenly we became interested in security&quot;</li>
<li>The talk also touches on how low-level changes can shake up the software ecosystem and third party packages that everyone uses</li>
<li>There&#39;s some funny history on the name of the function (being called arc4random despite not using RC4 anymore) and an overall status update on various platforms&#39; usage of it</li>
<li>Very detailed and informative presentation, and the slides can be found <a href="http://www.openbsd.org/papers/hackfest2014-arc4random/index.html" rel="nofollow">here</a></li>
<li>A great quote from the beginning: &quot;We consider ourselves a community of (probably rather strange) people who work on software specifically for the purpose of trying to make it better. We take a &#39;whole-systems&#39; approach: trying to change everything in the ecosystem that&#39;s under our control, trying to see if we can make it better. We gain a lot of strength by being able to throw backwards compatibility out the window. So that means that we&#39;re able to do research and the minute that we decide that something isn&#39;t right, we&#39;ll design an alternative for it and push it in. And if it ends up breaking everybody&#39;s machines from the previous stage to the next stage, that&#39;s fine because we&#39;ll end up in a happier place.&quot;
***</li>
</ul>

<h2>Interview - Justin Cormack - <a href="mailto:justin@netbsd.org" rel="nofollow">justin@netbsd.org</a> / <a href="https://twitter.com/justincormack" rel="nofollow">@justincormack</a></h2>

<p>NetBSD on Xen, rump kernels, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/11/freebsd-foundation-announces-generous.html" rel="nofollow">The FreeBSD foundation&#39;s biggest donation</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post about the largest donation they&#39;ve ever gotten</li>
<li>From the CEO of WhatsApp comes a whopping one million dollars in a single donation</li>
<li>It also has some comments from the donor about why they use BSD and why it&#39;s important to give back</li>
<li>Be sure to donate to the foundation of whatever BSD you use when you can - every little bit helps, especially for <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/donations/" rel="nofollow">NetBSD</a> and <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">DragonFly</a> who don&#39;t have huge companies supporting them regularly like FreeBSD does
***</li>
</ul>

<h3><a href="http://open-zfs.org/wiki/OpenZFS_Developer_Summit" rel="nofollow">OpenZFS Dev Summit 2014 videos</a></h3>

<ul>
<li>Videos from the recent OpenZFS developer summit are being uploaded, with speakers from different represented platforms and companies
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a>, <a href="https://www.youtube.com/watch?v=XnTzbisLYzg" rel="nofollow">opening keynote</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Raphael Carvalho, <a href="https://www.youtube.com/watch?v=TJLOBLSRoHE" rel="nofollow">Platform Overview: ZFS on OSv</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brian Behlendorf, <a href="https://www.youtube.com/watch?v=_MVOpMNV7LY" rel="nofollow">Platform Overview: ZFS on Linux</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Prakash Surya, <a href="https://www.youtube.com/watch?v=UtlGt3ag0o0" rel="nofollow">Platform Overview: illumos</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Xin Li, <a href="https://www.youtube.com/watch?v=xO0x5_3A1X4" rel="nofollow">Platform Overview: FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>All platforms, <a href="https://www.youtube.com/watch?v=t4UlT0RmSCc" rel="nofollow">Group Q&amp;A Session</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dave Pacheco, <a href="https://www.youtube.com/watch?v=BEoCMpdB8WU" rel="nofollow">Manta</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Saso Kiselkov, <a href="https://www.youtube.com/watch?v=TZF92taa_us" rel="nofollow">Compression</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a>, <a href="https://www.youtube.com/watch?v=deJc0EMKrM4" rel="nofollow">Performance</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Tim Feldman, <a href="https://www.youtube.com/watch?v=b1yqjV8qemU" rel="nofollow">Host-Aware SMR</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=-4c4gsLi1LI" rel="nofollow">Fast File Cloning</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The audio is <a href="https://twitter.com/OpenZFS/status/534005125853888512" rel="nofollow">pretty poor</a> on all of them unfortunately
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/11/bsdtalk248-dragonflybsd-with-matthew.html" rel="nofollow">BSDTalk 248</a></h3>

<ul>
<li>Our friend Will Backman is still busy getting BSD interviews as well</li>
<li>This time he sits down with Matthew Dillon, the lead developer of DragonFly BSD</li>
<li>We&#39;ve never had Dillon on the show, so you&#39;ll definitely want to give this one a listen</li>
<li>They mainly discuss all the big changes coming in DragonFly&#39;s upcoming 4.0 release
***</li>
</ul>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">MeetBSD 2014 videos</a></h3>

<ul>
<li>The presentations from this year&#39;s MeetBSD conference are starting to appear online as well
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=DEEr6dT-4uQ" rel="nofollow">A Narrative History of BSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://www.youtube.com/watch?v=Mri66Uz6-8Y" rel="nofollow">FreeBSD: The Next 10 Years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brendan Gregg, <a href="https://www.youtube.com/watch?v=uvKMptfXtdo" rel="nofollow">Performance Analysis</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The slides can be found <a href="https://www.meetbsd.com/agenda/" rel="nofollow">here</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20PXjp55N" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s2LwEYT3bA" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s2ubK8vQVt" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s216Eq8nFG" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s21D2ugDUy" rel="nofollow">Kevin writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141600819500004&r=1&w=2" rel="nofollow">Contributing without code</a></li>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033176.html" rel="nofollow">Compression isn&#39;t a CRIME</a></li>
<li><a href="https://www.marc.info/?t=141616714600001&r=1&w=2" rel="nofollow">Securing web browsers</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with Justin Cormack about NetBSD rump kernels. We&#39;ll learn how to run them on other operating systems, what&#39;s planned for the future and a lot more. As always, answers to viewer-submitted questions and all the news for the week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and tutorials</a></h3>

<ul>
<li>The 2014 EuroBSDCon videos have been online for over a month, but unannounced - keep in mind these links may be temporary (but we&#39;ll mention their new location in a future show and fix the show notes if that&#39;s the case)
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Arun Thomas, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/01.BSD-ARM%20Kernel%20Internals%20-%20Arun%20Thomas.mp4" rel="nofollow">BSD ARM Kernel Internals</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ted Unangst, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/02.Developing%20Software%20in%20a%20Hostile%20Environment%20-%20Ted%20Unangst.mp4" rel="nofollow">Developing Software in a Hostile Environment</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Pieuchot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/03.Taming%20OpenBSD%20Network%20Stack%20Dragons%20-%20Martin%20Pieuchot.mp4" rel="nofollow">Taming OpenBSD Network Stack Dragons</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Henning Brauer, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/04.OpenBGPD%20turns%2010%20years%20-%20%20Henning%20Brauer.mp4" rel="nofollow">OpenBGPD turns 10 years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Claudio Jeker, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/05.vscsi(4)%20and%20iscsid%20-%20iSCSI%20initiator%20the%20OpenBSD%20way%20-%20Claudio%20Jeker.mp4" rel="nofollow">vscsi and iscsid iSCSI initiator the OpenBSD way</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Paul Irofti, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/03.Saturday/06.Making%20OpenBSD%20Useful%20on%20the%20Octeon%20Network%20Gear%20-%20Paul%20Irofti.mp4" rel="nofollow">Making OpenBSD Useful on the Octeon Network Gear</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Baptiste Daroussin, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/01.Cross%20Building%20the%20FreeBSD%20ports%20tree%20-%20Baptiste%20Daroussin.mp4" rel="nofollow">Cross Building the FreeBSD ports tree</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Boris Astardzhiev, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/02.Smartcom%e2%80%99s%20control%20plane%20software,%20a%20customized%20version%20of%20FreeBSD%20-%20Boris%20Astardzhiev.mp4" rel="nofollow">Smartcom’s control plane software, a customized version of FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Michał Dubiel, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/03.OpenStack%20and%20OpenContrail%20for%20FreeBSD%20platform%20-%20Micha%c5%82%20Dubiel.mp4" rel="nofollow">OpenStack and OpenContrail for FreeBSD platform</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Martin Husemann &amp; Joerg Sonnenberger, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/04.(Tool-)chaining%20the%20Hydra%20The%20ongoing%20quest%20for%20modern%20toolchains%20in%20NetBSD%20-%20Martin%20Huseman%20&%20Joerg%20Sonnenberger.mp4" rel="nofollow">Tool-chaining the Hydra, the ongoing quest for modern toolchains in NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Taylor R Campbell, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/05.The%20entropic%20principle:%20dev-u%3frandom%20and%20NetBSD%20-%20Taylor%20R%20Campbell.mp4" rel="nofollow">The entropic principle: /dev/u?random and NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dag-Erling Smørgrav, <a href="https://va.ludost.net/files/eurobsdcon/2014/Rodopi/04.Sunday/06.Securing%20sensitive%20&%20restricted%20data%20-%20Dag-Erling%20Sm%c3%b8rgrav.mp4" rel="nofollow">Securing sensitive &amp; restricted data</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/01.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">Building The Network You Need</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/02.Building%20The%20Network%20You%20Need%20With%20PF%20-%20Peter%20Hansteen.mp4" rel="nofollow">With PF</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Stefan Sperling, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/01.Thursday/03.Subversion%20for%20FreeBSD%20developers%20-%20Stefan%20Sperling.mp4" rel="nofollow">Subversion for FreeBSD developers</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hansteen, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/01.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">Transition to</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/02.Transition%20to%20OpenBSD%205.6%20-%20Peter%20Hansteen.mp4" rel="nofollow">OpenBSD 5.6</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Ingo Schwarze, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/03.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">Let’s make manuals</a> <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/02.Friday/04.Let%e2%80%99s%20make%20manuals%20more%20useful%20-%20Ingo%20Schwarze.mp4" rel="nofollow">more useful</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/01.Improving%20DragonFly%e2%80%99s%20performance%20with%20PostgreSQL%20-%20Francois%20Tigeot.mp4" rel="nofollow">Improving DragonFly’s performance with PostgreSQL</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Justin Cormack, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/02.Running%20Applications%20on%20the%20NetBSD%20Rump%20Kernel%20-%20Justin%20Cormack.mp4" rel="nofollow">Running Applications on the NetBSD Rump Kernel</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pierre Pronchery, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/04.EdgeBSD,%20a%20year%20later%20-%20%20Pierre%20Pronchery.mp4" rel="nofollow">EdgeBSD, a year later</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Peter Hessler, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/05.Using%20routing%20domains%20or%20tables%20in%20a%20production%20network%20-%20%20Peter%20Hessler.mp4" rel="nofollow">Using routing domains or tables in a production network</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Sean Bruno, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/03.Saturday/06.QEMU%20user%20mode%20on%20FreeBSD%20-%20%20Sean%20Bruno.mp4" rel="nofollow">QEMU user mode on FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Kristaps Dzonsons, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/01.Bugs%20Ex%20Ante%20-%20Kristaps%20Dzonsons.mp4" rel="nofollow">Bugs Ex Ante</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Yann Sionneau, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/02.Porting%20NetBSD%20to%20the%20LatticeMico32%20open%20source%20CPU%20-%20Yann%20Sionneau.mp4" rel="nofollow">Porting NetBSD to the LatticeMico32 open source CPU</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Alexander Nasonov, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/03.JIT%20Code%20Generator%20for%20NetBSD%20-%20Alexander%20Nasonov.mp4" rel="nofollow">JIT Code Generator for NetBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Masao Uebayashi, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/04.Porting%20Valgrind%20to%20NetBSD%20and%20OpenBSD%20-%20Masao%20Uebayashi.mp4" rel="nofollow">Porting Valgrind to NetBSD and OpenBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Marc Espie, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/05.parallel%20make:%20working%20with%20legacy%20code%20-%20Marc%20Espie.mp4" rel="nofollow">parallel make, working with legacy code</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Francois Tigeot, <a href="https://va.ludost.net/files/eurobsdcon/2014/Pirin/04.Sunday/06.Porting%20the%20drm-kms%20graphic%20drivers%20to%20DragonFly%20-%20Francois%20Tigeot.mp4" rel="nofollow">Porting the drm-kms graphic drivers to DragonFly</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><strong>The following talks (from the Vitosha track room) are all currently missing:</strong></li>
<li>Jordan Hubbard, FreeBSD, Looking forward to another 10 years (but we have another recording)</li>
<li>Theo de Raadt, Randomness, how arc4random has grown since 1998 (but we have another recording)</li>
<li>Kris Moore, Snapshots, Replication, and Boot-Environments</li>
<li>Kirk McKusick, An Introduction to the Implementation of ZFS</li>
<li>John-Mark Gurney, Optimizing GELI Performance</li>
<li>Emmanuel Dreyfus, FUSE and beyond, bridging filesystems</li>
<li>Lourival Vieira Neto, NPF scripting with Lua</li>
<li>Andy Tanenbaum, A Reimplementation of NetBSD Based on a Microkernel</li>
<li>Stefano Garzarella, Software segmentation offloading for FreeBSD</li>
<li>Ted Unangst, LibreSSL</li>
<li>Shawn Webb, Introducing ASLR In FreeBSD</li>
<li>Ed Maste, The LLDB Debugger in FreeBSD</li>
<li>Philip Guenther, Secure lazy binding
***</li>
</ul>

<h3><a href="https://www.marc.info/?l=openbsd-tech&m=141614801713457&w=2" rel="nofollow">OpenBSD adopts SipHash</a></h3>

<ul>
<li>Even more DJB crypto somehow finds its way into OpenBSD&#39;s base system</li>
<li>This time it&#39;s <a href="https://131002.net/siphash/" rel="nofollow">SipHash</a>, a family of pseudorandom functions that&#39;s resistant to hash bucket flooding attacks while still providing good performance</li>
<li>After an <a href="http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys/crypto/siphash.c?rev=1.1&content-type=text/x-cvsweb-markup" rel="nofollow">initial import</a> and some <a href="https://www.marc.info/?l=openbsd-cvs&m=141604896822253&w=2" rel="nofollow">clever early usage</a>, a few developers agreed that it would be better to use it in a lot more places</li>
<li>It will now be used in the filesystem, and the plan is to utilize it to protect <strong>all kernel hash functions</strong></li>
<li>Some <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">other places</a> that Bernstein&#39;s work can be found in OpenBSD include the ChaCha20-Poly1305 authenticated stream cipher and Curve25519 KEX used in SSH, ChaCha20 used in the RNG, and Ed25519 keys used in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">signify</a> and SSH
***</li>
</ul>

<h3><a href="https://www.freebsd.org/releases/10.1R/announce.html" rel="nofollow">FreeBSD 10.1-RELEASE</a></h3>

<ul>
<li>FreeBSD&#39;s <a href="http://www.bsdnow.tv/episodes/2013-09-11_engineering_powder_kegs" rel="nofollow">release engineering team</a> likes to troll us by uploading new versions just a few hours after we finish recording an episode</li>
<li>The first maintenance update for the 10.x branch is out, improving upon a lot of things found in 10.0-RELEASE</li>
<li>The vt driver was merged from -CURRENT and can now be enabled with a loader.conf switch (and can even be used on a PlayStation 3)</li>
<li>Bhyve has gotten quite a lot of fixes and improvements from its initial debut in 10.0, including boot support for ZFS</li>
<li>Lots of new ARM hardware is supported now, including SMP support for most of them</li>
<li>A new kernel selection menu was added to the loader, so you can switch between newer and older kernels at boot time</li>
<li>10.1 is the first to support UEFI booting on amd64, which also has serial console support now</li>
<li>Lots of third party software (OpenSSH, OpenSSL, Unbound..) and drivers have gotten updates to newer versions</li>
<li>It&#39;s a worthy update from 10.0, or a good time to try the 10.x branch if you were avoiding the first .0 release, so <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.1/" rel="nofollow">grab an ISO</a> or <a href="https://www.freebsd.org/cgi/man.cgi?query=freebsd-update" rel="nofollow">upgrade</a> today</li>
<li>Check the <a href="https://www.freebsd.org/releases/10.1R/relnotes.html" rel="nofollow">detailed release notes</a> for more information on all the changes</li>
<li>Also take a look at some of the <a href="https://www.freebsd.org/releases/10.1R/errata.html#open-issues" rel="nofollow">known problems</a> to see <a href="https://forums.freebsd.org/threads/segmentation-fault-while-upgrading-from-10-0-release-to-10-1-release.48977/" rel="nofollow">if</a> <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-October/080599.html" rel="nofollow">you&#39;ll</a> <a href="https://forums.freebsd.org/threads/10-0-10-1-diocaddrule-operation-not-supported-by-device.49016/" rel="nofollow">be</a> <a href="https://www.reddit.com/r/freebsd/comments/2mmzzy/101release_restart_problems_anyone/" rel="nofollow">affected</a> by any of them</li>
<li>PC-BSD was also <a href="http://wiki.pcbsd.org/index.php/What%27s_New/10.1" rel="nofollow">updated accordingly</a> with some of their own unique features and changes
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=aWmLWx8ut20" rel="nofollow">arc4random - Randomization for All Occasions</a></h3>

<ul>
<li>Theo de Raadt gave an updated version of his EuroBSDCon presentation at Hackfest 2014 in Quebec</li>
<li>The presentation is mainly about OpenBSD&#39;s arc4random function, and outlines the overall poor state of randomization in the 90s and how it has evolved in OpenBSD over time</li>
<li>It begins with some interesting history on OpenBSD and how it became a security-focused OS - in 1996, their syslogd got broken into and &quot;suddenly we became interested in security&quot;</li>
<li>The talk also touches on how low-level changes can shake up the software ecosystem and third party packages that everyone uses</li>
<li>There&#39;s some funny history on the name of the function (being called arc4random despite not using RC4 anymore) and an overall status update on various platforms&#39; usage of it</li>
<li>Very detailed and informative presentation, and the slides can be found <a href="http://www.openbsd.org/papers/hackfest2014-arc4random/index.html" rel="nofollow">here</a></li>
<li>A great quote from the beginning: &quot;We consider ourselves a community of (probably rather strange) people who work on software specifically for the purpose of trying to make it better. We take a &#39;whole-systems&#39; approach: trying to change everything in the ecosystem that&#39;s under our control, trying to see if we can make it better. We gain a lot of strength by being able to throw backwards compatibility out the window. So that means that we&#39;re able to do research and the minute that we decide that something isn&#39;t right, we&#39;ll design an alternative for it and push it in. And if it ends up breaking everybody&#39;s machines from the previous stage to the next stage, that&#39;s fine because we&#39;ll end up in a happier place.&quot;
***</li>
</ul>

<h2>Interview - Justin Cormack - <a href="mailto:justin@netbsd.org" rel="nofollow">justin@netbsd.org</a> / <a href="https://twitter.com/justincormack" rel="nofollow">@justincormack</a></h2>

<p>NetBSD on Xen, rump kernels, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/11/freebsd-foundation-announces-generous.html" rel="nofollow">The FreeBSD foundation&#39;s biggest donation</a></h3>

<ul>
<li>The FreeBSD foundation has a new blog post about the largest donation they&#39;ve ever gotten</li>
<li>From the CEO of WhatsApp comes a whopping one million dollars in a single donation</li>
<li>It also has some comments from the donor about why they use BSD and why it&#39;s important to give back</li>
<li>Be sure to donate to the foundation of whatever BSD you use when you can - every little bit helps, especially for <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD</a>, <a href="https://www.netbsd.org/donations/" rel="nofollow">NetBSD</a> and <a href="http://www.dragonflybsd.org/donations/" rel="nofollow">DragonFly</a> who don&#39;t have huge companies supporting them regularly like FreeBSD does
***</li>
</ul>

<h3><a href="http://open-zfs.org/wiki/OpenZFS_Developer_Summit" rel="nofollow">OpenZFS Dev Summit 2014 videos</a></h3>

<ul>
<li>Videos from the recent OpenZFS developer summit are being uploaded, with speakers from different represented platforms and companies
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a>, <a href="https://www.youtube.com/watch?v=XnTzbisLYzg" rel="nofollow">opening keynote</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Raphael Carvalho, <a href="https://www.youtube.com/watch?v=TJLOBLSRoHE" rel="nofollow">Platform Overview: ZFS on OSv</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brian Behlendorf, <a href="https://www.youtube.com/watch?v=_MVOpMNV7LY" rel="nofollow">Platform Overview: ZFS on Linux</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Prakash Surya, <a href="https://www.youtube.com/watch?v=UtlGt3ag0o0" rel="nofollow">Platform Overview: illumos</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Xin Li, <a href="https://www.youtube.com/watch?v=xO0x5_3A1X4" rel="nofollow">Platform Overview: FreeBSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>All platforms, <a href="https://www.youtube.com/watch?v=t4UlT0RmSCc" rel="nofollow">Group Q&amp;A Session</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Dave Pacheco, <a href="https://www.youtube.com/watch?v=BEoCMpdB8WU" rel="nofollow">Manta</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Saso Kiselkov, <a href="https://www.youtube.com/watch?v=TZF92taa_us" rel="nofollow">Compression</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a>, <a href="https://www.youtube.com/watch?v=deJc0EMKrM4" rel="nofollow">Performance</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Tim Feldman, <a href="https://www.youtube.com/watch?v=b1yqjV8qemU" rel="nofollow">Host-Aware SMR</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Pavel Zakharov, <a href="https://www.youtube.com/watch?v=-4c4gsLi1LI" rel="nofollow">Fast File Cloning</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The audio is <a href="https://twitter.com/OpenZFS/status/534005125853888512" rel="nofollow">pretty poor</a> on all of them unfortunately
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/11/bsdtalk248-dragonflybsd-with-matthew.html" rel="nofollow">BSDTalk 248</a></h3>

<ul>
<li>Our friend Will Backman is still busy getting BSD interviews as well</li>
<li>This time he sits down with Matthew Dillon, the lead developer of DragonFly BSD</li>
<li>We&#39;ve never had Dillon on the show, so you&#39;ll definitely want to give this one a listen</li>
<li>They mainly discuss all the big changes coming in DragonFly&#39;s upcoming 4.0 release
***</li>
</ul>

<h3><a href="https://www.meetbsd.com/" rel="nofollow">MeetBSD 2014 videos</a></h3>

<ul>
<li>The presentations from this year&#39;s MeetBSD conference are starting to appear online as well
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk McKusick</a>, <a href="https://www.youtube.com/watch?v=DEEr6dT-4uQ" rel="nofollow">A Narrative History of BSD</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_27-bridging_the_gap" rel="nofollow">Jordan Hubbard</a>, <a href="https://www.youtube.com/watch?v=Mri66Uz6-8Y" rel="nofollow">FreeBSD: The Next 10 Years</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>Brendan Gregg, <a href="https://www.youtube.com/watch?v=uvKMptfXtdo" rel="nofollow">Performance Analysis</a>
&lt;!-- i wonder if freebsdnews will rip our html again and repost it <sup>_^</sup> --&gt;</li>
<li>The slides can be found <a href="https://www.meetbsd.com/agenda/" rel="nofollow">here</a> 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20PXjp55N" rel="nofollow">Dominik writes in</a></li>
<li><a href="http://slexy.org/view/s2LwEYT3bA" rel="nofollow">Steven writes in</a></li>
<li><a href="http://slexy.org/view/s2ubK8vQVt" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s216Eq8nFG" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s21D2ugDUy" rel="nofollow">Kevin writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141600819500004&r=1&w=2" rel="nofollow">Contributing without code</a></li>
<li><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-November/033176.html" rel="nofollow">Compression isn&#39;t a CRIME</a></li>
<li><a href="https://www.marc.info/?t=141616714600001&r=1&w=2" rel="nofollow">Securing web browsers</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>63: A Man's man(1)</title>
  <link>https://www.bsdnow.tv/63</link>
  <guid isPermaLink="false">0dbe70cc-bfdd-4af8-b67f-a5d1e85b7115</guid>
  <pubDate>Wed, 12 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0dbe70cc-bfdd-4af8-b67f-a5d1e85b7115.mp3" length="70356244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we've got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week's news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:37:43</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we've got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week's news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=273872" target="_blank" rel="nofollow noopener"&gt;Updates to FreeBSD's random(4)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD's random device, which presents itself as "/dev/random" to &lt;a href="https://news.ycombinator.com/item?id=8550457" target="_blank" rel="nofollow noopener"&gt;users&lt;/a&gt;, has gotten a fairly major overhaul in -CURRENT&lt;/li&gt;
&lt;li&gt;The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna&lt;/li&gt;
&lt;li&gt;Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)&lt;/li&gt;
&lt;li&gt;Pluggable modules can now be written to add more sources of entropy&lt;/li&gt;
&lt;li&gt;These changes are expected to make it in 11.0-RELEASE, but there hasn't been any mention of MFCing them to 10 or 9
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD Tor relays and network diversity&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've talked about getting &lt;a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd" target="_blank" rel="nofollow noopener"&gt;more BSD-based Tor nodes&lt;/a&gt; a few times in previous episodes&lt;/li&gt;
&lt;li&gt;The "tor-relays" mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes&lt;/li&gt;
&lt;li&gt;With the security features and attention to detail, it makes for an excellent dedicated Tor box&lt;/li&gt;
&lt;li&gt;More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large&lt;/li&gt;
&lt;li&gt;A few users are even saying they'll &lt;em&gt;convert their Linux nodes&lt;/em&gt; to OpenBSD to help out&lt;/li&gt;
&lt;li&gt;Check the archive for the full conversation, and maybe &lt;a href="http://www.bsdnow.tv/tutorials/tor" target="_blank" rel="nofollow noopener"&gt;run a node yourself&lt;/a&gt; on any of the BSDs&lt;/li&gt;
&lt;li&gt;The Tor wiki page on OpenBSD is pretty &lt;a href="https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html" target="_blank" rel="nofollow noopener"&gt;out of date&lt;/a&gt; (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html" target="_blank" rel="nofollow noopener"&gt;SSP now default for FreeBSD ports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;SSP, or &lt;a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" target="_blank" rel="nofollow noopener"&gt;Stack Smashing Protection&lt;/a&gt;, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces&lt;/li&gt;
&lt;li&gt;It's now enabled by default in FreeBSD's ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)&lt;/li&gt;
&lt;li&gt;This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates&lt;/li&gt;
&lt;li&gt;If you were using the temporary "new Xorg" or SSP package repositories instead of the default ones, you need to switch back over&lt;/li&gt;
&lt;li&gt;NetBSD made this the default on i386 and amd64 &lt;a href="https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html" target="_blank" rel="nofollow noopener"&gt;two years ago&lt;/a&gt; and OpenBSD made this the default on all architectures &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=103881967909595&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;twelve years ago&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/" target="_blank" rel="nofollow noopener"&gt;Building an OpenBSD firewall and router&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While we've discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side&lt;/li&gt;
&lt;li&gt;The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris&lt;/li&gt;
&lt;li&gt;Most agree that, if it's for a business especially, it's worth the extra money to go with something that's well known in the BSD community&lt;/li&gt;
&lt;li&gt;They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.&lt;/li&gt;
&lt;li&gt;Through the comments, we also find out that &lt;strong&gt;QuakeCon runs OpenBSD&lt;/strong&gt; on their network&lt;/li&gt;
&lt;li&gt;Hopefully most of our listeners are running some kind of BSD as their gateway - &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;try it out&lt;/a&gt; if you haven't already
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Kristaps Džonsons - &lt;a href="mailto:kristaps@bsd.lv" target="_blank" rel="nofollow noopener"&gt;kristaps@bsd.lv&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Mandoc, historical man pages, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router#queues" target="_blank" rel="nofollow noopener"&gt;Throttling bandwidth with PF&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Kansai Open Forum 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Japanese NetBSD users invade yet another conference, demonstrating that they &lt;strong&gt;can and will&lt;/strong&gt; install NetBSD &lt;em&gt;on everything&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all&lt;/li&gt;
&lt;li&gt;As always, you can find lots of pictures in the trip report
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr lurkers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The lovable "getting to know your portmgr" series makes its triumphant return&lt;/li&gt;
&lt;li&gt;This time around, they interview Alex, one of the portmgr lurkers that joined just this month&lt;/li&gt;
&lt;li&gt;"How would you describe yourself?" "Too lazy."&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/" target="_blank" rel="nofollow noopener"&gt;Another post&lt;/a&gt; includes a short interview with Emanuel, another new lurker&lt;/li&gt;
&lt;li&gt;We discussed the portmgr lurkers initiative with Steve Wills &lt;a href="http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice" target="_blank" rel="nofollow noopener"&gt;a while back&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support" target="_blank" rel="nofollow noopener"&gt;NetBSD's ARM port gets SMP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used&lt;/li&gt;
&lt;li&gt;This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X&lt;/li&gt;
&lt;li&gt;NetBSD's release team is working on getting these changes into the 7 branch before 7.0 is released&lt;/li&gt;
&lt;li&gt;There are also a few nice pictures in the article
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/" target="_blank" rel="nofollow noopener"&gt;A high performance mid-range NAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This blog post is about FreeNAS and optimizing iSCSI performance&lt;/li&gt;
&lt;li&gt;It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance&lt;/li&gt;
&lt;li&gt;There are some nice graphs and lots of detail if you're interested in tweaking some of your own settings&lt;/li&gt;
&lt;li&gt;They conclude "there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2xGCUj8mC" target="_blank" rel="nofollow noopener"&gt;Heto writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2SJ8xppDJ" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Ktl6BMk" target="_blank" rel="nofollow noopener"&gt;Tyler writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2AsrxU0ZQ" target="_blank" rel="nofollow noopener"&gt;Tim writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21yn0xLv2" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?t=141379917200003&amp;amp;r=1&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Suspicious contributions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141538800019451&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;La puissance du fromage&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html" target="_blank" rel="nofollow noopener"&gt;Nothing unusual here&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, mandoc, sysjail, mdocml, mdoc, mancgi, mult, random, arc4random, libressl, meetbsd, fortuna, yarrow, soekris, alix, apu, altq, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week&#39;s news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=273872" rel="nofollow">Updates to FreeBSD&#39;s random(4)</a></h3>

<ul>
<li>FreeBSD&#39;s random device, which presents itself as &quot;/dev/random&quot; to <a href="https://news.ycombinator.com/item?id=8550457" rel="nofollow">users</a>, has gotten a fairly major overhaul in -CURRENT</li>
<li>The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna</li>
<li>Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)</li>
<li>Pluggable modules can now be written to add more sources of entropy</li>
<li>These changes are expected to make it in 11.0-RELEASE, but there hasn&#39;t been any mention of MFCing them to 10 or 9
***</li>
</ul>

<h3><a href="https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html" rel="nofollow">OpenBSD Tor relays and network diversity</a></h3>

<ul>
<li>We&#39;ve talked about getting <a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd" rel="nofollow">more BSD-based Tor nodes</a> a few times in previous episodes</li>
<li>The &quot;tor-relays&quot; mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes</li>
<li>With the security features and attention to detail, it makes for an excellent dedicated Tor box</li>
<li>More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large</li>
<li>A few users are even saying they&#39;ll <em>convert their Linux nodes</em> to OpenBSD to help out</li>
<li>Check the archive for the full conversation, and maybe <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">run a node yourself</a> on any of the BSDs</li>
<li>The Tor wiki page on OpenBSD is pretty <a href="https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html" rel="nofollow">out of date</a> (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html" rel="nofollow">SSP now default for FreeBSD ports</a></h3>

<ul>
<li>SSP, or <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">Stack Smashing Protection</a>, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces</li>
<li>It&#39;s now enabled by default in FreeBSD&#39;s ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)</li>
<li>This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates</li>
<li>If you were using the temporary &quot;new Xorg&quot; or SSP package repositories instead of the default ones, you need to switch back over</li>
<li>NetBSD made this the default on i386 and amd64 <a href="https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html" rel="nofollow">two years ago</a> and OpenBSD made this the default on all architectures <a href="https://www.marc.info/?l=openbsd-cvs&m=103881967909595&w=2" rel="nofollow">twelve years ago</a></li>
<li>Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/" rel="nofollow">Building an OpenBSD firewall and router</a></h3>

<ul>
<li>While we&#39;ve discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side</li>
<li>The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris</li>
<li>Most agree that, if it&#39;s for a business especially, it&#39;s worth the extra money to go with something that&#39;s well known in the BSD community</li>
<li>They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.</li>
<li>Through the comments, we also find out that <strong>QuakeCon runs OpenBSD</strong> on their network</li>
<li>Hopefully most of our listeners are running some kind of BSD as their gateway - <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">try it out</a> if you haven&#39;t already
***</li>
</ul>

<h2>Interview - Kristaps Džonsons - <a href="mailto:kristaps@bsd.lv" rel="nofollow">kristaps@bsd.lv</a></h2>

<p>Mandoc, historical man pages, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router#queues" rel="nofollow">Throttling bandwidth with PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html" rel="nofollow">NetBSD at Kansai Open Forum 2014</a></h3>

<ul>
<li>Japanese NetBSD users invade yet another conference, demonstrating that they <strong>can and will</strong> install NetBSD <em>on everything</em></li>
<li>From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all</li>
<li>As always, you can find lots of pictures in the trip report
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The lovable &quot;getting to know your portmgr&quot; series makes its triumphant return</li>
<li>This time around, they interview Alex, one of the portmgr lurkers that joined just this month</li>
<li>&quot;How would you describe yourself?&quot; &quot;Too lazy.&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/" rel="nofollow">Another post</a> includes a short interview with Emanuel, another new lurker</li>
<li>We discussed the portmgr lurkers initiative with Steve Wills <a href="http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice" rel="nofollow">a while back</a>
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support" rel="nofollow">NetBSD&#39;s ARM port gets SMP</a></h3>

<ul>
<li>The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used</li>
<li>This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X</li>
<li>NetBSD&#39;s release team is working on getting these changes into the 7 branch before 7.0 is released</li>
<li>There are also a few nice pictures in the article
***</li>
</ul>

<h3><a href="http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/" rel="nofollow">A high performance mid-range NAS</a></h3>

<ul>
<li>This blog post is about FreeNAS and optimizing iSCSI performance</li>
<li>It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance</li>
<li>There are some nice graphs and lots of detail if you&#39;re interested in tweaking some of your own settings</li>
<li>They conclude &quot;there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload&quot;
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xGCUj8mC" rel="nofollow">Heto writes in</a></li>
<li><a href="http://slexy.org/view/s2SJ8xppDJ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s20Ktl6BMk" rel="nofollow">Tyler writes in</a></li>
<li><a href="http://slexy.org/view/s2AsrxU0ZQ" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s21yn0xLv2" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141379917200003&r=1&w=2" rel="nofollow">Suspicious contributions</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141538800019451&w=2" rel="nofollow">La puissance du fromage</a></li>
<li><a href="https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html" rel="nofollow">Nothing unusual here</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ve got an interview with Kristaps Džonsons, the creator of mandoc. He tells us how the project got started and what its current status is across the various BSDs. We also have a mini-tutorial on using PF to throttle bandwidth. This week&#39;s news, answers to your emails and even some cheesy mailing list gold, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=273872" rel="nofollow">Updates to FreeBSD&#39;s random(4)</a></h3>

<ul>
<li>FreeBSD&#39;s random device, which presents itself as &quot;/dev/random&quot; to <a href="https://news.ycombinator.com/item?id=8550457" rel="nofollow">users</a>, has gotten a fairly major overhaul in -CURRENT</li>
<li>The CSPRNG (cryptographically secure pseudo-random number generator) algorithm, Yarrow, now has a new alternative called Fortuna</li>
<li>Yarrow is still the default for now, but Fortuna can be used with a kernel option (and will likely be the new default in 11.0-RELEASE)</li>
<li>Pluggable modules can now be written to add more sources of entropy</li>
<li>These changes are expected to make it in 11.0-RELEASE, but there hasn&#39;t been any mention of MFCing them to 10 or 9
***</li>
</ul>

<h3><a href="https://lists.torproject.org/pipermail/tor-relays/2014-November/005661.html" rel="nofollow">OpenBSD Tor relays and network diversity</a></h3>

<ul>
<li>We&#39;ve talked about getting <a href="http://lists.nycbug.org/mailman/listinfo/tor-bsd" rel="nofollow">more BSD-based Tor nodes</a> a few times in previous episodes</li>
<li>The &quot;tor-relays&quot; mailing list has had some recent discussion about increasing diversity in the Tor network, specifically by adding more OpenBSD nodes</li>
<li>With the security features and attention to detail, it makes for an excellent dedicated Tor box</li>
<li>More and more adversaries are attacking Tor nodes, so having something that can withstand that will help the greater network at large</li>
<li>A few users are even saying they&#39;ll <em>convert their Linux nodes</em> to OpenBSD to help out</li>
<li>Check the archive for the full conversation, and maybe <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">run a node yourself</a> on any of the BSDs</li>
<li>The Tor wiki page on OpenBSD is pretty <a href="https://lists.torproject.org/pipermail/tor-dev/2014-November/007715.html" rel="nofollow">out of date</a> (nine years old!?) and uses the old pf syntax, maybe one of our listeners can modernize it
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-November/096344.html" rel="nofollow">SSP now default for FreeBSD ports</a></h3>

<ul>
<li>SSP, or <a href="https://en.wikipedia.org/wiki/Buffer_overflow_protection" rel="nofollow">Stack Smashing Protection</a>, is an additional layer of protection against buffer overflows that the compiler can give to the binaries it produces</li>
<li>It&#39;s now enabled by default in FreeBSD&#39;s ports tree, and the pkgng packages will have it as well - but only for amd64 (all supported releases) and i386 (10.0-RELEASE or newer)</li>
<li>This will only apply to regular ports and binary packages, not the quarterly branch that only receives security updates</li>
<li>If you were using the temporary &quot;new Xorg&quot; or SSP package repositories instead of the default ones, you need to switch back over</li>
<li>NetBSD made this the default on i386 and amd64 <a href="https://www.netbsd.org/releases/formal-6/NetBSD-6.0.html" rel="nofollow">two years ago</a> and OpenBSD made this the default on all architectures <a href="https://www.marc.info/?l=openbsd-cvs&m=103881967909595&w=2" rel="nofollow">twelve years ago</a></li>
<li>Next time you rebuild your ports, things should be automatically hardened without any extra steps or configuration needed
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/BSD/comments/2ld0yw/building_an_openbsd_firewall_and_router/" rel="nofollow">Building an OpenBSD firewall and router</a></h3>

<ul>
<li>While we&#39;ve discussed the software and configuration of an OpenBSD router, this Reddit thread focuses more on the hardware side</li>
<li>The OP lists some of his potential choices, but was originally looking for something a bit cheaper than a Soekris</li>
<li>Most agree that, if it&#39;s for a business especially, it&#39;s worth the extra money to go with something that&#39;s well known in the BSD community</li>
<li>They also list a few other popular alternatives: ALIX or the APU series from PC Engines, some Supermicro boards, etc.</li>
<li>Through the comments, we also find out that <strong>QuakeCon runs OpenBSD</strong> on their network</li>
<li>Hopefully most of our listeners are running some kind of BSD as their gateway - <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">try it out</a> if you haven&#39;t already
***</li>
</ul>

<h2>Interview - Kristaps Džonsons - <a href="mailto:kristaps@bsd.lv" rel="nofollow">kristaps@bsd.lv</a></h2>

<p>Mandoc, historical man pages, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router#queues" rel="nofollow">Throttling bandwidth with PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/11/08/msg000672.html" rel="nofollow">NetBSD at Kansai Open Forum 2014</a></h3>

<ul>
<li>Japanese NetBSD users invade yet another conference, demonstrating that they <strong>can and will</strong> install NetBSD <em>on everything</em></li>
<li>From a Raspberry Pi to SHARP Netwalkers to various luna68k devices, they had it all</li>
<li>As always, you can find lots of pictures in the trip report
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/11/04/getting-to-know-your-portmgr-lurker-ak/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The lovable &quot;getting to know your portmgr&quot; series makes its triumphant return</li>
<li>This time around, they interview Alex, one of the portmgr lurkers that joined just this month</li>
<li>&quot;How would you describe yourself?&quot; &quot;Too lazy.&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2014/11/08/getting-to-know-your-portmgr-lurker-ehaupt/" rel="nofollow">Another post</a> includes a short interview with Emanuel, another new lurker</li>
<li>We discussed the portmgr lurkers initiative with Steve Wills <a href="http://www.bsdnow.tv/episodes/2014_10_01-the_daemons_apprentice" rel="nofollow">a while back</a>
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/working_arm_multiprocessor_support" rel="nofollow">NetBSD&#39;s ARM port gets SMP</a></h3>

<ul>
<li>The ARM port of NetBSD now has SMP support, allowing more than one CPU to be used</li>
<li>This blog post on the website has a list of supported boards: Banana Pi, Cubieboard 2, Cubietruck, Merrii Hummingbird A31, CUBOX-I and NITROGEN6X</li>
<li>NetBSD&#39;s release team is working on getting these changes into the 7 branch before 7.0 is released</li>
<li>There are also a few nice pictures in the article
***</li>
</ul>

<h3><a href="http://pivotallabs.com/high-performing-mid-range-nas-server-part-2-performance-tuning-iscsi/" rel="nofollow">A high performance mid-range NAS</a></h3>

<ul>
<li>This blog post is about FreeNAS and optimizing iSCSI performance</li>
<li>It talks about using mid-range hardware with FreeNAS and different tunables you can change to affect performance</li>
<li>There are some nice graphs and lots of detail if you&#39;re interested in tweaking some of your own settings</li>
<li>They conclude &quot;there is no optimal configuration; rather, FreeNAS can be configured to suit a particular workload&quot;
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xGCUj8mC" rel="nofollow">Heto writes in</a></li>
<li><a href="http://slexy.org/view/s2SJ8xppDJ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s20Ktl6BMk" rel="nofollow">Tyler writes in</a></li>
<li><a href="http://slexy.org/view/s2AsrxU0ZQ" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s21yn0xLv2" rel="nofollow">Brad writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?t=141379917200003&r=1&w=2" rel="nofollow">Suspicious contributions</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141538800019451&w=2" rel="nofollow">La puissance du fromage</a></li>
<li><a href="https://mail-index.netbsd.org/tech-ports/2002/07/05/0000.html" rel="nofollow">Nothing unusual here</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>62: Gift from the Sun</title>
  <link>https://www.bsdnow.tv/62</link>
  <guid isPermaLink="false">1a099eb3-3c03-4d49-ba89-e6381381718d</guid>
  <pubDate>Wed, 05 Nov 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/1a099eb3-3c03-4d49-ba89-e6381381718d.mp3" length="24585844" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're away at MeetBSD this week, but we've still got a great show for you. We'll be joined by Pawel Dawidek, who's done quite a lot of things in FreeBSD over the years, including the initial ZFS port. We'll get to hear how that came about, what he's up to now and a whole lot more. We'll be back next week with a normal episode of BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>34:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're away at MeetBSD this week, but we've still got a great show for you. We'll be joined by Pawel Dawidek, who's done quite a lot of things in FreeBSD over the years, including the initial ZFS port. We'll get to hear how that came about, what he's up to now and a whole lot more. We'll be back next week with a normal episode of BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Pawel Jakub Dawidek - &lt;a href="mailto:pjd@freebsd.org" target="_blank" rel="nofollow noopener"&gt;pjd@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Porting ZFS, GEOM, GELI, Capsicum, various topics&lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, capsicum, geom, geli, openzfs, jails, solaris, illumos, opensolaris, openindiana, sun, oracle, meetbsd, meetbsdca, ixsystems</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re away at MeetBSD this week, but we&#39;ve still got a great show for you. We&#39;ll be joined by Pawel Dawidek, who&#39;s done quite a lot of things in FreeBSD over the years, including the initial ZFS port. We&#39;ll get to hear how that came about, what he&#39;s up to now and a whole lot more. We&#39;ll be back next week with a normal episode of BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Pawel Jakub Dawidek - <a href="mailto:pjd@freebsd.org" rel="nofollow">pjd@freebsd.org</a></h2>

<p>Porting ZFS, GEOM, GELI, Capsicum, various topics</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re away at MeetBSD this week, but we&#39;ve still got a great show for you. We&#39;ll be joined by Pawel Dawidek, who&#39;s done quite a lot of things in FreeBSD over the years, including the initial ZFS port. We&#39;ll get to hear how that came about, what he&#39;s up to now and a whole lot more. We&#39;ll be back next week with a normal episode of BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Pawel Jakub Dawidek - <a href="mailto:pjd@freebsd.org" rel="nofollow">pjd@freebsd.org</a></h2>

<p>Porting ZFS, GEOM, GELI, Capsicum, various topics</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>61: IPSECond Wind</title>
  <link>https://www.bsdnow.tv/61</link>
  <guid isPermaLink="false">a0bfab13-8167-4b68-b1de-74122013593a</guid>
  <pubDate>Wed, 29 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a0bfab13-8167-4b68-b1de-74122013593a.mp3" length="53960980" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD's IPSEC stack. We'll learn what he's adding, what needed to be fixed and how we'll benefit from the changes. As always, answers to your emails and all of this week's news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" target="_blank" rel="nofollow noopener"&gt;BSD panel at Phoenix LUG&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD&lt;/li&gt;
&lt;li&gt;It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience&lt;/li&gt;
&lt;li&gt;They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy&lt;/li&gt;
&lt;li&gt;It was a good "real world" example of things potential switchers are curious to know about&lt;/li&gt;
&lt;li&gt;They closed by concluding that more diversity is always better, and even if you've got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" target="_blank" rel="nofollow noopener"&gt;Book of PF signed copy auction&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Peter Hansteen (who we've &lt;a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" target="_blank" rel="nofollow noopener"&gt;had on the show&lt;/a&gt;) is auctioning off the first signed copy of the new Book of PF&lt;/li&gt;
&lt;li&gt;All the profits from the sale will go to the &lt;a href="http://www.openbsd.org/donations.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD Foundation&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD's versions (which still use ALTQ, among other differences)&lt;/li&gt;
&lt;li&gt;If you're interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;Michael Lucas&lt;/a&gt; has &lt;a href="https://www.marc.info/?l=openbsd-misc&amp;amp;m=141429413908567&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;challenged Peter&lt;/a&gt; to raise more for the foundation than his last book selling - let's see who wins&lt;/li&gt;
&lt;li&gt;Pause the episode, &lt;a href="http://www.ebay.com/itm/321563281902" target="_blank" rel="nofollow noopener"&gt;go bid on it&lt;/a&gt; and then come back!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation goes to EuroBSDCon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report&lt;/li&gt;
&lt;li&gt;They also sponsored four other developers to go&lt;/li&gt;
&lt;li&gt;The foundation was there "to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD"&lt;/li&gt;
&lt;li&gt;They also have &lt;a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" target="_blank" rel="nofollow noopener"&gt;a second report&lt;/a&gt; from Kamil Czekirda&lt;/li&gt;
&lt;li&gt;A total of $2000 was raised at the conference
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/56.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Note&lt;/strong&gt;: we're doing this story a couple days early - it's actually being released on November 1st (this Saturday), but we have next week off and didn't want to let this one slip through the cracks - it may be out by the time you're watching this&lt;/li&gt;
&lt;li&gt;Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6&lt;/li&gt;
&lt;li&gt;It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features&lt;/li&gt;
&lt;li&gt;5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it&lt;/li&gt;
&lt;li&gt;You can now hibernate your laptop when using a fully-encrypted filesystem (see &lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt; for that)&lt;/li&gt;
&lt;li&gt;ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed&lt;/li&gt;
&lt;li&gt;This will serve as a "transitional" release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to &lt;a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" target="_blank" rel="nofollow noopener"&gt;httpd&lt;/a&gt; and from BIND to Unbound&lt;/li&gt;
&lt;li&gt;Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions&lt;/li&gt;
&lt;li&gt;As always, 5.6 comes with its own &lt;a href="http://www.openbsd.org/lyrics.html#56" target="_blank" rel="nofollow noopener"&gt;song and artwork&lt;/a&gt; - the theme this time was obviously LibreSSL&lt;/li&gt;
&lt;li&gt;Be sure to check the &lt;a href="http://www.openbsd.org/plus56.html" target="_blank" rel="nofollow noopener"&gt;full changelog&lt;/a&gt; (&lt;em&gt;it's huge&lt;/em&gt;) and pick up &lt;a href="http://www.openbsd.org/orders.html" target="_blank" rel="nofollow noopener"&gt;a CD or tshirt&lt;/a&gt; to support their efforts&lt;/li&gt;
&lt;li&gt;If you don't already have the public key releases are signed with, getting a physical CD is a good "out of bounds" way to obtain it safely&lt;/li&gt;
&lt;li&gt;Here are some cool &lt;a href="https://imgur.com/a/5PtFe" target="_blank" rel="nofollow noopener"&gt;images of the set&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;After you do your installation or &lt;a href="http://www.openbsd.org/faq/upgrade56.html" target="_blank" rel="nofollow noopener"&gt;upgrade&lt;/a&gt;, don't forget to head over to &lt;a href="http://www.openbsd.org/errata56.html" target="_blank" rel="nofollow noopener"&gt;the errata page&lt;/a&gt; and apply any patches listed there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - John-Mark Gurney - &lt;a href="mailto:jmg@freebsd.org" target="_blank" rel="nofollow noopener"&gt;jmg@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/encthenet" target="_blank" rel="nofollow noopener"&gt;@encthenet&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Updating FreeBSD's IPSEC stack&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.dragonflydigest.com/2014/10/22/14942.html" target="_blank" rel="nofollow noopener"&gt;Clang in DragonFly BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64&lt;/li&gt;
&lt;li&gt;Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly&lt;/li&gt;
&lt;li&gt;We'd love to see more BSDs switch to Clang/LLVM eventually, it's a lot more modern than the old GCC most are using
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" target="_blank" rel="nofollow noopener"&gt;reallocarray(): integer overflow detection for free&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the less obvious features in OpenBSD 5.6 is a new libc function: "reallocarray()"&lt;/li&gt;
&lt;li&gt;It's a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost&lt;/li&gt;
&lt;li&gt;Theo and a few other developers have &lt;a href="https://secure.freshbsd.org/search?project=openbsd&amp;amp;q=reallocarray" target="_blank" rel="nofollow noopener"&gt;already started&lt;/a&gt; a mass audit of the entire source tree, replacing many instances with this new feature&lt;/li&gt;
&lt;li&gt;OpenBSD's explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bothsidesofthence.tumblr.com/" target="_blank" rel="nofollow noopener"&gt;Switching from Linux blog&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux&lt;/li&gt;
&lt;li&gt;After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)&lt;/li&gt;
&lt;li&gt;So far, he's put up a few posts about his initial thoughts, some documentation he's going through and his experiments so far&lt;/li&gt;
&lt;li&gt;It'll be an ongoing series, so we may check back in with him again later on
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" target="_blank" rel="nofollow noopener"&gt;Owncloud in a FreeNAS jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the most common emails we get is about running Owncloud in FreeNAS&lt;/li&gt;
&lt;li&gt;Now, finally, someone made a video on how to do just that, and it's even jailed&lt;/li&gt;
&lt;li&gt;A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend&lt;/li&gt;
&lt;li&gt;If you're looking for an easy way to back up and sync your files, this might be worth a watch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2XEsQdggZ" target="_blank" rel="nofollow noopener"&gt;Ernõ writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21EizH2aR" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s24SAJ5im6" target="_blank" rel="nofollow noopener"&gt;Kamil writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20ABZe0RD" target="_blank" rel="nofollow noopener"&gt;Torsten writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s208jQs9c6" target="_blank" rel="nofollow noopener"&gt;Dominik writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" target="_blank" rel="nofollow noopener"&gt;That's not our IP&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" target="_blank" rel="nofollow noopener"&gt;Is this thing on?&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ipsec, aes, gcm, chacha20, encryption, netsec, ike, openiked, infosec, 5.6, openhttpd, opensmtpd, meetbsd, book of pf, libressl, freenas, owncloud</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we sat down with John-Mark Gurney to talk about modernizing FreeBSD&#39;s IPSEC stack. We&#39;ll learn what he&#39;s adding, what needed to be fixed and how we&#39;ll benefit from the changes. As always, answers to your emails and all of this week&#39;s news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/watch?v=3AOF7fm-TJ0" rel="nofollow">BSD panel at Phoenix LUG</a></h3>

<ul>
<li>The Phoenix, Arizona Linux users group had a special panel so they could learn a bit more about BSD</li>
<li>It had one FreeBSD user and one OpenBSD user, and they answered questions from the organizer and the people in the audience</li>
<li>They covered a variety of topics, including filesystems, firewalls, different development models, licenses and philosophy</li>
<li>It was a good &quot;real world&quot; example of things potential switchers are curious to know about</li>
<li>They closed by concluding that more diversity is always better, and even if you&#39;ve got a lot of Linux boxes, putting a few BSD ones in the mix is a good idea
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/10/the-book-of-pf-3rd-edition-is-here.html" rel="nofollow">Book of PF signed copy auction</a></h3>

<ul>
<li>Peter Hansteen (who we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">had on the show</a>) is auctioning off the first signed copy of the new Book of PF</li>
<li>All the profits from the sale will go to the <a href="http://www.openbsd.org/donations.html" rel="nofollow">OpenBSD Foundation</a></li>
<li>The updated edition of the book includes all the latest pf syntax changes, but also provides examples for FreeBSD and NetBSD&#39;s versions (which still use ALTQ, among other differences)</li>
<li>If you&#39;re interested in firewalls, security or even just advanced networking, this book is a great one to have on your shelf - and the money will also go to a good cause</li>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a> has <a href="https://www.marc.info/?l=openbsd-misc&m=141429413908567&w=2" rel="nofollow">challenged Peter</a> to raise more for the foundation than his last book selling - let&#39;s see who wins</li>
<li>Pause the episode, <a href="http://www.ebay.com/itm/321563281902" rel="nofollow">go bid on it</a> and then come back!
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/10/freebsd-foundation-goes-to-eurobsdcon.html" rel="nofollow">FreeBSD Foundation goes to EuroBSDCon</a></h3>

<ul>
<li>Some people from the FreeBSD Foundation went to EuroBSDCon this year, and come back with a nice trip report</li>
<li>They also sponsored four other developers to go</li>
<li>The foundation was there &quot;to find out what people are working on, what kind of help they could use from the Foundation, feedback on what we can be doing to support the FreeBSD Project and community, and what features/functions people want supported in FreeBSD&quot;</li>
<li>They also have <a href="http://freebsdfoundation.blogspot.com/2014/10/eurobsdcon-trip-report-kamil-czekirda.html" rel="nofollow">a second report</a> from Kamil Czekirda</li>
<li>A total of $2000 was raised at the conference
***</li>
</ul>

<h3><a href="http://www.openbsd.org/56.html" rel="nofollow">OpenBSD 5.6 released</a></h3>

<ul>
<li><strong>Note</strong>: we&#39;re doing this story a couple days early - it&#39;s actually being released on November 1st (this Saturday), but we have next week off and didn&#39;t want to let this one slip through the cracks - it may be out by the time you&#39;re watching this</li>
<li>Continuing their always-on-time six month release cycle, the OpenBSD team has released version 5.6</li>
<li>It includes support for new hardware, lots of driver updates, network stack improvements (SMP, in particular) and new security features</li>
<li>5.6 is the first formal release with LibreSSL, their fork of OpenSSL, and lots of ports have been fixed to work with it</li>
<li>You can now hibernate your laptop when using a fully-encrypted filesystem (see <a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">our tutorial</a> for that)</li>
<li>ALTQ, Kerberos, Lynx, Bluetooth, TCP Wrappers and Apache were all removed</li>
<li>This will serve as a &quot;transitional&quot; release for a lot of services: moving from Sendmail to OpenSMTPD, from nginx to <a href="http://www.bsdnow.tv/episodes/2014_09_03-its_hammer_time" rel="nofollow">httpd</a> and from BIND to Unbound</li>
<li>Sendmail, nginx and BIND will be gone in the next release, so either migrate to the new stuff between now and then or switch to the ports versions</li>
<li>As always, 5.6 comes with its own <a href="http://www.openbsd.org/lyrics.html#56" rel="nofollow">song and artwork</a> - the theme this time was obviously LibreSSL</li>
<li>Be sure to check the <a href="http://www.openbsd.org/plus56.html" rel="nofollow">full changelog</a> (<em>it&#39;s huge</em>) and pick up <a href="http://www.openbsd.org/orders.html" rel="nofollow">a CD or tshirt</a> to support their efforts</li>
<li>If you don&#39;t already have the public key releases are signed with, getting a physical CD is a good &quot;out of bounds&quot; way to obtain it safely</li>
<li>Here are some cool <a href="https://imgur.com/a/5PtFe" rel="nofollow">images of the set</a></li>
<li>After you do your installation or <a href="http://www.openbsd.org/faq/upgrade56.html" rel="nofollow">upgrade</a>, don&#39;t forget to head over to <a href="http://www.openbsd.org/errata56.html" rel="nofollow">the errata page</a> and apply any patches listed there
***</li>
</ul>

<h2>Interview - John-Mark Gurney - <a href="mailto:jmg@freebsd.org" rel="nofollow">jmg@freebsd.org</a> / <a href="https://twitter.com/encthenet" rel="nofollow">@encthenet</a></h2>

<p>Updating FreeBSD&#39;s IPSEC stack</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.dragonflydigest.com/2014/10/22/14942.html" rel="nofollow">Clang in DragonFly BSD</a></h3>

<ul>
<li>As we all know, FreeBSD got rid of GCC in 10.0, and now uses Clang almost exclusively on i386/amd64</li>
<li>Some DragonFly developers are considering migrating over as well, and one of them is doing some work to make the OS more Clang-friendly</li>
<li>We&#39;d love to see more BSDs switch to Clang/LLVM eventually, it&#39;s a lot more modern than the old GCC most are using
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/28/reallocarray-in-openbsd-integer-overflow-detection-for-free/" rel="nofollow">reallocarray(): integer overflow detection for free</a></h3>

<ul>
<li>One of the less obvious features in OpenBSD 5.6 is a new libc function: &quot;reallocarray()&quot;</li>
<li>It&#39;s a replacement function for realloc(3) that provides integer overflow detection at basically no extra cost</li>
<li>Theo and a few other developers have <a href="https://secure.freshbsd.org/search?project=openbsd&q=reallocarray" rel="nofollow">already started</a> a mass audit of the entire source tree, replacing many instances with this new feature</li>
<li>OpenBSD&#39;s explicit_bzero was recently imported into FreeBSD, maybe someone could also port over this too
***</li>
</ul>

<h3><a href="http://bothsidesofthence.tumblr.com/" rel="nofollow">Switching from Linux blog</a></h3>

<ul>
<li>A listener of the show has started a new blog series, detailing his experiences in switching over to BSD from Linux</li>
<li>After over ten years of using Linux, he decided to give BSD a try after listening to our show (which is awesome)</li>
<li>So far, he&#39;s put up a few posts about his initial thoughts, some documentation he&#39;s going through and his experiments so far</li>
<li>It&#39;ll be an ongoing series, so we may check back in with him again later on
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=z6VQwOl4wE4" rel="nofollow">Owncloud in a FreeNAS jail</a></h3>

<ul>
<li>One of the most common emails we get is about running Owncloud in FreeNAS</li>
<li>Now, finally, someone made a video on how to do just that, and it&#39;s even jailed</li>
<li>A member of the FreeNAS community has uploaded a video on how to set it up, with lighttpd as the webserver backend</li>
<li>If you&#39;re looking for an easy way to back up and sync your files, this might be worth a watch
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2XEsQdggZ" rel="nofollow">Ernõ writes in</a></li>
<li><a href="http://slexy.org/view/s21EizH2aR" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s24SAJ5im6" rel="nofollow">Kamil writes in</a></li>
<li><a href="http://slexy.org/view/s20ABZe0RD" rel="nofollow">Torsten writes in</a></li>
<li><a href="http://slexy.org/view/s208jQs9c6" rel="nofollow">Dominik writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://mail-index.netbsd.org/source-changes/2014/10/17/msg059564.html" rel="nofollow">That&#39;s not our IP</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-acpi/2014-June/008644.html" rel="nofollow">Is this thing on?</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>60: Don't Buy a Router</title>
  <link>https://www.bsdnow.tv/60</link>
  <guid isPermaLink="false">e61941d1-74ff-40d0-91f6-86ff864cf99b</guid>
  <pubDate>Wed, 22 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e61941d1-74ff-40d0-91f6-86ff864cf99b.mp3" length="49443412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show we're joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We'll be discussing what the BSD Router Project is, what it's for and where it's going. All this week's headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" target="_blank" rel="nofollow noopener"&gt;BSD Devroom CFP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom&lt;/li&gt;
&lt;li&gt;They've issued a call for papers on anything BSD-related, and we always love more presentations&lt;/li&gt;
&lt;li&gt;If you're in the Belgium area or plan on going, submit a talk about something cool you're doing&lt;/li&gt;
&lt;li&gt;There's also &lt;a href="https://lists.fosdem.org/listinfo/bsd-devroom" target="_blank" rel="nofollow noopener"&gt;a mailing list&lt;/a&gt; and some more information in the original post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" target="_blank" rel="nofollow noopener"&gt;Bhyve SVM code merge&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The bhyve_svm code has been in the "projects" tree of FreeBSD, but is &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=273375" target="_blank" rel="nofollow noopener"&gt;now ready&lt;/a&gt; for -CURRENT&lt;/li&gt;
&lt;li&gt;This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only&lt;/li&gt;
&lt;li&gt;All the supported operating systems and utilities should work on both now&lt;/li&gt;
&lt;li&gt;One thing to note: bhyve doesn't support PCI passthrough on AMD just yet&lt;/li&gt;
&lt;li&gt;There may still be &lt;a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" target="_blank" rel="nofollow noopener"&gt;some issues&lt;/a&gt; though
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Open Source Conference Tokyo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Japanese NetBSD users group held a booth at another recent open source conference&lt;/li&gt;
&lt;li&gt;As always, they were running NetBSD on everything you can imagine&lt;/li&gt;
&lt;li&gt;One of the users reports back to the mailing list on their experience, providing lots of pictures and links&lt;/li&gt;
&lt;li&gt;Here's an interesting &lt;a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" target="_blank" rel="nofollow noopener"&gt;screenshot of NetBSD running various other BSDs in Xen&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" target="_blank" rel="nofollow noopener"&gt;More BSD switchers every day&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community&lt;/li&gt;
&lt;li&gt;Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect&lt;/li&gt;
&lt;li&gt;So far, he's found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion&lt;/li&gt;
&lt;li&gt;There's also &lt;a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" target="_blank" rel="nofollow noopener"&gt;another semi-related thread&lt;/a&gt; about another Linux user wanting to switch to BSD because of systemd and GNU people&lt;/li&gt;
&lt;li&gt;There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read&lt;/li&gt;
&lt;li&gt;Maybe the OPs should've just watched this show
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Olivier Cochard-Labbé - &lt;a href="mailto:olivier@cochard.me" target="_blank" rel="nofollow noopener"&gt;olivier@cochard.me&lt;/a&gt; / &lt;a href="https://twitter.com/ocochardlabbe" target="_blank" rel="nofollow noopener"&gt;@ocochardlabbe&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The BSD Router Project&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" target="_blank" rel="nofollow noopener"&gt;FreeBSD -CURRENT on a T420&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Thinkpads are quite popular with BSD developers and users&lt;/li&gt;
&lt;li&gt;Most of the hardware seems to be supported across the BSDs (especially wifi)&lt;/li&gt;
&lt;li&gt;This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI&lt;/li&gt;
&lt;li&gt;If you've got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" target="_blank" rel="nofollow noopener"&gt;FreeNAS on a Supermicro 5018A-MHN4&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More and more people are migrating their NAS devices to BSD-based solutions&lt;/li&gt;
&lt;li&gt;In this post, the author goes through setting up FreeNAS on some of his new hardware&lt;/li&gt;
&lt;li&gt;His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor&lt;/li&gt;
&lt;li&gt;The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" target="_blank" rel="nofollow noopener"&gt;Hardening procfs and linprocfs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux&lt;/li&gt;
&lt;li&gt;There exists a native procfs in FreeBSD, which was the target point of that exploit, but it's not used very often&lt;/li&gt;
&lt;li&gt;The Linux emulation layer also supports its own linprocfs, which was affected as well&lt;/li&gt;
&lt;li&gt;The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs&lt;/li&gt;
&lt;li&gt;If you want to learn more about ASLR and HardenedBSD, be sure to check out &lt;a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" target="_blank" rel="nofollow noopener"&gt;our interview with Shawn&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" target="_blank" rel="nofollow noopener"&gt;pfSense monitoring with bandwidthd&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A lot of people run pfSense on their home network, and it's really useful to monitor the bandwidth usage&lt;/li&gt;
&lt;li&gt;This article will walk you through setting up bandwidthd to do exactly that&lt;/li&gt;
&lt;li&gt;bandwidthd monitors based on the IP address, rather than per-interface&lt;/li&gt;
&lt;li&gt;It can also build some cool HTML graphs, and we love those pfSense graphs&lt;/li&gt;
&lt;li&gt;Have a look at our &lt;a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" target="_blank" rel="nofollow noopener"&gt;bandwidth monitoring and testing&lt;/a&gt; tutorial for some more ideas
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2b5ZZ5qCv" target="_blank" rel="nofollow noopener"&gt;Dave writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20aVvhv2d" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Vmwxy1QM" target="_blank" rel="nofollow noopener"&gt;Zeke writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2LB6MKoNT" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2xxB9uOuV" target="_blank" rel="nofollow noopener"&gt;Patrick writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-tech&amp;amp;m=141357595922692&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;More&lt;/a&gt; &lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141358124924479&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;old bugs&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.marc.info/?l=openbsd-cvs&amp;amp;m=141332534304117&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;The Right Font™&lt;/a&gt; (&lt;a href="https://twitter.com/blakkheim/status/522162864409546753" target="_blank" rel="nofollow noopener"&gt;see also&lt;/a&gt;)
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bsdrp, bsd router project, freenas, nas4free, router, gateway, firewall, pfsense, nanobsd, hardenedbsd, bhyve, devroom, fosdem</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;re joined by Olivier Cochard-Labbé, the creator of both FreeNAS and the BSD Router Project! We&#39;ll be discussing what the BSD Router Project is, what it&#39;s for and where it&#39;s going. All this week&#39;s headlines and answers to viewer-submitted questions, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.fosdem.org/pipermail/fosdem/2014-October/002038.html" rel="nofollow">BSD Devroom CFP</a></h3>

<ul>
<li>This year&#39;s FOSDEM conference (Belgium, Jan 31st - Feb 1st) is having a dedicated BSD devroom</li>
<li>They&#39;ve issued a call for papers on anything BSD-related, and we always love more presentations</li>
<li>If you&#39;re in the Belgium area or plan on going, submit a talk about something cool you&#39;re doing</li>
<li>There&#39;s also <a href="https://lists.fosdem.org/listinfo/bsd-devroom" rel="nofollow">a mailing list</a> and some more information in the original post
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002905.html" rel="nofollow">Bhyve SVM code merge</a></h3>

<ul>
<li>The bhyve_svm code has been in the &quot;projects&quot; tree of FreeBSD, but is <a href="https://svnweb.freebsd.org/base?view=revision&revision=273375" rel="nofollow">now ready</a> for -CURRENT</li>
<li>This changeset will finally allow bhyve to run on AMD CPUs, where it was previously limited to Intel only</li>
<li>All the supported operating systems and utilities should work on both now</li>
<li>One thing to note: bhyve doesn&#39;t support PCI passthrough on AMD just yet</li>
<li>There may still be <a href="https://lists.freebsd.org/pipermail/freebsd-virtualization/2014-October/002935.html" rel="nofollow">some issues</a> though
***</li>
</ul>

<h3><a href="https://mail-index.netbsd.org/netbsd-advocacy/2014/10/20/msg000671.html" rel="nofollow">NetBSD at Open Source Conference Tokyo</a></h3>

<ul>
<li>The Japanese NetBSD users group held a booth at another recent open source conference</li>
<li>As always, they were running NetBSD on everything you can imagine</li>
<li>One of the users reports back to the mailing list on their experience, providing lots of pictures and links</li>
<li>Here&#39;s an interesting <a href="https://pbs.twimg.com/media/B0NnfcbCEAAmKIU.jpg:large" rel="nofollow">screenshot of NetBSD running various other BSDs in Xen</a>
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/unix/comments/2il383/question_about_the_bsd_community_as_a_whole/" rel="nofollow">More BSD switchers every day</a></h3>

<ul>
<li>A decade-long Linux user is considering making the switch, and asks Reddit about the BSD community</li>
<li>Tired of the pointless bickering he sees in his current community, he asks if the same problems exist over here and what he should expect</li>
<li>So far, he&#39;s found that BSD people seem to act more level-headed about things, and are much more practical, whereas some FSF/GNU/GPL people make open source a religion</li>
<li>There&#39;s also <a href="https://www.reddit.com/r/BSD/comments/2jpxj9/question_about_the_current_state_of_freebsd/" rel="nofollow">another semi-related thread</a> about another Linux user wanting to switch to BSD because of systemd and GNU people</li>
<li>There are some extremely well written and thought-out comments in the replies (in both threads), be sure to give them all a read</li>
<li>Maybe the OPs should&#39;ve just watched this show
***</li>
</ul>

<h2>Interview - Olivier Cochard-Labbé - <a href="mailto:olivier@cochard.me" rel="nofollow">olivier@cochard.me</a> / <a href="https://twitter.com/ocochardlabbe" rel="nofollow">@ocochardlabbe</a></h2>

<p>The BSD Router Project</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.banym.de/freebsd/install-freebsd-11-on-thinkpad-t420" rel="nofollow">FreeBSD -CURRENT on a T420</a></h3>

<ul>
<li>Thinkpads are quite popular with BSD developers and users</li>
<li>Most of the hardware seems to be supported across the BSDs (especially wifi)</li>
<li>This article walks through installing FreeBSD -CURRENT on a Thinkpad T420 with UEFI</li>
<li>If you&#39;ve got a Thinkpad, or especially this specific one, have a look at some of the steps involved
***</li>
</ul>

<h3><a href="https://www.teckelworks.com/2014/10/building-a-freenas-server-with-a-supermicro-5018a-mhn4/" rel="nofollow">FreeNAS on a Supermicro 5018A-MHN4</a></h3>

<ul>
<li>More and more people are migrating their NAS devices to BSD-based solutions</li>
<li>In this post, the author goes through setting up FreeNAS on some of his new hardware</li>
<li>His new rack-mounted FreeNAS machine has a low power Atom with eight cores and 64GB of RAM - quite a lot for its small form factor</li>
<li>The rest of the post details all of the hardware he chose and goes through the build process (with lots of cool pictures)
***</li>
</ul>

<h3><a href="http://hardenedbsd.org/article/shawn-webb/2014-10-15/hardening-procfs-and-linprocfs" rel="nofollow">Hardening procfs and linprocfs</a></h3>

<ul>
<li>There was an exploit published recently for SFTP in OpenSSH, but it mostly just affected Linux</li>
<li>There exists a native procfs in FreeBSD, which was the target point of that exploit, but it&#39;s not used very often</li>
<li>The Linux emulation layer also supports its own linprocfs, which was affected as well</li>
<li>The HardenedBSD guys weigh in on how to best solve the problem, and now support an additional protection layer from writing to memory with procfs</li>
<li>If you want to learn more about ASLR and HardenedBSD, be sure to check out <a href="http://www.bsdnow.tv/episodes/2014_08_27-reverse_takeover" rel="nofollow">our interview with Shawn</a> too
***</li>
</ul>

<h3><a href="http://pfsensesetup.com/bandwidth-monitoring-with-bandwidthd/" rel="nofollow">pfSense monitoring with bandwidthd</a></h3>

<ul>
<li>A lot of people run pfSense on their home network, and it&#39;s really useful to monitor the bandwidth usage</li>
<li>This article will walk you through setting up bandwidthd to do exactly that</li>
<li>bandwidthd monitors based on the IP address, rather than per-interface</li>
<li>It can also build some cool HTML graphs, and we love those pfSense graphs</li>
<li>Have a look at our <a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">bandwidth monitoring and testing</a> tutorial for some more ideas
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2b5ZZ5qCv" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s20aVvhv2d" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2Vmwxy1QM" rel="nofollow">Zeke writes in</a></li>
<li><a href="http://slexy.org/view/s2LB6MKoNT" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2xxB9uOuV" rel="nofollow">Patrick writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://www.marc.info/?l=openbsd-tech&m=141357595922692&w=2" rel="nofollow">More</a> <a href="https://www.marc.info/?l=openbsd-cvs&m=141358124924479&w=2" rel="nofollow">old bugs</a></li>
<li><a href="https://www.marc.info/?l=openbsd-cvs&m=141332534304117&w=2" rel="nofollow">The Right Font™</a> (<a href="https://twitter.com/blakkheim/status/522162864409546753" rel="nofollow">see also</a>)
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>59: BSDって聞いたことある？</title>
  <link>https://www.bsdnow.tv/59</link>
  <guid isPermaLink="false">b1712d17-1c5f-4c0a-8722-3ad171336d67</guid>
  <pubDate>Wed, 15 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b1712d17-1c5f-4c0a-8722-3ad171336d67.mp3" length="57694324" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show we'll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos" target="_blank" rel="nofollow noopener"&gt;BSD talks at XDC 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's Xorg conference featured a few BSD-related talks&lt;/li&gt;
&lt;li&gt;Matthieu Herrb, &lt;a href="https://www.youtube.com/watch?v=KopgD4nTtnA" target="_blank" rel="nofollow noopener"&gt;Status of the OpenBSD graphics stack&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matthieu's talk details what's been done recently in Xenocara the OpenBSD kernel for graphics (&lt;a href="http://www.openbsd.org/papers/xdc2014-xenocara.pdf" target="_blank" rel="nofollow noopener"&gt;slides here&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Jean-Sébastien Pédron, &lt;a href="https://www.youtube.com/watch?v=POmxFleN3Bc" target="_blank" rel="nofollow noopener"&gt;The status of the graphics stack on FreeBSD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt;His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (&lt;a href="http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf" target="_blank" rel="nofollow noopener"&gt;slides here&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Francois Tigeot, &lt;a href="https://www.youtube.com/watch?v=NdM7_yPGFDk" target="_blank" rel="nofollow noopener"&gt;Porting DRM/KMS drivers to DragonFlyBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Francois' talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (&lt;a href="http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf" target="_blank" rel="nofollow noopener"&gt;slides here&lt;/a&gt;)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2014-07-2014-09.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Quarterly Status Report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD project has a report of their activities between July and September of this year&lt;/li&gt;
&lt;li&gt;Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform&lt;/li&gt;
&lt;li&gt;The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we've already covered most of the items on the show&lt;/li&gt;
&lt;li&gt;If you're interested in seeing what the FreeBSD community has been up to lately, check the full report - it's huge
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/" target="_blank" rel="nofollow noopener"&gt;Monitoring pfSense logs using ELK&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you&lt;/li&gt;
&lt;li&gt;ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs&lt;/li&gt;
&lt;li&gt;It works with lots of different things that output logs and can be sent to one central server for displaying&lt;/li&gt;
&lt;li&gt;This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=272840" target="_blank" rel="nofollow noopener"&gt;Some updates to IPFW&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW&lt;/li&gt;
&lt;li&gt;While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT&lt;/li&gt;
&lt;li&gt;The commit lists the user-visible changes, performance changes, ABI changes and internal changes&lt;/li&gt;
&lt;li&gt;It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE&lt;/li&gt;
&lt;li&gt;Also check &lt;a href="http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html" target="_blank" rel="nofollow noopener"&gt;this blog post&lt;/a&gt; for some more information and fancy graphs
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Hiroki Sato (佐藤広生) - &lt;a href="mailto:hrs@freebsd.org" target="_blank" rel="nofollow noopener"&gt;hrs@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/hiroki_sato" target="_blank" rel="nofollow noopener"&gt;@hiroki_sato&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD in Japan, technology conferences, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://virtual-ops.de/?p=600" target="_blank" rel="nofollow noopener"&gt;pfSense on Hyper-V&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In case you didn't know, the latest pfSense snapshots support running on Hyper-V&lt;/li&gt;
&lt;li&gt;Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now&lt;/li&gt;
&lt;li&gt;The author of the post tells about his experience running pfSense and gives lots of links to read if you're interested in doing the same&lt;/li&gt;
&lt;li&gt;He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/" target="_blank" rel="nofollow noopener"&gt;OpenBSD as a daily driver&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS&lt;/li&gt;
&lt;li&gt;The overall consensus is that it works great for that, stays out of your way and is quite reliable&lt;/li&gt;
&lt;li&gt;Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating&lt;/li&gt;
&lt;li&gt;If you're considering running OpenBSD as a "daily driver," check all the comments for more information and tips
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://secure.ciscodude.net/2014/10/09/firewall-log-stats/" target="_blank" rel="nofollow noopener"&gt;Getting PF log statistics&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs&lt;/li&gt;
&lt;li&gt;He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..&lt;/li&gt;
&lt;li&gt;He sets out to find the best way to gather firewall log statistics&lt;/li&gt;
&lt;li&gt;After coming across &lt;a href="http://www.pantz.org/software/pf/pantzpfblockstats.html" target="_blank" rel="nofollow noopener"&gt;a perl script&lt;/a&gt; to do this, he edited it a bit and is now a happy, lazy admin once again&lt;/li&gt;
&lt;li&gt;You can try out his updated PF script &lt;a href="https://github.com/tbaschak/Pantz-PFlog-Stats" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.nmedia.net/flashrd/" target="_blank" rel="nofollow noopener"&gt;FlashRD 1.7 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In case anyone's not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment&lt;/li&gt;
&lt;li&gt;This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building&lt;/li&gt;
&lt;li&gt;It also includes fixes for 4k drives and lots of various other improvements&lt;/li&gt;
&lt;li&gt;If you're interested in learning more, take a look at some of the slides and audio from the main developer on the website
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20XvSa4h0" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20lGUXW3d" target="_blank" rel="nofollow noopener"&gt;Don writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2al5DFIO7" target="_blank" rel="nofollow noopener"&gt;Andriy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203QoFuWs" target="_blank" rel="nofollow noopener"&gt;Richard writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s29WIplL6k" target="_blank" rel="nofollow noopener"&gt;Robert writes in&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Mailing List Gold&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=141271076115386&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Subtle trolling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://marc.info/?l=openbsd-cvs&amp;amp;m=141275713329601&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Old bugs with old fixes&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html" target="_blank" rel="nofollow noopener"&gt;A pig reinstall&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html" target="_blank" rel="nofollow noopener"&gt;Strange DOS-like environment&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, japan, japanese, 日本語, conference, hiroki sato, daichi goto, 後藤大地, 佐藤広生, allbsd, eurobsdcon, asiabsdcon, flashrd, freenas, pfsense, xdc2014</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos" rel="nofollow">BSD talks at XDC 2014</a></h3>

<ul>
<li>This year&#39;s Xorg conference featured a few BSD-related talks</li>
<li>Matthieu Herrb, <a href="https://www.youtube.com/watch?v=KopgD4nTtnA" rel="nofollow">Status of the OpenBSD graphics stack</a></li>
<li>Matthieu&#39;s talk details what&#39;s been done recently in Xenocara the OpenBSD kernel for graphics (<a href="http://www.openbsd.org/papers/xdc2014-xenocara.pdf" rel="nofollow">slides here</a>)</li>
<li>Jean-Sébastien Pédron, <a href="https://www.youtube.com/watch?v=POmxFleN3Bc" rel="nofollow">The status of the graphics stack on FreeBSD</a> </li>
<li>His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf" rel="nofollow">slides here</a>)</li>
<li>Francois Tigeot, <a href="https://www.youtube.com/watch?v=NdM7_yPGFDk" rel="nofollow">Porting DRM/KMS drivers to DragonFlyBSD</a></li>
<li>Francois&#39; talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf" rel="nofollow">slides here</a>)
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-07-2014-09.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The FreeBSD project has a report of their activities between July and September of this year</li>
<li>Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform</li>
<li>The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we&#39;ve already covered most of the items on the show</li>
<li>If you&#39;re interested in seeing what the FreeBSD community has been up to lately, check the full report - it&#39;s huge
***</li>
</ul>

<h3><a href="http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/" rel="nofollow">Monitoring pfSense logs using ELK</a></h3>

<ul>
<li>If you&#39;re one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you</li>
<li>ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs</li>
<li>It works with lots of different things that output logs and can be sent to one central server for displaying</li>
<li>This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=272840" rel="nofollow">Some updates to IPFW</a></h3>

<ul>
<li>Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW</li>
<li>While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT</li>
<li>The commit lists the user-visible changes, performance changes, ABI changes and internal changes</li>
<li>It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE</li>
<li>Also check <a href="http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html" rel="nofollow">this blog post</a> for some more information and fancy graphs
***</li>
</ul>

<h2>Interview - Hiroki Sato (佐藤広生) - <a href="mailto:hrs@freebsd.org" rel="nofollow">hrs@freebsd.org</a> / <a href="https://twitter.com/hiroki_sato" rel="nofollow">@hiroki_sato</a></h2>

<p>BSD in Japan, technology conferences, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://virtual-ops.de/?p=600" rel="nofollow">pfSense on Hyper-V</a></h3>

<ul>
<li>In case you didn&#39;t know, the latest pfSense snapshots support running on Hyper-V</li>
<li>Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now</li>
<li>The author of the post tells about his experience running pfSense and gives lots of links to read if you&#39;re interested in doing the same</li>
<li>He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/" rel="nofollow">OpenBSD as a daily driver</a></h3>

<ul>
<li>A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS</li>
<li>The overall consensus is that it works great for that, stays out of your way and is quite reliable</li>
<li>Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating</li>
<li>If you&#39;re considering running OpenBSD as a &quot;daily driver,&quot; check all the comments for more information and tips
***</li>
</ul>

<h3><a href="https://secure.ciscodude.net/2014/10/09/firewall-log-stats/" rel="nofollow">Getting PF log statistics</a></h3>

<ul>
<li>The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs</li>
<li>He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..</li>
<li>He sets out to find the best way to gather firewall log statistics</li>
<li>After coming across <a href="http://www.pantz.org/software/pf/pantzpfblockstats.html" rel="nofollow">a perl script</a> to do this, he edited it a bit and is now a happy, lazy admin once again</li>
<li>You can try out his updated PF script <a href="https://github.com/tbaschak/Pantz-PFlog-Stats" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.nmedia.net/flashrd/" rel="nofollow">FlashRD 1.7 released</a></h3>

<ul>
<li>In case anyone&#39;s not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment</li>
<li>This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building</li>
<li>It also includes fixes for 4k drives and lots of various other improvements</li>
<li>If you&#39;re interested in learning more, take a look at some of the slides and audio from the main developer on the website
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20XvSa4h0" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s20lGUXW3d" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s2al5DFIO7" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s203QoFuWs" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s29WIplL6k" rel="nofollow">Robert writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141271076115386&w=2" rel="nofollow">Subtle trolling</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141275713329601&w=2" rel="nofollow">Old bugs with old fixes</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html" rel="nofollow">A pig reinstall</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html" rel="nofollow">Strange DOS-like environment</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be talking with Hiroki Sato about the status of BSD in Japan. We also get to hear about how he got on the core team, and we just might find out why NetBSD is so popular over there! Answers to all your emails, the latest news, and even a brand new segment, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.youtube.com/channel/UCXlH5v1PkEhjzLFTUTm_U7g/videos" rel="nofollow">BSD talks at XDC 2014</a></h3>

<ul>
<li>This year&#39;s Xorg conference featured a few BSD-related talks</li>
<li>Matthieu Herrb, <a href="https://www.youtube.com/watch?v=KopgD4nTtnA" rel="nofollow">Status of the OpenBSD graphics stack</a></li>
<li>Matthieu&#39;s talk details what&#39;s been done recently in Xenocara the OpenBSD kernel for graphics (<a href="http://www.openbsd.org/papers/xdc2014-xenocara.pdf" rel="nofollow">slides here</a>)</li>
<li>Jean-Sébastien Pédron, <a href="https://www.youtube.com/watch?v=POmxFleN3Bc" rel="nofollow">The status of the graphics stack on FreeBSD</a> </li>
<li>His presentation gives a history of major changes and outlines the current overall status of graphics in FreeBSD (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014PedronFreeBSD/XDC-2014_FreeBSD.pdf" rel="nofollow">slides here</a>)</li>
<li>Francois Tigeot, <a href="https://www.youtube.com/watch?v=NdM7_yPGFDk" rel="nofollow">Porting DRM/KMS drivers to DragonFlyBSD</a></li>
<li>Francois&#39; talk tells the story of how he ported some of the DRM and KMS kernel drivers to DragonFly (<a href="http://www.x.org/wiki/Events/XDC2014/XDC2014TigeotDragonFlyBSD/XDC-2014_Porting_kms_drivers_to_DragonFly.pdf" rel="nofollow">slides here</a>)
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-07-2014-09.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The FreeBSD project has a report of their activities between July and September of this year</li>
<li>Lots of ARM work has been done, and a goal for 11.0 is tier one support for the platform</li>
<li>The release includes reports from the cluster admin team, release team, ports team, core team and much more, but we&#39;ve already covered most of the items on the show</li>
<li>If you&#39;re interested in seeing what the FreeBSD community has been up to lately, check the full report - it&#39;s huge
***</li>
</ul>

<h3><a href="http://elijahpaul.co.uk/monitoring-pfsense-2-1-logs-using-elk-logstash-kibana-elasticsearch/" rel="nofollow">Monitoring pfSense logs using ELK</a></h3>

<ul>
<li>If you&#39;re one of those people who loves the cool graphs and charts that pfSense can produce, this is the post for you</li>
<li>ELK (ElasticSearch, Logstash, Kibana) is a group of tools that let you collect, store, search and (most importantly) visualize logs</li>
<li>It works with lots of different things that output logs and can be sent to one central server for displaying</li>
<li>This post shows you how to set up pfSense to do remote logging to ELK and get some pretty awesome graphs
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=272840" rel="nofollow">Some updates to IPFW</a></h3>

<ul>
<li>Even though PF gets a lot of attention, a lot of FreeBSD people still love IPFW</li>
<li>While mostly a dormant section of the source tree, some updates were recently committed to -CURRENT</li>
<li>The commit lists the user-visible changes, performance changes, ABI changes and internal changes</li>
<li>It should be merged back to -STABLE after a month or so of testing, and will probably end up in 10.2-RELEASE</li>
<li>Also check <a href="http://blog.cochard.me/2014/10/ipfw-improvement-on-freebsd-current.html" rel="nofollow">this blog post</a> for some more information and fancy graphs
***</li>
</ul>

<h2>Interview - Hiroki Sato (佐藤広生) - <a href="mailto:hrs@freebsd.org" rel="nofollow">hrs@freebsd.org</a> / <a href="https://twitter.com/hiroki_sato" rel="nofollow">@hiroki_sato</a></h2>

<p>BSD in Japan, technology conferences, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://virtual-ops.de/?p=600" rel="nofollow">pfSense on Hyper-V</a></h3>

<ul>
<li>In case you didn&#39;t know, the latest pfSense snapshots support running on Hyper-V</li>
<li>Unfortunately, the current stable release is based on an old, unsupported FreeBSD 8.x base, so you have to use the snapshots for now</li>
<li>The author of the post tells about his experience running pfSense and gives lots of links to read if you&#39;re interested in doing the same</li>
<li>He also praises pfSense above other Linux-based solutions for its IPv6 support and high quality code
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/openbsd/comments/2isz24/openbsd_as_a_daily_driver/" rel="nofollow">OpenBSD as a daily driver</a></h3>

<ul>
<li>A curious Reddit user posts to ask the community about using OpenBSD as an everyday desktop OS</li>
<li>The overall consensus is that it works great for that, stays out of your way and is quite reliable</li>
<li>Caveats would include there being no Adobe Flash support (though others consider this a blessing..) and it requiring a more hands-on approach to updating</li>
<li>If you&#39;re considering running OpenBSD as a &quot;daily driver,&quot; check all the comments for more information and tips
***</li>
</ul>

<h3><a href="https://secure.ciscodude.net/2014/10/09/firewall-log-stats/" rel="nofollow">Getting PF log statistics</a></h3>

<ul>
<li>The author of this post runs an OpenBSD box in front of all his VMs at his colocation, and details his experiences with firewall logs</li>
<li>He usually investigates any IPs of interest with whois, nslookup, etc. - but this gets repetitive quickly, so..</li>
<li>He sets out to find the best way to gather firewall log statistics</li>
<li>After coming across <a href="http://www.pantz.org/software/pf/pantzpfblockstats.html" rel="nofollow">a perl script</a> to do this, he edited it a bit and is now a happy, lazy admin once again</li>
<li>You can try out his updated PF script <a href="https://github.com/tbaschak/Pantz-PFlog-Stats" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.nmedia.net/flashrd/" rel="nofollow">FlashRD 1.7 released</a></h3>

<ul>
<li>In case anyone&#39;s not familiar, flashrd is a tool to create OpenBSD images for embedded hardware devices, executing from a virtualized environment</li>
<li>This new version is based on (the currently unreleased) OpenBSD 5.6, and automatically adapts to the number of CPUs you have for building</li>
<li>It also includes fixes for 4k drives and lots of various other improvements</li>
<li>If you&#39;re interested in learning more, take a look at some of the slides and audio from the main developer on the website
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20XvSa4h0" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s20lGUXW3d" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s2al5DFIO7" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s203QoFuWs" rel="nofollow">Richard writes in</a></li>
<li><a href="http://slexy.org/view/s29WIplL6k" rel="nofollow">Robert writes in</a>
***</li>
</ul>

<h2>Mailing List Gold</h2>

<ul>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141271076115386&w=2" rel="nofollow">Subtle trolling</a></li>
<li><a href="https://marc.info/?l=openbsd-cvs&m=141275713329601&w=2" rel="nofollow">Old bugs with old fixes</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-ports/2014-October/095906.html" rel="nofollow">A pig reinstall</a></li>
<li><a href="https://lists.freebsd.org/pipermail/freebsd-doc/2014-October/024408.html" rel="nofollow">Strange DOS-like environment</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>58: Behind the Masq</title>
  <link>https://www.bsdnow.tv/58</link>
  <guid isPermaLink="false">987ec34a-a4f6-4c08-afa9-f39b542e05c5</guid>
  <pubDate>Wed, 08 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/987ec34a-a4f6-4c08-afa9-f39b542e05c5.mp3" length="54646708" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we'll be talking to Matt Ranney and George Kola about how they use FreeBSD at Voxer, and how to get more companies to switch over. After that, we'll show you how to filter website ads at the gateway level, using DNSMasq. All this week's news and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show, we'll be talking to Matt Ranney and George Kola about how they use FreeBSD at Voxer, and how to get more companies to switch over. After that, we'll show you how to filter website ads at the gateway level, using DNSMasq. All this week's news and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_developer_summit_at_eurobsdcon" target="_blank" rel="nofollow noopener"&gt;NetBSD's EuroBSDCon report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's EuroBSDCon had the record number of NetBSD developers attending&lt;/li&gt;
&lt;li&gt;The NetBSD guys had a small devsummit as well, and this blog post details some of their activities&lt;/li&gt;
&lt;li&gt;Pierre Pronchery also talked about EdgeBSD there (also see &lt;a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" target="_blank" rel="nofollow noopener"&gt;our interview&lt;/a&gt; if you haven't already)&lt;/li&gt;
&lt;li&gt;Hopefully this trend continues, and NetBSD starts to have even more of a presence at the conferences
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lteo.net/blog/2014/10/01/a-sneak-peek-at-the-upcoming-openbsd-5-dot-6-release/" target="_blank" rel="nofollow noopener"&gt;Upcoming features in OpenBSD 5.6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD 5.6 is to be released in just under a month from now, and one of the developers wrote a blog post about some of the new features&lt;/li&gt;
&lt;li&gt;The post is mostly a collection of various links, many of which we've discussed before&lt;/li&gt;
&lt;li&gt;It'll be the first version with LibreSSL and many other cool things&lt;/li&gt;
&lt;li&gt;We will, of course, have all the details on the day of release&lt;/li&gt;
&lt;li&gt;There are some good &lt;a href="https://news.ycombinator.com/item?id=8413028" target="_blank" rel="nofollow noopener"&gt;comments&lt;/a&gt; on hacker news about 5.6 as well 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.prnewswire.com/news-releases/cavium-to-sponsor-freebsd-armv8-based-implementation-277724361.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD ARMv8-based implementation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation is sponsoring some work to port FreeBSD to the new ThunderX ARM CPU family&lt;/li&gt;
&lt;li&gt;With the potential to have up to 48 cores, this type of CPU might make ARM-based servers a more appealing option&lt;/li&gt;
&lt;li&gt;Cavium, the company involved with this deal, seems to have lots of BSD fans&lt;/li&gt;
&lt;li&gt;This collaboration is expected to result in Tier 1 recognition of the ARMv8 architecture
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://marc.info/?l=openbsd-ports&amp;amp;m=141235737615585&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Updating orphaned OpenBSD ports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We discussed OpenBSD porting over portscout from FreeBSD a while back&lt;/li&gt;
&lt;li&gt;Their ports team is making full use of it now, and they're also looking for people to help update some unmaintained ports&lt;/li&gt;
&lt;li&gt;A new subdomain, &lt;a href="http://portroach.openbsd.org/" target="_blank" rel="nofollow noopener"&gt;portroach.openbsd.org&lt;/a&gt;, will let you view all the ports information easily&lt;/li&gt;
&lt;li&gt;If you're interested in learning to port software, or just want to help update a port you use, this is a good chance to get involved
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Matt Ranney &amp;amp; George Kola - &lt;a href="mailto:mjr@ranney.com" target="_blank" rel="nofollow noopener"&gt;mjr@ranney.com&lt;/a&gt; &amp;amp; &lt;a href="mailto:george.kola@voxer.com" target="_blank" rel="nofollow noopener"&gt;george.kola@voxer.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD at Voxer, companies switching from Linux, community interaction&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/dnsmasq" target="_blank" rel="nofollow noopener"&gt;Adblocking with DNSMasq &amp;amp; Pixelserv&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://ghostbsd.org/4.0-release" target="_blank" rel="nofollow noopener"&gt;GhostBSD 4.0 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The 4.0 branch of GhostBSD has finally been released, based on FreeBSD 10&lt;/li&gt;
&lt;li&gt;With it come all the big 10.0 changes: clang instead of gcc, pkgng by default, make replaced by bmake&lt;/li&gt;
&lt;li&gt;Mate is now the default desktop, with different workstation styles to choose from
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ypnose.org/blog/2014/newbrute-pf.html" target="_blank" rel="nofollow noopener"&gt;Reports from PF about banned IPs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you run any kind of public-facing server, you've probably seen your logs fill up with unwanted traffic&lt;/li&gt;
&lt;li&gt;This is especially true if you run SSH on port 22, which the author of this post seems to&lt;/li&gt;
&lt;li&gt;A lot can be done with just PF and some brute force tables&lt;/li&gt;
&lt;li&gt;He goes through some different options for blocking Chinese IPs and break-in attempts&lt;/li&gt;
&lt;li&gt;It includes a useful script he wrote to get reports about the IPs being blocked via email
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_5_and" target="_blank" rel="nofollow noopener"&gt;NetBSD 6.1.5 and 6.0.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The 6.1 and 6.0 branches of NetBSD got some updates&lt;/li&gt;
&lt;li&gt;They include a number of security and stability fixes - plenty of OpenSSL mentions&lt;/li&gt;
&lt;li&gt;Various panics and other small bugs also got fixed
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2014-October/000119.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.7 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After a long delay, OpenSSH 6.7 has finally been released&lt;/li&gt;
&lt;li&gt;Major internal refactoring has been done to make part of OpenSSH usable as a library&lt;/li&gt;
&lt;li&gt;SFTP transfers can now be resumed&lt;/li&gt;
&lt;li&gt;Lots of bug fixes, a few more new features - check the release notes for all the details&lt;/li&gt;
&lt;li&gt;This release disables some insecure ciphers by default, so keep that in mind if you connect with legacy clients that use Arcfour or CBC modes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s218tT9C7v" target="_blank" rel="nofollow noopener"&gt;Andriy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2WY5R5e0l" target="_blank" rel="nofollow noopener"&gt;Karl writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20z8MPBVw" target="_blank" rel="nofollow noopener"&gt;Possnfiffer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21h2Yx5al" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21xu9U0qt" target="_blank" rel="nofollow noopener"&gt;Solomon writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, voxer, whatsapp, dnsmasq, pixelserv, ad blocking, adblock plus, advertisements, malware, linux vs bsd, differences, linux, arm, eurobsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking to Matt Ranney and George Kola about how they use FreeBSD at Voxer, and how to get more companies to switch over. After that, we&#39;ll show you how to filter website ads at the gateway level, using DNSMasq. All this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_developer_summit_at_eurobsdcon" rel="nofollow">NetBSD&#39;s EuroBSDCon report</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon had the record number of NetBSD developers attending</li>
<li>The NetBSD guys had a small devsummit as well, and this blog post details some of their activities</li>
<li>Pierre Pronchery also talked about EdgeBSD there (also see <a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" rel="nofollow">our interview</a> if you haven&#39;t already)</li>
<li>Hopefully this trend continues, and NetBSD starts to have even more of a presence at the conferences
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/01/a-sneak-peek-at-the-upcoming-openbsd-5-dot-6-release/" rel="nofollow">Upcoming features in OpenBSD 5.6</a></h3>

<ul>
<li>OpenBSD 5.6 is to be released in just under a month from now, and one of the developers wrote a blog post about some of the new features</li>
<li>The post is mostly a collection of various links, many of which we&#39;ve discussed before</li>
<li>It&#39;ll be the first version with LibreSSL and many other cool things</li>
<li>We will, of course, have all the details on the day of release</li>
<li>There are some good <a href="https://news.ycombinator.com/item?id=8413028" rel="nofollow">comments</a> on hacker news about 5.6 as well 
***</li>
</ul>

<h3><a href="http://www.prnewswire.com/news-releases/cavium-to-sponsor-freebsd-armv8-based-implementation-277724361.html" rel="nofollow">FreeBSD ARMv8-based implementation</a></h3>

<ul>
<li>The FreeBSD foundation is sponsoring some work to port FreeBSD to the new ThunderX ARM CPU family</li>
<li>With the potential to have up to 48 cores, this type of CPU might make ARM-based servers a more appealing option</li>
<li>Cavium, the company involved with this deal, seems to have lots of BSD fans</li>
<li>This collaboration is expected to result in Tier 1 recognition of the ARMv8 architecture
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-ports&m=141235737615585&w=2" rel="nofollow">Updating orphaned OpenBSD ports</a></h3>

<ul>
<li>We discussed OpenBSD porting over portscout from FreeBSD a while back</li>
<li>Their ports team is making full use of it now, and they&#39;re also looking for people to help update some unmaintained ports</li>
<li>A new subdomain, <a href="http://portroach.openbsd.org/" rel="nofollow">portroach.openbsd.org</a>, will let you view all the ports information easily</li>
<li>If you&#39;re interested in learning to port software, or just want to help update a port you use, this is a good chance to get involved
***</li>
</ul>

<h2>Interview - Matt Ranney &amp; George Kola - <a href="mailto:mjr@ranney.com" rel="nofollow">mjr@ranney.com</a> &amp; <a href="mailto:george.kola@voxer.com" rel="nofollow">george.kola@voxer.com</a></h2>

<p>BSD at Voxer, companies switching from Linux, community interaction</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnsmasq" rel="nofollow">Adblocking with DNSMasq &amp; Pixelserv</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://ghostbsd.org/4.0-release" rel="nofollow">GhostBSD 4.0 released</a></h3>

<ul>
<li>The 4.0 branch of GhostBSD has finally been released, based on FreeBSD 10</li>
<li>With it come all the big 10.0 changes: clang instead of gcc, pkgng by default, make replaced by bmake</li>
<li>Mate is now the default desktop, with different workstation styles to choose from
***</li>
</ul>

<h3><a href="http://ypnose.org/blog/2014/newbrute-pf.html" rel="nofollow">Reports from PF about banned IPs</a></h3>

<ul>
<li>If you run any kind of public-facing server, you&#39;ve probably seen your logs fill up with unwanted traffic</li>
<li>This is especially true if you run SSH on port 22, which the author of this post seems to</li>
<li>A lot can be done with just PF and some brute force tables</li>
<li>He goes through some different options for blocking Chinese IPs and break-in attempts</li>
<li>It includes a useful script he wrote to get reports about the IPs being blocked via email
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_5_and" rel="nofollow">NetBSD 6.1.5 and 6.0.6 released</a></h3>

<ul>
<li>The 6.1 and 6.0 branches of NetBSD got some updates</li>
<li>They include a number of security and stability fixes - plenty of OpenSSL mentions</li>
<li>Various panics and other small bugs also got fixed
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2014-October/000119.html" rel="nofollow">OpenSSH 6.7 released</a></h3>

<ul>
<li>After a long delay, OpenSSH 6.7 has finally been released</li>
<li>Major internal refactoring has been done to make part of OpenSSH usable as a library</li>
<li>SFTP transfers can now be resumed</li>
<li>Lots of bug fixes, a few more new features - check the release notes for all the details</li>
<li>This release disables some insecure ciphers by default, so keep that in mind if you connect with legacy clients that use Arcfour or CBC modes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s218tT9C7v" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s2WY5R5e0l" rel="nofollow">Karl writes in</a></li>
<li><a href="http://slexy.org/view/s20z8MPBVw" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s21h2Yx5al" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21xu9U0qt" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ll be talking to Matt Ranney and George Kola about how they use FreeBSD at Voxer, and how to get more companies to switch over. After that, we&#39;ll show you how to filter website ads at the gateway level, using DNSMasq. All this week&#39;s news and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_developer_summit_at_eurobsdcon" rel="nofollow">NetBSD&#39;s EuroBSDCon report</a></h3>

<ul>
<li>This year&#39;s EuroBSDCon had the record number of NetBSD developers attending</li>
<li>The NetBSD guys had a small devsummit as well, and this blog post details some of their activities</li>
<li>Pierre Pronchery also talked about EdgeBSD there (also see <a href="http://www.bsdnow.tv/episodes/2014_04_01-edgy_bsd_users" rel="nofollow">our interview</a> if you haven&#39;t already)</li>
<li>Hopefully this trend continues, and NetBSD starts to have even more of a presence at the conferences
***</li>
</ul>

<h3><a href="http://lteo.net/blog/2014/10/01/a-sneak-peek-at-the-upcoming-openbsd-5-dot-6-release/" rel="nofollow">Upcoming features in OpenBSD 5.6</a></h3>

<ul>
<li>OpenBSD 5.6 is to be released in just under a month from now, and one of the developers wrote a blog post about some of the new features</li>
<li>The post is mostly a collection of various links, many of which we&#39;ve discussed before</li>
<li>It&#39;ll be the first version with LibreSSL and many other cool things</li>
<li>We will, of course, have all the details on the day of release</li>
<li>There are some good <a href="https://news.ycombinator.com/item?id=8413028" rel="nofollow">comments</a> on hacker news about 5.6 as well 
***</li>
</ul>

<h3><a href="http://www.prnewswire.com/news-releases/cavium-to-sponsor-freebsd-armv8-based-implementation-277724361.html" rel="nofollow">FreeBSD ARMv8-based implementation</a></h3>

<ul>
<li>The FreeBSD foundation is sponsoring some work to port FreeBSD to the new ThunderX ARM CPU family</li>
<li>With the potential to have up to 48 cores, this type of CPU might make ARM-based servers a more appealing option</li>
<li>Cavium, the company involved with this deal, seems to have lots of BSD fans</li>
<li>This collaboration is expected to result in Tier 1 recognition of the ARMv8 architecture
***</li>
</ul>

<h3><a href="https://marc.info/?l=openbsd-ports&m=141235737615585&w=2" rel="nofollow">Updating orphaned OpenBSD ports</a></h3>

<ul>
<li>We discussed OpenBSD porting over portscout from FreeBSD a while back</li>
<li>Their ports team is making full use of it now, and they&#39;re also looking for people to help update some unmaintained ports</li>
<li>A new subdomain, <a href="http://portroach.openbsd.org/" rel="nofollow">portroach.openbsd.org</a>, will let you view all the ports information easily</li>
<li>If you&#39;re interested in learning to port software, or just want to help update a port you use, this is a good chance to get involved
***</li>
</ul>

<h2>Interview - Matt Ranney &amp; George Kola - <a href="mailto:mjr@ranney.com" rel="nofollow">mjr@ranney.com</a> &amp; <a href="mailto:george.kola@voxer.com" rel="nofollow">george.kola@voxer.com</a></h2>

<p>BSD at Voxer, companies switching from Linux, community interaction</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnsmasq" rel="nofollow">Adblocking with DNSMasq &amp; Pixelserv</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://ghostbsd.org/4.0-release" rel="nofollow">GhostBSD 4.0 released</a></h3>

<ul>
<li>The 4.0 branch of GhostBSD has finally been released, based on FreeBSD 10</li>
<li>With it come all the big 10.0 changes: clang instead of gcc, pkgng by default, make replaced by bmake</li>
<li>Mate is now the default desktop, with different workstation styles to choose from
***</li>
</ul>

<h3><a href="http://ypnose.org/blog/2014/newbrute-pf.html" rel="nofollow">Reports from PF about banned IPs</a></h3>

<ul>
<li>If you run any kind of public-facing server, you&#39;ve probably seen your logs fill up with unwanted traffic</li>
<li>This is especially true if you run SSH on port 22, which the author of this post seems to</li>
<li>A lot can be done with just PF and some brute force tables</li>
<li>He goes through some different options for blocking Chinese IPs and break-in attempts</li>
<li>It includes a useful script he wrote to get reports about the IPs being blocked via email
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_5_and" rel="nofollow">NetBSD 6.1.5 and 6.0.6 released</a></h3>

<ul>
<li>The 6.1 and 6.0 branches of NetBSD got some updates</li>
<li>They include a number of security and stability fixes - plenty of OpenSSL mentions</li>
<li>Various panics and other small bugs also got fixed
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-announce/2014-October/000119.html" rel="nofollow">OpenSSH 6.7 released</a></h3>

<ul>
<li>After a long delay, OpenSSH 6.7 has finally been released</li>
<li>Major internal refactoring has been done to make part of OpenSSH usable as a library</li>
<li>SFTP transfers can now be resumed</li>
<li>Lots of bug fixes, a few more new features - check the release notes for all the details</li>
<li>This release disables some insecure ciphers by default, so keep that in mind if you connect with legacy clients that use Arcfour or CBC modes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s218tT9C7v" rel="nofollow">Andriy writes in</a></li>
<li><a href="http://slexy.org/view/s2WY5R5e0l" rel="nofollow">Karl writes in</a></li>
<li><a href="http://slexy.org/view/s20z8MPBVw" rel="nofollow">Possnfiffer writes in</a></li>
<li><a href="http://slexy.org/view/s21h2Yx5al" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21xu9U0qt" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>57: The Daemon's Apprentice</title>
  <link>https://www.bsdnow.tv/57</link>
  <guid isPermaLink="false">fe6cb8d4-b1ab-4260-a466-435ed66e003f</guid>
  <pubDate>Wed, 01 Oct 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/fe6cb8d4-b1ab-4260-a466-435ed66e003f.mp3" length="65007508" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from EuroBSDCon! This week we'll be talking with Steve Wills about mentoring new BSD developers. If you've ever considered becoming a developer or helping out, it's actually really easy to get involved. We've also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:17</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back from EuroBSDCon! This week we'll be talking with Steve Wills about mentoring new BSD developers. If you've ever considered becoming a developer or helping out, it's actually really easy to get involved. We've also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/09/26/msg000669.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Hiroshima Open Source Conference&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD developers are hard at work, putting NetBSD on everything they can find&lt;/li&gt;
&lt;li&gt;At a technology conference in Hiroshima, some developers brought their exotic machines to put on display&lt;/li&gt;
&lt;li&gt;As usual, there are lots of pictures and a nice report from the conference
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?limit_changes=0&amp;amp;view=revision&amp;amp;revision=368845" target="_blank" rel="nofollow noopener"&gt;FreeBSD's Linux emulation overhaul&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For a long time, FreeBSD's emulation layer has been based on an ancient Fedora 10 system&lt;/li&gt;
&lt;li&gt;If you've ever needed to install Adobe Flash on BSD, you'll be stuck with all this extra junk&lt;/li&gt;
&lt;li&gt;With some recent work, that's been replaced with a recent CentOS release&lt;/li&gt;
&lt;li&gt;This opens up the door for newer versions of Skype to run on FreeBSD, and maybe even Steam someday
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1449" target="_blank" rel="nofollow noopener"&gt;pfSense 2.2-BETA&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Big changes are coming in pfSense land, with their upcoming 2.2 release&lt;/li&gt;
&lt;li&gt;We &lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;talked to the developer&lt;/a&gt; a while back about future plans, and now they're finally out there&lt;/li&gt;
&lt;li&gt;The 2.2 branch will be based on FreeBSD 10-STABLE (instead of 8.3) and include lots of performance fixes&lt;/li&gt;
&lt;li&gt;It also includes some security updates, lots of package changes and updates and much more&lt;/li&gt;
&lt;li&gt;You can check the &lt;a href="https://doc.pfsense.org/index.php/2.2_New_Features_and_Changes" target="_blank" rel="nofollow noopener"&gt;full list of changes&lt;/a&gt; on their wiki
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.cambus.net/netbsd-on-the-raspberry-pi/" target="_blank" rel="nofollow noopener"&gt;NetBSD on the Raspberry Pi&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This article shows how you can install NetBSD on the ever-so-popular Raspberry Pi&lt;/li&gt;
&lt;li&gt;As of right now, you'll need to use a -CURRENT snapshot to do it&lt;/li&gt;
&lt;li&gt;It also shows how to grow the filesystem to fill up an SD card, some pkgsrc basics and how to get some initial things set up&lt;/li&gt;
&lt;li&gt;Can anyone find something that you can't install NetBSD on?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Steve Wills - &lt;a href="mailto:swills@freebsd.org" target="_blank" rel="nofollow noopener"&gt;swills@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/swills" target="_blank" rel="nofollow noopener"&gt;@swills&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Mentoring new BSD developers&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.midnightbsd.org/notes/" target="_blank" rel="nofollow noopener"&gt;MidnightBSD 0.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We don't hear a whole lot about MidnightBSD, but they've just released version 0.5&lt;/li&gt;
&lt;li&gt;It's got a round of the latest FreeBSD security patches, driver updates and various small things&lt;/li&gt;
&lt;li&gt;Maybe one of their developers could come on the show sometime and tell us more about the project
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.52/" target="_blank" rel="nofollow noopener"&gt;BSD Router Project 1.52 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The newest update for the BSD Router Project is out&lt;/li&gt;
&lt;li&gt;This version is based on a snapshot of 10-STABLE that's very close to 10.1-RELEASE&lt;/li&gt;
&lt;li&gt;It's mostly a bugfix release, but includes some small changes and package updates
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflydigest.com/2014/09/19/14751.html" target="_blank" rel="nofollow noopener"&gt;Configuring a DragonFly BSD desktop&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've done tutorials on how to set up a FreeBSD or OpenBSD desktop, but maybe you're more interested in DragonFly&lt;/li&gt;
&lt;li&gt;In this post from Justin Sherrill, you'll learn some of the steps to do just that&lt;/li&gt;
&lt;li&gt;He pulled out an old desktop machine, gave it a try and seems to be pleased with the results&lt;/li&gt;
&lt;li&gt;It includes a few Xorg tips, and there are some comments about the possibility of making a GUI DragonFly installer
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://pakitong.blogspot.com/2014/09/jetway-j7f2-four-lan-mini-itx-for.html" target="_blank" rel="nofollow noopener"&gt;Building a mini-ITX pfSense box&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another week, another pfSense firewall build post&lt;/li&gt;
&lt;li&gt;This time, the author is installing to a Jetway J7F2, a mini-ITX device with four LAN ports&lt;/li&gt;
&lt;li&gt;He used to be a m0n0wall guy, but wanted to give the more modern pfSense a try&lt;/li&gt;
&lt;li&gt;Lots of great pictures of the hardware, which we always love
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2184TfOKD" target="_blank" rel="nofollow noopener"&gt;Damian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20uAdTwLv" target="_blank" rel="nofollow noopener"&gt;Jan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20es52IgZ" target="_blank" rel="nofollow noopener"&gt;Dale writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2mjulpac6" target="_blank" rel="nofollow noopener"&gt;Joe writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2BvNC8cgi" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, eurobsdcon, 2014, presentation, talk, steve wills, mentoring, developers, community, ports, bsdrp, bash, linux, exploit, pfsense, devsummit, shellshock</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from EuroBSDCon! This week we&#39;ll be talking with Steve Wills about mentoring new BSD developers. If you&#39;ve ever considered becoming a developer or helping out, it&#39;s actually really easy to get involved. We&#39;ve also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/09/26/msg000669.html" rel="nofollow">NetBSD at Hiroshima Open Source Conference</a></h3>

<ul>
<li>NetBSD developers are hard at work, putting NetBSD on everything they can find</li>
<li>At a technology conference in Hiroshima, some developers brought their exotic machines to put on display</li>
<li>As usual, there are lots of pictures and a nice report from the conference
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?limit_changes=0&view=revision&revision=368845" rel="nofollow">FreeBSD&#39;s Linux emulation overhaul</a></h3>

<ul>
<li>For a long time, FreeBSD&#39;s emulation layer has been based on an ancient Fedora 10 system</li>
<li>If you&#39;ve ever needed to install Adobe Flash on BSD, you&#39;ll be stuck with all this extra junk</li>
<li>With some recent work, that&#39;s been replaced with a recent CentOS release</li>
<li>This opens up the door for newer versions of Skype to run on FreeBSD, and maybe even Steam someday
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1449" rel="nofollow">pfSense 2.2-BETA</a></h3>

<ul>
<li>Big changes are coming in pfSense land, with their upcoming 2.2 release</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">talked to the developer</a> a while back about future plans, and now they&#39;re finally out there</li>
<li>The 2.2 branch will be based on FreeBSD 10-STABLE (instead of 8.3) and include lots of performance fixes</li>
<li>It also includes some security updates, lots of package changes and updates and much more</li>
<li>You can check the <a href="https://doc.pfsense.org/index.php/2.2_New_Features_and_Changes" rel="nofollow">full list of changes</a> on their wiki
***</li>
</ul>

<h3><a href="http://www.cambus.net/netbsd-on-the-raspberry-pi/" rel="nofollow">NetBSD on the Raspberry Pi</a></h3>

<ul>
<li>This article shows how you can install NetBSD on the ever-so-popular Raspberry Pi</li>
<li>As of right now, you&#39;ll need to use a -CURRENT snapshot to do it</li>
<li>It also shows how to grow the filesystem to fill up an SD card, some pkgsrc basics and how to get some initial things set up</li>
<li>Can anyone find something that you can&#39;t install NetBSD on?
***</li>
</ul>

<h2>Interview - Steve Wills - <a href="mailto:swills@freebsd.org" rel="nofollow">swills@freebsd.org</a> / <a href="https://twitter.com/swills" rel="nofollow">@swills</a></h2>

<p>Mentoring new BSD developers</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.5 released</a></h3>

<ul>
<li>We don&#39;t hear a whole lot about MidnightBSD, but they&#39;ve just released version 0.5</li>
<li>It&#39;s got a round of the latest FreeBSD security patches, driver updates and various small things</li>
<li>Maybe one of their developers could come on the show sometime and tell us more about the project
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.52/" rel="nofollow">BSD Router Project 1.52 released</a></h3>

<ul>
<li>The newest update for the BSD Router Project is out</li>
<li>This version is based on a snapshot of 10-STABLE that&#39;s very close to 10.1-RELEASE</li>
<li>It&#39;s mostly a bugfix release, but includes some small changes and package updates
***</li>
</ul>

<h3><a href="http://www.dragonflydigest.com/2014/09/19/14751.html" rel="nofollow">Configuring a DragonFly BSD desktop</a></h3>

<ul>
<li>We&#39;ve done tutorials on how to set up a FreeBSD or OpenBSD desktop, but maybe you&#39;re more interested in DragonFly</li>
<li>In this post from Justin Sherrill, you&#39;ll learn some of the steps to do just that</li>
<li>He pulled out an old desktop machine, gave it a try and seems to be pleased with the results</li>
<li>It includes a few Xorg tips, and there are some comments about the possibility of making a GUI DragonFly installer
***</li>
</ul>

<h3><a href="http://pakitong.blogspot.com/2014/09/jetway-j7f2-four-lan-mini-itx-for.html" rel="nofollow">Building a mini-ITX pfSense box</a></h3>

<ul>
<li>Another week, another pfSense firewall build post</li>
<li>This time, the author is installing to a Jetway J7F2, a mini-ITX device with four LAN ports</li>
<li>He used to be a m0n0wall guy, but wanted to give the more modern pfSense a try</li>
<li>Lots of great pictures of the hardware, which we always love
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2184TfOKD" rel="nofollow">Damian writes in</a></li>
<li><a href="http://slexy.org/view/s20uAdTwLv" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s20es52IgZ" rel="nofollow">Dale writes in</a></li>
<li><a href="http://slexy.org/view/s2mjulpac6" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2BvNC8cgi" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from EuroBSDCon! This week we&#39;ll be talking with Steve Wills about mentoring new BSD developers. If you&#39;ve ever considered becoming a developer or helping out, it&#39;s actually really easy to get involved. We&#39;ve also got all the BSD news for the week and answers to your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/09/26/msg000669.html" rel="nofollow">NetBSD at Hiroshima Open Source Conference</a></h3>

<ul>
<li>NetBSD developers are hard at work, putting NetBSD on everything they can find</li>
<li>At a technology conference in Hiroshima, some developers brought their exotic machines to put on display</li>
<li>As usual, there are lots of pictures and a nice report from the conference
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?limit_changes=0&view=revision&revision=368845" rel="nofollow">FreeBSD&#39;s Linux emulation overhaul</a></h3>

<ul>
<li>For a long time, FreeBSD&#39;s emulation layer has been based on an ancient Fedora 10 system</li>
<li>If you&#39;ve ever needed to install Adobe Flash on BSD, you&#39;ll be stuck with all this extra junk</li>
<li>With some recent work, that&#39;s been replaced with a recent CentOS release</li>
<li>This opens up the door for newer versions of Skype to run on FreeBSD, and maybe even Steam someday
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1449" rel="nofollow">pfSense 2.2-BETA</a></h3>

<ul>
<li>Big changes are coming in pfSense land, with their upcoming 2.2 release</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">talked to the developer</a> a while back about future plans, and now they&#39;re finally out there</li>
<li>The 2.2 branch will be based on FreeBSD 10-STABLE (instead of 8.3) and include lots of performance fixes</li>
<li>It also includes some security updates, lots of package changes and updates and much more</li>
<li>You can check the <a href="https://doc.pfsense.org/index.php/2.2_New_Features_and_Changes" rel="nofollow">full list of changes</a> on their wiki
***</li>
</ul>

<h3><a href="http://www.cambus.net/netbsd-on-the-raspberry-pi/" rel="nofollow">NetBSD on the Raspberry Pi</a></h3>

<ul>
<li>This article shows how you can install NetBSD on the ever-so-popular Raspberry Pi</li>
<li>As of right now, you&#39;ll need to use a -CURRENT snapshot to do it</li>
<li>It also shows how to grow the filesystem to fill up an SD card, some pkgsrc basics and how to get some initial things set up</li>
<li>Can anyone find something that you can&#39;t install NetBSD on?
***</li>
</ul>

<h2>Interview - Steve Wills - <a href="mailto:swills@freebsd.org" rel="nofollow">swills@freebsd.org</a> / <a href="https://twitter.com/swills" rel="nofollow">@swills</a></h2>

<p>Mentoring new BSD developers</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.midnightbsd.org/notes/" rel="nofollow">MidnightBSD 0.5 released</a></h3>

<ul>
<li>We don&#39;t hear a whole lot about MidnightBSD, but they&#39;ve just released version 0.5</li>
<li>It&#39;s got a round of the latest FreeBSD security patches, driver updates and various small things</li>
<li>Maybe one of their developers could come on the show sometime and tell us more about the project
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.52/" rel="nofollow">BSD Router Project 1.52 released</a></h3>

<ul>
<li>The newest update for the BSD Router Project is out</li>
<li>This version is based on a snapshot of 10-STABLE that&#39;s very close to 10.1-RELEASE</li>
<li>It&#39;s mostly a bugfix release, but includes some small changes and package updates
***</li>
</ul>

<h3><a href="http://www.dragonflydigest.com/2014/09/19/14751.html" rel="nofollow">Configuring a DragonFly BSD desktop</a></h3>

<ul>
<li>We&#39;ve done tutorials on how to set up a FreeBSD or OpenBSD desktop, but maybe you&#39;re more interested in DragonFly</li>
<li>In this post from Justin Sherrill, you&#39;ll learn some of the steps to do just that</li>
<li>He pulled out an old desktop machine, gave it a try and seems to be pleased with the results</li>
<li>It includes a few Xorg tips, and there are some comments about the possibility of making a GUI DragonFly installer
***</li>
</ul>

<h3><a href="http://pakitong.blogspot.com/2014/09/jetway-j7f2-four-lan-mini-itx-for.html" rel="nofollow">Building a mini-ITX pfSense box</a></h3>

<ul>
<li>Another week, another pfSense firewall build post</li>
<li>This time, the author is installing to a Jetway J7F2, a mini-ITX device with four LAN ports</li>
<li>He used to be a m0n0wall guy, but wanted to give the more modern pfSense a try</li>
<li>Lots of great pictures of the hardware, which we always love
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2184TfOKD" rel="nofollow">Damian writes in</a></li>
<li><a href="http://slexy.org/view/s20uAdTwLv" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s20es52IgZ" rel="nofollow">Dale writes in</a></li>
<li><a href="http://slexy.org/view/s2mjulpac6" rel="nofollow">Joe writes in</a></li>
<li><a href="http://slexy.org/view/s2BvNC8cgi" rel="nofollow">Bostjan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>56: Beastly Infrastructure</title>
  <link>https://www.bsdnow.tv/56</link>
  <guid isPermaLink="false">ef260b07-d765-4154-9f4e-3fc616050361</guid>
  <pubDate>Wed, 24 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ef260b07-d765-4154-9f4e-3fc616050361.mp3" length="41104084" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we're on the other side of the Atlantic, attending EuroBSDCon. For now, we've got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It's an inside look that you probably won't hear about anywhere else! We'll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>57:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we're on the other side of the Atlantic, attending EuroBSDCon. For now, we've got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It's an inside look that you probably won't hear about anywhere else! We'll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Peter Wemm - &lt;a href="mailto:peter@freebsd.org" target="_blank" rel="nofollow noopener"&gt;peter@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/karinjiri" target="_blank" rel="nofollow noopener"&gt;@karinjiri&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The FreeBSD web cluster and infrastructure&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2LRZu3hlI" target="_blank" rel="nofollow noopener"&gt;Todd writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21JeoW1rn" target="_blank" rel="nofollow noopener"&gt;Brandon writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, eurobsdcon, 2014, cluster, infrastructure, web, servers, datacenter, internal, ssh, jails</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;re on the other side of the Atlantic, attending EuroBSDCon. For now, we&#39;ve got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It&#39;s an inside look that you probably won&#39;t hear about anywhere else! We&#39;ll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Peter Wemm - <a href="mailto:peter@freebsd.org" rel="nofollow">peter@freebsd.org</a> / <a href="https://twitter.com/karinjiri" rel="nofollow">@karinjiri</a></h2>

<p>The FreeBSD web cluster and infrastructure</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2LRZu3hlI" rel="nofollow">Todd writes in</a></li>
<li><a href="http://slexy.org/view/s21JeoW1rn" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;re on the other side of the Atlantic, attending EuroBSDCon. For now, we&#39;ve got an awesome interview with Peter Wemm about the FreeBSD web cluster and infrastructure. It&#39;s an inside look that you probably won&#39;t hear about anywhere else! We&#39;ll also get to a couple of your emails today, and be back next week with all the usual goodies, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Peter Wemm - <a href="mailto:peter@freebsd.org" rel="nofollow">peter@freebsd.org</a> / <a href="https://twitter.com/karinjiri" rel="nofollow">@karinjiri</a></h2>

<p>The FreeBSD web cluster and infrastructure</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2LRZu3hlI" rel="nofollow">Todd writes in</a></li>
<li><a href="http://slexy.org/view/s21JeoW1rn" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>55: The Promised WLAN</title>
  <link>https://www.bsdnow.tv/55</link>
  <guid isPermaLink="false">138f743e-c056-4292-9d04-7a7022b34944</guid>
  <pubDate>Wed, 17 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/138f743e-c056-4292-9d04-7a7022b34944.mp3" length="57124948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:19:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we've got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.1-BETA1 is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The first maintenance update in the 10.x series of FreeBSD is on its way&lt;/li&gt;
&lt;li&gt;Since we can't see a changelog yet, the 10-STABLE &lt;a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" target="_blank" rel="nofollow noopener"&gt;release notes&lt;/a&gt; offer a glimpse at some of the new features and fixes that will be included in 10.1&lt;/li&gt;
&lt;li&gt;The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11&lt;/li&gt;
&lt;li&gt;Initial UEFI support, multithreaded softupdates for UFS and many more things were added&lt;/li&gt;
&lt;li&gt;You can check the &lt;a href="https://www.freebsd.org/releases/10.1R/schedule.html" target="_blank" rel="nofollow noopener"&gt;release schedule&lt;/a&gt; for the planned release dates&lt;/li&gt;
&lt;li&gt;Details for the various forms of release media can be found in &lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" target="_blank" rel="nofollow noopener"&gt;the announcement&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" target="_blank" rel="nofollow noopener"&gt;Remote headless OpenBSD installation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes&lt;/li&gt;
&lt;li&gt;Sometimes you'll get lucky and they'll offer FreeBSD, but it's much harder to find ones that natively support other BSDs&lt;/li&gt;
&lt;li&gt;This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely&lt;/li&gt;
&lt;li&gt;It required a few specific steps you'll want to take note of, but is &lt;strong&gt;extremely useful&lt;/strong&gt; for those pesky hosting providers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" target="_blank" rel="nofollow noopener"&gt;Building a firewall appliance with pfSense&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate &lt;a href="http://pcengines.ch/alix2c3.htm" target="_blank" rel="nofollow noopener"&gt;ALIX2C3 APU&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;After the author's modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board&lt;/li&gt;
&lt;li&gt;The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)&lt;/li&gt;
&lt;li&gt;There's a lot of &lt;em&gt;great&lt;/em&gt; pictures of the hardware and detailed screenshots, definitely worth a look
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" target="_blank" rel="nofollow noopener"&gt;Receive Side Scaling - UDP testing&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress&lt;/li&gt;
&lt;li&gt;He's using some quad core boxes with 10 gigabit ethernet for the tests&lt;/li&gt;
&lt;li&gt;The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do&lt;/li&gt;
&lt;li&gt;He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)&lt;/li&gt;
&lt;li&gt;And speaking of Adrian Chadd...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Adrian Chadd - &lt;a href="mailto:adrian@freebsd.org" target="_blank" rel="nofollow noopener"&gt;adrian@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/erikarn" target="_blank" rel="nofollow noopener"&gt;@erikarn&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD on laptops, wifi, drivers, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140916084251" target="_blank" rel="nofollow noopener"&gt;Sendmail removed from OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Mail server admins around the world &lt;a href="https://news.ycombinator.com/item?id=8324475" target="_blank" rel="nofollow noopener"&gt;are rejoicing&lt;/a&gt;, because sendmail is &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=141081997917153&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;finally gone&lt;/a&gt; from OpenBSD&lt;/li&gt;
&lt;li&gt;With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded&lt;/li&gt;
&lt;li&gt;If you've ever compared a "sendmail.cf" file to an "smtpd.conf" file... the different is as clear as night and day&lt;/li&gt;
&lt;li&gt;5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it&lt;/li&gt;
&lt;li&gt;If you still need it for some reason, sendmail will live in ports from now on&lt;/li&gt;
&lt;li&gt;Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly's mail transfer agent in base (instead of an entire mail server)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://github.com/zinkwazi/pfmb" target="_blank" rel="nofollow noopener"&gt;pfSense backups with pfmb&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've mentioned the need for a tool to back up pfSense configs a number of times on the show&lt;/li&gt;
&lt;li&gt;This script, hosted on github, does pretty much exactly that&lt;/li&gt;
&lt;li&gt;It can connect to one (or more!) pfSense installations and back up the configuration&lt;/li&gt;
&lt;li&gt;You can roll back or replace failed hardware very easily with its restore function&lt;/li&gt;
&lt;li&gt;Everything is done over SSH, so it should be pretty secure
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.amazon.com/dp/0321968972/" target="_blank" rel="nofollow noopener"&gt;The Design and Implementation of the FreeBSD Operating System&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned when the pre orders were up, but now "The Design and Implementation of the FreeBSD Operating System, 2nd edition" seems to be shipping out&lt;/li&gt;
&lt;li&gt;If you're interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy&lt;/li&gt;
&lt;li&gt;We've even had &lt;a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" target="_blank" rel="nofollow noopener"&gt;all&lt;/a&gt; &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;three&lt;/a&gt; &lt;a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" target="_blank" rel="nofollow noopener"&gt;authors&lt;/a&gt; on the show before!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140915064856" target="_blank" rel="nofollow noopener"&gt;OpenBSD's systemd replacement updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention&lt;/li&gt;
&lt;li&gt;One of the developers writes in to Undeadly, detailing what's going on and what the overall status is&lt;/li&gt;
&lt;li&gt;He also clears up any confusion about "porting systemd to BSD" &lt;strong&gt;(that's not what's going on)&lt;/strong&gt; or his code ever ending up in base &lt;strong&gt;(it won't)&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20jrx0nIf" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21hFUJ2ju" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21RgSzOv4" target="_blank" rel="nofollow noopener"&gt;Mathieu writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2P1mzalPh" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, bsd, interview, adrian chadd, wireless, wifi, aircrack-ng, kismet, packet injection, monitor mode, libressl, openssl, qemu, zfs, jails, headless, remote, pfsense, systemd, netgate, apu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be talking with Adrian Chadd about all things wireless, his experience with FreeBSD on various laptop hardware and a whole lot more. As usual, we&#39;ve got the latest news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://ftp.freebsd.org/pub/FreeBSD/releases/ISO-IMAGES/10.1/" rel="nofollow">FreeBSD 10.1-BETA1 is out</a></h3>

<ul>
<li>The first maintenance update in the 10.x series of FreeBSD is on its way</li>
<li>Since we can&#39;t see a changelog yet, the 10-STABLE <a href="https://www.freebsd.org/relnotes/10-STABLE/relnotes/article.html" rel="nofollow">release notes</a> offer a glimpse at some of the new features and fixes that will be included in 10.1</li>
<li>The vt driver was merged from -CURRENT, lots of drivers were updated, lots of bugs were fixed and bhyve also got many improvements from 11</li>
<li>Initial UEFI support, multithreaded softupdates for UFS and many more things were added</li>
<li>You can check the <a href="https://www.freebsd.org/releases/10.1R/schedule.html" rel="nofollow">release schedule</a> for the planned release dates</li>
<li>Details for the various forms of release media can be found in <a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-September/080106.html" rel="nofollow">the announcement</a>
***</li>
</ul>

<h3><a href="https://jcs.org/notaweblog/2014/09/12/remotely_installing_openbsd_on_a/" rel="nofollow">Remote headless OpenBSD installation</a></h3>

<ul>
<li>A lot of server providers only offer a limited number of operating systems to be easily installed on their boxes</li>
<li>Sometimes you&#39;ll get lucky and they&#39;ll offer FreeBSD, but it&#39;s much harder to find ones that natively support other BSDs</li>
<li>This article shows how you can use a Linux-based rescue system, a RAM disk and QEMU to install OpenBSD on the bare metal of a server, headlessly and remotely</li>
<li>It required a few specific steps you&#39;ll want to take note of, but is <strong>extremely useful</strong> for those pesky hosting providers
***</li>
</ul>

<h3><a href="http://www.get-virtual.net/2014/09/16/build-firewall-appliance/" rel="nofollow">Building a firewall appliance with pfSense</a></h3>

<ul>
<li>In this article, we learn how to easily set up a gateway and wireless access point with pfSense on a Netgate <a href="http://pcengines.ch/alix2c3.htm" rel="nofollow">ALIX2C3 APU</a></li>
<li>After the author&#39;s modem died, he decided to look into a more do-it-yourself option with pf and a tiny router board</li>
<li>The hardware he used has gigabit ports and a BSD-compatible wireless card, as well as enough CPU power for a modest workload and a few services (OpenVPN, etc.)</li>
<li>There&#39;s a lot of <em>great</em> pictures of the hardware and detailed screenshots, definitely worth a look
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2014/09/receive-side-scaling-testing-udp.html" rel="nofollow">Receive Side Scaling - UDP testing</a></h3>

<ul>
<li>Adrian Chadd has been working on RSS (Receive Side Scaling) in FreeBSD, and gives an update on the progress</li>
<li>He&#39;s using some quad core boxes with 10 gigabit ethernet for the tests</li>
<li>The post gives lots of stats and results from his network benchmark, as well as some interesting workarounds he had to do</li>
<li>He also provides some system configuration options, sysctl knobs, etc. (if you want to try it out)</li>
<li>And speaking of Adrian Chadd...
***</li>
</ul>

<h2>Interview - Adrian Chadd - <a href="mailto:adrian@freebsd.org" rel="nofollow">adrian@freebsd.org</a> / <a href="https://twitter.com/erikarn" rel="nofollow">@erikarn</a></h2>

<p>BSD on laptops, wifi, drivers, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140916084251" rel="nofollow">Sendmail removed from OpenBSD</a></h3>

<ul>
<li>Mail server admins around the world <a href="https://news.ycombinator.com/item?id=8324475" rel="nofollow">are rejoicing</a>, because sendmail is <a href="http://marc.info/?l=openbsd-cvs&m=141081997917153&w=2" rel="nofollow">finally gone</a> from OpenBSD</li>
<li>With OpenSMTPD being a part of the base system, sendmail became largely redundant and unneeded</li>
<li>If you&#39;ve ever compared a &quot;sendmail.cf&quot; file to an &quot;smtpd.conf&quot; file... the different is as clear as night and day</li>
<li>5.6 will serve as a transitional release, including both sendmail and OpenSMTPD, but 5.7 will be the first release without it</li>
<li>If you still need it for some reason, sendmail will live in ports from now on</li>
<li>Hopefully FreeBSD will follow suit sometime in the future as well, possibly including DragonFly&#39;s mail transfer agent in base (instead of an entire mail server)
***</li>
</ul>

<h3><a href="https://github.com/zinkwazi/pfmb" rel="nofollow">pfSense backups with pfmb</a></h3>

<ul>
<li>We&#39;ve mentioned the need for a tool to back up pfSense configs a number of times on the show</li>
<li>This script, hosted on github, does pretty much exactly that</li>
<li>It can connect to one (or more!) pfSense installations and back up the configuration</li>
<li>You can roll back or replace failed hardware very easily with its restore function</li>
<li>Everything is done over SSH, so it should be pretty secure
***</li>
</ul>

<h3><a href="http://www.amazon.com/dp/0321968972/" rel="nofollow">The Design and Implementation of the FreeBSD Operating System</a></h3>

<ul>
<li>We mentioned when the pre orders were up, but now &quot;The Design and Implementation of the FreeBSD Operating System, 2nd edition&quot; seems to be shipping out</li>
<li>If you&#39;re interested in FreeBSD development, or learning about the operating system internals, this is a great book to buy</li>
<li>We&#39;ve even had <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">all</a> <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">three</a> <a href="http://www.bsdnow.tv/episodes/2014_08_13-vpn_my_dear_watson" rel="nofollow">authors</a> on the show before!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140915064856" rel="nofollow">OpenBSD&#39;s systemd replacement updates</a></h3>

<ul>
<li>We mentioned last week that the news of OpenBSD creating systemd wrappers was getting mainstream attention</li>
<li>One of the developers writes in to Undeadly, detailing what&#39;s going on and what the overall status is</li>
<li>He also clears up any confusion about &quot;porting systemd to BSD&quot; <strong>(that&#39;s not what&#39;s going on)</strong> or his code ever ending up in base <strong>(it won&#39;t)</strong></li>
<li>The top comment as of right now is a Linux user asking if his systemd wrappers can be ported back to Linux... poor guy
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20jrx0nIf" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21hFUJ2ju" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21RgSzOv4" rel="nofollow">Mathieu writes in</a></li>
<li><a href="http://slexy.org/view/s2P1mzalPh" rel="nofollow">Steve writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>54: Luminary Environment</title>
  <link>https://www.bsdnow.tv/54</link>
  <guid isPermaLink="false">c6ff3386-0834-4798-809e-dd4917c5bc7b</guid>
  <pubDate>Wed, 10 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c6ff3386-0834-4798-809e-dd4917c5bc7b.mp3" length="56630740" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, it's all about Lumina. We'll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There's also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, it's all about Lumina. We'll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There's also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.jasper.la/portscout-for-openbsd/" target="_blank" rel="nofollow noopener"&gt;Portscout ported to OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Portscout is a popular utility used in the FreeBSD ports infrastructure&lt;/li&gt;
&lt;li&gt;It lets port maintainers know when there's a new version of the upstream software available by automatically checking the distfile mirror&lt;/li&gt;
&lt;li&gt;Now OpenBSD porters can enjoy the same convenience, as it's been ported over&lt;/li&gt;
&lt;li&gt;You can view the status &lt;a href="http://portscout.jasper.la/" target="_blank" rel="nofollow noopener"&gt;online&lt;/a&gt; to see how it works and &lt;a href="http://portscout.jasper.la/index-total.html" target="_blank" rel="nofollow noopener"&gt;who maintains what&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well&lt;/li&gt;
&lt;li&gt;He decided to &lt;a href="https://jasperla.github.io/portroach/" target="_blank" rel="nofollow noopener"&gt;fork and rename it&lt;/a&gt; a few days later
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/" target="_blank" rel="nofollow noopener"&gt;Sysadmins and systemd refugees flocking to BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives&lt;/li&gt;
&lt;li&gt;This "&lt;a href="http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483" target="_blank" rel="nofollow noopener"&gt;you got your Windows in my Linux&lt;/a&gt;" article (and accompanying comments) give a nice glimpse into the minds of some of those switchers&lt;/li&gt;
&lt;li&gt;Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd&lt;/li&gt;
&lt;li&gt;Fortunately, the BSD communities are usually very welcoming of switchers - it's pretty nice on this side!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/OpenBSD-version-numbers" target="_blank" rel="nofollow noopener"&gt;OpenBSD's versioning schemes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software&lt;/li&gt;
&lt;li&gt;In contrast to FreeBSD's release cycle, OpenBSD isn't as concerned with breaking backwards compatibility (but only if it's needed to make progress)&lt;/li&gt;
&lt;li&gt;This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses&lt;/li&gt;
&lt;li&gt;He also details the difference between branches, their errata system and lack of "patch levels" for security&lt;/li&gt;
&lt;li&gt;Some other things in OpenBSD don't have version numbers at all, like tmux&lt;/li&gt;
&lt;li&gt;"Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=zLsgFPaMPyg" target="_blank" rel="nofollow noopener"&gt;VAXstation 4000 Model 90 booting NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992&lt;/li&gt;
&lt;li&gt;This system has a monstrous 71 MHz CPU and 128MB of ECC RAM&lt;/li&gt;
&lt;li&gt;It &lt;a href="https://www.youtube.com/watch?v=YKzDXKmn66U" target="_blank" rel="nofollow noopener"&gt;continues in part two&lt;/a&gt;, where we learn that it would've cost around $25,000 when it was released!&lt;/li&gt;
&lt;li&gt;The uploader talks about his experiences getting NetBSD on it, what does and doesn't work, etc&lt;/li&gt;
&lt;li&gt;It's interesting to see that such old hardware isn't necessarily obsolete just because newer things have come out since then (but maybe don't try to build world on it...)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ken Moore - &lt;a href="mailto:ken@pcbsd.org" target="_blank" rel="nofollow noopener"&gt;ken@pcbsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The Lumina desktop environment&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Special segment&lt;/h2&gt;

&lt;h3&gt;Lumina walkthrough&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-one" target="_blank" rel="nofollow noopener"&gt;Suricata for IDS on pfSense&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While most people are familiar with Snort as an intrusion detection system, Suricata is another choice&lt;/li&gt;
&lt;li&gt;This guide goes through the steps of installing and configuring it on a public-facing pfSense box&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/" target="_blank" rel="nofollow noopener"&gt;Part two&lt;/a&gt; details some of the configuration steps&lt;/li&gt;
&lt;li&gt;One other cool thing about Suricata - it's compatible with Snort rules, so you can use the same updates&lt;/li&gt;
&lt;li&gt;There's also &lt;a href="http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD" target="_blank" rel="nofollow noopener"&gt;another recent post&lt;/a&gt; about snort as well, if that's more your style&lt;/li&gt;
&lt;li&gt;If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd" target="_blank" rel="nofollow noopener"&gt;OpenBSD's systemd API emulation project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This story was pretty popular in the mainstream news this week&lt;/li&gt;
&lt;li&gt;For the Google Summer of Code, a student is writing emulation wrappers for some of &lt;a href="https://twitter.com/blakkheim/status/509092821773848577" target="_blank" rel="nofollow noopener"&gt;systemd's functions&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn't have to run the full systemd&lt;/li&gt;
&lt;li&gt;One particularly interesting Slashdot comment &lt;a href="http://bsd.slashdot.org/comments.pl?sid=5663319&amp;amp;cid=47851361" target="_blank" rel="nofollow noopener"&gt;snippet&lt;/a&gt;: "We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn't as steep as we expected, general system stability seems to be better too, and BSD's security reputation goes without saying."&lt;/li&gt;
&lt;li&gt;It will NOT be in the base system - only in ports, and only installed as a dependency for things like &lt;a href="http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/" target="_blank" rel="nofollow noopener"&gt;newer GNOME&lt;/a&gt; that require such APIs&lt;/li&gt;
&lt;li&gt;In the long run, BSD will still be safe from systemd's reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/" target="_blank" rel="nofollow noopener"&gt;GhostBSD 4 previewed&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The GhostBSD project is moving along, slowly getting closer to the 4 release&lt;/li&gt;
&lt;li&gt;This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends&lt;/li&gt;
&lt;li&gt;If you're not too familiar with GhostBSD, we &lt;a href="http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition" target="_blank" rel="nofollow noopener"&gt;interviewed the lead developer&lt;/a&gt; a little while back
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html" target="_blank" rel="nofollow noopener"&gt;NetBSD on the Banana Pi&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs&lt;/li&gt;
&lt;li&gt;In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it&lt;/li&gt;
&lt;li&gt;After studying how the prebuilt Linux image booted, he made some notes and started hacking&lt;/li&gt;
&lt;li&gt;Ethernet, one of the few things not working, is being looked into and he's hoping to get it fully supported for the upcoming NetBSD 7.0&lt;/li&gt;
&lt;li&gt;They're only about $65 as of the time we're recording this, so it might be a fun project to try
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s28iKdBEbm" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Wfnv87h" target="_blank" rel="nofollow noopener"&gt;Garegin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Fzryxhdz" target="_blank" rel="nofollow noopener"&gt;Erno writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ILcqdFfF" target="_blank" rel="nofollow noopener"&gt;Brandon writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, lumina, desktop environment, window manager, graphical user interface, tiling, floating, gnome3, kde5, kde4, qt5, banana pi, raspberry pi, portscout, vax, vaxstation, linux vs bsd, systemd, portroach, ids, suricata</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, it&#39;s all about Lumina. We&#39;ll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There&#39;s also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.jasper.la/portscout-for-openbsd/" rel="nofollow">Portscout ported to OpenBSD</a></h3>

<ul>
<li>Portscout is a popular utility used in the FreeBSD ports infrastructure</li>
<li>It lets port maintainers know when there&#39;s a new version of the upstream software available by automatically checking the distfile mirror</li>
<li>Now OpenBSD porters can enjoy the same convenience, as it&#39;s been ported over</li>
<li>You can view the status <a href="http://portscout.jasper.la/" rel="nofollow">online</a> to see how it works and <a href="http://portscout.jasper.la/index-total.html" rel="nofollow">who maintains what</a></li>
<li>The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well</li>
<li>He decided to <a href="https://jasperla.github.io/portroach/" rel="nofollow">fork and rename it</a> a few days later
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/" rel="nofollow">Sysadmins and systemd refugees flocking to BSD</a></h3>

<ul>
<li>With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives</li>
<li>This &quot;<a href="http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483" rel="nofollow">you got your Windows in my Linux</a>&quot; article (and accompanying comments) give a nice glimpse into the minds of some of those switchers</li>
<li>Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd</li>
<li>Fortunately, the BSD communities are usually very welcoming of switchers - it&#39;s pretty nice on this side!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-version-numbers" rel="nofollow">OpenBSD&#39;s versioning schemes</a></h3>

<ul>
<li>Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software</li>
<li>In contrast to FreeBSD&#39;s release cycle, OpenBSD isn&#39;t as concerned with breaking backwards compatibility (but only if it&#39;s needed to make progress)</li>
<li>This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses</li>
<li>He also details the difference between branches, their errata system and lack of &quot;patch levels&quot; for security</li>
<li>Some other things in OpenBSD don&#39;t have version numbers at all, like tmux</li>
<li>&quot;Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features.&quot;
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=zLsgFPaMPyg" rel="nofollow">VAXstation 4000 Model 90 booting NetBSD</a></h3>

<ul>
<li>We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992</li>
<li>This system has a monstrous 71 MHz CPU and 128MB of ECC RAM</li>
<li>It <a href="https://www.youtube.com/watch?v=YKzDXKmn66U" rel="nofollow">continues in part two</a>, where we learn that it would&#39;ve cost around $25,000 when it was released!</li>
<li>The uploader talks about his experiences getting NetBSD on it, what does and doesn&#39;t work, etc</li>
<li>It&#39;s interesting to see that such old hardware isn&#39;t necessarily obsolete just because newer things have come out since then (but maybe don&#39;t try to build world on it...)
***</li>
</ul>

<h2>Interview - Ken Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a></h2>

<p>The Lumina desktop environment</p>

<hr>

<h2>Special segment</h2>

<h3>Lumina walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-one" rel="nofollow">Suricata for IDS on pfSense</a></h3>

<ul>
<li>While most people are familiar with Snort as an intrusion detection system, Suricata is another choice</li>
<li>This guide goes through the steps of installing and configuring it on a public-facing pfSense box</li>
<li><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/" rel="nofollow">Part two</a> details some of the configuration steps</li>
<li>One other cool thing about Suricata - it&#39;s compatible with Snort rules, so you can use the same updates</li>
<li>There&#39;s also <a href="http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD" rel="nofollow">another recent post</a> about snort as well, if that&#39;s more your style</li>
<li>If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd" rel="nofollow">OpenBSD&#39;s systemd API emulation project</a></h3>

<ul>
<li>This story was pretty popular in the mainstream news this week</li>
<li>For the Google Summer of Code, a student is writing emulation wrappers for some of <a href="https://twitter.com/blakkheim/status/509092821773848577" rel="nofollow">systemd&#39;s functions</a></li>
<li>There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn&#39;t have to run the full systemd</li>
<li>One particularly interesting Slashdot comment <a href="http://bsd.slashdot.org/comments.pl?sid=5663319&cid=47851361" rel="nofollow">snippet</a>: &quot;We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn&#39;t as steep as we expected, general system stability seems to be better too, and BSD&#39;s security reputation goes without saying.&quot;</li>
<li>It will NOT be in the base system - only in ports, and only installed as a dependency for things like <a href="http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/" rel="nofollow">newer GNOME</a> that require such APIs</li>
<li>In the long run, BSD will still be safe from systemd&#39;s reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***</li>
</ul>

<h3><a href="http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/" rel="nofollow">GhostBSD 4 previewed</a></h3>

<ul>
<li>The GhostBSD project is moving along, slowly getting closer to the 4 release</li>
<li>This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends</li>
<li>If you&#39;re not too familiar with GhostBSD, we <a href="http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition" rel="nofollow">interviewed the lead developer</a> a little while back
***</li>
</ul>

<h3><a href="http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html" rel="nofollow">NetBSD on the Banana Pi</a></h3>

<ul>
<li>The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs</li>
<li>In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it</li>
<li>After studying how the prebuilt Linux image booted, he made some notes and started hacking</li>
<li>Ethernet, one of the few things not working, is being looked into and he&#39;s hoping to get it fully supported for the upcoming NetBSD 7.0</li>
<li>They&#39;re only about $65 as of the time we&#39;re recording this, so it might be a fun project to try
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28iKdBEbm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21Wfnv87h" rel="nofollow">Garegin writes in</a></li>
<li><a href="http://slexy.org/view/s2Fzryxhdz" rel="nofollow">Erno writes in</a></li>
<li><a href="http://slexy.org/view/s2ILcqdFfF" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, it&#39;s all about Lumina. We&#39;ll be giving you a visual walkthrough of the new BSD-exclusive desktop environment, as well as chatting with the main developer. There&#39;s also answers to your emails and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blog.jasper.la/portscout-for-openbsd/" rel="nofollow">Portscout ported to OpenBSD</a></h3>

<ul>
<li>Portscout is a popular utility used in the FreeBSD ports infrastructure</li>
<li>It lets port maintainers know when there&#39;s a new version of the upstream software available by automatically checking the distfile mirror</li>
<li>Now OpenBSD porters can enjoy the same convenience, as it&#39;s been ported over</li>
<li>You can view the status <a href="http://portscout.jasper.la/" rel="nofollow">online</a> to see how it works and <a href="http://portscout.jasper.la/index-total.html" rel="nofollow">who maintains what</a></li>
<li>The developer who ported it is working to get all the current features working on OpenBSD, and added a few new features as well</li>
<li>He decided to <a href="https://jasperla.github.io/portroach/" rel="nofollow">fork and rename it</a> a few days later
***</li>
</ul>

<h3><a href="https://www.reddit.com/r/freebsd/comments/2fgb90/you_have_your_windows_in_my_linux_or_why_many/" rel="nofollow">Sysadmins and systemd refugees flocking to BSD</a></h3>

<ul>
<li>With all the drama in Linux land about the rapid changes to their init system, a lot of people are looking at BSD alternatives</li>
<li>This &quot;<a href="http://www.infoworld.com/d/data-center/you-have-your-windows-in-my-linux-249483" rel="nofollow">you got your Windows in my Linux</a>&quot; article (and accompanying comments) give a nice glimpse into the minds of some of those switchers</li>
<li>Both server administrators and regular everyday users are switching away from Linux, as more and more distros give them no choice but to use systemd</li>
<li>Fortunately, the BSD communities are usually very welcoming of switchers - it&#39;s pretty nice on this side!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-version-numbers" rel="nofollow">OpenBSD&#39;s versioning schemes</a></h3>

<ul>
<li>Ted Unangst explains the various versioning systems within OpenBSD, from the base to libraries to other included software</li>
<li>In contrast to FreeBSD&#39;s release cycle, OpenBSD isn&#39;t as concerned with breaking backwards compatibility (but only if it&#39;s needed to make progress)</li>
<li>This allows them to innovate and introduce new features a lot more easily, and get those features in a stable release that everyone uses</li>
<li>He also details the difference between branches, their errata system and lack of &quot;patch levels&quot; for security</li>
<li>Some other things in OpenBSD don&#39;t have version numbers at all, like tmux</li>
<li>&quot;Every release adds some new features, fixes some old bugs, probably adds a new bug or two, and, if I have anything to say about it, removes some old features.&quot;
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=zLsgFPaMPyg" rel="nofollow">VAXstation 4000 Model 90 booting NetBSD</a></h3>

<ul>
<li>We found a video of NetBSD booting on a 22 year old VAX workstation, circa 1992</li>
<li>This system has a monstrous 71 MHz CPU and 128MB of ECC RAM</li>
<li>It <a href="https://www.youtube.com/watch?v=YKzDXKmn66U" rel="nofollow">continues in part two</a>, where we learn that it would&#39;ve cost around $25,000 when it was released!</li>
<li>The uploader talks about his experiences getting NetBSD on it, what does and doesn&#39;t work, etc</li>
<li>It&#39;s interesting to see that such old hardware isn&#39;t necessarily obsolete just because newer things have come out since then (but maybe don&#39;t try to build world on it...)
***</li>
</ul>

<h2>Interview - Ken Moore - <a href="mailto:ken@pcbsd.org" rel="nofollow">ken@pcbsd.org</a></h2>

<p>The Lumina desktop environment</p>

<hr>

<h2>Special segment</h2>

<h3>Lumina walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-one" rel="nofollow">Suricata for IDS on pfSense</a></h3>

<ul>
<li>While most people are familiar with Snort as an intrusion detection system, Suricata is another choice</li>
<li>This guide goes through the steps of installing and configuring it on a public-facing pfSense box</li>
<li><a href="http://pfsensesetup.com/suricata-intrusion-detection-system-part-two/" rel="nofollow">Part two</a> details some of the configuration steps</li>
<li>One other cool thing about Suricata - it&#39;s compatible with Snort rules, so you can use the same updates</li>
<li>There&#39;s also <a href="http://www.allamericancomputerrepair.com/Blog/Post/29/Install-Snort-on-FreeBSD" rel="nofollow">another recent post</a> about snort as well, if that&#39;s more your style</li>
<li>If you run pfSense (or any BSD) as an edge router for a lot of users, this might be worth looking into
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/14/09/08/0250207/gsoc-project-works-to-emulate-systemd-for-openbsd" rel="nofollow">OpenBSD&#39;s systemd API emulation project</a></h3>

<ul>
<li>This story was pretty popular in the mainstream news this week</li>
<li>For the Google Summer of Code, a student is writing emulation wrappers for some of <a href="https://twitter.com/blakkheim/status/509092821773848577" rel="nofollow">systemd&#39;s functions</a></li>
<li>There was consideration from some Linux users to port over the finished emulation back to Linux, so they wouldn&#39;t have to run the full systemd</li>
<li>One particularly interesting Slashdot comment <a href="http://bsd.slashdot.org/comments.pl?sid=5663319&cid=47851361" rel="nofollow">snippet</a>: &quot;We are currently migrating a large number (much larger than planned after initial results) of systems from RHEL to BSD - a decision taken due to general unhappiness with RHEL6, but SystemD pushed us towards BSD rather than another Linux distro - and in some cases are seeing throughput gains of greater than 10% on what should be equivalent Linux and BSD server builds. The re-learning curve wasn&#39;t as steep as we expected, general system stability seems to be better too, and BSD&#39;s security reputation goes without saying.&quot;</li>
<li>It will NOT be in the base system - only in ports, and only installed as a dependency for things like <a href="http://blogs.gnome.org/ovitters/2014/09/07/systemd-in-gnome-3-14-and-beyond/" rel="nofollow">newer GNOME</a> that require such APIs</li>
<li>In the long run, BSD will still be safe from systemd&#39;s reign of terror, but will hopefully still be compatible with some third party packages like GNOME that insist on using it
***</li>
</ul>

<h3><a href="http://www.linuxbsdos.com/2014/05/19/preview-of-ghostbsd-4-0/" rel="nofollow">GhostBSD 4 previewed</a></h3>

<ul>
<li>The GhostBSD project is moving along, slowly getting closer to the 4 release</li>
<li>This article shows some of the progress made, and includes lots of screenshots and interesting graphical frontends</li>
<li>If you&#39;re not too familiar with GhostBSD, we <a href="http://www.bsdnow.tv/episodes/2014_03_12-ghost_of_partition" rel="nofollow">interviewed the lead developer</a> a little while back
***</li>
</ul>

<h3><a href="http://rizzoandself.blogspot.com/2014/09/netbsd-on-banana-pi.html" rel="nofollow">NetBSD on the Banana Pi</a></h3>

<ul>
<li>The Banana Pi is a tasty alternative to the Raspberry Pi, with similar hardware specs</li>
<li>In this blog post, a NetBSD developer details his experiences in getting NetBSD to run on it</li>
<li>After studying how the prebuilt Linux image booted, he made some notes and started hacking</li>
<li>Ethernet, one of the few things not working, is being looked into and he&#39;s hoping to get it fully supported for the upcoming NetBSD 7.0</li>
<li>They&#39;re only about $65 as of the time we&#39;re recording this, so it might be a fun project to try
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s28iKdBEbm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21Wfnv87h" rel="nofollow">Garegin writes in</a></li>
<li><a href="http://slexy.org/view/s2Fzryxhdz" rel="nofollow">Erno writes in</a></li>
<li><a href="http://slexy.org/view/s2ILcqdFfF" rel="nofollow">Brandon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>53: It's HAMMER Time</title>
  <link>https://www.bsdnow.tv/53</link>
  <guid isPermaLink="false">ef498915-45f4-4dbb-87fc-4f8e9ee65342</guid>
  <pubDate>Wed, 03 Sep 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ef498915-45f4-4dbb-87fc-4f8e9ee65342.mp3" length="56493652" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our one year anniversary episode, and we'll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it's going. After that, we'll show you the ins and outs of DragonFly's HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's our one year anniversary episode, and we'll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it's going. After that, we'll show you the ins and outs of DragonFly's HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/08/freebsd-foundation-announces-ipsec.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation's new IPSEC project&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation, along with Netgate, is sponsoring some new work on the IPSEC code&lt;/li&gt;
&lt;li&gt;With bandwidth in the 10-40 gigabit per second range, the IPSEC stack needs to be brought up to modern standards in terms of encryption and performance&lt;/li&gt;
&lt;li&gt;This new work will add AES-CTR and AES-GCM modes to FreeBSD's implementation, borrowing some code from OpenBSD&lt;/li&gt;
&lt;li&gt;The updated stack will also support AES-NI for hardware-based encryption speed ups&lt;/li&gt;
&lt;li&gt;It's expected to be completed by the end of September, and will also be in pfSense 2.2
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/31/msg000667.html" target="_blank" rel="nofollow noopener"&gt;NetBSD at Shimane Open Source Conference 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Japanese NetBSD users group held a NetBSD booth at the Open Source Conference 2014 in Shimane on August 23&lt;/li&gt;
&lt;li&gt;One of the developers has gathered a bunch of pictures from the event and wrote a fairly lengthy summary&lt;/li&gt;
&lt;li&gt;They had NetBSD running on all sorts of devices, from Raspberry Pis to Sun Java Stations&lt;/li&gt;
&lt;li&gt;Some visitors said that NetBSD had the most chaotic booth at the conference
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1401" target="_blank" rel="nofollow noopener"&gt;pfSense 2.1.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new version of the pfSense 2.1 branch is out&lt;/li&gt;
&lt;li&gt;Mostly a security-focused release, including three web UI fixes and the most recent OpenSSL fix (which FreeBSD has &lt;a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-August/007875.html" target="_blank" rel="nofollow noopener"&gt;still not patched&lt;/a&gt; in -RELEASE after nearly a month)&lt;/li&gt;
&lt;li&gt;It also includes many other bug fixes, check the blog post for the full list
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://msrvideo.vo.msecnd.net/rmcvideos/227133/dl/227133.mp4" target="_blank" rel="nofollow noopener"&gt;Systems, Science and FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;George Neville-Neil&lt;/a&gt; gave a presentation at Microsoft Research&lt;/li&gt;
&lt;li&gt;It's mainly about using FreeBSD as a platform for research, inside and outside of universities&lt;/li&gt;
&lt;li&gt;The talk describes the OS and its features, ports, developer community, documentation, who uses BSD and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Reyk Floeter - &lt;a href="mailto:reyk@openbsd.org" target="_blank" rel="nofollow noopener"&gt;reyk@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/reykfloeter" target="_blank" rel="nofollow noopener"&gt;@reykfloeter&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD's HTTP daemon&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/hammer" target="_blank" rel="nofollow noopener"&gt;A crash course on HAMMER FS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://brynet.biz.tm/article-rcctl.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD's rcctl tool usage&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD recently &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140820090351" target="_blank" rel="nofollow noopener"&gt;got a new tool&lt;/a&gt; for managing /etc/rc.conf.local in -current&lt;/li&gt;
&lt;li&gt;Similar to FreeBSD's "sysrc" tool, it eliminates the need to manually edit rc.conf.local to enable or disable services&lt;/li&gt;
&lt;li&gt;This blog post - from a BSD Now viewer - shows the typical usage of the new tool to alter the startup services&lt;/li&gt;
&lt;li&gt;It won't make it to 5.6, but will be in 5.7 (next May)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mateh.id.au/2014/08/stream-netflix-chromecast-using-pfsense/" target="_blank" rel="nofollow noopener"&gt;pfSense mini-roundup&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We found five interesting pfSense articles throughout the week and wanted to quickly mention them&lt;/li&gt;
&lt;li&gt;The first item in our pfSense mini-roundup details how you can stream Netflix to in non-US countries using a "smart" DNS service&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://theosquest.com/2014/08/28/ipv6-with-comcast-and-pfsense/" target="_blank" rel="nofollow noopener"&gt;second post&lt;/a&gt; talks about setting ip IPv6, in particular if Comcast is your ISP&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://news.softpedia.com/news/PfSense-2-1-5-Is-Free-and-Powerful-FreeBSD-based-Firewall-Operating-System-457097.shtml" target="_blank" rel="nofollow noopener"&gt;third one&lt;/a&gt; features pfSense on Softpedia, a more mainstream tech site&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://sichent.wordpress.com/2014/02/22/filtering-https-traffic-with-squid-on-pfsense-2-1/" target="_blank" rel="nofollow noopener"&gt;fourth post&lt;/a&gt; describes how to filter HTTPS traffic with Squid and pfSense&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://pfsensesetup.com/vpn-tunneling-with-tinc/" target="_blank" rel="nofollow noopener"&gt;last article&lt;/a&gt; describes setting up a VPN using the "&lt;a href="https://en.wikipedia.org/wiki/Tinc_%28protocol%29" target="_blank" rel="nofollow noopener"&gt;tinc&lt;/a&gt;" daemon and pfSense&lt;/li&gt;
&lt;li&gt;It seems to be lesser known, compared to things like OpenVPN or SSH tunnels, so it's interesting to read about&lt;/li&gt;
&lt;li&gt;This pfSense HQ website seems to have lots of other cool pfSense items, check it out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/2Q-buffer-cache-algorithm" target="_blank" rel="nofollow noopener"&gt;OpenBSD's new buffer cache&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenBSD has traditionally used the tried-and-true LRU algorithm for buffer cache, but it has a few problems&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; has just switched to a new algorithm in -current, partially based on 2Q, and details some of his work&lt;/li&gt;
&lt;li&gt;Initial tests show positive results in terms of cache responsiveness&lt;/li&gt;
&lt;li&gt;Check the post for all the fine details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/08/bsdtalk244-lumina-desktop-environment.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 244&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another new BSDTalk is up and, this time around, &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;Will Backman&lt;/a&gt; interviews Ken Moore, the developer of the new BSD desktop environment&lt;/li&gt;
&lt;li&gt;They discuss the history of development, differences between it and other DEs, lots of topics&lt;/li&gt;
&lt;li&gt;If you're more of a visual person, fear not, because...&lt;/li&gt;
&lt;li&gt;We'll have Ken on &lt;em&gt;next week&lt;/em&gt;, including a full "virtual walkthrough" of Lumina and its applications
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21G3KL6lv" target="_blank" rel="nofollow noopener"&gt;Ghislain writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21USZdk2D" target="_blank" rel="nofollow noopener"&gt;Raynold writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2IWAfkDfX" target="_blank" rel="nofollow noopener"&gt;Van writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2OBhezoDV" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s22h9RhXUy" target="_blank" rel="nofollow noopener"&gt;Stefan writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, party, rave, dubstep, hammer, hammerfs, hammer fs, filesystem, zfs, dragonfly, matthew dillon, cluster, lumina, ipsec, rcctl, pfsense, reyk floeter, openhttpd, nginx, apache, webserver</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our one year anniversary episode, and we&#39;ll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it&#39;s going. After that, we&#39;ll show you the ins and outs of DragonFly&#39;s HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/freebsd-foundation-announces-ipsec.html" rel="nofollow">FreeBSD foundation&#39;s new IPSEC project</a></h3>

<ul>
<li>The FreeBSD foundation, along with Netgate, is sponsoring some new work on the IPSEC code</li>
<li>With bandwidth in the 10-40 gigabit per second range, the IPSEC stack needs to be brought up to modern standards in terms of encryption and performance</li>
<li>This new work will add AES-CTR and AES-GCM modes to FreeBSD&#39;s implementation, borrowing some code from OpenBSD</li>
<li>The updated stack will also support AES-NI for hardware-based encryption speed ups</li>
<li>It&#39;s expected to be completed by the end of September, and will also be in pfSense 2.2
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/31/msg000667.html" rel="nofollow">NetBSD at Shimane Open Source Conference 2014</a></h3>

<ul>
<li>The Japanese NetBSD users group held a NetBSD booth at the Open Source Conference 2014 in Shimane on August 23</li>
<li>One of the developers has gathered a bunch of pictures from the event and wrote a fairly lengthy summary</li>
<li>They had NetBSD running on all sorts of devices, from Raspberry Pis to Sun Java Stations</li>
<li>Some visitors said that NetBSD had the most chaotic booth at the conference
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1401" rel="nofollow">pfSense 2.1.5 released</a></h3>

<ul>
<li>A new version of the pfSense 2.1 branch is out</li>
<li>Mostly a security-focused release, including three web UI fixes and the most recent OpenSSL fix (which FreeBSD has <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-August/007875.html" rel="nofollow">still not patched</a> in -RELEASE after nearly a month)</li>
<li>It also includes many other bug fixes, check the blog post for the full list
***</li>
</ul>

<h3><a href="http://msrvideo.vo.msecnd.net/rmcvideos/227133/dl/227133.mp4" rel="nofollow">Systems, Science and FreeBSD</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">George Neville-Neil</a> gave a presentation at Microsoft Research</li>
<li>It&#39;s mainly about using FreeBSD as a platform for research, inside and outside of universities</li>
<li>The talk describes the OS and its features, ports, developer community, documentation, who uses BSD and much more
***</li>
</ul>

<h2>Interview - Reyk Floeter - <a href="mailto:reyk@openbsd.org" rel="nofollow">reyk@openbsd.org</a> / <a href="https://twitter.com/reykfloeter" rel="nofollow">@reykfloeter</a></h2>

<p>OpenBSD&#39;s HTTP daemon</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">A crash course on HAMMER FS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://brynet.biz.tm/article-rcctl.html" rel="nofollow">OpenBSD&#39;s rcctl tool usage</a></h3>

<ul>
<li>OpenBSD recently <a href="http://undeadly.org/cgi?action=article&sid=20140820090351" rel="nofollow">got a new tool</a> for managing /etc/rc.conf.local in -current</li>
<li>Similar to FreeBSD&#39;s &quot;sysrc&quot; tool, it eliminates the need to manually edit rc.conf.local to enable or disable services</li>
<li>This blog post - from a BSD Now viewer - shows the typical usage of the new tool to alter the startup services</li>
<li>It won&#39;t make it to 5.6, but will be in 5.7 (next May)
***</li>
</ul>

<h3><a href="http://mateh.id.au/2014/08/stream-netflix-chromecast-using-pfsense/" rel="nofollow">pfSense mini-roundup</a></h3>

<ul>
<li>We found five interesting pfSense articles throughout the week and wanted to quickly mention them</li>
<li>The first item in our pfSense mini-roundup details how you can stream Netflix to in non-US countries using a &quot;smart&quot; DNS service</li>
<li>The <a href="http://theosquest.com/2014/08/28/ipv6-with-comcast-and-pfsense/" rel="nofollow">second post</a> talks about setting ip IPv6, in particular if Comcast is your ISP</li>
<li>The <a href="http://news.softpedia.com/news/PfSense-2-1-5-Is-Free-and-Powerful-FreeBSD-based-Firewall-Operating-System-457097.shtml" rel="nofollow">third one</a> features pfSense on Softpedia, a more mainstream tech site</li>
<li>The <a href="http://sichent.wordpress.com/2014/02/22/filtering-https-traffic-with-squid-on-pfsense-2-1/" rel="nofollow">fourth post</a> describes how to filter HTTPS traffic with Squid and pfSense</li>
<li>The <a href="http://pfsensesetup.com/vpn-tunneling-with-tinc/" rel="nofollow">last article</a> describes setting up a VPN using the &quot;<a href="https://en.wikipedia.org/wiki/Tinc_%28protocol%29" rel="nofollow">tinc</a>&quot; daemon and pfSense</li>
<li>It seems to be lesser known, compared to things like OpenVPN or SSH tunnels, so it&#39;s interesting to read about</li>
<li>This pfSense HQ website seems to have lots of other cool pfSense items, check it out
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/2Q-buffer-cache-algorithm" rel="nofollow">OpenBSD&#39;s new buffer cache</a></h3>

<ul>
<li>OpenBSD has traditionally used the tried-and-true LRU algorithm for buffer cache, but it has a few problems</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has just switched to a new algorithm in -current, partially based on 2Q, and details some of his work</li>
<li>Initial tests show positive results in terms of cache responsiveness</li>
<li>Check the post for all the fine details
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/08/bsdtalk244-lumina-desktop-environment.html" rel="nofollow">BSDTalk episode 244</a></h3>

<ul>
<li>Another new BSDTalk is up and, this time around, <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">Will Backman</a> interviews Ken Moore, the developer of the new BSD desktop environment</li>
<li>They discuss the history of development, differences between it and other DEs, lots of topics</li>
<li>If you&#39;re more of a visual person, fear not, because...</li>
<li>We&#39;ll have Ken on <em>next week</em>, including a full &quot;virtual walkthrough&quot; of Lumina and its applications
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G3KL6lv" rel="nofollow">Ghislain writes in</a></li>
<li><a href="http://slexy.org/view/s21USZdk2D" rel="nofollow">Raynold writes in</a></li>
<li><a href="http://slexy.org/view/s2IWAfkDfX" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s2OBhezoDV" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s22h9RhXUy" rel="nofollow">Stefan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our one year anniversary episode, and we&#39;ll be talking with Reyk Floeter about the new OpenBSD webserver - why it was created and where it&#39;s going. After that, we&#39;ll show you the ins and outs of DragonFly&#39;s HAMMER FS. Answers to viewer-submitted questions and the latest headlines, on a very special BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/freebsd-foundation-announces-ipsec.html" rel="nofollow">FreeBSD foundation&#39;s new IPSEC project</a></h3>

<ul>
<li>The FreeBSD foundation, along with Netgate, is sponsoring some new work on the IPSEC code</li>
<li>With bandwidth in the 10-40 gigabit per second range, the IPSEC stack needs to be brought up to modern standards in terms of encryption and performance</li>
<li>This new work will add AES-CTR and AES-GCM modes to FreeBSD&#39;s implementation, borrowing some code from OpenBSD</li>
<li>The updated stack will also support AES-NI for hardware-based encryption speed ups</li>
<li>It&#39;s expected to be completed by the end of September, and will also be in pfSense 2.2
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/31/msg000667.html" rel="nofollow">NetBSD at Shimane Open Source Conference 2014</a></h3>

<ul>
<li>The Japanese NetBSD users group held a NetBSD booth at the Open Source Conference 2014 in Shimane on August 23</li>
<li>One of the developers has gathered a bunch of pictures from the event and wrote a fairly lengthy summary</li>
<li>They had NetBSD running on all sorts of devices, from Raspberry Pis to Sun Java Stations</li>
<li>Some visitors said that NetBSD had the most chaotic booth at the conference
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1401" rel="nofollow">pfSense 2.1.5 released</a></h3>

<ul>
<li>A new version of the pfSense 2.1 branch is out</li>
<li>Mostly a security-focused release, including three web UI fixes and the most recent OpenSSL fix (which FreeBSD has <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-August/007875.html" rel="nofollow">still not patched</a> in -RELEASE after nearly a month)</li>
<li>It also includes many other bug fixes, check the blog post for the full list
***</li>
</ul>

<h3><a href="http://msrvideo.vo.msecnd.net/rmcvideos/227133/dl/227133.mp4" rel="nofollow">Systems, Science and FreeBSD</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">George Neville-Neil</a> gave a presentation at Microsoft Research</li>
<li>It&#39;s mainly about using FreeBSD as a platform for research, inside and outside of universities</li>
<li>The talk describes the OS and its features, ports, developer community, documentation, who uses BSD and much more
***</li>
</ul>

<h2>Interview - Reyk Floeter - <a href="mailto:reyk@openbsd.org" rel="nofollow">reyk@openbsd.org</a> / <a href="https://twitter.com/reykfloeter" rel="nofollow">@reykfloeter</a></h2>

<p>OpenBSD&#39;s HTTP daemon</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/hammer" rel="nofollow">A crash course on HAMMER FS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://brynet.biz.tm/article-rcctl.html" rel="nofollow">OpenBSD&#39;s rcctl tool usage</a></h3>

<ul>
<li>OpenBSD recently <a href="http://undeadly.org/cgi?action=article&sid=20140820090351" rel="nofollow">got a new tool</a> for managing /etc/rc.conf.local in -current</li>
<li>Similar to FreeBSD&#39;s &quot;sysrc&quot; tool, it eliminates the need to manually edit rc.conf.local to enable or disable services</li>
<li>This blog post - from a BSD Now viewer - shows the typical usage of the new tool to alter the startup services</li>
<li>It won&#39;t make it to 5.6, but will be in 5.7 (next May)
***</li>
</ul>

<h3><a href="http://mateh.id.au/2014/08/stream-netflix-chromecast-using-pfsense/" rel="nofollow">pfSense mini-roundup</a></h3>

<ul>
<li>We found five interesting pfSense articles throughout the week and wanted to quickly mention them</li>
<li>The first item in our pfSense mini-roundup details how you can stream Netflix to in non-US countries using a &quot;smart&quot; DNS service</li>
<li>The <a href="http://theosquest.com/2014/08/28/ipv6-with-comcast-and-pfsense/" rel="nofollow">second post</a> talks about setting ip IPv6, in particular if Comcast is your ISP</li>
<li>The <a href="http://news.softpedia.com/news/PfSense-2-1-5-Is-Free-and-Powerful-FreeBSD-based-Firewall-Operating-System-457097.shtml" rel="nofollow">third one</a> features pfSense on Softpedia, a more mainstream tech site</li>
<li>The <a href="http://sichent.wordpress.com/2014/02/22/filtering-https-traffic-with-squid-on-pfsense-2-1/" rel="nofollow">fourth post</a> describes how to filter HTTPS traffic with Squid and pfSense</li>
<li>The <a href="http://pfsensesetup.com/vpn-tunneling-with-tinc/" rel="nofollow">last article</a> describes setting up a VPN using the &quot;<a href="https://en.wikipedia.org/wiki/Tinc_%28protocol%29" rel="nofollow">tinc</a>&quot; daemon and pfSense</li>
<li>It seems to be lesser known, compared to things like OpenVPN or SSH tunnels, so it&#39;s interesting to read about</li>
<li>This pfSense HQ website seems to have lots of other cool pfSense items, check it out
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/2Q-buffer-cache-algorithm" rel="nofollow">OpenBSD&#39;s new buffer cache</a></h3>

<ul>
<li>OpenBSD has traditionally used the tried-and-true LRU algorithm for buffer cache, but it has a few problems</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has just switched to a new algorithm in -current, partially based on 2Q, and details some of his work</li>
<li>Initial tests show positive results in terms of cache responsiveness</li>
<li>Check the post for all the fine details
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/08/bsdtalk244-lumina-desktop-environment.html" rel="nofollow">BSDTalk episode 244</a></h3>

<ul>
<li>Another new BSDTalk is up and, this time around, <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">Will Backman</a> interviews Ken Moore, the developer of the new BSD desktop environment</li>
<li>They discuss the history of development, differences between it and other DEs, lots of topics</li>
<li>If you&#39;re more of a visual person, fear not, because...</li>
<li>We&#39;ll have Ken on <em>next week</em>, including a full &quot;virtual walkthrough&quot; of Lumina and its applications
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21G3KL6lv" rel="nofollow">Ghislain writes in</a></li>
<li><a href="http://slexy.org/view/s21USZdk2D" rel="nofollow">Raynold writes in</a></li>
<li><a href="http://slexy.org/view/s2IWAfkDfX" rel="nofollow">Van writes in</a></li>
<li><a href="http://slexy.org/view/s2OBhezoDV" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s22h9RhXUy" rel="nofollow">Stefan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>52: Reverse Takeover</title>
  <link>https://www.bsdnow.tv/52</link>
  <guid isPermaLink="false">67ad6e78-144e-4d1c-a713-49b54e5b679e</guid>
  <pubDate>Wed, 27 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/67ad6e78-144e-4d1c-a713-49b54e5b679e.mp3" length="53663188" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we'll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:14:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we'll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation August update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The foundation has published a new PDF detailing some of their recent activities&lt;/li&gt;
&lt;li&gt;It includes project development updates, the 10.1-RELEASE schedule and some of its new features&lt;/li&gt;
&lt;li&gt;There is also a short interview with &lt;a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" target="_blank" rel="nofollow noopener"&gt;Dru Lavigne&lt;/a&gt; in the "voices from the community" section&lt;/li&gt;
&lt;li&gt;If you're into hardware, there's another section about some new FreeBSD server equipment&lt;/li&gt;
&lt;li&gt;In closing, there's an update on funding too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" target="_blank" rel="nofollow noopener"&gt;NSD for an authoritative nameserver&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup&lt;/li&gt;
&lt;li&gt;This article shows how to use NSD for an authoritative DNS nameserver&lt;/li&gt;
&lt;li&gt;It's also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)&lt;/li&gt;
&lt;li&gt;All the instructions are presented very neatly, with all the little details included&lt;/li&gt;
&lt;li&gt;Less BIND means less vulnerabilities, everybody's happy
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=140873518514033&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;BIND and Nginx removed from OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While we're on the topic of DNS servers, BIND was finally removed from OpenBSD as well&lt;/li&gt;
&lt;li&gt;The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)&lt;/li&gt;
&lt;li&gt;They've also &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=140908174910713&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;removed nginx&lt;/a&gt; from the base system, in favor of the new custom HTTP daemon&lt;/li&gt;
&lt;li&gt;BIND and Nginx are still available in ports if you don't want to switch&lt;/li&gt;
&lt;li&gt;We're hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on&lt;/li&gt;
&lt;li&gt;With Apache gone in the upcoming 5.6, It's also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/tsutsuii/videos" target="_blank" rel="nofollow noopener"&gt;NetBSD demo videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A Japanese NetBSD developer has been uploading lots of interesting videos&lt;/li&gt;
&lt;li&gt;Unsurprisingly, they're all featuring NetBSD running on exotic and weird hardware&lt;/li&gt;
&lt;li&gt;Most of them are demoing sound or running a modern Twitter client on an ancient computer&lt;/li&gt;
&lt;li&gt;They're from the same guy that did the conference wrap-up we mentioned recently
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Shawn Webb - &lt;a href="mailto:shawn.webb@hardenedbsd.org" target="_blank" rel="nofollow noopener"&gt;shawn.webb@hardenedbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/lattera" target="_blank" rel="nofollow noopener"&gt;@lattera&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Address space layout randomization &lt;a href="http://hardenedbsd.org/" target="_blank" rel="nofollow noopener"&gt;in FreeBSD&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/reverse-ssh" target="_blank" rel="nofollow noopener"&gt;Reverse SSH tunneling&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" target="_blank" rel="nofollow noopener"&gt;Puppet master-agent installation on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got a lot of BSD boxes under your control, or if you're just lazy, you've probably looked into Puppet before&lt;/li&gt;
&lt;li&gt;The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own&lt;/li&gt;
&lt;li&gt;He goes through some advantages of using this type of tool for deployments, even when you don't have a huge number of systems&lt;/li&gt;
&lt;li&gt;The rest of the post explains how to set up both the master and the agent configurations
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" target="_blank" rel="nofollow noopener"&gt;Misc. pfSense items&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We found a few miscellaneous pfSense articles this past week &lt;/li&gt;
&lt;li&gt;The first one is about the hunt for the "ultimate" free open source firewall, where pfSense is obviously a strong contender&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" target="_blank" rel="nofollow noopener"&gt;The second one&lt;/a&gt; shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" target="_blank" rel="nofollow noopener"&gt;the third&lt;/a&gt;, you can see how to automatically back up your configuration files&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" target="_blank" rel="nofollow noopener"&gt;The fourth item&lt;/a&gt; shows how to set up PXE booting with pfSense, similar to one of our tutorials
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" target="_blank" rel="nofollow noopener"&gt;Time Machine backups on ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive "time capsule"&lt;/li&gt;
&lt;li&gt;This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system&lt;/li&gt;
&lt;li&gt;With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive&lt;/li&gt;
&lt;li&gt;Surprisingly simple to do, recommended for anyone with Macs on their network
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" target="_blank" rel="nofollow noopener"&gt;Lumina desktop preview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely&lt;/li&gt;
&lt;li&gt;The main developer has posted an update on the PCBSD blog with some screenshots&lt;/li&gt;
&lt;li&gt;Lots of new features have been added, many of which are documented in the post&lt;/li&gt;
&lt;li&gt;There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21eLBvf1l" target="_blank" rel="nofollow noopener"&gt;Gary writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20xqTKNrf" target="_blank" rel="nofollow noopener"&gt;Cedric writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21q428tPj" target="_blank" rel="nofollow noopener"&gt;Caldwell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2uVLhqCaO" target="_blank" rel="nofollow noopener"&gt;Cary writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, tunnel, reverse tunnel, encryption, aslr, pie, address space layout randomization, position-independent executables, nsd, bind, unbound, dns server, pfsense, shawn webb, time machine, os x, nginx</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we&#39;ll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" rel="nofollow">FreeBSD foundation August update</a></h3>

<ul>
<li>The foundation has published a new PDF detailing some of their recent activities</li>
<li>It includes project development updates, the 10.1-RELEASE schedule and some of its new features</li>
<li>There is also a short interview with <a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a> in the &quot;voices from the community&quot; section</li>
<li>If you&#39;re into hardware, there&#39;s another section about some new FreeBSD server equipment</li>
<li>In closing, there&#39;s an update on funding too
***</li>
</ul>

<h3><a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" rel="nofollow">NSD for an authoritative nameserver</a></h3>

<ul>
<li>With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup</li>
<li>This article shows how to use NSD for an authoritative DNS nameserver</li>
<li>It&#39;s also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)</li>
<li>All the instructions are presented very neatly, with all the little details included</li>
<li>Less BIND means less vulnerabilities, everybody&#39;s happy
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=140873518514033&w=2" rel="nofollow">BIND and Nginx removed from OpenBSD</a></h3>

<ul>
<li>While we&#39;re on the topic of DNS servers, BIND was finally removed from OpenBSD as well</li>
<li>The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)</li>
<li>They&#39;ve also <a href="http://marc.info/?l=openbsd-cvs&m=140908174910713&w=2" rel="nofollow">removed nginx</a> from the base system, in favor of the new custom HTTP daemon</li>
<li>BIND and Nginx are still available in ports if you don&#39;t want to switch</li>
<li>We&#39;re hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on</li>
<li>With Apache gone in the upcoming 5.6, It&#39;s also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/tsutsuii/videos" rel="nofollow">NetBSD demo videos</a></h3>

<ul>
<li>A Japanese NetBSD developer has been uploading lots of interesting videos</li>
<li>Unsurprisingly, they&#39;re all featuring NetBSD running on exotic and weird hardware</li>
<li>Most of them are demoing sound or running a modern Twitter client on an ancient computer</li>
<li>They&#39;re from the same guy that did the conference wrap-up we mentioned recently
***</li>
</ul>

<h2>Interview - Shawn Webb - <a href="mailto:shawn.webb@hardenedbsd.org" rel="nofollow">shawn.webb@hardenedbsd.org</a> / <a href="https://twitter.com/lattera" rel="nofollow">@lattera</a></h2>

<p>Address space layout randomization <a href="http://hardenedbsd.org/" rel="nofollow">in FreeBSD</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/reverse-ssh" rel="nofollow">Reverse SSH tunneling</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" rel="nofollow">Puppet master-agent installation on FreeBSD</a></h3>

<ul>
<li>If you&#39;ve got a lot of BSD boxes under your control, or if you&#39;re just lazy, you&#39;ve probably looked into Puppet before</li>
<li>The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own</li>
<li>He goes through some advantages of using this type of tool for deployments, even when you don&#39;t have a huge number of systems</li>
<li>The rest of the post explains how to set up both the master and the agent configurations
***</li>
</ul>

<h3><a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" rel="nofollow">Misc. pfSense items</a></h3>

<ul>
<li>We found a few miscellaneous pfSense articles this past week </li>
<li>The first one is about the hunt for the &quot;ultimate&quot; free open source firewall, where pfSense is obviously a strong contender</li>
<li><a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" rel="nofollow">The second one</a> shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)</li>
<li>In <a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" rel="nofollow">the third</a>, you can see how to automatically back up your configuration files</li>
<li><a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" rel="nofollow">The fourth item</a> shows how to set up PXE booting with pfSense, similar to one of our tutorials
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" rel="nofollow">Time Machine backups on ZFS</a></h3>

<ul>
<li>If you&#39;ve got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive &quot;time capsule&quot;</li>
<li>This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system</li>
<li>With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive</li>
<li>Surprisingly simple to do, recommended for anyone with Macs on their network
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" rel="nofollow">Lumina desktop preview</a></h3>

<ul>
<li>Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely</li>
<li>The main developer has posted an update on the PCBSD blog with some screenshots</li>
<li>Lots of new features have been added, many of which are documented in the post</li>
<li>There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21eLBvf1l" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s20xqTKNrf" rel="nofollow">Cedric writes in</a></li>
<li><a href="http://slexy.org/view/s21q428tPj" rel="nofollow">Caldwell writes in</a></li>
<li><a href="http://slexy.org/view/s2uVLhqCaO" rel="nofollow">Cary writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be chatting with Shawn Webb about his recent work with ASLR and PIE in FreeBSD. After that, we&#39;ll be showing you how you can create a reverse SSH tunnel to a system behind a firewall... how sneaky. Answers to your emails plus the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014augupdate.pdf" rel="nofollow">FreeBSD foundation August update</a></h3>

<ul>
<li>The foundation has published a new PDF detailing some of their recent activities</li>
<li>It includes project development updates, the 10.1-RELEASE schedule and some of its new features</li>
<li>There is also a short interview with <a href="http://www.bsdnow.tv/episodes/2014_04_09-pxe_dust" rel="nofollow">Dru Lavigne</a> in the &quot;voices from the community&quot; section</li>
<li>If you&#39;re into hardware, there&#39;s another section about some new FreeBSD server equipment</li>
<li>In closing, there&#39;s an update on funding too
***</li>
</ul>

<h3><a href="http://www.prado.it/2014/08/20/how-to-run-master-nsd-on-freebsd-10-0/" rel="nofollow">NSD for an authoritative nameserver</a></h3>

<ul>
<li>With BIND having been removed from FreeBSD 10.0, you might be looking to replace your old DNS setup</li>
<li>This article shows how to use NSD for an authoritative DNS nameserver</li>
<li>It&#39;s also got a link to a similar article on Unbound, the new favorite recursive and caching resolver (they work great together)</li>
<li>All the instructions are presented very neatly, with all the little details included</li>
<li>Less BIND means less vulnerabilities, everybody&#39;s happy
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=140873518514033&w=2" rel="nofollow">BIND and Nginx removed from OpenBSD</a></h3>

<ul>
<li>While we&#39;re on the topic of DNS servers, BIND was finally removed from OpenBSD as well</li>
<li>The base system contains both NSD and Unbound, so users can transition over between 5.6 (November of this year) and 5.7 (May of next year)</li>
<li>They&#39;ve also <a href="http://marc.info/?l=openbsd-cvs&m=140908174910713&w=2" rel="nofollow">removed nginx</a> from the base system, in favor of the new custom HTTP daemon</li>
<li>BIND and Nginx are still available in ports if you don&#39;t want to switch</li>
<li>We&#39;re hoping to have Reyk Floeter on the show next week to talk about it, but scheduling might not work out, so it may be a little later on</li>
<li>With Apache gone in the upcoming 5.6, It&#39;s also likely that sendmail will be removed before 5.7 - hooray for modern alternatives
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/tsutsuii/videos" rel="nofollow">NetBSD demo videos</a></h3>

<ul>
<li>A Japanese NetBSD developer has been uploading lots of interesting videos</li>
<li>Unsurprisingly, they&#39;re all featuring NetBSD running on exotic and weird hardware</li>
<li>Most of them are demoing sound or running a modern Twitter client on an ancient computer</li>
<li>They&#39;re from the same guy that did the conference wrap-up we mentioned recently
***</li>
</ul>

<h2>Interview - Shawn Webb - <a href="mailto:shawn.webb@hardenedbsd.org" rel="nofollow">shawn.webb@hardenedbsd.org</a> / <a href="https://twitter.com/lattera" rel="nofollow">@lattera</a></h2>

<p>Address space layout randomization <a href="http://hardenedbsd.org/" rel="nofollow">in FreeBSD</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/reverse-ssh" rel="nofollow">Reverse SSH tunneling</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://deuterion.net/puppet-master-agent-installation-on-freebsd/" rel="nofollow">Puppet master-agent installation on FreeBSD</a></h3>

<ul>
<li>If you&#39;ve got a lot of BSD boxes under your control, or if you&#39;re just lazy, you&#39;ve probably looked into Puppet before</li>
<li>The author claims a lack of BSD-specific Puppet documentation, so he decided to write up some notes of his own</li>
<li>He goes through some advantages of using this type of tool for deployments, even when you don&#39;t have a huge number of systems</li>
<li>The rest of the post explains how to set up both the master and the agent configurations
***</li>
</ul>

<h3><a href="http://www.mondaiji.com/blog/other/it/10175-the-hunt-for-the-ultimate-free-open-source-firewall-distro" rel="nofollow">Misc. pfSense items</a></h3>

<ul>
<li>We found a few miscellaneous pfSense articles this past week </li>
<li>The first one is about the hunt for the &quot;ultimate&quot; free open source firewall, where pfSense is obviously a strong contender</li>
<li><a href="http://willbradley.name/2014/08/20/logging-natfirewallstate-entries-in-pfsense/" rel="nofollow">The second one</a> shows how to log NAT firewall states (a good way to find out which family member has been torrenting!)</li>
<li>In <a href="http://www.proteansec.com/linux/pfsense-automatically-backup-configuration-files/" rel="nofollow">the third</a>, you can see how to automatically back up your configuration files</li>
<li><a href="https://vidarw.wordpress.com/2014/07/09/network-boot-with-pfsense-and-tftpd32/" rel="nofollow">The fourth item</a> shows how to set up PXE booting with pfSense, similar to one of our tutorials
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/timemachine-backups-on-freebsd-10" rel="nofollow">Time Machine backups on ZFS</a></h3>

<ul>
<li>If you&#39;ve got a Mac you need to keep backed up, a FreeBSD server with ZFS can take the place of an expensive &quot;time capsule&quot;</li>
<li>This post walks you through setting up netatalk and mDNS for a very versatile Time Machine backup system</li>
<li>With a single command on the OS X side, you can write to and read from the BSD box just like a regular external drive</li>
<li>Surprisingly simple to do, recommended for anyone with Macs on their network
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/08/pc-bsd-10-0-3-preview-lumina-desktop/" rel="nofollow">Lumina desktop preview</a></h3>

<ul>
<li>Lumina, the BSD-exclusive desktop environment, seems to be coming along nicely</li>
<li>The main developer has posted an update on the PCBSD blog with some screenshots</li>
<li>Lots of new features have been added, many of which are documented in the post</li>
<li>There just might be a BSD Now episode about Lumina coming up.. (cough cough)
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21eLBvf1l" rel="nofollow">Gary writes in</a></li>
<li><a href="http://slexy.org/view/s20xqTKNrf" rel="nofollow">Cedric writes in</a></li>
<li><a href="http://slexy.org/view/s21q428tPj" rel="nofollow">Caldwell writes in</a></li>
<li><a href="http://slexy.org/view/s2uVLhqCaO" rel="nofollow">Cary writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>51: Engineering Nginx</title>
  <link>https://www.bsdnow.tv/51</link>
  <guid isPermaLink="false">4502bfee-e803-4a0d-bdcc-fd4420b30bb1</guid>
  <pubDate>Wed, 20 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4502bfee-e803-4a0d-bdcc-fd4420b30bb1.mp3" length="62975956" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:27</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up on the show, we'll be showing you how to set up a secure, SSL-only webserver. There's also an interview with Eric Le Blan about community participation and FreeBSD's role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" target="_blank" rel="nofollow noopener"&gt;Password gropers take spamtrap bait&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" target="_blank" rel="nofollow noopener"&gt;Peter Hansteen&lt;/a&gt;, who keeps his eyes glued to his log files, has a new blog post&lt;/li&gt;
&lt;li&gt;He seems to have discovered another new weird phenomenon in his pop3 logs&lt;/li&gt;
&lt;li&gt;"yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia"&lt;/li&gt;
&lt;li&gt;Someone tried to log in to his service with an address that was known to be invalid&lt;/li&gt;
&lt;li&gt;The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" target="_blank" rel="nofollow noopener"&gt;Inside the Atheros wifi chipset&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adrian Chadd - sometimes known in the FreeBSD community as "the wireless guy" - gave a talk at the Defcon Wireless Village 2014&lt;/li&gt;
&lt;li&gt;He covers a lot of topics on wifi, specifically on Atheros chips and why they're so popular for open source development&lt;/li&gt;
&lt;li&gt;There's a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards&lt;/li&gt;
&lt;li&gt;Very technical talk; some parts might go over your head if you're not a driver developer&lt;/li&gt;
&lt;li&gt;The raw video file is also available &lt;a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" target="_blank" rel="nofollow noopener"&gt;to download&lt;/a&gt; on archive.org&lt;/li&gt;
&lt;li&gt;Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" target="_blank" rel="nofollow noopener"&gt;Trip report and hackathon mini-roundup&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted&lt;/li&gt;
&lt;li&gt;Mark Linimon mentions some of the future plans for FreeBSD's release engineering and ports&lt;/li&gt;
&lt;li&gt;Bapt &lt;a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" target="_blank" rel="nofollow noopener"&gt;also has a BSDCan report&lt;/a&gt; detailing his work on ports and packages&lt;/li&gt;
&lt;li&gt;Antoine Jacoutot &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140812064946" target="_blank" rel="nofollow noopener"&gt;writes about&lt;/a&gt; his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout&lt;/li&gt;
&lt;li&gt;Peter Hessler, a latecomer to the hackathon, &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140806125308" target="_blank" rel="nofollow noopener"&gt;details his experience&lt;/a&gt; too, hacking on the installer and built-in upgrade function&lt;/li&gt;
&lt;li&gt;Christian Weisgerber &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140803122705" target="_blank" rel="nofollow noopener"&gt;talks about&lt;/a&gt; starting some initial improvements of OpenBSD's ports infrastructure
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" target="_blank" rel="nofollow noopener"&gt;DragonFly BSD 3.8.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Although it was already branched, the release media is now available for DragonFly 3.8.2&lt;/li&gt;
&lt;li&gt;This is a minor update, mostly to fix the recent OpenSSL vulnerabilities&lt;/li&gt;
&lt;li&gt;It also includes some various other small fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Eric Le Blan - &lt;a href="mailto:info@xinuos.com" target="_blank" rel="nofollow noopener"&gt;info@xinuos.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Xinuos' recent FreeBSD integration, BSD in the commercial server space&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/nginx" target="_blank" rel="nofollow noopener"&gt;Building a hardened, feature-rich webserver&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" target="_blank" rel="nofollow noopener"&gt;Defend your network and privacy, FreeBSD version&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in &lt;a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" target="_blank" rel="nofollow noopener"&gt;episode 39&lt;/a&gt;, we covered a blog post about creating an OpenBSD gateway - partly based on &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This is a follow-up post, by the same author, about doing a similar thing with FreeBSD&lt;/li&gt;
&lt;li&gt;He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs&lt;/li&gt;
&lt;li&gt;The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" target="_blank" rel="nofollow noopener"&gt;Don't encrypt all the things&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another couple of interesting blog posts from &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; about encryption&lt;/li&gt;
&lt;li&gt;It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good&lt;/li&gt;
&lt;li&gt;After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie&lt;/li&gt;
&lt;li&gt;He also talks a bit about some PGP weaknesses and a possible future replacement&lt;/li&gt;
&lt;li&gt;He also has another, similar post entitled "&lt;a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" target="_blank" rel="nofollow noopener"&gt;in defense of opportunistic encryption&lt;/a&gt;"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=270096" target="_blank" rel="nofollow noopener"&gt;New automounter lands in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The work on the new automounter has just landed in 11-CURRENT&lt;/li&gt;
&lt;li&gt;With help from the FreeBSD Foundation, we'll have a new "autofs" kernel option&lt;/li&gt;
&lt;li&gt;Check the SVN viewer online to read over the man pages if you're not running -CURRENT&lt;/li&gt;
&lt;li&gt;You can also read a bit about it in the &lt;a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" target="_blank" rel="nofollow noopener"&gt;recent newsletter&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.7 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It's been a little while since the last OpenSSH release, but 6.7 is almost ready&lt;/li&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt; issued a call for testing for the upcoming version, which includes a fair amount of new features&lt;/li&gt;
&lt;li&gt;It includes some old code removal, some new features and some internal reworkings - we'll cover the full list in detail when it's released&lt;/li&gt;
&lt;li&gt;This version also officially supports being built with LibreSSL now&lt;/li&gt;
&lt;li&gt;Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20yIP7VXa" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2DeeUjAn6" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216imwEb0" target="_blank" rel="nofollow noopener"&gt;Francis writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2oc8vavWe" target="_blank" rel="nofollow noopener"&gt;Frank writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20wL61sSr" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, xinuos, cloud computing, hosting solution, nginx, webserver, httpd, spamd, atheros, wifi, aircrack-ng, kismet, defcon, wireless, bsdcan, hackathon, autofs, automounter, https, tls, ssl, openssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up on the show, we&#39;ll be showing you how to set up a secure, SSL-only webserver. There&#39;s also an interview with Eric Le Blan about community participation and FreeBSD&#39;s role in the commercial server space. All that and more, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://bsdly.blogspot.com/2014/08/password-gropers-take-spamtrap-bait.html" rel="nofollow">Password gropers take spamtrap bait</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_04_30-puffy_firewall" rel="nofollow">Peter Hansteen</a>, who keeps his eyes glued to his log files, has a new blog post</li>
<li>He seems to have discovered another new weird phenomenon in his pop3 logs</li>
<li>&quot;yes, I still run one, for the same bad reasons more than a third of my readers probably do: inertia&quot;</li>
<li>Someone tried to log in to his service with an address that was known to be invalid</li>
<li>The rest of the post goes into detail about his theory of why someone would use a list of invalid addresses for this purpose
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=WOcYTqoSQ68" rel="nofollow">Inside the Atheros wifi chipset</a></h3>

<ul>
<li>Adrian Chadd - sometimes known in the FreeBSD community as &quot;the wireless guy&quot; - gave a talk at the Defcon Wireless Village 2014</li>
<li>He covers a lot of topics on wifi, specifically on Atheros chips and why they&#39;re so popular for open source development</li>
<li>There&#39;s a lot of great information in the presentation, including cool (and evil) things you can do with wireless cards</li>
<li>Very technical talk; some parts might go over your head if you&#39;re not a driver developer</li>
<li>The raw video file is also available <a href="https://archive.org/download/WirelessVillageAtDefCon22/20-Atheros.mp4" rel="nofollow">to download</a> on archive.org</li>
<li>Adrian has also recently worked on getting Kismet and Aircrack-NG to work better with FreeBSD, including packet injection and other fun things
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-mark-linimon.html" rel="nofollow">Trip report and hackathon mini-roundup</a></h3>

<ul>
<li>A few more (late) reports from BSDCan and the latest OpenBSD hackathon have been posted</li>
<li>Mark Linimon mentions some of the future plans for FreeBSD&#39;s release engineering and ports</li>
<li>Bapt <a href="http://freebsdfoundation.blogspot.com/2014/08/bsdcan-trip-report-baptiste-daroussin.html" rel="nofollow">also has a BSDCan report</a> detailing his work on ports and packages</li>
<li>Antoine Jacoutot <a href="http://undeadly.org/cgi?action=article&sid=20140812064946" rel="nofollow">writes about</a> his work at the most recent hackathon, working with rc configuration and a new /etc/examples layout</li>
<li>Peter Hessler, a latecomer to the hackathon, <a href="http://undeadly.org/cgi?action=article&sid=20140806125308" rel="nofollow">details his experience</a> too, hacking on the installer and built-in upgrade function</li>
<li>Christian Weisgerber <a href="http://undeadly.org/cgi?action=article&sid=20140803122705" rel="nofollow">talks about</a> starting some initial improvements of OpenBSD&#39;s ports infrastructure
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-August/270573.html" rel="nofollow">DragonFly BSD 3.8.2 released</a></h3>

<ul>
<li>Although it was already branched, the release media is now available for DragonFly 3.8.2</li>
<li>This is a minor update, mostly to fix the recent OpenSSL vulnerabilities</li>
<li>It also includes some various other small fixes
***</li>
</ul>

<h2>Interview - Eric Le Blan - <a href="mailto:info@xinuos.com" rel="nofollow">info@xinuos.com</a></h2>

<p>Xinuos&#39; recent FreeBSD integration, BSD in the commercial server space</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nginx" rel="nofollow">Building a hardened, feature-rich webserver</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://networkfilter.blogspot.com/2014/08/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy, FreeBSD version</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_05_28-the_friendly_sandbox" rel="nofollow">episode 39</a>, we covered a blog post about creating an OpenBSD gateway - partly based on <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a></li>
<li>This is a follow-up post, by the same author, about doing a similar thing with FreeBSD</li>
<li>He mentions some of the advantages and disadvantages between the two operating systems, and encourages users to decide for themselves which one suits their needs</li>
<li>The rest is pretty much the same things: firewall, VPN, DHCP server, DNSCrypt, etc.
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/dont-encrypt-all-the-things" rel="nofollow">Don&#39;t encrypt all the things</a></h3>

<ul>
<li>Another couple of interesting blog posts from <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> about encryption</li>
<li>It talks about how Google recently started ranking sites with HTTPS higher in their search results, and then reflects on how sometimes encryption does more harm than good</li>
<li>After heartbleed, the ones who might be able to decrypt your emails went from just a three-letter agency to any script kiddie</li>
<li>He also talks a bit about some PGP weaknesses and a possible future replacement</li>
<li>He also has another, similar post entitled &quot;<a href="http://www.tedunangst.com/flak/post/in-defense-of-opportunistic-encryption" rel="nofollow">in defense of opportunistic encryption</a>&quot;
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=270096" rel="nofollow">New automounter lands in FreeBSD</a></h3>

<ul>
<li>The work on the new automounter has just landed in 11-CURRENT</li>
<li>With help from the FreeBSD Foundation, we&#39;ll have a new &quot;autofs&quot; kernel option</li>
<li>Check the SVN viewer online to read over the man pages if you&#39;re not running -CURRENT</li>
<li>You can also read a bit about it in the <a href="https://www.freebsdfoundation.org/press/2014jul-newsletter#Project3" rel="nofollow">recent newsletter</a>
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-August/032810.html" rel="nofollow">OpenSSH 6.7 CFT</a></h3>

<ul>
<li>It&#39;s been a little while since the last OpenSSH release, but 6.7 is almost ready</li>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> issued a call for testing for the upcoming version, which includes a fair amount of new features</li>
<li>It includes some old code removal, some new features and some internal reworkings - we&#39;ll cover the full list in detail when it&#39;s released</li>
<li>This version also officially supports being built with LibreSSL now</li>
<li>Help test it out and report any findings, especially if you have access to something a little more exotic than just a BSD system
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20yIP7VXa" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2DeeUjAn6" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s216imwEb0" rel="nofollow">Francis writes in</a></li>
<li><a href="http://slexy.org/view/s2oc8vavWe" rel="nofollow">Frank writes in</a></li>
<li><a href="http://slexy.org/view/s20wL61sSr" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>50: VPN, My Dear Watson</title>
  <link>https://www.bsdnow.tv/50</link>
  <guid isPermaLink="false">b0306dc5-ee87-4a03-aeea-9a89b915ff5e</guid>
  <pubDate>Wed, 13 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/b0306dc5-ee87-4a03-aeea-9a89b915ff5e.mp3" length="62998996" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's our 50th episode, and we're going to show you how to protect your internet traffic with a BSD-based VPN. We'll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" target="_blank" rel="nofollow noopener"&gt;MeetBSD 2014 is approaching&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California&lt;/li&gt;
&lt;li&gt;MeetBSD has an "unconference" format, which means there will be both planned talks and community events&lt;/li&gt;
&lt;li&gt;All the extra details will be on &lt;a href="https://www.meetbsd.com/" target="_blank" rel="nofollow noopener"&gt;their site&lt;/a&gt; soon&lt;/li&gt;
&lt;li&gt;It also has hotels and various other bits of useful information - hopefully with more info on the talks to come&lt;/li&gt;
&lt;li&gt;Of course, EuroBSDCon is coming up before then
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" target="_blank" rel="nofollow noopener"&gt;First experiences with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post that leads off with "tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven't tried before"&lt;/li&gt;
&lt;li&gt;The author read the famous "&lt;a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" target="_blank" rel="nofollow noopener"&gt;BSD for Linux users&lt;/a&gt;" series (that most of us have surely seen) and decided to give BSD a try&lt;/li&gt;
&lt;li&gt;He details his different OS and distro history, concluding with how he "eventually became annoyed at the poor quality of Linux userland software"&lt;/li&gt;
&lt;li&gt;From there, it talks about how he used the OpenBSD USB image and got a fully-working system&lt;/li&gt;
&lt;li&gt;He especially liked the simplicity of OpenBSD's "hostname.if" system for network configuration&lt;/li&gt;
&lt;li&gt;Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" target="_blank" rel="nofollow noopener"&gt;NetBSD rump kernels on bare metal (and Kansai OSC report)&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;When you're developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right&lt;/li&gt;
&lt;li&gt;However, NetBSD's rump kernels - a very unique concept - make this process a lot easier&lt;/li&gt;
&lt;li&gt;This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week&lt;/li&gt;
&lt;li&gt;Also have a look back at &lt;a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" target="_blank" rel="nofollow noopener"&gt;episode 8&lt;/a&gt; for our interview about rump kernels and what exactly they do&lt;/li&gt;
&lt;li&gt;While on the topic of NetBSD, there were also a couple of &lt;a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" target="_blank" rel="nofollow noopener"&gt;very detailed reports&lt;/a&gt; (with lots of pictures!) of the various NetBSD-themed booths at the 2014 &lt;a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" target="_blank" rel="nofollow noopener"&gt;Kansai Open Source Conference&lt;/a&gt; that we wanted to highlight
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.openssl.org/news/secadv_20140806.txt" target="_blank" rel="nofollow noopener"&gt;OpenSSL and LibreSSL updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)&lt;/li&gt;
&lt;li&gt;Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140752295222929&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;LibreSSL released a new version&lt;/a&gt; to address most of the vulnerabilities, but wasn't affected by some of them&lt;/li&gt;
&lt;li&gt;Whichever version of whatever SSL you use, make sure it's patched for these issues&lt;/li&gt;
&lt;li&gt;DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Robert Watson - &lt;a href="mailto:rwatson@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rwatson@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD architecture, security research techniques, exploit mitigation&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/openvpn" target="_blank" rel="nofollow noopener"&gt;Protecting traffic with a BSD-based VPN&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" target="_blank" rel="nofollow noopener"&gt;A FreeBSD-based CGit server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you use git (like a certain host of this show) then you've probably considered setting up your own server&lt;/li&gt;
&lt;li&gt;This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend&lt;/li&gt;
&lt;li&gt;It even shows you how to set up multiple repos with key-based user separation and other cool things&lt;/li&gt;
&lt;li&gt;The author of the post is also a listener of the show, thanks for sending it in!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" target="_blank" rel="nofollow noopener"&gt;Backup devices for small businesses&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this article, different methods of data storage and backup are compared&lt;/li&gt;
&lt;li&gt;After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer&lt;/li&gt;
&lt;li&gt;He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers&lt;/li&gt;
&lt;li&gt;It also goes over some of the hardware specifics in the FreeNAS Mini
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" target="_blank" rel="nofollow noopener"&gt;A new Xenocara interview&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As a follow up to last week's OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara&lt;/li&gt;
&lt;li&gt;If you're not familiar with Xenocara, it's OpenBSD's version of Xorg with some custom patches&lt;/li&gt;
&lt;li&gt;In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing&lt;/li&gt;
&lt;li&gt;Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it's natural for him to do a lot of the maintainership work there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" target="_blank" rel="nofollow noopener"&gt;Building a high performance FreeBSD samba server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what's the best solution?&lt;/li&gt;
&lt;li&gt;FreeBSD, ZFS and Samba obviously!&lt;/li&gt;
&lt;li&gt;The master image and related files clock in at over 20GB, and will be accessed at the same time by &lt;em&gt;all&lt;/em&gt; of those clients&lt;/li&gt;
&lt;li&gt;This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)&lt;/li&gt;
&lt;li&gt;It doesn't even require the newest or best hardware with the right changes, pretty cool
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" target="_blank" rel="nofollow noopener"&gt;An interesting Reddit thread&lt;/a&gt; (&lt;a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" target="_blank" rel="nofollow noopener"&gt;or two&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21t7L5bqO" target="_blank" rel="nofollow noopener"&gt;PB writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20MFywDqZ" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2Td6nq11J" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s215MlpJYV" target="_blank" rel="nofollow noopener"&gt;Lachlan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2N4JKkoKt" target="_blank" rel="nofollow noopener"&gt;Justin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, vpn, vps, openvpn, tunnel, ssh, security, exploit mitigation, zfs, lzo, tls, xenocara, x11, xorg, freenas, freenas mini, ixsystems, network attached storage, nas, meetbsd, rump kernels, libressl, openssl, kansai</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our 50th episode, and we&#39;re going to show you how to protect your internet traffic with a BSD-based VPN. We&#39;ll also be talking to Robert Watson, of the FreeBSD core team, about security research, exploit mitigation and a whole lot more. The latest news and answers to all of your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.ixsystems.com/whats-new/ixsystems-to-host-meetbsd-california-2014-at-western-digital-in-san-jose/" rel="nofollow">MeetBSD 2014 is approaching</a></h3>

<ul>
<li>The MeetBSD conference is coming up, and will be held on November 1st and 2nd in San Jose, California</li>
<li>MeetBSD has an &quot;unconference&quot; format, which means there will be both planned talks and community events</li>
<li>All the extra details will be on <a href="https://www.meetbsd.com/" rel="nofollow">their site</a> soon</li>
<li>It also has hotels and various other bits of useful information - hopefully with more info on the talks to come</li>
<li>Of course, EuroBSDCon is coming up before then
***</li>
</ul>

<h3><a href="https://www.azabani.com/2014/08/09/first-experiences-with-openbsd.html" rel="nofollow">First experiences with OpenBSD</a></h3>

<ul>
<li>A new blog post that leads off with &quot;tired of the sluggishness of Windows on my laptop and interested in experimenting with a Unix-like that I haven&#39;t tried before&quot;</li>
<li>The author read the famous &quot;<a href="http://www.over-yonder.net/%7Efullermd/rants/bsd4linux/01" rel="nofollow">BSD for Linux users</a>&quot; series (that most of us have surely seen) and decided to give BSD a try</li>
<li>He details his different OS and distro history, concluding with how he &quot;eventually became annoyed at the poor quality of Linux userland software&quot;</li>
<li>From there, it talks about how he used the OpenBSD USB image and got a fully-working system</li>
<li>He especially liked the simplicity of OpenBSD&#39;s &quot;hostname.if&quot; system for network configuration</li>
<li>Finally, he gets Xorg working and imports all his usual configuration files - seems to be a happy new user! 
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/an_internet_ready_os_from" rel="nofollow">NetBSD rump kernels on bare metal (and Kansai OSC report)</a></h3>

<ul>
<li>When you&#39;re developing a new OS or a very specialized custom solution, working drivers become one of the hardest things to get right</li>
<li>However, NetBSD&#39;s rump kernels - a very unique concept - make this process a lot easier</li>
<li>This blog post talks about the process of starting with just a rump kernel and expanding into an internet-ready system in just a week</li>
<li>Also have a look back at <a href="http://www.bsdnow.tv/episodes/2013_10_23-a_brief_intorduction" rel="nofollow">episode 8</a> for our interview about rump kernels and what exactly they do</li>
<li>While on the topic of NetBSD, there were also a couple of <a href="http://mail-index.netbsd.org/netbsd-advocacy/2014/08/09/msg000658.html" rel="nofollow">very detailed reports</a> (with lots of pictures!) of the various NetBSD-themed booths at the 2014 <a href="http://d.hatena.ne.jp/mizuno-as/20140806/1407307913" rel="nofollow">Kansai Open Source Conference</a> that we wanted to highlight
***</li>
</ul>

<h3><a href="https://www.openssl.org/news/secadv_20140806.txt" rel="nofollow">OpenSSL and LibreSSL updates</a></h3>

<ul>
<li>OpenSSL pushed out a few new versions, fixing multiple vulnerabilities (nine to be precise!)</li>
<li>Security concerns include leaking memory, possible denial of service, crashing clients, memory exhaustion, TLS downgrades and more</li>
<li><a href="http://marc.info/?l=openbsd-tech&m=140752295222929&w=2" rel="nofollow">LibreSSL released a new version</a> to address most of the vulnerabilities, but wasn&#39;t affected by some of them</li>
<li>Whichever version of whatever SSL you use, make sure it&#39;s patched for these issues</li>
<li>DragonFly and OpenBSD are patched as of the time of this recording but, even after a week, NetBSD and FreeBSD are not (outside of -CURRENT)
***</li>
</ul>

<h2>Interview - Robert Watson - <a href="mailto:rwatson@freebsd.org" rel="nofollow">rwatson@freebsd.org</a></h2>

<p>FreeBSD architecture, security research techniques, exploit mitigation</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openvpn" rel="nofollow">Protecting traffic with a BSD-based VPN</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://lechindianer.de/blog/2014/08/06/freebsd-cgit/" rel="nofollow">A FreeBSD-based CGit server</a></h3>

<ul>
<li>If you use git (like a certain host of this show) then you&#39;ve probably considered setting up your own server</li>
<li>This article takes you through the process of setting up a jailed git server, complete with a fancy web frontend</li>
<li>It even shows you how to set up multiple repos with key-based user separation and other cool things</li>
<li>The author of the post is also a listener of the show, thanks for sending it in!
***</li>
</ul>

<h3><a href="http://www.smallbusinesscomputing.com/biztools/6-data-backup-devices-for-small-businesses.html" rel="nofollow">Backup devices for small businesses</a></h3>

<ul>
<li>In this article, different methods of data storage and backup are compared</li>
<li>After weighing the various options, the author comes to an obvious conclusion: FreeNAS is the answer</li>
<li>He praises FreeNAS and the FreeNAS Mini for their tight integration, rock solid FreeBSD base and the great ZFS featureset that it offers</li>
<li>It also goes over some of the hardware specifics in the FreeNAS Mini
***</li>
</ul>

<h3><a href="http://blog.bronevichok.ru/2014/08/06/testing-of-xorg.html" rel="nofollow">A new Xenocara interview</a></h3>

<ul>
<li>As a follow up to last week&#39;s OpenSMTPD interview, this Russian blog interviews Matthieu Herrb about Xenocara</li>
<li>If you&#39;re not familiar with Xenocara, it&#39;s OpenBSD&#39;s version of Xorg with some custom patches</li>
<li>In this interview, he discusses how large and complex the upstream X11 development is, how different components are worked on by different people, how they test code (including a new framework) and security auditing</li>
<li>Matthieu is both a developer of upstream Xorg and an OpenBSD developer, so it&#39;s natural for him to do a lot of the maintainership work there
***</li>
</ul>

<h3><a href="https://not.burntout.org/blog/high_performance_samba_server_on_freebsd/" rel="nofollow">Building a high performance FreeBSD samba server</a></h3>

<ul>
<li>If you&#39;ve got to PXE boot several hundred Windows boxes to upgrade from XP to 7, what&#39;s the best solution?</li>
<li>FreeBSD, ZFS and Samba obviously!</li>
<li>The master image and related files clock in at over 20GB, and will be accessed at the same time by <em>all</em> of those clients</li>
<li>This article documents that process, highlighting some specific configuration tweaks to maximize performance (including NIC bonding)</li>
<li>It doesn&#39;t even require the newest or best hardware with the right changes, pretty cool
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/2ctlt4/switched_from_arch_linux_to_openbsd_reference/" rel="nofollow">An interesting Reddit thread</a> (<a href="http://www.reddit.com/r/BSD/comments/2dcig9/thinking_about_coming_to_bsd_from_arch" rel="nofollow">or two</a>)</li>
<li><a href="http://slexy.org/view/s21t7L5bqO" rel="nofollow">PB writes in</a></li>
<li><a href="http://slexy.org/view/s20MFywDqZ" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2Td6nq11J" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s215MlpJYV" rel="nofollow">Lachlan writes in</a></li>
<li><a href="http://slexy.org/view/s2N4JKkoKt" rel="nofollow">Justin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>49: The PC-BSD Tour</title>
  <link>https://www.bsdnow.tv/49</link>
  <guid isPermaLink="false">ccc19842-ae62-43a9-8f82-44f3f281de42</guid>
  <pubDate>Wed, 06 Aug 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ccc19842-ae62-43a9-8f82-44f3f281de42.mp3" length="59661652" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show, we've got something special for you! We'll be giving you an in-depth look at all of the graphical PC-BSD utilities. That's right, BSD doesn't have to be commandline-only anymore! There's also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:51</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show, we've got something special for you! We'll be giving you an in-depth look at all of the graphical PC-BSD utilities. That's right, BSD doesn't have to be commandline-only anymore! There's also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation semi-annual newsletter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation&lt;/li&gt;
&lt;li&gt;"In fact after reading [the president's] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!"&lt;/li&gt;
&lt;li&gt;It talks about the &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;FreeBSD journal&lt;/a&gt; as being one of the most exciting things they've launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT&lt;/li&gt;
&lt;li&gt;The full list of funded projects is included, also with details in the financial reports&lt;/li&gt;
&lt;li&gt;There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, intel nuc, nuc, gui, ssl, tls, libressl, openssl, foundation, bafug, talk, presentation, recording, bhyve, libvirt, rss, netmap, opensmtpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got something special for you! We&#39;ll be giving you an in-depth look at all of the graphical PC-BSD utilities. That&#39;s right, BSD doesn&#39;t have to be commandline-only anymore! There&#39;s also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation</li>
<li>&quot;In fact after reading [the president&#39;s] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!&quot;</li>
<li>It talks about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD journal</a> as being one of the most exciting things they&#39;ve launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT</li>
<li>The full list of funded projects is included, also with details in the financial reports</li>
<li>There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show, we&#39;ve got something special for you! We&#39;ll be giving you an in-depth look at all of the graphical PC-BSD utilities. That&#39;s right, BSD doesn&#39;t have to be commandline-only anymore! There&#39;s also the usual round of answers to your emails and all the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsdfoundation.org/press/2014jul-newsletter" rel="nofollow">FreeBSD foundation semi-annual newsletter</a></h3>

<ul>
<li>The FreeBSD foundation published their semi-annual newsletter, complete with a letter from the president of the foundation</li>
<li>&quot;In fact after reading [the president&#39;s] letter, I was motivated to come up with my own elevator pitch instead of the usual FreeBSD is like Linux, only better!&quot;</li>
<li>It talks about the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD journal</a> as being one of the most exciting things they&#39;ve launched this year, conferences they funded and various bits of sponsored code that went into -CURRENT</li>
<li>The full list of funded projects is included, also with details in the financial reports</li>
<li>There are also a number of conference wrap-ups: NYCBSDCon, BSDCan, AsiaBSDCon and details about the upcoming EuroBSDCon</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>48: Liberating SSL</title>
  <link>https://www.bsdnow.tv/48</link>
  <guid isPermaLink="false">e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809</guid>
  <pubDate>Wed, 30 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e0c8ab6b-dd19-4778-8dc2-4b02bd2ae809.mp3" length="43106548" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>59:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up in this week's episode, we'll be talking with one of OpenBSD's newest developers - Brent Cook - about the portable version of LibreSSL and how it's developed. We've also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD quarterly status report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD has gotten quite a lot done this quarter&lt;/li&gt;
&lt;li&gt;Changes in the way release branches are supported - major releases will get at least five years over their lifespan&lt;/li&gt;
&lt;li&gt;A new automounter is in the works, hoping to replace amd (which has some issues)&lt;/li&gt;
&lt;li&gt;The CAM target layer and RPC stack have gotten some major optimization and speed boosts&lt;/li&gt;
&lt;li&gt;Work on ZFSGuru continues, with a large status report specifically for that&lt;/li&gt;
&lt;li&gt;The report also mentioned some new committers, both source and ports&lt;/li&gt;
&lt;li&gt;It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we've already mentioned on the show&lt;/li&gt;
&lt;li&gt;"Foundation-sponsored work resulted in &lt;strong&gt;226 commits&lt;/strong&gt; to FreeBSD over the April to June period"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140724094043" target="_blank" rel="nofollow noopener"&gt;A new OpenBSD HTTPD is born&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Work has begun on a new HTTP daemon in the OpenBSD base system&lt;/li&gt;
&lt;li&gt;A lot of people are &lt;a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" target="_blank" rel="nofollow noopener"&gt;asking&lt;/a&gt; "why?" since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?&lt;/li&gt;
&lt;li&gt;Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn't trying to be a full-featured replacement)&lt;/li&gt;
&lt;li&gt;It's partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter&lt;/li&gt;
&lt;li&gt;This has the added benefit of the usual, easy-to-understand syntax and privilege separation &lt;/li&gt;
&lt;li&gt;There's a very brief &lt;a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" target="_blank" rel="nofollow noopener"&gt;man page&lt;/a&gt; online already&lt;/li&gt;
&lt;li&gt;It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs&lt;/li&gt;
&lt;li&gt;Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" target="_blank" rel="nofollow noopener"&gt;pkgng 1.3 announced&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The newest version of FreeBSD's second generation &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;package management system&lt;/a&gt; has been released, with lots of new features&lt;/li&gt;
&lt;li&gt;It has a new "real" solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)&lt;/li&gt;
&lt;li&gt;Lots of the code has been sandboxed for extra security&lt;/li&gt;
&lt;li&gt;You'll probably notice some new changes to the UI too, making things more user friendly&lt;/li&gt;
&lt;li&gt;A few days later &lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=362996" target="_blank" rel="nofollow noopener"&gt;1.3.1&lt;/a&gt; was released to fix a few small bugs, then &lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363108" target="_blank" rel="nofollow noopener"&gt;1.3.2&lt;/a&gt; shortly thereafter and &lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=363363" target="_blank" rel="nofollow noopener"&gt;1.3.3&lt;/a&gt; yesterday
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" target="_blank" rel="nofollow noopener"&gt;FreeBSD after-install security tasks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A number of people have written in to ask us "how do I secure my BSD box after I install it?"&lt;/li&gt;
&lt;li&gt;With this blog post, hopefully most of their questions will finally be answered in detail&lt;/li&gt;
&lt;li&gt;It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things&lt;/li&gt;
&lt;li&gt;Not only does it just list things to do, but the post also does a good job of explaining why you should do them&lt;/li&gt;
&lt;li&gt;Maybe we'll see some more posts in this series in the future
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brent Cook - &lt;a href="mailto:bcook@openbsd.org" target="_blank" rel="nofollow noopener"&gt;bcook@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/busterbcook" target="_blank" rel="nofollow noopener"&gt;@busterbcook&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;LibreSSL's portable version and development&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" target="_blank" rel="nofollow noopener"&gt;FreeBSD Mastery - Storage Essentials&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;MWL&lt;/a&gt;'s new book about the FreeBSD storage subsystems now has an early draft available&lt;/li&gt;
&lt;li&gt;Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes&lt;/li&gt;
&lt;li&gt;Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance&lt;/li&gt;
&lt;li&gt;You'll get access to the completed (e)book when it's done if you buy the early draft&lt;/li&gt;
&lt;li&gt;The suggested price is $8
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" target="_blank" rel="nofollow noopener"&gt;Why BSD and not Linux?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Yet another thread comes up asking why you should choose BSD over Linux or vice-versa&lt;/li&gt;
&lt;li&gt;Lots of good responses from users of the various BSDs&lt;/li&gt;
&lt;li&gt;Directly ripping a quote: "Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is "GCC free". DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity."&lt;/li&gt;
&lt;li&gt;And "Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS."&lt;/li&gt;
&lt;li&gt;Some other users share their switching experiences - worth a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550" target="_blank" rel="nofollow noopener"&gt;More g2k14 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Following up from last week's &lt;a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" target="_blank" rel="nofollow noopener"&gt;huge list&lt;/a&gt; of hackathon reports, we have a few more&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140724161550" target="_blank" rel="nofollow noopener"&gt;Landry Breuil&lt;/a&gt; spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140728122850" target="_blank" rel="nofollow noopener"&gt;Andrew Fresh&lt;/a&gt; enjoyed his first hackathon, pushing OpenBSD's perl patches upstream and got tricked into rewriting the adduser utility in perl&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140729070721" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; did his usual "teduing" (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth&lt;/li&gt;
&lt;li&gt;Luckily we didn't have to cover 20 new ones this time!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 243&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The newest episode of &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;BSDTalk&lt;/a&gt; is out, featuring an interview with Ingo Schwarze of the OpenBSD team&lt;/li&gt;
&lt;li&gt;The main topic of discussion is mandoc, which some users might not be familiar with&lt;/li&gt;
&lt;li&gt;mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it's not built by default)&lt;/li&gt;
&lt;li&gt;We'll catch up to you soon, Will!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2xLRQytAZ" target="_blank" rel="nofollow noopener"&gt;Thomas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21AYng20n" target="_blank" rel="nofollow noopener"&gt;Stephen writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2DwLRdQDS" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2E05L31BC" target="_blank" rel="nofollow noopener"&gt;Florian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21Nmg3Jrk" target="_blank" rel="nofollow noopener"&gt;Bob Beck writes in&lt;/a&gt; - and note the "Caution" section that was added to &lt;a href="http://www.libressl.org/" target="_blank" rel="nofollow noopener"&gt;libressl.org&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, portable, openssh, security, linux, arc4random, intrinsic functions, rng, prng, status report, pkgng, openhttpd, relayd, httpd, web server, zfsguru, zfs, freebsd mastery, book, storage, ufs, geom, disks, presentation, talk, comparison, mandoc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up in this week&#39;s episode, we&#39;ll be talking with one of OpenBSD&#39;s newest developers - Brent Cook - about the portable version of LibreSSL and how it&#39;s developed. We&#39;ve also got some information about the FreeBSD port of LibreSSL you might not know. The latest news and your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/news/status/report-2014-04-2014-06.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>FreeBSD has gotten quite a lot done this quarter</li>
<li>Changes in the way release branches are supported - major releases will get at least five years over their lifespan</li>
<li>A new automounter is in the works, hoping to replace amd (which has some issues)</li>
<li>The CAM target layer and RPC stack have gotten some major optimization and speed boosts</li>
<li>Work on ZFSGuru continues, with a large status report specifically for that</li>
<li>The report also mentioned some new committers, both source and ports</li>
<li>It also covers GNATS being replaced with Bugzilla, the new core team, 9.3-RELEASE, GSoC updates, UEFI booting and lots of other things that we&#39;ve already mentioned on the show</li>
<li>&quot;Foundation-sponsored work resulted in <strong>226 commits</strong> to FreeBSD over the April to June period&quot;
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724094043" rel="nofollow">A new OpenBSD HTTPD is born</a></h3>

<ul>
<li>Work has begun on a new HTTP daemon in the OpenBSD base system</li>
<li>A lot of people are <a href="http://www.reddit.com/r/BSD/comments/2b7azm/openbsd_gets_its_own_http_server/" rel="nofollow">asking</a> &quot;why?&quot; since OpenBSD includes a chrooted nginx already - will it be removed? Will they co-exist?</li>
<li>Initial responses seem to indicate that nginx is getting bloated, and is a bit overkill for just serving content (this isn&#39;t trying to be a full-featured replacement)</li>
<li>It&#39;s partially based on the relayd codebase and also comes from the author of relayd, Reyk Floeter</li>
<li>This has the added benefit of the usual, easy-to-understand syntax and privilege separation </li>
<li>There&#39;s a very brief <a href="http://www.openbsd.org/cgi-bin/man.cgi/OpenBSD-current/man8/httpd.8" rel="nofollow">man page</a> online already</li>
<li>It supports vhosts and can serve static files, but is still in very active development - there will probably be even more new features by the time this airs</li>
<li>Will it be named OpenHTTPD? Or perhaps... LibreHTTPD? (I hope not)
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-ports-announce/2014-July/000084.html" rel="nofollow">pkgng 1.3 announced</a></h3>

<ul>
<li>The newest version of FreeBSD&#39;s second generation <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">package management system</a> has been released, with lots of new features</li>
<li>It has a new &quot;real&quot; solver to automatically handle conflicts, and dynamically discover new ones (this means the annoying -o option is deprecated now, hooray!)</li>
<li>Lots of the code has been sandboxed for extra security</li>
<li>You&#39;ll probably notice some new changes to the UI too, making things more user friendly</li>
<li>A few days later <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=362996" rel="nofollow">1.3.1</a> was released to fix a few small bugs, then <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363108" rel="nofollow">1.3.2</a> shortly thereafter and <a href="https://svnweb.freebsd.org/ports?view=revision&revision=363363" rel="nofollow">1.3.3</a> yesterday
***</li>
</ul>

<h3><a href="http://twisteddaemon.com/post/92921205276/freebsd-installed-your-next-five-moves-should-be" rel="nofollow">FreeBSD after-install security tasks</a></h3>

<ul>
<li>A number of people have written in to ask us &quot;how do I secure my BSD box after I install it?&quot;</li>
<li>With this blog post, hopefully most of their questions will finally be answered in detail</li>
<li>It goes through locking down SSH with keys, patching the base system for security, installing packages and keeping them updated, monitoring and closing any listening services and a few other small things</li>
<li>Not only does it just list things to do, but the post also does a good job of explaining why you should do them</li>
<li>Maybe we&#39;ll see some more posts in this series in the future
***</li>
</ul>

<h2>Interview - Brent Cook - <a href="mailto:bcook@openbsd.org" rel="nofollow">bcook@openbsd.org</a> / <a href="https://twitter.com/busterbcook" rel="nofollow">@busterbcook</a></h2>

<p>LibreSSL&#39;s portable version and development</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.tiltedwindmillpress.com/?product=freebsd-mastery-storage-essentials" rel="nofollow">FreeBSD Mastery - Storage Essentials</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a>&#39;s new book about the FreeBSD storage subsystems now has an early draft available</li>
<li>Early buyers can get access to an in-progress draft of the book before the official release, but keep in mind that it may go through a lot of changes</li>
<li>Topics of the book will include GEOM, UFS, ZFS, the disk utilities, partition schemes, disk encryption and maximizing I/O performance</li>
<li>You&#39;ll get access to the completed (e)book when it&#39;s done if you buy the early draft</li>
<li>The suggested price is $8
***</li>
</ul>

<h3><a href="http://www.reddit.com/r/BSD/comments/2buea5/why_bsd_and_not_linux_or_why_linux_and_not_bsd/" rel="nofollow">Why BSD and not Linux?</a></h3>

<ul>
<li>Yet another thread comes up asking why you should choose BSD over Linux or vice-versa</li>
<li>Lots of good responses from users of the various BSDs</li>
<li>Directly ripping a quote: &quot;Features like Ports, Capsicum, CARP, ZFS and DTrace were stable on BSDs before their Linux versions, and some of those are far more usable on BSD. Features like pf are still BSD-only. FreeBSD has GELI and ipfw and is &quot;GCC free&quot;. DragonflyBSD has HAMMER and kernel performance tuning. OpenBSD have upstream pf and their gamut of security features, as well as a general emphasis on simplicity.&quot;</li>
<li>And &quot;Over the years, the BSDs have clearly shown their worth in the nix ecosystem by pioneering new features and driving adoption of others. The most recent on OpenBSD were 2038 support and LibreSSL. FreeBSD still arguably rules the FOSS storage space with ZFS.&quot;</li>
<li>Some other users share their switching experiences - worth a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">More g2k14 hackathon reports</a></h3>

<ul>
<li>Following up from last week&#39;s <a href="http://www.bsdnow.tv/episodes/2014_07_23-des_challenge_iv" rel="nofollow">huge list</a> of hackathon reports, we have a few more</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140724161550" rel="nofollow">Landry Breuil</a> spent some time with Ansible testing his infrastructure, worked on the firefox port and tried to push some of their patches upstream</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140728122850" rel="nofollow">Andrew Fresh</a> enjoyed his first hackathon, pushing OpenBSD&#39;s perl patches upstream and got tricked into rewriting the adduser utility in perl</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140729070721" rel="nofollow">Ted Unangst</a> did his usual &quot;teduing&quot; (removing of) old code - say goodbye to asa, fpr, mkstr, xstr, oldrdist, fsplit, uyap and bluetooth</li>
<li>Luckily we didn&#39;t have to cover 20 new ones this time!
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/07/mandoc-with-ingo-schwarze.html" rel="nofollow">BSDTalk episode 243</a></h3>

<ul>
<li>The newest episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, featuring an interview with Ingo Schwarze of the OpenBSD team</li>
<li>The main topic of discussion is mandoc, which some users might not be familiar with</li>
<li>mandoc is a utility for formatting manpages that OpenBSD and NetBSD use (DragonFlyBSD and FreeBSD include it in their source tree, but it&#39;s not built by default)</li>
<li>We&#39;ll catch up to you soon, Will!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2xLRQytAZ" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21AYng20n" rel="nofollow">Stephen writes in</a></li>
<li><a href="http://slexy.org/view/s2DwLRdQDS" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2E05L31BC" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s21Nmg3Jrk" rel="nofollow">Bob Beck writes in</a> - and note the &quot;Caution&quot; section that was added to <a href="http://www.libressl.org/" rel="nofollow">libressl.org</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>47: DES Challenge IV</title>
  <link>https://www.bsdnow.tv/47</link>
  <guid isPermaLink="false">2c9f4e68-6474-41f9-ab80-bb40fbb76855</guid>
  <pubDate>Wed, 23 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/2c9f4e68-6474-41f9-ab80-bb40fbb76855.mp3" length="66811828" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:32:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week on the show! We've got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/hackathons.html" target="_blank" rel="nofollow noopener"&gt;g2k14 hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon&lt;/li&gt;
&lt;li&gt;Lots of work got done - in just the first two weeks of July, there were &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;r=1&amp;amp;b=201407&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;over 1000 commits&lt;/a&gt; to their CVS tree&lt;/li&gt;
&lt;li&gt;Some of the developers wrote in to document what they were up to at the event&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140713220618" target="_blank" rel="nofollow noopener"&gt;Bob Beck&lt;/a&gt; planned to work on kernel stuff, but then "LibreSSL happened" and he spent most of his time working on that&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140718072312" target="_blank" rel="nofollow noopener"&gt;Miod Vallat&lt;/a&gt; also tells about his LibreSSL experiences&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140718090456" target="_blank" rel="nofollow noopener"&gt;Brent Cook&lt;/a&gt;, a new developer, worked mainly on the portable version of LibreSSL (and we'll be interviewing him next week!)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140714094454" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140714191912" target="_blank" rel="nofollow noopener"&gt;Martin Pieuchot&lt;/a&gt; fixed some bugs in the USB stack, softraid and misc other things&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140714202157" target="_blank" rel="nofollow noopener"&gt;Marc Espie&lt;/a&gt; improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140715120259" target="_blank" rel="nofollow noopener"&gt;Martin Pelikan&lt;/a&gt; integrated read-only ext4 support&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140715094848" target="_blank" rel="nofollow noopener"&gt;Vadim Zhukov&lt;/a&gt; did lots of ports work, including working on KDE4&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140715212333" target="_blank" rel="nofollow noopener"&gt;Theo de Raadt&lt;/a&gt; created a new, more secure system call, "sendsyslog" and did a lot of work with /etc, sysmerge and the rc scripts&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140718134017" target="_blank" rel="nofollow noopener"&gt;Paul Irofti&lt;/a&gt; worked on the USB stack, specifically for the Octeon platform&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140719104939" target="_blank" rel="nofollow noopener"&gt;Sebastian Benoit&lt;/a&gt; worked on relayd filters and IPv6 code&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140719134058" target="_blank" rel="nofollow noopener"&gt;Jasper Lievisse Adriaanse&lt;/a&gt; did work with puppet, packages and the bootloader&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140719082410" target="_blank" rel="nofollow noopener"&gt;Jonathan Gray&lt;/a&gt; imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125235" target="_blank" rel="nofollow noopener"&gt;Stefan Sperling&lt;/a&gt; fixed a lot of issues with wireless drivers&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140721125020" target="_blank" rel="nofollow noopener"&gt;Florian Obser&lt;/a&gt; did many things related to IPv6&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140721090411" target="_blank" rel="nofollow noopener"&gt;Ingo Schwarze&lt;/a&gt; worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140722071413" target="_blank" rel="nofollow noopener"&gt;Ken Westerback&lt;/a&gt; hacked on dhclient and dhcpd, and also got dump working on 4k sector drives&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140723142224" target="_blank" rel="nofollow noopener"&gt;Matthieu Herrb&lt;/a&gt; worked on updating and modernizing parts of xenocara
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD pf discussion takes off&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Concerns from last week, about FreeBSD's packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the "questions" and "current" mailing lists (unfortunately people didn't always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)&lt;/li&gt;
&lt;li&gt;Straight from the SMP FreeBSD pf maintainer: "no one right now [is actively developing pf on FreeBSD]"&lt;/li&gt;
&lt;li&gt;Searching for documentation online for pf is troublesome because there are two incompatible syntaxes&lt;/li&gt;
&lt;li&gt;FreeBSD's pf man pages are lacking, and some of FreeBSD's documentation still links to OpenBSD's pages, which won't work anymore - possibly turning away would-be BSD converts because it's frustrating&lt;/li&gt;
&lt;li&gt;There's also the issue of importing patches from pfSense, but most of those still haven't been done either&lt;/li&gt;
&lt;li&gt;Lots of disagreement among developers vs. users...&lt;/li&gt;
&lt;li&gt;Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren't interested&lt;/li&gt;
&lt;li&gt;Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions&lt;/li&gt;
&lt;li&gt;Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning's claims about OpenBSD's improved speed as "uncorroborated claims" (but neither side has provided any public benchmarks)&lt;/li&gt;
&lt;li&gt;Gleb had to abandon his work on FreeBSD's pf because funding ran out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" target="_blank" rel="nofollow noopener"&gt;LibreSSL progress update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;LibreSSL's first few portable releases have come out and they're making great progress, releasing 2.0.3 &lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140599450206255&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;two days ago&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list&lt;/li&gt;
&lt;li&gt;However, there has already been some drama... with Linux users&lt;/li&gt;
&lt;li&gt;There was a problem with Linux's PRNG, and LibreSSL was &lt;a href="https://twitter.com/MiodVallat/status/489122763610021888" target="_blank" rel="nofollow noopener"&gt;unforgiving&lt;/a&gt; of it, not making an effort to randomize something that could not provide real entropy&lt;/li&gt;
&lt;li&gt;This "problem" doesn't affect OpenBSD's native implementation, only the portable version&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" target="_blank" rel="nofollow noopener"&gt;The developers&lt;/a&gt; decide to &lt;a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" target="_blank" rel="nofollow noopener"&gt;weigh in&lt;/a&gt; to calm the misinformation and rage&lt;/li&gt;
&lt;li&gt;A fix was added in 2.0.2, and Linux may even &lt;a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" target="_blank" rel="nofollow noopener"&gt;get a new system call&lt;/a&gt; to handle this properly now - remember to say thanks, guys&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; has a &lt;a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" target="_blank" rel="nofollow noopener"&gt;really good post&lt;/a&gt; about the whole situation, definitely check it out&lt;/li&gt;
&lt;li&gt;As a follow-up from last week, bapt says they're working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you're a port maintainer, please test your ports against it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" target="_blank" rel="nofollow noopener"&gt;Preparation for NetBSD 7&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The release process for NetBSD 7.0 is finally underway&lt;/li&gt;
&lt;li&gt;The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September&lt;/li&gt;
&lt;li&gt;If you run NetBSD, that'll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)&lt;/li&gt;
&lt;li&gt;They're also looking for some help updating documentation and fixing any bugs that get reported&lt;/li&gt;
&lt;li&gt;Another formal announcement will be made when the beta binaries are up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Dag-Erling Smørgrav - &lt;a href="mailto:des@freebsd.org" target="_blank" rel="nofollow noopener"&gt;des@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/RealEvilDES" target="_blank" rel="nofollow noopener"&gt;@RealEvilDES&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The role of the FreeBSD Security Officer, recent ports features, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" target="_blank" rel="nofollow noopener"&gt;BSDCan ports and packages WG&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages&lt;/li&gt;
&lt;li&gt;Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages&lt;/li&gt;
&lt;li&gt;There's also some detail about the signing infrastructure and different mirrors&lt;/li&gt;
&lt;li&gt;Ports people and source people need to talk more often about ABI breakage&lt;/li&gt;
&lt;li&gt;The post also includes information about pkg 1.3, the old pkg tools' EOL, the quarterly stable package sets and a lot more (it's a huge post!)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.ignoranthack.me/?p=212" target="_blank" rel="nofollow noopener"&gt;Cross-compiling ports with QEMU and poudriere&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;With recent QEMU features, you can basically chroot into a completely different architecture&lt;/li&gt;
&lt;li&gt;This article goes through the process of building ARMv6 packages on a normal X86 box&lt;/li&gt;
&lt;li&gt;Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now&lt;/li&gt;
&lt;li&gt;The poudriere-devel port now has a "qemu user" option that will pull in all the requirements&lt;/li&gt;
&lt;li&gt;Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2108" target="_blank" rel="nofollow noopener"&gt;Cloning FreeBSD with ZFS send&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen&lt;/li&gt;
&lt;li&gt;This post shows his entire process in creating a mirror machine, using ZFS for everything&lt;/li&gt;
&lt;li&gt;The "zfs send" and "zfs snapshot" commands really come in handy for this&lt;/li&gt;
&lt;li&gt;He does the whole thing from a live CD, pretty impressive
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" target="_blank" rel="nofollow noopener"&gt;FreeBSD Overview series&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog series we stumbled upon about a Linux user switching to BSD&lt;/li&gt;
&lt;li&gt;In part one, he gives a little background on being "done with Linux distros" and documents his initial experience getting and installing FreeBSD 10&lt;/li&gt;
&lt;li&gt;He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels&lt;/li&gt;
&lt;li&gt;Most of what he was used to on Linux was already in the default FreeBSD (except bash...)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" target="_blank" rel="nofollow noopener"&gt;Part two&lt;/a&gt; documents his experiences with pkgng and ports 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s214FYbOKL" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21cWLhzj4" target="_blank" rel="nofollow noopener"&gt;Rick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21A4grtH0" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s27fQHz8Se" target="_blank" rel="nofollow noopener"&gt;Esteban writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21QscO4Cr" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://imgur.com/a/Ah444" target="_blank" rel="nofollow noopener"&gt;Matt sends in pictures of his FreeBSD CD collection&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, openssl, libressl, prng, linux, des, aes, encryption, cryptography, Dag-Erling Smørgrav, security, hackathon, pf, packet filter, firewall, smp, multithreading, ixsystems, tarsnap, bsdcan, cheri, zfs, qemu</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week on the show! We&#39;ve got an interview with Dag-Erling Smørgrav, the current security officer of FreeBSD, to discuss what exactly being in such an important position is like. The latest news, answers to your emails and even some LibreSSL drama, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/hackathons.html" rel="nofollow">g2k14 hackathon reports</a></h3>

<ul>
<li>Nearly 50 OpenBSD developers gathered in Ljubljana, Slovenia from July 8-14 for a hackathon</li>
<li>Lots of work got done - in just the first two weeks of July, there were <a href="http://marc.info/?l=openbsd-cvs&r=1&b=201407&w=2" rel="nofollow">over 1000 commits</a> to their CVS tree</li>
<li>Some of the developers wrote in to document what they were up to at the event</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140713220618" rel="nofollow">Bob Beck</a> planned to work on kernel stuff, but then &quot;LibreSSL happened&quot; and he spent most of his time working on that</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718072312" rel="nofollow">Miod Vallat</a> also tells about his LibreSSL experiences</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718090456" rel="nofollow">Brent Cook</a>, a new developer, worked mainly on the portable version of LibreSSL (and we&#39;ll be interviewing him next week!)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714094454" rel="nofollow">Henning Brauer</a> worked on VLAN bpf and various things related to IPv6 and network interfaces (and he still hates IPv6)</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714191912" rel="nofollow">Martin Pieuchot</a> fixed some bugs in the USB stack, softraid and misc other things</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140714202157" rel="nofollow">Marc Espie</a> improved the package code, enabling some speed ups, fixed some ports that broke with LibreSSL and some of the new changes and also did some work on ensuring snapshot consistency</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715120259" rel="nofollow">Martin Pelikan</a> integrated read-only ext4 support</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715094848" rel="nofollow">Vadim Zhukov</a> did lots of ports work, including working on KDE4</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140715212333" rel="nofollow">Theo de Raadt</a> created a new, more secure system call, &quot;sendsyslog&quot; and did a lot of work with /etc, sysmerge and the rc scripts</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140718134017" rel="nofollow">Paul Irofti</a> worked on the USB stack, specifically for the Octeon platform</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719104939" rel="nofollow">Sebastian Benoit</a> worked on relayd filters and IPv6 code</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719134058" rel="nofollow">Jasper Lievisse Adriaanse</a> did work with puppet, packages and the bootloader</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140719082410" rel="nofollow">Jonathan Gray</a> imported newer Mesa libraries and did a lot with Xenocara, including work in the installer for autodetection</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125235" rel="nofollow">Stefan Sperling</a> fixed a lot of issues with wireless drivers</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721125020" rel="nofollow">Florian Obser</a> did many things related to IPv6</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140721090411" rel="nofollow">Ingo Schwarze</a> worked on mandoc, as usual, and also rewrote the openbsd.org man.cgi interface</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140722071413" rel="nofollow">Ken Westerback</a> hacked on dhclient and dhcpd, and also got dump working on 4k sector drives</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140723142224" rel="nofollow">Matthieu Herrb</a> worked on updating and modernizing parts of xenocara
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-questions/2014-July/259292.html" rel="nofollow">FreeBSD pf discussion takes off</a></h3>

<ul>
<li>Concerns from last week, about FreeBSD&#39;s packet filter being old and unmaintained, seemed to have finally sparked some conversation about the topic on the &quot;questions&quot; and &quot;current&quot; mailing lists (unfortunately people didn&#39;t always use reply-all so you have to cross-reference the two lists to follow the whole conversation sometimes)</li>
<li>Straight from the SMP FreeBSD pf maintainer: &quot;no one right now [is actively developing pf on FreeBSD]&quot;</li>
<li>Searching for documentation online for pf is troublesome because there are two incompatible syntaxes</li>
<li>FreeBSD&#39;s pf man pages are lacking, and some of FreeBSD&#39;s documentation still links to OpenBSD&#39;s pages, which won&#39;t work anymore - possibly turning away would-be BSD converts because it&#39;s frustrating</li>
<li>There&#39;s also the issue of importing patches from pfSense, but most of those still haven&#39;t been done either</li>
<li>Lots of disagreement among developers vs. users...</li>
<li>Many users are very vocal about wanting it updated, saying the syntax change is no big deal and is worth the benefits - developers aren&#39;t interested</li>
<li>Henning Brauer, the main developer of pf on OpenBSD, has been very nice and offered to help the other BSDs get their pf fixed on multiple occasions</li>
<li>Gleb Smirnoff, author of the FreeBSD-specific SMP patches, questions Henning&#39;s claims about OpenBSD&#39;s improved speed as &quot;uncorroborated claims&quot; (but neither side has provided any public benchmarks)</li>
<li>Gleb had to abandon his work on FreeBSD&#39;s pf because funding ran out
***</li>
</ul>

<h3><a href="http://linux.slashdot.org/story/14/07/16/1950235/libressl-prng-vulnerability-patched" rel="nofollow">LibreSSL progress update</a></h3>

<ul>
<li>LibreSSL&#39;s first few portable releases have come out and they&#39;re making great progress, releasing 2.0.3 <a href="http://marc.info/?l=openbsd-tech&m=140599450206255&w=2" rel="nofollow">two days ago</a></li>
<li>Lots of non-OpenBSD people are starting to contribute, sending in patches via the tech mailing list</li>
<li>However, there has already been some drama... with Linux users</li>
<li>There was a problem with Linux&#39;s PRNG, and LibreSSL was <a href="https://twitter.com/MiodVallat/status/489122763610021888" rel="nofollow">unforgiving</a> of it, not making an effort to randomize something that could not provide real entropy</li>
<li>This &quot;problem&quot; doesn&#39;t affect OpenBSD&#39;s native implementation, only the portable version</li>
<li><a href="http://www.securityweek.com/openbsd-downplays-prng-vulnerability-libressl" rel="nofollow">The developers</a> decide to <a href="http://www.tedunangst.com/flak/post/wrapping-pids-for-fun-and-profit" rel="nofollow">weigh in</a> to calm the misinformation and rage</li>
<li>A fix was added in 2.0.2, and Linux may even <a href="http://thread.gmane.org/gmane.linux.kernel.cryptoapi/11666" rel="nofollow">get a new system call</a> to handle this properly now - remember to say thanks, guys</li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has a <a href="http://www.tedunangst.com/flak/post/this-is-why-software-sucks" rel="nofollow">really good post</a> about the whole situation, definitely check it out</li>
<li>As a follow-up from last week, bapt says they&#39;re working on building the whole FreeBSD ports tree against LibreSSL, but lots of things still need some patching to work properly - if you&#39;re a port maintainer, please test your ports against it
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/current-users/2014/07/13/msg025234.html" rel="nofollow">Preparation for NetBSD 7</a></h3>

<ul>
<li>The release process for NetBSD 7.0 is finally underway</li>
<li>The netbsd-7 CVS branch should be created around July 26th, which marks the start of the first beta period, which will be lasting until September</li>
<li>If you run NetBSD, that&#39;ll be a great time to help test on as many platforms as you can (this is especially true on custom embedded applications)</li>
<li>They&#39;re also looking for some help updating documentation and fixing any bugs that get reported</li>
<li>Another formal announcement will be made when the beta binaries are up
***</li>
</ul>

<h2>Interview - Dag-Erling Smørgrav - <a href="mailto:des@freebsd.org" rel="nofollow">des@freebsd.org</a> / <a href="https://twitter.com/RealEvilDES" rel="nofollow">@RealEvilDES</a></h2>

<p>The role of the FreeBSD Security Officer, recent ports features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/07/18/bsdcan-2014-ports-and-packages-wg/" rel="nofollow">BSDCan ports and packages WG</a></h3>

<ul>
<li>Back at BSDCan this year, there was a special event for discussion of FreeBSD ports and packages</li>
<li>Bapt talked about package building, poudriere and the systems the foundation funded for compiling packages</li>
<li>There&#39;s also some detail about the signing infrastructure and different mirrors</li>
<li>Ports people and source people need to talk more often about ABI breakage</li>
<li>The post also includes information about pkg 1.3, the old pkg tools&#39; EOL, the quarterly stable package sets and a lot more (it&#39;s a huge post!)
***</li>
</ul>

<h3><a href="http://blog.ignoranthack.me/?p=212" rel="nofollow">Cross-compiling ports with QEMU and poudriere</a></h3>

<ul>
<li>With recent QEMU features, you can basically chroot into a completely different architecture</li>
<li>This article goes through the process of building ARMv6 packages on a normal X86 box</li>
<li>Note though that this requires 10-STABLE or 11-CURRENT and an extra patch for QEMU right now</li>
<li>The poudriere-devel port now has a &quot;qemu user&quot; option that will pull in all the requirements</li>
<li>Hopefully this will pave the way for official pkgng packages on those lesser-used architectures
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2108" rel="nofollow">Cloning FreeBSD with ZFS send</a></h3>

<ul>
<li>For a FreeBSD mail server that MWL runs, he wanted to have a way to easily restore the whole system if something were to happen</li>
<li>This post shows his entire process in creating a mirror machine, using ZFS for everything</li>
<li>The &quot;zfs send&quot; and &quot;zfs snapshot&quot; commands really come in handy for this</li>
<li>He does the whole thing from a live CD, pretty impressive
***</li>
</ul>

<h3><a href="http://thiagoperrotta.wordpress.com/2014/07/20/here-be-dragons-freebsd-overview-part-i/" rel="nofollow">FreeBSD Overview series</a></h3>

<ul>
<li>A new blog series we stumbled upon about a Linux user switching to BSD</li>
<li>In part one, he gives a little background on being &quot;done with Linux distros&quot; and documents his initial experience getting and installing FreeBSD 10</li>
<li>He was pleasantly surprised to be able to use ZFS without jumping through hoops and doing custom kernels</li>
<li>Most of what he was used to on Linux was already in the default FreeBSD (except bash...)</li>
<li><a href="http://thiagoperrotta.wordpress.com/2014/07/21/here-be-packages-freebsd-overview-part-ii/" rel="nofollow">Part two</a> documents his experiences with pkgng and ports 
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s214FYbOKL" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s21cWLhzj4" rel="nofollow">Rick writes in</a></li>
<li><a href="http://slexy.org/view/s21A4grtH0" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s27fQHz8Se" rel="nofollow">Esteban writes in</a></li>
<li><a href="http://slexy.org/view/s21QscO4Cr" rel="nofollow">Ben writes in</a></li>
<li><a href="https://imgur.com/a/Ah444" rel="nofollow">Matt sends in pictures of his FreeBSD CD collection</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>45: ZFS War Stories</title>
  <link>https://www.bsdnow.tv/45</link>
  <guid isPermaLink="false">d53fb6f3-26c8-4311-86c5-a2034403b866</guid>
  <pubDate>Wed, 09 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d53fb6f3-26c8-4311-86c5-a2034403b866.mp3" length="33459412" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week Allan is at BSDCam in the UK, so we'll be back with a regular episode next week. For now though, here's an interview with Josh Paetzel about some crazy experiences he's had with ZFS.</itunes:subtitle>
  <itunes:duration>46:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week Allan is at BSDCam in the UK, so we'll be back with a regular episode next week. For now though, here's an interview with Josh Paetzel about some crazy experiences he's had with ZFS.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Josh Paetzel - &lt;a href="mailto:josh@ixsystems.com" target="_blank" rel="nofollow noopener"&gt;josh@ixsystems.com&lt;/a&gt; / &lt;a href="https://twitter.com/bsdunix4ever" target="_blank" rel="nofollow noopener"&gt;@bsdunix4ever&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Crazy ZFS stories, network protocols, server hardware &lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, zpool, raid, raid-z, openzfs, open-zfs, array, hardware, iscsi, freenas, ixsystems, high availability, bsdcam</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week Allan is at BSDCam in the UK, so we&#39;ll be back with a regular episode next week. For now though, here&#39;s an interview with Josh Paetzel about some crazy experiences he&#39;s had with ZFS.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Josh Paetzel - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<p>Crazy ZFS stories, network protocols, server hardware </p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week Allan is at BSDCam in the UK, so we&#39;ll be back with a regular episode next week. For now though, here&#39;s an interview with Josh Paetzel about some crazy experiences he&#39;s had with ZFS.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Interview - Josh Paetzel - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/bsdunix4ever" rel="nofollow">@bsdunix4ever</a></h2>

<p>Crazy ZFS stories, network protocols, server hardware </p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>44: Base ISO 100</title>
  <link>https://www.bsdnow.tv/44</link>
  <guid isPermaLink="false">cbf5ab1d-2355-4c2c-ade8-0e66250b204e</guid>
  <pubDate>Wed, 02 Jul 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf5ab1d-2355-4c2c-ade8-0e66250b204e.mp3" length="75659476" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:45:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we'll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can't wait! This week's news and answers to all your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1377" target="_blank" rel="nofollow noopener"&gt;pfSense 2.1.4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The &lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;pfSense team&lt;/a&gt; has released 2.1.4, shortly after 2.1.3 - it's mainly a security release&lt;/li&gt;
&lt;li&gt;Included within are eight security fixes, most of which are pfSense-specific&lt;/li&gt;
&lt;li&gt;OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)&lt;/li&gt;
&lt;li&gt;It also includes a large number of various other bug fixes&lt;/li&gt;
&lt;li&gt;Update all your routers!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD's pf gets SMP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;While we're on the topic of pf...&lt;/li&gt;
&lt;li&gt;Dragonfly patches their old[er than even FreeBSD's] pf to support multithreading in many areas&lt;/li&gt;
&lt;li&gt;Stemming from &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" target="_blank" rel="nofollow noopener"&gt;a user's complaint&lt;/a&gt;, Matthew Dillon did his own work on pf to make it SMP-aware&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" target="_blank" rel="nofollow noopener"&gt;Altering your configuration&lt;/a&gt;'s ruleset can also help speed things up, he found&lt;/li&gt;
&lt;li&gt;When will OpenBSD, the source of pf, finally do the same?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://ianix.com/pub/chacha-deployment.html" target="_blank" rel="nofollow noopener"&gt;ChaCha usage and deployment&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A while back, &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;we talked to djm&lt;/a&gt; about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5&lt;/li&gt;
&lt;li&gt;This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20&lt;/li&gt;
&lt;li&gt;OpenSSH offers it as a stream cipher now, OpenBSD uses it for it's random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it&lt;/li&gt;
&lt;li&gt;Both Google's fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not&lt;/li&gt;
&lt;li&gt;Unfortunately, this article has one mistake: FreeBSD &lt;a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" target="_blank" rel="nofollow noopener"&gt;does not use it&lt;/a&gt; - they &lt;em&gt;still&lt;/em&gt; use the broken RC4 algorithm
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag June 2014 issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The monthly online BSD magazine releases their newest issue&lt;/li&gt;
&lt;li&gt;This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, "saving time and headaches using the robot framework for testing," an interview and an article about the increasing number of security vulnerabilities&lt;/li&gt;
&lt;li&gt;The free pdf file is available for download as always
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Craig Rodrigues - &lt;a href="mailto:rodrigc@freebsd.org" target="_blank" rel="nofollow noopener"&gt;rodrigc@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD's &lt;a href="https://wiki.freebsd.org/Jenkins" target="_blank" rel="nofollow noopener"&gt;continuous&lt;/a&gt; &lt;a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" target="_blank" rel="nofollow noopener"&gt;testing&lt;/a&gt; &lt;a href="https://jenkins.freebsd.org/jenkins/" target="_blank" rel="nofollow noopener"&gt;infrastructure&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/stable-iso" target="_blank" rel="nofollow noopener"&gt;Creating pre-patched OpenBSD ISOs&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" target="_blank" rel="nofollow noopener"&gt;Preauthenticated decryption considered harmful&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Responding to &lt;a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" target="_blank" rel="nofollow noopener"&gt;a post&lt;/a&gt; from Adam Langley, &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; talks a little more about how signify and pkg_add handle signatures&lt;/li&gt;
&lt;li&gt;In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns&lt;/li&gt;
&lt;li&gt;With signify, now everything is fully downloaded and verified before tar is even invoked&lt;/li&gt;
&lt;li&gt;The pkg_add utility works a little bit differently, but it's also been improved in this area - details in the post&lt;/li&gt;
&lt;li&gt;Be sure to also read the original post from Adam, lots of good information
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.3-RC2 is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As the -RELEASE inches closer, release candidate 2 is out and ready for testing&lt;/li&gt;
&lt;li&gt;Since the last one, it's got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things&lt;/li&gt;
&lt;li&gt;The updated bsdconfig will use pkgng style packages now too&lt;/li&gt;
&lt;li&gt;A lesser known fact: there are also premade virtual machine images you can use too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://saveosx.org/pkgsrcCon/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon 2014 wrap-up&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In what may be the first real pkgsrcCon article we've ever had!&lt;/li&gt;
&lt;li&gt;Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event&lt;/li&gt;
&lt;li&gt;Unfortunately no recordings to be found...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" target="_blank" rel="nofollow noopener"&gt;PostgreSQL FreeBSD performance and scalability&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales&lt;/li&gt;
&lt;li&gt;On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings&lt;/li&gt;
&lt;li&gt;Lots of technical details if you're interested in getting the best performance out of your hardware&lt;/li&gt;
&lt;li&gt;It also includes specific kernel options he used and the rest of the configuration&lt;/li&gt;
&lt;li&gt;If you don't want to open the pdf file, you can &lt;a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" target="_blank" rel="nofollow noopener"&gt;use this link&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s24pFjUPe4" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21OogIgTu" target="_blank" rel="nofollow noopener"&gt;Klemen writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21rLcemNN" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203Qsx6CZ" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2eBj0FfSL" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, iso, patch, stable, cd, dvd, cdr, pre-applied, applied, horrible puns, jenkins, testing, kyua, ixsystems, tarsnap, pfsense, freenas, tarsnap, ixsystems, pfsense, freenas, bsdmag, magazine, ssl, tls, hardening, hardened, security, pf, smp, multithreading, firewall, scalability, postgresql, mysql, sql, database, performance, openssl, libressl, boringssl, google, chacha, chacha20, salsa20, encryption, pkgsrc, pkgsrccon, signify, pkg_add, authenticated encryption, decryption, gcm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be sitting down to talk with Craig Rodrigues about Jenkins and the FreeBSD testing infrastructure. Following that, we&#39;ll show you how to roll your own OpenBSD ISOs with all the patches already applied... ISO can&#39;t wait! This week&#39;s news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://blog.pfsense.org/?p=1377" rel="nofollow">pfSense 2.1.4 released</a></h3>

<ul>
<li>The <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense team</a> has released 2.1.4, shortly after 2.1.3 - it&#39;s mainly a security release</li>
<li>Included within are eight security fixes, most of which are pfSense-specific</li>
<li>OpenSSL, the WebUI and some packages all need to be patched (and there are instructions on how to do so)</li>
<li>It also includes a large number of various other bug fixes</li>
<li>Update all your routers!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/commits/2014-June/270300.html" rel="nofollow">DragonflyBSD&#39;s pf gets SMP</a></h3>

<ul>
<li>While we&#39;re on the topic of pf...</li>
<li>Dragonfly patches their old[er than even FreeBSD&#39;s] pf to support multithreading in many areas</li>
<li>Stemming from <a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128664.html" rel="nofollow">a user&#39;s complaint</a>, Matthew Dillon did his own work on pf to make it SMP-aware</li>
<li><a href="http://lists.dragonflybsd.org/pipermail/users/2014-June/128671.html" rel="nofollow">Altering your configuration</a>&#39;s ruleset can also help speed things up, he found</li>
<li>When will OpenBSD, the source of pf, finally do the same?
***</li>
</ul>

<h3><a href="http://ianix.com/pub/chacha-deployment.html" rel="nofollow">ChaCha usage and deployment</a></h3>

<ul>
<li>A while back, <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">we talked to djm</a> about some cryptography changes in OpenBSD 5.5 and OpenSSH 6.5</li>
<li>This article is sort of an interesting follow-up to that, showing which projects have adopted ChaCha20</li>
<li>OpenSSH offers it as a stream cipher now, OpenBSD uses it for it&#39;s random number generator, Google offers it in TLS for Chromium and some of their services and lots of other projects seem to be adopting it</li>
<li>Both Google&#39;s fork of OpenSSL and LibReSSL have upcoming implementations, while vanilla OpenSSL does not</li>
<li>Unfortunately, this article has one mistake: FreeBSD <a href="https://lists.freebsd.org/pipermail/freebsd-bugs/2013-October/054018.html" rel="nofollow">does not use it</a> - they <em>still</em> use the broken RC4 algorithm
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1864-tls-hardening-june-bsd-magazine-issue" rel="nofollow">BSDMag June 2014 issue</a></h3>

<ul>
<li>The monthly online BSD magazine releases their newest issue</li>
<li>This one includes the following articles: TLS hardening, setting up a package cluster in MidnightBSD, more GIMP tutorials, &quot;saving time and headaches using the robot framework for testing,&quot; an interview and an article about the increasing number of security vulnerabilities</li>
<li>The free pdf file is available for download as always
***</li>
</ul>

<h2>Interview - Craig Rodrigues - <a href="mailto:rodrigc@freebsd.org" rel="nofollow">rodrigc@freebsd.org</a></h2>

<p>FreeBSD&#39;s <a href="https://wiki.freebsd.org/Jenkins" rel="nofollow">continuous</a> <a href="https://docs.google.com/presentation/d/1yBiPxS1nKnVwRlAEsYeAOzYdpG5uzXTv1_7i7jwVCfU/edit#slide=id.p" rel="nofollow">testing</a> <a href="https://jenkins.freebsd.org/jenkins/" rel="nofollow">infrastructure</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-iso" rel="nofollow">Creating pre-patched OpenBSD ISOs</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.tedunangst.com/flak/post/preauthenticated-decryption-considered-harmful" rel="nofollow">Preauthenticated decryption considered harmful</a></h3>

<ul>
<li>Responding to <a href="https://www.imperialviolet.org/2014/06/27/streamingencryption.html" rel="nofollow">a post</a> from Adam Langley, <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> talks a little more about how signify and pkg_add handle signatures</li>
<li>In the past, the OpenBSD installer would pipe the output of ftp straight to tar, but then verify the SHA256 at the end - this had the advantage of not requiring any extra disk space, but raised some security concerns</li>
<li>With signify, now everything is fully downloaded and verified before tar is even invoked</li>
<li>The pkg_add utility works a little bit differently, but it&#39;s also been improved in this area - details in the post</li>
<li>Be sure to also read the original post from Adam, lots of good information
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/079092.html" rel="nofollow">FreeBSD 9.3-RC2 is out</a></h3>

<ul>
<li>As the -RELEASE inches closer, release candidate 2 is out and ready for testing</li>
<li>Since the last one, it&#39;s got some fixes for NIC drivers, the latest file and libmagic security fixes, some serial port workarounds and various other small things</li>
<li>The updated bsdconfig will use pkgng style packages now too</li>
<li>A lesser known fact: there are also premade virtual machine images you can use too
***</li>
</ul>

<h3><a href="http://saveosx.org/pkgsrcCon/" rel="nofollow">pkgsrcCon 2014 wrap-up</a></h3>

<ul>
<li>In what may be the first real pkgsrcCon article we&#39;ve ever had!</li>
<li>Includes wrap-up discussion about the event, the talks, the speakers themselves, what they use pkgsrc for, the hackathon and basically the whole event</li>
<li>Unfortunately no recordings to be found...
***</li>
</ul>

<h3><a href="https://kib.kiev.ua/kib/pgsql_perf.pdf" rel="nofollow">PostgreSQL FreeBSD performance and scalability</a></h3>

<ul>
<li>FreeBSD developer kib@ writes a report on PostgreSQL on FreeBSD, and how it scales</li>
<li>On his monster 40-core box with 1TB of RAM, he runs lots of benchmarks and posts the findings</li>
<li>Lots of technical details if you&#39;re interested in getting the best performance out of your hardware</li>
<li>It also includes specific kernel options he used and the rest of the configuration</li>
<li>If you don&#39;t want to open the pdf file, you can <a href="https://docs.google.com/viewer?url=https%3A%2F%2Fkib.kiev.ua%2Fkib%2Fpgsql_perf.pdf" rel="nofollow">use this link</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s24pFjUPe4" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21OogIgTu" rel="nofollow">Klemen writes in</a></li>
<li><a href="http://slexy.org/view/s21rLcemNN" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s203Qsx6CZ" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s2eBj0FfSL" rel="nofollow">Adam writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>43: Package Design</title>
  <link>https://www.bsdnow.tv/43</link>
  <guid isPermaLink="false">d4b10034-d20a-44a6-a918-a57335debcae</guid>
  <pubDate>Wed, 25 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d4b10034-d20a-44a6-a918-a57335debcae.mp3" length="62389876" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:26:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's a big show this week! We'll be interviewing Marc Espie about OpenBSD's package system and build cluster. Also, we've been asked many times "how do I keep my BSD box up to date?" Well, today's tutorial should finally answer that. Answers to all your emails and this week's headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/talks-and-schedule/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon 2014 talks and schedule&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The talks and schedules for EuroBSDCon 2014 are finally revealed&lt;/li&gt;
&lt;li&gt;The opening keynote is called "FreeBSD, looking forward to another 10 years" by jkh&lt;/li&gt;
&lt;li&gt;Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great&lt;/li&gt;
&lt;li&gt;It looks like Theo even has a talk, but the title isn't on the page... how mysterious&lt;/li&gt;
&lt;li&gt;There are also days dedicated to some really interesting tutorials&lt;/li&gt;
&lt;li&gt;Register now, the conference is on September 25-28th in Bulgaria&lt;/li&gt;
&lt;li&gt;If you see Allan and Kris walking towards you and you haven't given us an interview yet... well you know what's going to happen&lt;/li&gt;
&lt;li&gt;Why aren't the videos up from last year yet? Will this year also not have any?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" target="_blank" rel="nofollow noopener"&gt;FreeNAS vs NAS4Free&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More mainstream news covering BSD, this time with an article about different NAS solutions&lt;/li&gt;
&lt;li&gt;In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free&lt;/li&gt;
&lt;li&gt;Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect&lt;/li&gt;
&lt;li&gt;Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project&lt;/li&gt;
&lt;li&gt;"One is pleasantly functional; the other continues devolving during a journey of pain" - uh oh, who's the loser?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://queue.acm.org/detail.cfm?id=2636165" target="_blank" rel="nofollow noopener"&gt;Quality software costs money, heartbleed was free&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" target="_blank" rel="nofollow noopener"&gt;PHK&lt;/a&gt; writes an article for ACM Queue about open source software projects' funding efforts&lt;/li&gt;
&lt;li&gt;A lot of people don't realize just how widespread open source software is - TVs, printers, gaming consoles, etc&lt;/li&gt;
&lt;li&gt;The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish's funding&lt;/li&gt;
&lt;li&gt;The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them&lt;/li&gt;
&lt;li&gt;On that subject, "Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software"&lt;/li&gt;
&lt;li&gt;Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" target="_blank" rel="nofollow noopener"&gt;Geoblock evasion with pf and OpenBSD rdomains&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Geoblocking is a way for websites to block visitors based on the location of their IP&lt;/li&gt;
&lt;li&gt;This is a blog post about how to get around it, using pf and rdomains&lt;/li&gt;
&lt;li&gt;It has the advantage of not requiring any browser plugins or DNS settings on the users' computers, you just need to be running OpenBSD on your router (hmm, if only a website had &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;a tutorial about that&lt;/a&gt;...)&lt;/li&gt;
&lt;li&gt;In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia&lt;/li&gt;
&lt;li&gt;It's got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Marc Espie - &lt;a href="mailto:espie@openbsd.org" target="_blank" rel="nofollow noopener"&gt;espie@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/espie_openbsd" target="_blank" rel="nofollow noopener"&gt;@espie_openbsd&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD's package system, building cluster, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/upgrade" target="_blank" rel="nofollow noopener"&gt;Keeping your BSD up to date&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" target="_blank" rel="nofollow noopener"&gt;BoringSSL and LibReSSL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Yet another OpenSSL fork pops up, this time from Google, called BoringSSL&lt;/li&gt;
&lt;li&gt;Adam Langley has a blog post about it, why they did it and how they're going to maintain it&lt;/li&gt;
&lt;li&gt;You can easily browse &lt;a href="https://boringssl.googlesource.com/" target="_blank" rel="nofollow noopener"&gt;the source code&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Theo de Raadt also &lt;a href="http://marc.info/?l=openbsd-tech&amp;amp;m=140332790726752&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;weighs in&lt;/a&gt; with how this effort relates to LibReSSL&lt;/li&gt;
&lt;li&gt;More eyes on the code is good, and patches will be shared between the two projects
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" target="_blank" rel="nofollow noopener"&gt;More BSD Tor nodes wanted&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" target="_blank" rel="nofollow noopener"&gt;Originally discussed&lt;/a&gt; on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network&lt;/li&gt;
&lt;li&gt;If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.&lt;/li&gt;
&lt;li&gt;The EFF is also holding a &lt;a href="https://www.eff.org/torchallenge/" target="_blank" rel="nofollow noopener"&gt;Tor challenge&lt;/a&gt; for people to start up new relays and keep them online for over a year&lt;/li&gt;
&lt;li&gt;Check out our &lt;a href="http://www.bsdnow.tv/tutorials/tor" target="_blank" rel="nofollow noopener"&gt;Tor tutorial&lt;/a&gt; and help out the network, and promote BSD at the same time!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 OpenStack images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;OpenStack, to quote Wikipedia, is "a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution."&lt;/li&gt;
&lt;li&gt;The article goes into detail about creating a FreeBSD instant, installing and converting it for use with "bsd-cloudinit"&lt;/li&gt;
&lt;li&gt;The author of the article is a regular listener and emailer of the show, hey!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" target="_blank" rel="nofollow noopener"&gt;BSDday 2014 call for papers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD Day, a conference not so well-known, is going to be held August 9th in Argentina&lt;/li&gt;
&lt;li&gt;It was created in 2008 and is the only BSD conference around that area&lt;/li&gt;
&lt;li&gt;The "call for papers" was issued, so if you're around Argentina and use BSD, consider submitting a talk&lt;/li&gt;
&lt;li&gt;Sysadmins, developers and regular users are, of course, all welcome to come to the event
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20nTYO2w1" target="_blank" rel="nofollow noopener"&gt;Maruf writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21cvV6mRP" target="_blank" rel="nofollow noopener"&gt;Solomon writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2MK8sbea0" target="_blank" rel="nofollow noopener"&gt;Silas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2Yz97YlzI" target="_blank" rel="nofollow noopener"&gt;Bert writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, packages, cluster, building, pkg_add, freenas, ixsystems, tarsnap, eurobsdcon, bulgaria, 2014, talks, presentation, slides, Poul-Henning Kamp, phk, schedule, freenas, nas4free, nas, geoblock, evasion, bypassing, ip ban, pf, firewall, rdomains, glusterfs, marc espie, boringssl, openssl, libressl, upgrades, how to upgrade, update, rebuild, tor, tor nodes, relays, exit node, eff, tor challenge, aslr, pie, security, bsdday, openstack, bsd-cloudinit, cloud computing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s a big show this week! We&#39;ll be interviewing Marc Espie about OpenBSD&#39;s package system and build cluster. Also, we&#39;ve been asked many times &quot;how do I keep my BSD box up to date?&quot; Well, today&#39;s tutorial should finally answer that. Answers to all your emails and this week&#39;s headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/talks-and-schedule/" rel="nofollow">EuroBSDCon 2014 talks and schedule</a></h3>

<ul>
<li>The talks and schedules for EuroBSDCon 2014 are finally revealed</li>
<li>The opening keynote is called &quot;FreeBSD, looking forward to another 10 years&quot; by jkh</li>
<li>Lots of talks spanning FreeBSD, OpenBSD and PCBSD, and we finally have a few about NetBSD and DragonflyBSD too! Variety is great</li>
<li>It looks like Theo even has a talk, but the title isn&#39;t on the page... how mysterious</li>
<li>There are also days dedicated to some really interesting tutorials</li>
<li>Register now, the conference is on September 25-28th in Bulgaria</li>
<li>If you see Allan and Kris walking towards you and you haven&#39;t given us an interview yet... well you know what&#39;s going to happen</li>
<li>Why aren&#39;t the videos up from last year yet? Will this year also not have any?
***</li>
</ul>

<h3><a href="http://arstechnica.com/information-technology/2014/06/the-ars-nas-distribution-shootout-freenas-vs-nas4free/" rel="nofollow">FreeNAS vs NAS4Free</a></h3>

<ul>
<li>More mainstream news covering BSD, this time with an article about different NAS solutions</li>
<li>In a possibly excessive eight-page article, Ars Technica discusses the pros and cons of both FreeNAS and NAS4Free</li>
<li>Both are based on FreeBSD and ZFS of course, but there are more differences than you might expect</li>
<li>Discusses the different development models, release cycles, features, interfaces and ease-of-use factor of each project</li>
<li>&quot;One is pleasantly functional; the other continues devolving during a journey of pain&quot; - uh oh, who&#39;s the loser?
***</li>
</ul>

<h3><a href="https://queue.acm.org/detail.cfm?id=2636165" rel="nofollow">Quality software costs money, heartbleed was free</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_10_16-go_directly_to_jail" rel="nofollow">PHK</a> writes an article for ACM Queue about open source software projects&#39; funding efforts</li>
<li>A lot of people don&#39;t realize just how widespread open source software is - TVs, printers, gaming consoles, etc</li>
<li>The article discusses ways to convince your workplace to fund open source efforts, then goes into a little bit about FreeBSD and Varnish&#39;s funding</li>
<li>The latest heartbleed vulnerability should teach everyone that open source projects are critical to the internet, and need people actively maintaining them</li>
<li>On that subject, &quot;Earlier this year the OpenSSL Heartbleed bug laid waste to Internet security, and there are still hundreds of thousands of embedded devices of all kinds—probably your television among them—that have not been and will not ever be software-upgraded to fix it. The best way to prevent that from happening again is to avoid having bugs of that kind go undiscovered for several years, and the only way to avoid that is to have competent people paying attention to the software&quot;</li>
<li>Consider donating to your favorite BSD foundation (or buying cool shirts and CDs!) and keeping the ecosystem alive
***</li>
</ul>

<h3><a href="https://matt.bionicmessage.net/blog/2014/06/21/Advanced%20Geoblock%20evasion%20with%20OpenBSD%20pf%20and%20rdomain%27s" rel="nofollow">Geoblock evasion with pf and OpenBSD rdomains</a></h3>

<ul>
<li>Geoblocking is a way for websites to block visitors based on the location of their IP</li>
<li>This is a blog post about how to get around it, using pf and rdomains</li>
<li>It has the advantage of not requiring any browser plugins or DNS settings on the users&#39; computers, you just need to be running OpenBSD on your router (hmm, if only a website had <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">a tutorial about that</a>...)</li>
<li>In this post, the author wanted to get an American IP address, since the service he was using (Netflix) is blocked in Australia</li>
<li>It&#39;s got all the details you need to set up a VPN-like system and bypass those pesky geographic filters
***</li>
</ul>

<h2>Interview - Marc Espie - <a href="mailto:espie@openbsd.org" rel="nofollow">espie@openbsd.org</a> / <a href="https://twitter.com/espie_openbsd" rel="nofollow">@espie_openbsd</a></h2>

<p>OpenBSD&#39;s package system, building cluster, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/upgrade" rel="nofollow">Keeping your BSD up to date</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.imperialviolet.org/2014/06/20/boringssl.html" rel="nofollow">BoringSSL and LibReSSL</a></h3>

<ul>
<li>Yet another OpenSSL fork pops up, this time from Google, called BoringSSL</li>
<li>Adam Langley has a blog post about it, why they did it and how they&#39;re going to maintain it</li>
<li>You can easily browse <a href="https://boringssl.googlesource.com/" rel="nofollow">the source code</a></li>
<li>Theo de Raadt also <a href="http://marc.info/?l=openbsd-tech&m=140332790726752&w=2" rel="nofollow">weighs in</a> with how this effort relates to LibReSSL</li>
<li>More eyes on the code is good, and patches will be shared between the two projects
***</li>
</ul>

<h3><a href="http://lists.nycbug.org/pipermail/tor-bsd/2014-June/000129.html" rel="nofollow">More BSD Tor nodes wanted</a></h3>

<ul>
<li>Friend of the show bcallah posts some news to the Tor-BSD mailing list about monoculture in the Tor network being both bad and dangerous</li>
<li><a href="https://lists.torproject.org/pipermail/tor-relays/2014-June/004699.html" rel="nofollow">Originally discussed</a> on the Tor-Relays list, it was made apparent that having such a large amount of Linux nodes weakens the security of the whole network</li>
<li>If one vulnerability is found, a huge portion of the network would be useless - we need more variety in the network stacks, crypto, etc.</li>
<li>The EFF is also holding a <a href="https://www.eff.org/torchallenge/" rel="nofollow">Tor challenge</a> for people to start up new relays and keep them online for over a year</li>
<li>Check out our <a href="http://www.bsdnow.tv/tutorials/tor" rel="nofollow">Tor tutorial</a> and help out the network, and promote BSD at the same time!
***</li>
</ul>

<h3><a href="https://raymii.org/s/tutorials/FreeBSD_10.0-release_Openstack_Image.html" rel="nofollow">FreeBSD 10 OpenStack images</a></h3>

<ul>
<li>OpenStack, to quote Wikipedia, is &quot;a free and open-source software cloud computing platform. It is primarily deployed as an infrastructure as a service (IaaS) solution.&quot;</li>
<li>The article goes into detail about creating a FreeBSD instant, installing and converting it for use with &quot;bsd-cloudinit&quot;</li>
<li>The author of the article is a regular listener and emailer of the show, hey!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-advocacy/2014-June/004465.html" rel="nofollow">BSDday 2014 call for papers</a></h3>

<ul>
<li>BSD Day, a conference not so well-known, is going to be held August 9th in Argentina</li>
<li>It was created in 2008 and is the only BSD conference around that area</li>
<li>The &quot;call for papers&quot; was issued, so if you&#39;re around Argentina and use BSD, consider submitting a talk</li>
<li>Sysadmins, developers and regular users are, of course, all welcome to come to the event
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20nTYO2w1" rel="nofollow">Maruf writes in</a></li>
<li><a href="http://slexy.org/view/s21cvV6mRP" rel="nofollow">Solomon writes in</a></li>
<li><a href="http://slexy.org/view/s2MK8sbea0" rel="nofollow">Silas writes in</a></li>
<li><a href="http://slexy.org/view/s2Yz97YlzI" rel="nofollow">Bert writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>42: Devious Methods</title>
  <link>https://www.bsdnow.tv/42</link>
  <guid isPermaLink="false">95dc548f-e688-476d-9fd7-8e78ff3cd16f</guid>
  <pubDate>Wed, 18 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/95dc548f-e688-476d-9fd7-8e78ff3cd16f.mp3" length="60629908" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Coming up this week, we'll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:24:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Coming up this week, we'll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" target="_blank" rel="nofollow noopener"&gt;PIE and ASLR in FreeBSD update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A status update for Shawn Webb's ASLR and PIE work for FreeBSD&lt;/li&gt;
&lt;li&gt;One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree&lt;/li&gt;
&lt;li&gt;"FreeBSD has supported loading PIEs for a while now, but the applications in base weren't compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support"&lt;/li&gt;
&lt;li&gt;If you're running -CURRENT, just add "WITH_PIE=1" to your /etc/src.conf and /etc/make.conf&lt;/li&gt;
&lt;li&gt;The next step is working on the ASLR coding style and getting more developers to look through it&lt;/li&gt;
&lt;li&gt;Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1347" target="_blank" rel="nofollow noopener"&gt;Misc. pfSense news&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Couple of pfSense news items this week, including some hardware news&lt;/li&gt;
&lt;li&gt;Someone's gotta test the pfSense hardware devices before they're sold, which involves powering them all on at least once&lt;/li&gt;
&lt;li&gt;To make that process faster, they're building a controllable power board (and include some cool pics)&lt;/li&gt;
&lt;li&gt;There will be more info on that device a bit later on&lt;/li&gt;
&lt;li&gt;On Friday, June 27th, there will be &lt;a href="https://blog.pfsense.org/?p=1367" target="_blank" rel="nofollow noopener"&gt;another video session&lt;/a&gt; (for paying customers only...) about virtualized firewalls&lt;/li&gt;
&lt;li&gt;pfSense &lt;a href="https://blog.pfsense.org/?p=1332" target="_blank" rel="nofollow noopener"&gt;University&lt;/a&gt;, a new paid training course, was also announced&lt;/li&gt;
&lt;li&gt;A single two-day class costs $2000, ouch
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" target="_blank" rel="nofollow noopener"&gt;ZFS stripe width&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post from &lt;a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" target="_blank" rel="nofollow noopener"&gt;Matt Ahrens&lt;/a&gt; about ZFS stripe width&lt;/li&gt;
&lt;li&gt;"The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice"&lt;/li&gt;
&lt;li&gt;Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages&lt;/li&gt;
&lt;li&gt;He covers best performance on random IOPS, best reliability, and best space efficiency use cases&lt;/li&gt;
&lt;li&gt;It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels' overhead factor
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 9.3-BETA3 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The third BETA in the 9.3 release cycle is out, we're slowly getting closer to the release&lt;/li&gt;
&lt;li&gt;This is expected to be the final BETA, next will come the RCs&lt;/li&gt;
&lt;li&gt;There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what's in -CURRENT (but still isn't using ChaCha20)&lt;/li&gt;
&lt;li&gt;The FreeBSD foundation has &lt;a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" target="_blank" rel="nofollow noopener"&gt;a blog post&lt;/a&gt; about it too&lt;/li&gt;
&lt;li&gt;There's &lt;a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" target="_blank" rel="nofollow noopener"&gt;a list of changes&lt;/a&gt; between 9.2 and 9.3 as well, but we'll be sure to cover it when the -RELEASE hits
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Bryce Chidester - &lt;a href="mailto:brycec@devio.us" target="_blank" rel="nofollow noopener"&gt;brycec@devio.us&lt;/a&gt; / &lt;a href="https://twitter.com/brycied00d" target="_blank" rel="nofollow noopener"&gt;@brycied00d&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Running a BSD shell provider&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ssh-chaining" target="_blank" rel="nofollow noopener"&gt;Chaining SSH connections&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" target="_blank" rel="nofollow noopener"&gt;My FreeBSD adventure&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A Slackware user from the "linux questions" forum decides to try out BSD, and documents his initial impressions and findings&lt;/li&gt;
&lt;li&gt;After &lt;a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" target="_blank" rel="nofollow noopener"&gt;ruling out&lt;/a&gt; PCBSD due to the demanding hardware requirements and NetBSD due to "politics" (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on&lt;/li&gt;
&lt;li&gt;In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things&lt;/li&gt;
&lt;li&gt;So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux&lt;/li&gt;
&lt;li&gt;Might be an interesting, ongoing series we can follow up on later
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" target="_blank" rel="nofollow noopener"&gt;Even more BSDCan trip reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan may be over until next year, but trip reports are still pouring in&lt;/li&gt;
&lt;li&gt;This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation&lt;/li&gt;
&lt;li&gt;He's part of the "Jenkins CI for FreeBSD" group and went to BSDCan mostly for that&lt;/li&gt;
&lt;li&gt;Nice long post about all of his experiences at the event, definitely worth a read&lt;/li&gt;
&lt;li&gt;He even talks about... the food
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2096" target="_blank" rel="nofollow noopener"&gt;FreeBSD disk partitioning&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For his latest book series on FreeBSD's GEOM system, MWL asked the hackers mailing list for some clarification&lt;/li&gt;
&lt;li&gt;This erupted into a very &lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" target="_blank" rel="nofollow noopener"&gt;long discussion&lt;/a&gt; about fdisk vs gnop vs gpart&lt;/li&gt;
&lt;li&gt;So you don't have to read the 500 mailing list posts, he's summarized the findings in a blog post&lt;/li&gt;
&lt;li&gt;It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" target="_blank" rel="nofollow noopener"&gt;BSD Router Project version 1.51&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new version of the BSD Router Project has been released, 1.51&lt;/li&gt;
&lt;li&gt;It's now based on FreeBSD 10-STABLE instead of 10.0-RELEASE&lt;/li&gt;
&lt;li&gt;Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere&lt;/li&gt;
&lt;li&gt;Check the sourceforge page for the complete list of changes&lt;/li&gt;
&lt;li&gt;Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21X4hl28g" target="_blank" rel="nofollow noopener"&gt;Fongaboo writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20DELplMw" target="_blank" rel="nofollow noopener"&gt;David writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2tmazORRN" target="_blank" rel="nofollow noopener"&gt;Kristian writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, openssh, chaining, tor, hopping, jump host, tunnel, vpn, cowsay, 9.3, beta, release, pie, aslr, zfs, zpool, matt ahrens, delphix, foundation, devious, devio.us, bcallah is a noob, shell, shell provider, free, hosting, vps, vpn, ixsystems, tarsnap, bsdcan, report, bsd router project, router, pfsense, m0n0wall, openstack, security, linux, slackware, switching, linux vs bsd, netgate, firewall, university, hangout</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Coming up this week, we&#39;ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" rel="nofollow">PIE and ASLR in FreeBSD update</a></h3>

<ul>
<li>A status update for Shawn Webb&#39;s ASLR and PIE work for FreeBSD</li>
<li>One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree</li>
<li>&quot;FreeBSD has supported loading PIEs for a while now, but the applications in base weren&#39;t compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support&quot;</li>
<li>If you&#39;re running -CURRENT, just add &quot;WITH_PIE=1&quot; to your /etc/src.conf and /etc/make.conf</li>
<li>The next step is working on the ASLR coding style and getting more developers to look through it</li>
<li>Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1347" rel="nofollow">Misc. pfSense news</a></h3>

<ul>
<li>Couple of pfSense news items this week, including some hardware news</li>
<li>Someone&#39;s gotta test the pfSense hardware devices before they&#39;re sold, which involves powering them all on at least once</li>
<li>To make that process faster, they&#39;re building a controllable power board (and include some cool pics)</li>
<li>There will be more info on that device a bit later on</li>
<li>On Friday, June 27th, there will be <a href="https://blog.pfsense.org/?p=1367" rel="nofollow">another video session</a> (for paying customers only...) about virtualized firewalls</li>
<li>pfSense <a href="https://blog.pfsense.org/?p=1332" rel="nofollow">University</a>, a new paid training course, was also announced</li>
<li>A single two-day class costs $2000, ouch
***</li>
</ul>

<h3><a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" rel="nofollow">ZFS stripe width</a></h3>

<ul>
<li>A new blog post from <a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a> about ZFS stripe width</li>
<li>&quot;The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice&quot;</li>
<li>Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages</li>
<li>He covers best performance on random IOPS, best reliability, and best space efficiency use cases</li>
<li>It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels&#39; overhead factor
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" rel="nofollow">FreeBSD 9.3-BETA3 released</a></h3>

<ul>
<li>The third BETA in the 9.3 release cycle is out, we&#39;re slowly getting closer to the release</li>
<li>This is expected to be the final BETA, next will come the RCs</li>
<li>There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what&#39;s in -CURRENT (but still isn&#39;t using ChaCha20)</li>
<li>The FreeBSD foundation has <a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" rel="nofollow">a blog post</a> about it too</li>
<li>There&#39;s <a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" rel="nofollow">a list of changes</a> between 9.2 and 9.3 as well, but we&#39;ll be sure to cover it when the -RELEASE hits
***</li>
</ul>

<h2>Interview - Bryce Chidester - <a href="mailto:brycec@devio.us" rel="nofollow">brycec@devio.us</a> / <a href="https://twitter.com/brycied00d" rel="nofollow">@brycied00d</a></h2>

<p>Running a BSD shell provider</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-chaining" rel="nofollow">Chaining SSH connections</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" rel="nofollow">My FreeBSD adventure</a></h3>

<ul>
<li>A Slackware user from the &quot;linux questions&quot; forum decides to try out BSD, and documents his initial impressions and findings</li>
<li>After <a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" rel="nofollow">ruling out</a> PCBSD due to the demanding hardware requirements and NetBSD due to &quot;politics&quot; (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on</li>
<li>In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things</li>
<li>So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux</li>
<li>Might be an interesting, ongoing series we can follow up on later
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" rel="nofollow">Even more BSDCan trip reports</a></h3>

<ul>
<li>BSDCan may be over until next year, but trip reports are still pouring in</li>
<li>This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation</li>
<li>He&#39;s part of the &quot;Jenkins CI for FreeBSD&quot; group and went to BSDCan mostly for that</li>
<li>Nice long post about all of his experiences at the event, definitely worth a read</li>
<li>He even talks about... the food
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2096" rel="nofollow">FreeBSD disk partitioning</a></h3>

<ul>
<li>For his latest book series on FreeBSD&#39;s GEOM system, MWL asked the hackers mailing list for some clarification</li>
<li>This erupted into a very <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" rel="nofollow">long discussion</a> about fdisk vs gnop vs gpart</li>
<li>So you don&#39;t have to read the 500 mailing list posts, he&#39;s summarized the findings in a blog post</li>
<li>It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" rel="nofollow">BSD Router Project version 1.51</a></h3>

<ul>
<li>A new version of the BSD Router Project has been released, 1.51</li>
<li>It&#39;s now based on FreeBSD 10-STABLE instead of 10.0-RELEASE</li>
<li>Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere</li>
<li>Check the sourceforge page for the complete list of changes</li>
<li>Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21X4hl28g" rel="nofollow">Fongaboo writes in</a></li>
<li><a href="http://slexy.org/view/s20DELplMw" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2tmazORRN" rel="nofollow">Kristian writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Coming up this week, we&#39;ll be showing you how to chain SSH connections, as well as some cool tricks you can do with it. Going along with that theme, we also have an interview with Bryce Chidester about running a BSD-based shell provider. News, emails and cowsay turkeys, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.soldierx.com/news/Position-Independent-Executable-Support-Added-FreeBSD" rel="nofollow">PIE and ASLR in FreeBSD update</a></h3>

<ul>
<li>A status update for Shawn Webb&#39;s ASLR and PIE work for FreeBSD</li>
<li>One major part of the code, position-independent executable support, has finally been merged into the -CURRENT tree</li>
<li>&quot;FreeBSD has supported loading PIEs for a while now, but the applications in base weren&#39;t compiled as PIEs. Given that ASLR is useless without PIE, getting base compiled with PIE support is a mandatory first step in proper ASLR support&quot;</li>
<li>If you&#39;re running -CURRENT, just add &quot;WITH_PIE=1&quot; to your /etc/src.conf and /etc/make.conf</li>
<li>The next step is working on the ASLR coding style and getting more developers to look through it</li>
<li>Shawn will also be at EuroBSDCon (in September) giving an updated version of his BSDCan talk about ASLR
***</li>
</ul>

<h3><a href="https://blog.pfsense.org/?p=1347" rel="nofollow">Misc. pfSense news</a></h3>

<ul>
<li>Couple of pfSense news items this week, including some hardware news</li>
<li>Someone&#39;s gotta test the pfSense hardware devices before they&#39;re sold, which involves powering them all on at least once</li>
<li>To make that process faster, they&#39;re building a controllable power board (and include some cool pics)</li>
<li>There will be more info on that device a bit later on</li>
<li>On Friday, June 27th, there will be <a href="https://blog.pfsense.org/?p=1367" rel="nofollow">another video session</a> (for paying customers only...) about virtualized firewalls</li>
<li>pfSense <a href="https://blog.pfsense.org/?p=1332" rel="nofollow">University</a>, a new paid training course, was also announced</li>
<li>A single two-day class costs $2000, ouch
***</li>
</ul>

<h3><a href="http://blog.delphix.com/matt/2014/06/06/zfs-stripe-width/" rel="nofollow">ZFS stripe width</a></h3>

<ul>
<li>A new blog post from <a href="http://www.bsdnow.tv/episodes/2014_05_14-bsdcanned_goods" rel="nofollow">Matt Ahrens</a> about ZFS stripe width</li>
<li>&quot;The popularity of OpenZFS has spawned a great community of users, sysadmins, architects and developers, contributing a wealth of advice, tips and tricks, and rules of thumb on how to configure ZFS. In general, this is a great aspect of the ZFS community, but I’d like to take the opportunity to address one piece of misinformed advice&quot;</li>
<li>Matt goes through different situations where you would set up your zpool differently, each with their own advantages and disadvantages</li>
<li>He covers best performance on random IOPS, best reliability, and best space efficiency use cases</li>
<li>It includes a lot of detail on each one, including graphs, and addresses some misconceptions about different RAID-Z levels&#39; overhead factor
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-June/078959.html" rel="nofollow">FreeBSD 9.3-BETA3 released</a></h3>

<ul>
<li>The third BETA in the 9.3 release cycle is out, we&#39;re slowly getting closer to the release</li>
<li>This is expected to be the final BETA, next will come the RCs</li>
<li>There have mostly just been small bug fixes since BETA2, but OpenSSL was also updated and the arc4random code was updated to match what&#39;s in -CURRENT (but still isn&#39;t using ChaCha20)</li>
<li>The FreeBSD foundation has <a href="http://freebsdfoundation.blogspot.com/2014/06/freebsd-93-beta3-now-available.html" rel="nofollow">a blog post</a> about it too</li>
<li>There&#39;s <a href="https://www.freebsd.org/relnotes/9-STABLE/relnotes/article.html" rel="nofollow">a list of changes</a> between 9.2 and 9.3 as well, but we&#39;ll be sure to cover it when the -RELEASE hits
***</li>
</ul>

<h2>Interview - Bryce Chidester - <a href="mailto:brycec@devio.us" rel="nofollow">brycec@devio.us</a> / <a href="https://twitter.com/brycied00d" rel="nofollow">@brycied00d</a></h2>

<p>Running a BSD shell provider</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-chaining" rel="nofollow">Chaining SSH connections</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.linuxquestions.org/questions/*bsd-17/my-freebsd-adventure-continued-4175508055/" rel="nofollow">My FreeBSD adventure</a></h3>

<ul>
<li>A Slackware user from the &quot;linux questions&quot; forum decides to try out BSD, and documents his initial impressions and findings</li>
<li>After <a href="https://www.linuxquestions.org/questions/*bsd-17/pc-bsd-10-0-is-now-available-4175493047/page2.html#post5142465" rel="nofollow">ruling out</a> PCBSD due to the demanding hardware requirements and NetBSD due to &quot;politics&quot; (whatever that means, his words) he decides to start off with FreeBSD 10, but also mentions trying OpenBSD later on</li>
<li>In his forum post, he covers the documentation (and how easy it makes it for a switcher), dual booting, packages vs ports, network configuration and some other little things</li>
<li>So far, he seems to really enjoy BSD and thinks that it makes a lot of sense compared to Linux</li>
<li>Might be an interesting, ongoing series we can follow up on later
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-li-wen-hsu.html" rel="nofollow">Even more BSDCan trip reports</a></h3>

<ul>
<li>BSDCan may be over until next year, but trip reports are still pouring in</li>
<li>This time we have a summary from Li-Wen Hsu, who was paid for by the FreeBSD foundation</li>
<li>He&#39;s part of the &quot;Jenkins CI for FreeBSD&quot; group and went to BSDCan mostly for that</li>
<li>Nice long post about all of his experiences at the event, definitely worth a read</li>
<li>He even talks about... the food
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2096" rel="nofollow">FreeBSD disk partitioning</a></h3>

<ul>
<li>For his latest book series on FreeBSD&#39;s GEOM system, MWL asked the hackers mailing list for some clarification</li>
<li>This erupted into a very <a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2014-June/045246.html" rel="nofollow">long discussion</a> about fdisk vs gnop vs gpart</li>
<li>So you don&#39;t have to read the 500 mailing list posts, he&#39;s summarized the findings in a blog post</li>
<li>It covers MBR vs GPT, disk sector sizes and how to handle all of them with which tools
***</li>
</ul>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.51" rel="nofollow">BSD Router Project version 1.51</a></h3>

<ul>
<li>A new version of the BSD Router Project has been released, 1.51</li>
<li>It&#39;s now based on FreeBSD 10-STABLE instead of 10.0-RELEASE</li>
<li>Includes lots of bugfixes and small updates, as well as some patches from pfSense and elsewhere</li>
<li>Check the sourceforge page for the complete list of changes</li>
<li>Bad news... the minimum disk size requirement has increased to 512MB... getting pretty bloated
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21X4hl28g" rel="nofollow">Fongaboo writes in</a></li>
<li><a href="http://slexy.org/view/s20DELplMw" rel="nofollow">David writes in</a></li>
<li><a href="http://slexy.org/view/s2tmazORRN" rel="nofollow">Kristian writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>41: Commit This Bit</title>
  <link>https://www.bsdnow.tv/41</link>
  <guid isPermaLink="false">0017fbdd-17f8-464f-8bd5-94c6070bbd9a</guid>
  <pubDate>Wed, 11 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0017fbdd-17f8-464f-8bd5-94c6070bbd9a.mp3" length="48292564" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week in the big show, we'll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:04</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week in the big show, we'll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD moves to Bugzilla&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Historically, FreeBSD has used the old GNATS system for keeping track of bug reports&lt;/li&gt;
&lt;li&gt;After years and years of wanting to switch, they've finally moved away from GNATS to Bugzilla&lt;/li&gt;
&lt;li&gt;It offers a lot of advantages, is much more modern and actively maintained and &lt;/li&gt;
&lt;li&gt;There's a new &lt;a href="http://people.freebsd.org/%7Eeadler/bugrelocation/workflow.html" target="_blank" rel="nofollow noopener"&gt;workflow chart&lt;/a&gt; for developers to illustrate the new way of doing things&lt;/li&gt;
&lt;li&gt;The old "send-pr" command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)&lt;/li&gt;
&lt;li&gt;This will hopefully make reporting bugs a lot less painful
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html" target="_blank" rel="nofollow noopener"&gt;DIY NAS: EconoNAS 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We previously covered this blog last year, but the 2014 edition is up&lt;/li&gt;
&lt;li&gt;More of a hardware-focused article, the author details the parts he's using for a &lt;strong&gt;budget&lt;/strong&gt; NAS&lt;/li&gt;
&lt;li&gt;Details the motherboard, RAM, CPU, hard drives, case, etc&lt;/li&gt;
&lt;li&gt;With a set goal of $500 max, he goes just over it - $550 for all the parts&lt;/li&gt;
&lt;li&gt;Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD 3.8 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;Justin&lt;/a&gt; announced the availability of DragonflyBSD 3.8.0&lt;/li&gt;
&lt;li&gt;Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts&lt;/li&gt;
&lt;li&gt;It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions&lt;/li&gt;
&lt;li&gt;Work continues on for the Intel graphics drivers, but it's currently limited to the HD4000 and Ivy Bridge series&lt;/li&gt;
&lt;li&gt;See &lt;a href="http://www.dragonflybsd.org/release38/" target="_blank" rel="nofollow noopener"&gt;the release page&lt;/a&gt; for more info and check the link for source-based upgrade instructions
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference" target="_blank" rel="nofollow noopener"&gt;OpenZFS European conference 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure&lt;/li&gt;
&lt;li&gt;Matt Ahrens, &lt;a href="http://www.youtube.com/watch?v=Mk1czZs6vkQ" target="_blank" rel="nofollow noopener"&gt;Introduction&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Michael Alexander, &lt;a href="http://www.youtube.com/watch?v=Ak1HB507-xY" target="_blank" rel="nofollow noopener"&gt;FhGFS performance on ZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Andriy Gapon, &lt;a href="http://www.youtube.com/watch?v=oB-QDwVuBH4" target="_blank" rel="nofollow noopener"&gt;Testing ZFS on FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Luke Marsden, &lt;a href="http://www.youtube.com/watch?v=ISI9Ppj3kTo" target="_blank" rel="nofollow noopener"&gt;HybridCluster: ZFS in the cloud&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Vadim Comănescu, &lt;a href="http://www.youtube.com/watch?v=1xK94v0BedE" target="_blank" rel="nofollow noopener"&gt;Syneto: continuously delivering a ZFS-based OS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Chris George, &lt;a href="http://www.youtube.com/watch?v=ScNHjWBQYQ8" target="_blank" rel="nofollow noopener"&gt;DDRdrive ZIL accelerator: random write revelation&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Grenville Whelan, &lt;a href="http://www.youtube.com/watch?v=tiTYZykCeDo" target="_blank" rel="nofollow noopener"&gt;High-Availability&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Phil Harman, &lt;a href="https://www.youtube.com/watch?v=ApjkrBVlPXk" target="_blank" rel="nofollow noopener"&gt;Harman Holistic&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Mark Rees, &lt;a href="http://www.youtube.com/watch?v=41yl23EACns" target="_blank" rel="nofollow noopener"&gt;Storiant and OpenZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Andrew Holway, &lt;a href="http://www.youtube.com/watch?v=b4L0DRvKJxo" target="_blank" rel="nofollow noopener"&gt;EraStor ZFS appliances&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dan Vâtca, &lt;a href="http://www.youtube.com/watch?v=pPOW8bwUXxo" target="_blank" rel="nofollow noopener"&gt;Syneto and OpenZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Luke Marsden, &lt;a href="http://www.youtube.com/watch?v=uSM1s1aWlZE" target="_blank" rel="nofollow noopener"&gt;HybridCluster and OpenZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matt Ahrens, &lt;a href="http://www.youtube.com/watch?v=UaRdzUOsieA" target="_blank" rel="nofollow noopener"&gt;Delphix and OpenZFS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Check the link for slides and other goodies
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Benedict Reuschling - &lt;a href="mailto:bcr@freebsd.org" target="_blank" rel="nofollow noopener"&gt;bcr@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD documentation, getting commit access, unix education, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr, Steve Wills&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"It is my pleasure to introduce Steve Wills, the newest member of the portmgr team"&lt;/li&gt;
&lt;li&gt;swills is an all-round good guy, does a lot for ports (especially the ruby ports)&lt;/li&gt;
&lt;li&gt;In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more&lt;/li&gt;
&lt;li&gt;He used to work for Red Hat, woah
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 242&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This time on BSDTalk, Will interviews &lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;Chris Buechler&lt;/a&gt; from pfSense&lt;/li&gt;
&lt;li&gt;Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes&lt;/li&gt;
&lt;li&gt;They also touch on recent concerns in the pfSense community about their license change, that they may be "going commercial" and closing the source - so tune in to find out what their future plans are for all of that
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html" target="_blank" rel="nofollow noopener"&gt;Turn old PC hardware into a killer home server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lots of us have old hardware lying around doing nothing but collecting dust&lt;/li&gt;
&lt;li&gt;Why not turn that old box into a modern file server with FreeNAS and ZFS?&lt;/li&gt;
&lt;li&gt;This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)&lt;/li&gt;
&lt;li&gt;Most of our users are already familiar with all of this stuff, nothing too advanced&lt;/li&gt;
&lt;li&gt;Good to see BSD getting some well-deserved attention on a big mainstream site
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd" target="_blank" rel="nofollow noopener"&gt;Unbloating the VAX install CD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After a discussion on the VAX mailing list, something very important came to the attention of the developers...&lt;/li&gt;
&lt;li&gt;You can't boot NetBSD on a VAX box with 16MB of RAM from the CD image&lt;/li&gt;
&lt;li&gt;This blog post goes through the developer's adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller&lt;/li&gt;
&lt;li&gt;In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s211mNScBr" target="_blank" rel="nofollow noopener"&gt;Thomas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21JA8BVmZ" target="_blank" rel="nofollow noopener"&gt;Reynold writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2kwS3ncTY" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2VgjXUfW9" target="_blank" rel="nofollow noopener"&gt;Paul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s202AAQUXt" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, gnats, send-pr, sendbug, bugzilla, bug tracker, iso, cdr, dvd, patches, applied, commit bit, documentation, bsdcan, 2014, 9.3-RELEASE, 9.3, release, stable, advocacy, openssl, libressl, security, vulnerability, bsdtalk, pfsense, license, openzfs, zfs, presentation, talk, matthew ahrens, delphix, hybridcluster, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week in the big show, we&#39;ll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html" rel="nofollow">FreeBSD moves to Bugzilla</a></h3>

<ul>
<li>Historically, FreeBSD has used the old GNATS system for keeping track of bug reports</li>
<li>After years and years of wanting to switch, they&#39;ve finally moved away from GNATS to Bugzilla</li>
<li>It offers a lot of advantages, is much more modern and actively maintained and </li>
<li>There&#39;s a new <a href="http://people.freebsd.org/%7Eeadler/bugrelocation/workflow.html" rel="nofollow">workflow chart</a> for developers to illustrate the new way of doing things</li>
<li>The old &quot;send-pr&quot; command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)</li>
<li>This will hopefully make reporting bugs a lot less painful
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html" rel="nofollow">DIY NAS: EconoNAS 2014</a></h3>

<ul>
<li>We previously covered this blog last year, but the 2014 edition is up</li>
<li>More of a hardware-focused article, the author details the parts he&#39;s using for a <strong>budget</strong> NAS</li>
<li>Details the motherboard, RAM, CPU, hard drives, case, etc</li>
<li>With a set goal of $500 max, he goes just over it - $550 for all the parts</li>
<li>Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html" rel="nofollow">DragonflyBSD 3.8 released</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin</a> announced the availability of DragonflyBSD 3.8.0</li>
<li>Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts</li>
<li>It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions</li>
<li>Work continues on for the Intel graphics drivers, but it&#39;s currently limited to the HD4000 and Ivy Bridge series</li>
<li>See <a href="http://www.dragonflybsd.org/release38/" rel="nofollow">the release page</a> for more info and check the link for source-based upgrade instructions
***</li>
</ul>

<h3><a href="http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference" rel="nofollow">OpenZFS European conference 2014</a></h3>

<ul>
<li>There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure</li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=Mk1czZs6vkQ" rel="nofollow">Introduction</a></li>
<li>Michael Alexander, <a href="http://www.youtube.com/watch?v=Ak1HB507-xY" rel="nofollow">FhGFS performance on ZFS</a></li>
<li>Andriy Gapon, <a href="http://www.youtube.com/watch?v=oB-QDwVuBH4" rel="nofollow">Testing ZFS on FreeBSD</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=ISI9Ppj3kTo" rel="nofollow">HybridCluster: ZFS in the cloud</a></li>
<li>Vadim Comănescu, <a href="http://www.youtube.com/watch?v=1xK94v0BedE" rel="nofollow">Syneto: continuously delivering a ZFS-based OS</a></li>
<li>Chris George, <a href="http://www.youtube.com/watch?v=ScNHjWBQYQ8" rel="nofollow">DDRdrive ZIL accelerator: random write revelation</a></li>
<li>Grenville Whelan, <a href="http://www.youtube.com/watch?v=tiTYZykCeDo" rel="nofollow">High-Availability</a></li>
<li>Phil Harman, <a href="https://www.youtube.com/watch?v=ApjkrBVlPXk" rel="nofollow">Harman Holistic</a></li>
<li>Mark Rees, <a href="http://www.youtube.com/watch?v=41yl23EACns" rel="nofollow">Storiant and OpenZFS</a></li>
<li>Andrew Holway, <a href="http://www.youtube.com/watch?v=b4L0DRvKJxo" rel="nofollow">EraStor ZFS appliances</a></li>
<li>Dan Vâtca, <a href="http://www.youtube.com/watch?v=pPOW8bwUXxo" rel="nofollow">Syneto and OpenZFS</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=uSM1s1aWlZE" rel="nofollow">HybridCluster and OpenZFS</a></li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=UaRdzUOsieA" rel="nofollow">Delphix and OpenZFS</a></li>
<li>Check the link for slides and other goodies
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<p>BSD documentation, getting commit access, unix education, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/" rel="nofollow">Getting to know your portmgr, Steve Wills</a></h3>

<ul>
<li>&quot;It is my pleasure to introduce Steve Wills, the newest member of the portmgr team&quot;</li>
<li>swills is an all-round good guy, does a lot for ports (especially the ruby ports)</li>
<li>In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more</li>
<li>He used to work for Red Hat, woah
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html" rel="nofollow">BSDTalk episode 242</a></h3>

<ul>
<li>This time on BSDTalk, Will interviews <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">Chris Buechler</a> from pfSense</li>
<li>Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes</li>
<li>They also touch on recent concerns in the pfSense community about their license change, that they may be &quot;going commercial&quot; and closing the source - so tune in to find out what their future plans are for all of that
***</li>
</ul>

<h3><a href="http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html" rel="nofollow">Turn old PC hardware into a killer home server</a></h3>

<ul>
<li>Lots of us have old hardware lying around doing nothing but collecting dust</li>
<li>Why not turn that old box into a modern file server with FreeNAS and ZFS?</li>
<li>This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)</li>
<li>Most of our users are already familiar with all of this stuff, nothing too advanced</li>
<li>Good to see BSD getting some well-deserved attention on a big mainstream site
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd" rel="nofollow">Unbloating the VAX install CD</a></h3>

<ul>
<li>After a discussion on the VAX mailing list, something very important came to the attention of the developers...</li>
<li>You can&#39;t boot NetBSD on a VAX box with 16MB of RAM from the CD image</li>
<li>This blog post goes through the developer&#39;s adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller</li>
<li>In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s211mNScBr" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21JA8BVmZ" rel="nofollow">Reynold writes in</a></li>
<li><a href="http://slexy.org/view/s2kwS3ncTY" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2VgjXUfW9" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s202AAQUXt" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week in the big show, we&#39;ll be interviewing Benedict Reuschling of the FreeBSD documentation team, and he has a special surprise in store for Allan. As always, answers to your questions and all the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2014-June/001559.html" rel="nofollow">FreeBSD moves to Bugzilla</a></h3>

<ul>
<li>Historically, FreeBSD has used the old GNATS system for keeping track of bug reports</li>
<li>After years and years of wanting to switch, they&#39;ve finally moved away from GNATS to Bugzilla</li>
<li>It offers a lot of advantages, is much more modern and actively maintained and </li>
<li>There&#39;s a new <a href="http://people.freebsd.org/%7Eeadler/bugrelocation/workflow.html" rel="nofollow">workflow chart</a> for developers to illustrate the new way of doing things</li>
<li>The old &quot;send-pr&quot; command will still work for the time being, but will eventually be phased out in favor of native Bugzilla reporting tools (of which there are multiple in ports)</li>
<li>This will hopefully make reporting bugs a lot less painful
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/06/diy-nas-econonas-2014.html" rel="nofollow">DIY NAS: EconoNAS 2014</a></h3>

<ul>
<li>We previously covered this blog last year, but the 2014 edition is up</li>
<li>More of a hardware-focused article, the author details the parts he&#39;s using for a <strong>budget</strong> NAS</li>
<li>Details the motherboard, RAM, CPU, hard drives, case, etc</li>
<li>With a set goal of $500 max, he goes just over it - $550 for all the parts</li>
<li>Lots of nice pictures of the hardware and step by step instructions for assembly, as well as software configuration instructions
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/06/04/14122.html" rel="nofollow">DragonflyBSD 3.8 released</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin</a> announced the availability of DragonflyBSD 3.8.0</li>
<li>Binaries in /bin and /sbin are dynamic now, enabling the use of PAM and NSS to manage user accounts</li>
<li>It includes a new HAMMER FS backup script and lots of FreeBSD tools have been synced with their latest versions</li>
<li>Work continues on for the Intel graphics drivers, but it&#39;s currently limited to the HD4000 and Ivy Bridge series</li>
<li>See <a href="http://www.dragonflybsd.org/release38/" rel="nofollow">the release page</a> for more info and check the link for source-based upgrade instructions
***</li>
</ul>

<h3><a href="http://www.open-zfs.org/wiki/Publications#2014_OpenZFS_European_Conference" rel="nofollow">OpenZFS European conference 2014</a></h3>

<ul>
<li>There was an OpenZFS conference held in Europe recently, and now the videos are online for your viewing pleasure</li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=Mk1czZs6vkQ" rel="nofollow">Introduction</a></li>
<li>Michael Alexander, <a href="http://www.youtube.com/watch?v=Ak1HB507-xY" rel="nofollow">FhGFS performance on ZFS</a></li>
<li>Andriy Gapon, <a href="http://www.youtube.com/watch?v=oB-QDwVuBH4" rel="nofollow">Testing ZFS on FreeBSD</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=ISI9Ppj3kTo" rel="nofollow">HybridCluster: ZFS in the cloud</a></li>
<li>Vadim Comănescu, <a href="http://www.youtube.com/watch?v=1xK94v0BedE" rel="nofollow">Syneto: continuously delivering a ZFS-based OS</a></li>
<li>Chris George, <a href="http://www.youtube.com/watch?v=ScNHjWBQYQ8" rel="nofollow">DDRdrive ZIL accelerator: random write revelation</a></li>
<li>Grenville Whelan, <a href="http://www.youtube.com/watch?v=tiTYZykCeDo" rel="nofollow">High-Availability</a></li>
<li>Phil Harman, <a href="https://www.youtube.com/watch?v=ApjkrBVlPXk" rel="nofollow">Harman Holistic</a></li>
<li>Mark Rees, <a href="http://www.youtube.com/watch?v=41yl23EACns" rel="nofollow">Storiant and OpenZFS</a></li>
<li>Andrew Holway, <a href="http://www.youtube.com/watch?v=b4L0DRvKJxo" rel="nofollow">EraStor ZFS appliances</a></li>
<li>Dan Vâtca, <a href="http://www.youtube.com/watch?v=pPOW8bwUXxo" rel="nofollow">Syneto and OpenZFS</a></li>
<li>Luke Marsden, <a href="http://www.youtube.com/watch?v=uSM1s1aWlZE" rel="nofollow">HybridCluster and OpenZFS</a></li>
<li>Matt Ahrens, <a href="http://www.youtube.com/watch?v=UaRdzUOsieA" rel="nofollow">Delphix and OpenZFS</a></li>
<li>Check the link for slides and other goodies
***</li>
</ul>

<h2>Interview - Benedict Reuschling - <a href="mailto:bcr@freebsd.org" rel="nofollow">bcr@freebsd.org</a></h2>

<p>BSD documentation, getting commit access, unix education, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/06/04/getting-to-know-your-portmgr-steve-wills/" rel="nofollow">Getting to know your portmgr, Steve Wills</a></h3>

<ul>
<li>&quot;It is my pleasure to introduce Steve Wills, the newest member of the portmgr team&quot;</li>
<li>swills is an all-round good guy, does a lot for ports (especially the ruby ports)</li>
<li>In this interview, we learn why he uses FreeBSD, the most embarrassing moment in his FreeBSD career and much more</li>
<li>He used to work for Red Hat, woah
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/06/bsdtalk242-pfsense-with-chris-buechler.html" rel="nofollow">BSDTalk episode 242</a></h3>

<ul>
<li>This time on BSDTalk, Will interviews <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">Chris Buechler</a> from pfSense</li>
<li>Topics include: the heartbleed vulnerability and how it affected pfSense, how people usually leave their firewalls unpatched for a long time (or even forget about them!), changes between major versions, the upgrade process, upcoming features in their 10-based version, backporting drivers and security fixes</li>
<li>They also touch on recent concerns in the pfSense community about their license change, that they may be &quot;going commercial&quot; and closing the source - so tune in to find out what their future plans are for all of that
***</li>
</ul>

<h3><a href="http://www.pcworld.com/article/2243748/turn-old-pc-hardware-into-a-killer-home-server-with-freenas.html" rel="nofollow">Turn old PC hardware into a killer home server</a></h3>

<ul>
<li>Lots of us have old hardware lying around doing nothing but collecting dust</li>
<li>Why not turn that old box into a modern file server with FreeNAS and ZFS?</li>
<li>This article goes through the process of setting up a NAS, gives a little history behind the project and highlights some of the different protocols FreeNAS can use (NFS, SMB, AFS, etc)</li>
<li>Most of our users are already familiar with all of this stuff, nothing too advanced</li>
<li>Good to see BSD getting some well-deserved attention on a big mainstream site
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/unbloating_the_vax_install_cd" rel="nofollow">Unbloating the VAX install CD</a></h3>

<ul>
<li>After a discussion on the VAX mailing list, something very important came to the attention of the developers...</li>
<li>You can&#39;t boot NetBSD on a VAX box with 16MB of RAM from the CD image</li>
<li>This blog post goes through the developer&#39;s adventure in trying to fix that through emulation and stripping various things out of the kernel to make it smaller</li>
<li>In the end, he got it booting - and now all three VAX users who want to run NetBSD can do so on their systems with 16MB of RAM...
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s211mNScBr" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s21JA8BVmZ" rel="nofollow">Reynold writes in</a></li>
<li><a href="http://slexy.org/view/s2kwS3ncTY" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2VgjXUfW9" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s202AAQUXt" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>40: AirPorts &amp; Packages</title>
  <link>https://www.bsdnow.tv/40</link>
  <guid isPermaLink="false">f9c8a284-4fd9-4c5d-9137-77062c5814b4</guid>
  <pubDate>Wed, 04 Jun 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f9c8a284-4fd9-4c5d-9137-77062c5814b4.mp3" length="52844692" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:13:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;On this week's episode, we'll be giving you an introductory guide on OpenBSD's ports and package system. There's also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 talks and reports, part 2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;More presentations and trip reports are still being uploaded&lt;/li&gt;
&lt;li&gt;Ingo Schwarze, &lt;a href="https://www.youtube.com/watch?v=oifYhwTaOuw" target="_blank" rel="nofollow noopener"&gt;New Trends in mandoc&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Vsevolod Stakhov, &lt;a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" target="_blank" rel="nofollow noopener"&gt;The Architecture of the New Solver in pkg
&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Julio Merino, &lt;a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" target="_blank" rel="nofollow noopener"&gt;The FreeBSD Test Suite&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Zbigniew Bodek, &lt;a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" target="_blank" rel="nofollow noopener"&gt;Transparent Superpages for FreeBSD on ARM&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's also a &lt;a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" target="_blank" rel="nofollow noopener"&gt;trip report from Michael Dexter&lt;/a&gt; and another (very long and detailed) &lt;a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" target="_blank" rel="nofollow noopener"&gt;trip report&lt;/a&gt; from our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" target="_blank" rel="nofollow noopener"&gt;Warren Block&lt;/a&gt; that even gives us some linkage, thanks!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" target="_blank" rel="nofollow noopener"&gt;Beyond security, getting to know OpenBSD's real purpose&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;Michael W Lucas&lt;/a&gt; (who, we learn through this video, has been using BSD since 1986) gave a "webcast" last week, and the audio and slides are finally up&lt;/li&gt;
&lt;li&gt;It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics&lt;/li&gt;
&lt;li&gt;Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a "pressure cooker for ideas," briefly touches on GPL vs BSDL, their "do it right or don't do it at all" attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans&lt;/li&gt;
&lt;li&gt;Here's a direct link to &lt;a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" target="_blank" rel="nofollow noopener"&gt;the slides&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Great presentation if you'd like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" target="_blank" rel="nofollow noopener"&gt;FreeBSD vs Linux, a comprehensive comparison&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux&lt;/li&gt;
&lt;li&gt;This one was worth mentioning because it's very thorough in regards to how things are done behind the scenes, not just the usual technical differences&lt;/li&gt;
&lt;li&gt;It highlights the concept of a "core team" and their role vs "contributors" and "committers" (similar to a presentation Kirk McKusick did not long ago)&lt;/li&gt;
&lt;li&gt;While a lot of things will be the same on both platforms, you might still be asking "which one is right for me?" - this article weighs in with some points for both sides and different use cases&lt;/li&gt;
&lt;li&gt;Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don't hate us for linking it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" target="_blank" rel="nofollow noopener"&gt;Expand FreeNAS with plugins&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework&lt;/li&gt;
&lt;li&gt;With these plugins, you can greatly expand the feature set of your NAS via third party programs&lt;/li&gt;
&lt;li&gt;This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience&lt;/li&gt;
&lt;li&gt;Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more&lt;/li&gt;
&lt;li&gt;It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Karl Lehenbauer - &lt;a href="mailto:karl@flightaware.com" target="_blank" rel="nofollow noopener"&gt;karl@flightaware.com&lt;/a&gt; / &lt;a href="https://twitter.com/flightaware" target="_blank" rel="nofollow noopener"&gt;@flightaware&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD at FlightAware, BSD history, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ports-obsd" target="_blank" rel="nofollow noopener"&gt;Ports and packages in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" target="_blank" rel="nofollow noopener"&gt;Code review culture meets FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree&lt;/li&gt;
&lt;li&gt;This article describes Phabricator, an open source code review system that we briefly mentioned last week&lt;/li&gt;
&lt;li&gt;Instructions for using it are on &lt;a href="https://wiki.freebsd.org/CodeReview" target="_blank" rel="nofollow noopener"&gt;the wiki&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;While not approved by the core team yet for anything official, it's in a testing phase and developers are encouraged to try it out and get their patches reviewed&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://phabric.freebsd.org/" target="_blank" rel="nofollow noopener"&gt;Just look at that fancy interface!!&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2088" target="_blank" rel="nofollow noopener"&gt;Upcoming BSD books&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sneaky MWL somehow finds his way into both our headlines and the news roundup&lt;/li&gt;
&lt;li&gt;He gives us an update on the next BSD books that he's planning to release&lt;/li&gt;
&lt;li&gt;The plan is to release three (or so) books based on different aspects of FreeBSD's storage system(s) - GEOM, UFS, ZFS, etc.&lt;/li&gt;
&lt;li&gt;This has the advantage of only requiring you to buy the one(s) you're specifically interested in&lt;/li&gt;
&lt;li&gt;"When will they be released? When I'm done writing them. How much will they cost? Dunno."&lt;/li&gt;
&lt;li&gt;It's not Absolute FreeBSD 3rd edition...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" target="_blank" rel="nofollow noopener"&gt;CARP failover and high availability on FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you're running a cluster or a group of servers, you should have some sort of failover in place&lt;/li&gt;
&lt;li&gt;But the question comes up, "how do you load balance the load balancers!?"&lt;/li&gt;
&lt;li&gt;This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying&lt;/li&gt;
&lt;li&gt;Also mentions DNS-based load balancing as another option
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This time in PCBSD land, we're getting ready for the 10.0.2 release &lt;a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" target="_blank" rel="nofollow noopener"&gt;(ISOs here)&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;AppCafe got a good number of fixes, and now shows 10 random highlighted applications&lt;/li&gt;
&lt;li&gt;EasyPBI added a "bulk" mode to create PBIs of an entire FreeBSD port category&lt;/li&gt;
&lt;li&gt;Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s205iiKiWp" target="_blank" rel="nofollow noopener"&gt;Paul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2060bkTNl" target="_blank" rel="nofollow noopener"&gt;Matt writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2G7eMC6oP" target="_blank" rel="nofollow noopener"&gt;Kjell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2REfzMFGK" target="_blank" rel="nofollow noopener"&gt;Paul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21nvJtXY6" target="_blank" rel="nofollow noopener"&gt;Tom writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, flightaware, karl lehenbauer, keynote, bsdcan, 2014, webcast, beyond security, libressl, linux, bsd vs linux, freenas, plugins, jails, plex media server, plex, owncloud, tarsnap, ixsystems, code review, kyua, geom, ufs, zfs, books, absolute freebsd, carp, failover, high availability, firewalls, pf, ipfw, load balancing</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be giving you an introductory guide on OpenBSD&#39;s ports and package system. There&#39;s also a pretty fly interview with Karl Lehenbauer, about how they use FreeBSD at FlightAware. Lots of interesting news and answers to all your emails, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports, part 2</a></h3>

<ul>
<li>More presentations and trip reports are still being uploaded</li>
<li>Ingo Schwarze, <a href="https://www.youtube.com/watch?v=oifYhwTaOuw" rel="nofollow">New Trends in mandoc</a></li>
<li>Vsevolod Stakhov, <a href="https://www.youtube.com/watch?v=3SOKFz2UUQ4" rel="nofollow">The Architecture of the New Solver in pkg
</a></li>
<li>Julio Merino, <a href="https://www.youtube.com/watch?v=nf-bFeKaZsY" rel="nofollow">The FreeBSD Test Suite</a></li>
<li>Zbigniew Bodek, <a href="https://www.youtube.com/watch?v=s5iIKEHtbX8" rel="nofollow">Transparent Superpages for FreeBSD on ARM</a></li>
<li>There&#39;s also a <a href="http://freebsdfoundation.blogspot.com/2014/06/bsdcan-trip-report-michael-dexter.html" rel="nofollow">trip report from Michael Dexter</a> and another (very long and detailed) <a href="http://freebsdfoundation.blogspot.com/2014/05/bsdcan-trip-report-warren-block.html" rel="nofollow">trip report</a> from our friend <a href="http://www.bsdnow.tv/episodes/2014_03_26-documentation_is_king" rel="nofollow">Warren Block</a> that even gives us some linkage, thanks!
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=JrFfrrY-yOo" rel="nofollow">Beyond security, getting to know OpenBSD&#39;s real purpose</a></h3>

<ul>
<li><a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael W Lucas</a> (who, we learn through this video, has been using BSD since 1986) gave a &quot;webcast&quot; last week, and the audio and slides are finally up</li>
<li>It clocks in at just over 30 minutes, managing to touch on a lot of OpenBSD topics</li>
<li>Some of those topics include: what is OpenBSD and why you should care, the philosophy of the project, how it serves as a &quot;pressure cooker for ideas,&quot; briefly touches on GPL vs BSDL, their &quot;do it right or don&#39;t do it at all&quot; attitude, their stance on NDAs and blobs, recent LibreSSL development, some of the security functions that OpenBSD enabled before anyone else (and the ripple effect that had) and, of course, their disturbing preference for comic sans</li>
<li>Here&#39;s a direct link to <a href="https://wcc.on24.com/event/76/67/12/rt/1/documents/resourceList1400781110933/20140527_beyond_security_openbsd.pdf" rel="nofollow">the slides</a></li>
<li>Great presentation if you&#39;d like to learn a bit about OpenBSD, but also contains a bit of information that long-time users might not know too
***</li>
</ul>

<h3><a href="http://brioteam.com/linux-versus-freebsd-comprehensive-comparison" rel="nofollow">FreeBSD vs Linux, a comprehensive comparison</a></h3>

<ul>
<li>Another blog post covering something people seem to be obsessed with - FreeBSD vs Linux</li>
<li>This one was worth mentioning because it&#39;s very thorough in regards to how things are done behind the scenes, not just the usual technical differences</li>
<li>It highlights the concept of a &quot;core team&quot; and their role vs &quot;contributors&quot; and &quot;committers&quot; (similar to a presentation Kirk McKusick did not long ago)</li>
<li>While a lot of things will be the same on both platforms, you might still be asking &quot;which one is right for me?&quot; - this article weighs in with some points for both sides and different use cases</li>
<li>Pretty well-written and unbiased article that also mentions areas where Linux might be better, so don&#39;t hate us for linking it
***</li>
</ul>

<h3><a href="http://www.openlogic.com/wazi/bid/345617/Expand-FreeNAS-with-plugins" rel="nofollow">Expand FreeNAS with plugins</a></h3>

<ul>
<li>One of the things people love the most about FreeNAS (other than ZFS) is their cool plugin framework</li>
<li>With these plugins, you can greatly expand the feature set of your NAS via third party programs</li>
<li>This page talks about a few of the more popular ones and how they can be used to improve your NAS or media box experience</li>
<li>Some examples include setting up an OwnCloud server, Bacula for backups, Maraschino for managing a home theater PC, Plex Media Server for an easy to use video experience and a few more</li>
<li>It then goes into more detail about each of them, how to actually install plugins and then how to set them up
***</li>
</ul>

<h2>Interview - Karl Lehenbauer - <a href="mailto:karl@flightaware.com" rel="nofollow">karl@flightaware.com</a> / <a href="https://twitter.com/flightaware" rel="nofollow">@flightaware</a></h2>

<p>FreeBSD at FlightAware, BSD history, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports-obsd" rel="nofollow">Ports and packages in OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://julipedia.meroh.net/2014/05/code-review-culture-meets-freebsd.html" rel="nofollow">Code review culture meets FreeBSD</a></h3>

<ul>
<li>In most of the BSDs, changes need to be reviewed by more than one person before being committed to the tree</li>
<li>This article describes Phabricator, an open source code review system that we briefly mentioned last week</li>
<li>Instructions for using it are on <a href="https://wiki.freebsd.org/CodeReview" rel="nofollow">the wiki</a></li>
<li>While not approved by the core team yet for anything official, it&#39;s in a testing phase and developers are encouraged to try it out and get their patches reviewed</li>
<li><a href="http://phabric.freebsd.org/" rel="nofollow">Just look at that fancy interface!!</a>
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/2088" rel="nofollow">Upcoming BSD books</a></h3>

<ul>
<li>Sneaky MWL somehow finds his way into both our headlines and the news roundup</li>
<li>He gives us an update on the next BSD books that he&#39;s planning to release</li>
<li>The plan is to release three (or so) books based on different aspects of FreeBSD&#39;s storage system(s) - GEOM, UFS, ZFS, etc.</li>
<li>This has the advantage of only requiring you to buy the one(s) you&#39;re specifically interested in</li>
<li>&quot;When will they be released? When I&#39;m done writing them. How much will they cost? Dunno.&quot;</li>
<li>It&#39;s not Absolute FreeBSD 3rd edition...
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=VjYb9mKB4jU" rel="nofollow">CARP failover and high availability on FreeBSD</a></h3>

<ul>
<li>If you&#39;re running a cluster or a group of servers, you should have some sort of failover in place</li>
<li>But the question comes up, &quot;how do you load balance the load balancers!?&quot;</li>
<li>This video goes through the process of giving more than one machine the same IP, how to set up CARP, securing it and demonstrates a node dying</li>
<li>Also mentions DNS-based load balancing as another option
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-30/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time in PCBSD land, we&#39;re getting ready for the 10.0.2 release <a href="http://download.pcbsd.org/iso/10.0-RELEASE/testing/amd64/" rel="nofollow">(ISOs here)</a></li>
<li>AppCafe got a good number of fixes, and now shows 10 random highlighted applications</li>
<li>EasyPBI added a &quot;bulk&quot; mode to create PBIs of an entire FreeBSD port category</li>
<li>Lumina, the new desktop environment, is still being worked on and got some bug fixes too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s205iiKiWp" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s2060bkTNl" rel="nofollow">Matt writes in</a></li>
<li><a href="http://slexy.org/view/s2G7eMC6oP" rel="nofollow">Kjell writes in</a></li>
<li><a href="http://slexy.org/view/s2REfzMFGK" rel="nofollow">Paul writes in</a></li>
<li><a href="http://slexy.org/view/s21nvJtXY6" rel="nofollow">Tom writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>39: The Friendly Sandbox</title>
  <link>https://www.bsdnow.tv/39</link>
  <guid isPermaLink="false">4ae1b0f5-7c6f-486f-bdcf-c71ec415269c</guid>
  <pubDate>Wed, 28 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4ae1b0f5-7c6f-486f-bdcf-c71ec415269c.mp3" length="45004756" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:02:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show we'll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 talks and reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links&lt;/li&gt;
&lt;li&gt;Karl Lehenbauer's &lt;a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" target="_blank" rel="nofollow noopener"&gt;keynote&lt;/a&gt; (he's on next week's episode)&lt;/li&gt;
&lt;li&gt;Mariusz Zaborski and Pawel Jakub Dawidek,
&lt;a href="https://www.youtube.com/watch?v=0la06FHbdvg" target="_blank" rel="nofollow noopener"&gt;Capsicum and Casper&lt;/a&gt; (relevant to today's interview)&lt;/li&gt;
&lt;li&gt;Luigi Rizzo,
&lt;a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" target="_blank" rel="nofollow noopener"&gt;In-kernel OpenvSwitch on FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Dwayne Hart, &lt;a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" target="_blank" rel="nofollow noopener"&gt;Migrating from Linux to FreeBSD for Backend Data Storage&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Warner Losh, &lt;a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" target="_blank" rel="nofollow noopener"&gt;NAND Flash and FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Simon Gerraty, &lt;a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" target="_blank" rel="nofollow noopener"&gt;FreeBSD bmake and Meta Mode&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Bob Beck, &lt;a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" target="_blank" rel="nofollow noopener"&gt;LibreSSL - The First 30 Days&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Henning Brauer, &lt;a href="https://www.youtube.com/watch?v=cP8AW111IKg" target="_blank" rel="nofollow noopener"&gt;OpenBGPD Turns 10 Years Old&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Arun Thomas, &lt;a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" target="_blank" rel="nofollow noopener"&gt;BSD ARM Kernel Internals&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Peter Hessler, &lt;a href="https://www.youtube.com/watch?v=i8UAVswpagA" target="_blank" rel="nofollow noopener"&gt;Using BGP for Realtime Spam Lists&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Pedro Giffuni, &lt;a href="https://www.youtube.com/watch?v=HMeTxViulgo" target="_blank" rel="nofollow noopener"&gt;Features and Status of FreeBSD's Ext2 Implementation
&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Matt Ahrens, &lt;a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" target="_blank" rel="nofollow noopener"&gt;OpenZFS Upcoming Features and Performance Enhancements&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Daichi Goto, &lt;a href="https://www.youtube.com/watch?v=MsRu0xIawaA" target="_blank" rel="nofollow noopener"&gt;Shellscripts and Commands&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Benno Rice, &lt;a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" target="_blank" rel="nofollow noopener"&gt;Keeping Current&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Sean Bruno, &lt;a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" target="_blank" rel="nofollow noopener"&gt;MIPS Router Hacking&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;John-Mark Gurney, &lt;a href="https://www.youtube.com/watch?v=2qicD0tv_tI" target="_blank" rel="nofollow noopener"&gt;Optimizing GELI Performance&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Patrick Kelsey, &lt;a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" target="_blank" rel="nofollow noopener"&gt;Userspace Networking with libuinet&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Massimiliano Stucchi, &lt;a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" target="_blank" rel="nofollow noopener"&gt;IPv6 Transitioning Mechanisms&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Roger Pau Monné, &lt;a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" target="_blank" rel="nofollow noopener"&gt;Taking the Red Pill&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Shawn Webb, &lt;a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" target="_blank" rel="nofollow noopener"&gt;Introducing ASLR in FreeBSD&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's also a &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140519164127" target="_blank" rel="nofollow noopener"&gt;trip report&lt;/a&gt; from Peter Hessler and &lt;a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" target="_blank" rel="nofollow noopener"&gt;one from Julio Merino&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that's a recurring trend)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" target="_blank" rel="nofollow noopener"&gt;Defend your network and privacy with a VPN and OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back&lt;/li&gt;
&lt;li&gt;This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities&lt;/li&gt;
&lt;li&gt;There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used&lt;/li&gt;
&lt;li&gt;You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)&lt;/li&gt;
&lt;li&gt;It also includes a few general privacy tips, recommended browser extensions, etc&lt;/li&gt;
&lt;li&gt;The intro to the article is especially great, so give the whole thing a read&lt;/li&gt;
&lt;li&gt;He mentions our &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;OpenBSD router guide&lt;/a&gt; and other tutorials being a big help for this setup, so hello if you're watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pascalj.com/article/you-should-try-freebsd/" target="_blank" rel="nofollow noopener"&gt;You should try FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this blog post, the author talks a bit about how some Linux people aren't familiar with the BSDs and how we can take steps to change that&lt;/li&gt;
&lt;li&gt;He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two&lt;/li&gt;
&lt;li&gt;Possibly the most useful part is how to address the question "my server already works, why bother switching?"&lt;/li&gt;
&lt;li&gt;"Stackoverflow’s answers assume I have apt-get installed"&lt;/li&gt;
&lt;li&gt;It includes mention of the great documentation, stability, ports, improved security and much more&lt;/li&gt;
&lt;li&gt;A takeaway quote for would-be Linux switchers: "I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" target="_blank" rel="nofollow noopener"&gt;OpenBSD and the little Mauritian contributor&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This is a story about a guy from &lt;a href="https://en.wikipedia.org/wiki/Mauritius" target="_blank" rel="nofollow noopener"&gt;Mauritius&lt;/a&gt; named Logan, one of OpenBSD's newest developers&lt;/li&gt;
&lt;li&gt;Back in 2010, he started sending in patched for OpenBSD's "mg" editor, among other small things, and eventually added file transfer resume support for SFTP&lt;/li&gt;
&lt;li&gt;The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon&lt;/li&gt;
&lt;li&gt;It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem&lt;/li&gt;
&lt;li&gt;Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jon Anderson - &lt;a href="mailto:jonathan@freebsd.org" target="_blank" rel="nofollow noopener"&gt;jonathan@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Capsicum and Casperd&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/dnscrypt" target="_blank" rel="nofollow noopener"&gt;Encrypting DNS lookups&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://i.imgur.com/f0qg6Ss.jpg" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal, May 2014 issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The newest issue of the &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal&lt;/a&gt; is out, following the bi-monthly release cycle&lt;/li&gt;
&lt;li&gt;This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling&lt;/li&gt;
&lt;li&gt;Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL porting update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Since the last LibreSSL post we covered, a couple unofficial "portable" versions have died off&lt;/li&gt;
&lt;li&gt;Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!&lt;/li&gt;
&lt;li&gt;This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example&lt;/li&gt;
&lt;li&gt;Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag May 2014 issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The usual monthly release from BSDMag, covering a variety of subjects&lt;/li&gt;
&lt;li&gt;This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things&lt;/li&gt;
&lt;li&gt;It's a free PDF, go grab it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 241&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new episode of &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;BSDTalk&lt;/a&gt; is out, this time with Bob Beck&lt;/li&gt;
&lt;li&gt;He talks about the OpenBSD foundation's recent activities, his own work in the project, some stories about the hardware in Theo's basement and a lot more&lt;/li&gt;
&lt;li&gt;The interview itself isn't about LibreSSL at all, but they do touch on it a bit too&lt;/li&gt;
&lt;li&gt;Really interesting stuff, covers a lot of different topics in a short amount of time
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;We got a number of replies about last week's VPN question, so thanks to everyone who sent in an email about it - the &lt;a href="https://www.freshports.org/security/vpnc/" target="_blank" rel="nofollow noopener"&gt;vpnc&lt;/a&gt; package seems to be what we were looking for&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20MK7bTyc" target="_blank" rel="nofollow noopener"&gt;Tim writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2OWREQdUA" target="_blank" rel="nofollow noopener"&gt;AJ writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s202obAqbT" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21Kye2jAc" target="_blank" rel="nofollow noopener"&gt;Thomas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2zqFVqwxN" target="_blank" rel="nofollow noopener"&gt;Martin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, casper, casperd, the friendly ghost, capsicum, sandbox, application, jails, isolation, isolated, chroot, virtual machine, exploit, vpn, security, ssh, tunnel, encryption, bsdcan, presentation, talk, video, recordings, dnscrypt, opendns, dnscurve, lookups, dns, dnssec, gateway, vpn, vps, journal, bsdmag, bsdtalk, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show we&#39;ll be talking with Jon Anderson about Capsicum and Casper to securely sandbox processes. After that, our tutorial will show you how to encrypt all your DNS lookups, either on a single system or for your whole network. News, emails and all the usual fun, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan 2014 talks and reports</a></h3>

<ul>
<li>The majority of the BSDCan talks are finally uploaded, so prepare to be flooded with links</li>
<li>Karl Lehenbauer&#39;s <a href="https://www.youtube.com/watch?v=13LiyjnTGsQ" rel="nofollow">keynote</a> (he&#39;s on next week&#39;s episode)</li>
<li>Mariusz Zaborski and Pawel Jakub Dawidek,
<a href="https://www.youtube.com/watch?v=0la06FHbdvg" rel="nofollow">Capsicum and Casper</a> (relevant to today&#39;s interview)</li>
<li>Luigi Rizzo,
<a href="https://www.youtube.com/watch?v=Lr5o1VQMtgA" rel="nofollow">In-kernel OpenvSwitch on FreeBSD</a></li>
<li>Dwayne Hart, <a href="https://www.youtube.com/watch?v=AVuF9eFeVWs" rel="nofollow">Migrating from Linux to FreeBSD for Backend Data Storage</a></li>
<li>Warner Losh, <a href="https://www.youtube.com/watch?v=lj0XAE6C6-k" rel="nofollow">NAND Flash and FreeBSD</a></li>
<li>Simon Gerraty, <a href="https://www.youtube.com/watch?v=4s0UY0sg6vI" rel="nofollow">FreeBSD bmake and Meta Mode</a></li>
<li>Bob Beck, <a href="https://www.youtube.com/watch?v=oM6S7FEUfkU" rel="nofollow">LibreSSL - The First 30 Days</a></li>
<li>Henning Brauer, <a href="https://www.youtube.com/watch?v=cP8AW111IKg" rel="nofollow">OpenBGPD Turns 10 Years Old</a></li>
<li>Arun Thomas, <a href="https://www.youtube.com/watch?v=ZAM7fqhGRr8" rel="nofollow">BSD ARM Kernel Internals</a></li>
<li>Peter Hessler, <a href="https://www.youtube.com/watch?v=i8UAVswpagA" rel="nofollow">Using BGP for Realtime Spam Lists</a></li>
<li>Pedro Giffuni, <a href="https://www.youtube.com/watch?v=HMeTxViulgo" rel="nofollow">Features and Status of FreeBSD&#39;s Ext2 Implementation
</a></li>
<li>Matt Ahrens, <a href="https://www.youtube.com/watch?v=EjGqVdCOIhM" rel="nofollow">OpenZFS Upcoming Features and Performance Enhancements</a></li>
<li>Daichi Goto, <a href="https://www.youtube.com/watch?v=MsRu0xIawaA" rel="nofollow">Shellscripts and Commands</a></li>
<li>Benno Rice, <a href="https://www.youtube.com/watch?v=jZp-ciB6mAg" rel="nofollow">Keeping Current</a></li>
<li>Sean Bruno, <a href="https://www.youtube.com/watch?v=LZjoFSfIv3k" rel="nofollow">MIPS Router Hacking</a></li>
<li>John-Mark Gurney, <a href="https://www.youtube.com/watch?v=2qicD0tv_tI" rel="nofollow">Optimizing GELI Performance</a></li>
<li>Patrick Kelsey, <a href="https://www.youtube.com/watch?v=LhIx8q8_7YY" rel="nofollow">Userspace Networking with libuinet</a></li>
<li>Massimiliano Stucchi, <a href="https://www.youtube.com/watch?v=WZoQzUZKaeo" rel="nofollow">IPv6 Transitioning Mechanisms</a></li>
<li>Roger Pau Monné, <a href="https://www.youtube.com/watch?v=q6l9qtjlNXU" rel="nofollow">Taking the Red Pill</a></li>
<li>Shawn Webb, <a href="https://www.youtube.com/watch?v=jo8ObzR1tKQ" rel="nofollow">Introducing ASLR in FreeBSD</a></li>
<li>There&#39;s also a <a href="http://undeadly.org/cgi?action=article&sid=20140519164127" rel="nofollow">trip report</a> from Peter Hessler and <a href="http://julipedia.meroh.net/2014/05/bsdcan-2014-summary.html" rel="nofollow">one from Julio Merino</a></li>
<li>The latter report also talks about how, unfortunately, NetBSD basically had no presence in the event at all (and how that&#39;s a recurring trend)
***</li>
</ul>

<h3><a href="http://networkfilter.blogspot.com/2014/05/defend-your-network-and-privacy-vpn.html" rel="nofollow">Defend your network and privacy with a VPN and OpenBSD</a></h3>

<ul>
<li>After all the recent news about spying, backdoored routers, deep packet inspection and everything else, you might want to start taking steps at getting some privacy back</li>
<li>This article describes how to set up a secure network gateway and VPN using OpenBSD and related crypto utilities</li>
<li>There are bits for DHCP, DNS, OpenVPN, DNSCrypt and a watchdog script to make sure your tunnel is always being used</li>
<li>You can transparently tunnel all your outbound traffic over the VPN with this configuration, nothing is needed on any of the client systems - this could also be used with Tor (but it would be very slow)</li>
<li>It also includes a few general privacy tips, recommended browser extensions, etc</li>
<li>The intro to the article is especially great, so give the whole thing a read</li>
<li>He mentions our <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">OpenBSD router guide</a> and other tutorials being a big help for this setup, so hello if you&#39;re watching!
***</li>
</ul>

<h3><a href="http://blog.pascalj.com/article/you-should-try-freebsd/" rel="nofollow">You should try FreeBSD</a></h3>

<ul>
<li>In this blog post, the author talks a bit about how some Linux people aren&#39;t familiar with the BSDs and how we can take steps to change that</li>
<li>He goes into some FreeBSD history specifically, then talks about some of the apparent (and not-so-apparent) differences between the two</li>
<li>Possibly the most useful part is how to address the question &quot;my server already works, why bother switching?&quot;</li>
<li>&quot;Stackoverflow’s answers assume I have apt-get installed&quot;</li>
<li>It includes mention of the great documentation, stability, ports, improved security and much more</li>
<li>A takeaway quote for would-be Linux switchers: &quot;I like to compare FreeBSD to a really tidy room where you can find everything with your eyes closed. Once you know where the closets are, it is easy to just grab what you need, even if you have never touched it before&quot;
***</li>
</ul>

<h3><a href="http://hacklog.in/openbsd-and-the-little-mauritian-contributor/" rel="nofollow">OpenBSD and the little Mauritian contributor</a></h3>

<ul>
<li>This is a story about a guy from <a href="https://en.wikipedia.org/wiki/Mauritius" rel="nofollow">Mauritius</a> named Logan, one of OpenBSD&#39;s newest developers</li>
<li>Back in 2010, he started sending in patched for OpenBSD&#39;s &quot;mg&quot; editor, among other small things, and eventually added file transfer resume support for SFTP</li>
<li>The article talks about his journey from just a guy who submits a patch here and there to joining the developer ranks and even getting his picture taken with Theo at a recent hackathon</li>
<li>It really shows how easy it is to get involved with the different BSDs and contribute back to the software ecosystem</li>
<li>Congrats to Logan, and hopefully this will inspire more people to start helping out and contributing code back
***</li>
</ul>

<h2>Interview - Jon Anderson - <a href="mailto:jonathan@freebsd.org" rel="nofollow">jonathan@freebsd.org</a></h2>

<p>Capsicum and Casperd</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dnscrypt" rel="nofollow">Encrypting DNS lookups</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://i.imgur.com/f0qg6Ss.jpg" rel="nofollow">FreeBSD Journal, May 2014 issue</a></h3>

<ul>
<li>The newest issue of the <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">FreeBSD Journal</a> is out, following the bi-monthly release cycle</li>
<li>This time the topics include: a letter from the foundation, a ports report, some 9.3-RELEASE plans, an events calendar, an overview of ipfw, exploring network activity with dtrace, an article about kqueue, data distribution with dnssec and finally an article about TCP scaling</li>
<li>Pick up your (digital) copy at Amazon, Google Play or on iTunes and have a read
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/05/libressl-porting-update.html" rel="nofollow">LibreSSL porting update</a></h3>

<ul>
<li>Since the last LibreSSL post we covered, a couple unofficial &quot;portable&quot; versions have died off</li>
<li>Unfortunately, people still think they can just port LibreSSL to other BSDs and Linux all willy-nilly - stop doing that!</li>
<li>This post reiterates that LibreSSL currently relies on a lot of OpenBSD-specific security functions that are not present in other systems, and also gives a very eye-opening example</li>
<li>Please wait for an official portable version instead of wasting time with these dime-a-dozen github clones that do more harm than good
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1862-meteorjs-on-freebsd-11-may-bsd-issue" rel="nofollow">BSDMag May 2014 issue is out</a></h3>

<ul>
<li>The usual monthly release from BSDMag, covering a variety of subjects</li>
<li>This time around the topics include: managing large development projects using RCS, working with HAMMER FS and PFSes, running MeteorJS on FreeBSD 11, another bhyve article, more GIMP tutorials and a few other things</li>
<li>It&#39;s a free PDF, go grab it
***</li>
</ul>

<h3><a href="http://bsdtalk.blogspot.com/2014/05/bsdtalk241-bob-beck.html" rel="nofollow">BSDTalk episode 241</a></h3>

<ul>
<li>A new episode of <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">BSDTalk</a> is out, this time with Bob Beck</li>
<li>He talks about the OpenBSD foundation&#39;s recent activities, his own work in the project, some stories about the hardware in Theo&#39;s basement and a lot more</li>
<li>The interview itself isn&#39;t about LibreSSL at all, but they do touch on it a bit too</li>
<li>Really interesting stuff, covers a lot of different topics in a short amount of time
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li>We got a number of replies about last week&#39;s VPN question, so thanks to everyone who sent in an email about it - the <a href="https://www.freshports.org/security/vpnc/" rel="nofollow">vpnc</a> package seems to be what we were looking for</li>
<li><a href="http://slexy.org/view/s20MK7bTyc" rel="nofollow">Tim writes in</a></li>
<li><a href="http://slexy.org/view/s2OWREQdUA" rel="nofollow">AJ writes in</a></li>
<li><a href="http://slexy.org/view/s202obAqbT" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21Kye2jAc" rel="nofollow">Thomas writes in</a></li>
<li><a href="http://slexy.org/view/s2zqFVqwxN" rel="nofollow">Martin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>38: A BUG's Life</title>
  <link>https://www.bsdnow.tv/38</link>
  <guid isPermaLink="false">01510b66-38e5-40ac-a282-9bff71cb55d9</guid>
  <pubDate>Wed, 21 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/01510b66-38e5-40ac-a282-9bff71cb55d9.mp3" length="63768244" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:28:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back from BSDCan! This week on the show we'll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We'll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we've got a tutorial on the basics of NetBSD's package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/2053" target="_blank" rel="nofollow noopener"&gt;FreeBSD 11 goals and discussion&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Something that actually happened at BSDCan this year...&lt;/li&gt;
&lt;li&gt;During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE&lt;/li&gt;
&lt;li&gt;Some of MWL's notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support&lt;/li&gt;
&lt;li&gt;A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more&lt;/li&gt;
&lt;li&gt;There's also some notes from the &lt;a href="http://blather.michaelwlucas.com/archives/2060" target="_blank" rel="nofollow noopener"&gt;devsummit virtualization session&lt;/a&gt;, mostly talking about bhyve&lt;/li&gt;
&lt;li&gt;Lastly, he also provides some notes about &lt;a href="http://blather.michaelwlucas.com/archives/2065" target="_blank" rel="nofollow noopener"&gt;ports and packages&lt;/a&gt; and where they're going
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" target="_blank" rel="nofollow noopener"&gt;An SSH honeypot with OpenBSD and Kippo&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Everyone loves messing with script kiddies, right?&lt;/li&gt;
&lt;li&gt;This blog post introduces &lt;a href="https://code.google.com/p/kippo/" target="_blank" rel="nofollow noopener"&gt;Kippo&lt;/a&gt;, an SSH honeypot tool, and how to use it in combination with OpenBSD&lt;/li&gt;
&lt;li&gt;It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely&lt;/li&gt;
&lt;li&gt;You can use this to get new 0day exploits or find weaknesses in your systems&lt;/li&gt;
&lt;li&gt;OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.netbsd.org/foundation/reports/financial/2013.html" target="_blank" rel="nofollow noopener"&gt;NetBSD foundation financial report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The NetBSD foundation has posted their 2013 financial report&lt;/li&gt;
&lt;li&gt;It's a very "no nonsense" page, pretty much only the hard numbers&lt;/li&gt;
&lt;li&gt;In 2013, they got $26,000 of income in donations&lt;/li&gt;
&lt;li&gt;The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else&lt;/li&gt;
&lt;li&gt;Be sure to donate to whichever BSDs you like and use!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" target="_blank" rel="nofollow noopener"&gt;Building a fully-encrypted NAS with OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you're doing&lt;/li&gt;
&lt;li&gt;This article takes a look at the OpenBSD side and &lt;a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" target="_blank" rel="nofollow noopener"&gt;explains how&lt;/a&gt; to build a NAS with security in mind&lt;/li&gt;
&lt;li&gt;The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected&lt;/li&gt;
&lt;li&gt;The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people's needs too&lt;/li&gt;
&lt;li&gt;There's also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Brian Callahan &amp;amp; Aaron Bieber - &lt;a href="mailto:admin@lists.nycbug.org" target="_blank" rel="nofollow noopener"&gt;admin@lists.nycbug.org&lt;/a&gt; &amp;amp; &lt;a href="mailto:admin@cobug.org" target="_blank" rel="nofollow noopener"&gt;admin@cobug.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Forming a local BSD Users Group&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/pkgsrc" target="_blank" rel="nofollow noopener"&gt;The basics of pkgsrc&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" target="_blank" rel="nofollow noopener"&gt;FreeBSD periodic mails vs. monitoring&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you've ever been an admin for a lot of FreeBSD boxes, you've probably noticed that you get a lot of email&lt;/li&gt;
&lt;li&gt;This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them&lt;/li&gt;
&lt;li&gt;From bad SSH logins to Zabbix alerts, it all adds up quickly&lt;/li&gt;
&lt;li&gt;It highlights the periodic.conf file and FreeBSD's periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.skogsrud.net/?p=44" target="_blank" rel="nofollow noopener"&gt;Doing cool stuff with OpenBSD routing domains&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A blog post from our viewer and regular emailer, Kjell-Aleksander!&lt;/li&gt;
&lt;li&gt;He manages some internally-routed IP ranges at his work, but didn't want to have equipment for each separate project&lt;/li&gt;
&lt;li&gt;This is where OpenBSD routing domains and pf come in to save the day&lt;/li&gt;
&lt;li&gt;The blog post goes through the process with all the network details you could ever dream of&lt;/li&gt;
&lt;li&gt;He even &lt;a href="http://i.imgur.com/penYQFP.jpg" target="_blank" rel="nofollow noopener"&gt;named his networking equipment... after us&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" target="_blank" rel="nofollow noopener"&gt;LibreSSL, the good and the bad&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We're all probably familiar with OpenBSD's fork of OpenSSL at this point&lt;/li&gt;
&lt;li&gt;However, "for those of you that don't know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk"&lt;/li&gt;
&lt;li&gt;This article talks about some of the cryptographic development challenges involved with maintaining such a massive project&lt;/li&gt;
&lt;li&gt;You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled&lt;/li&gt;
&lt;li&gt;It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lots going on in PCBSD land this week, AppCafe has been redesigned&lt;/li&gt;
&lt;li&gt;The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update&lt;/li&gt;
&lt;li&gt;In the more &lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" target="_blank" rel="nofollow noopener"&gt;recent post&lt;/a&gt;, there's some further explanation of the PBI system and the reason for the transition&lt;/li&gt;
&lt;li&gt;It's got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2UbEhgjce" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21XU0y3JP" target="_blank" rel="nofollow noopener"&gt;Daniel writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QQtuawFl" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20XrT5Q8U" target="_blank" rel="nofollow noopener"&gt;tsyn writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ayZ1nsdv" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pkgsrc, bug, bsd user group, users group, community, lug, uug, unix users group, packages, signing, binary, source, compile, ports, nycbug, nycbsdcon, cobug, colorado, new york, conference, presentation, 11.0, ssh, honeypot, script kiddies, kippo, foundation, financial report, encrypted, nas, network attached storage, full disk encryption, periodic, routing domains, pf, the book of pf, third edition, 3rd edition, cron, monitoring, openssl, libressl</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from BSDCan! This week on the show we&#39;ll be chatting with Brian Callahan and Aaron Bieber about forming a local BSD users group. We&#39;ll get to hear their experiences of running one and maybe encourage some of you to start your own! After that, we&#39;ve got a tutorial on the basics of NetBSD&#39;s package manager, pkgsrc. Answers to your emails and the latest headlines, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://blather.michaelwlucas.com/archives/2053" rel="nofollow">FreeBSD 11 goals and discussion</a></h3>

<ul>
<li>Something that actually happened at BSDCan this year...</li>
<li>During the FreeBSD devsummit, there was some discussion about what changes will be made in 11.0-RELEASE</li>
<li>Some of MWL&#39;s notes include: the test suite will be merged to 10-STABLE, more work on the MIPS platforms, LLDB getting more attention, UEFI boot and install support</li>
<li>A large list of possibilities was also included and open for discussion, including AES-GCM in IPSEC, ASLR, OpenMP, ICC, in-place kernel upgrades, Capsicum improvements, TCP performance improvements and A LOT more</li>
<li>There&#39;s also some notes from the <a href="http://blather.michaelwlucas.com/archives/2060" rel="nofollow">devsummit virtualization session</a>, mostly talking about bhyve</li>
<li>Lastly, he also provides some notes about <a href="http://blather.michaelwlucas.com/archives/2065" rel="nofollow">ports and packages</a> and where they&#39;re going
***</li>
</ul>

<h3><a href="http://securit.se/2014/05/how-to-install-kippo-ssh-honeypot-on-openbsd-5-5-with-chroot/" rel="nofollow">An SSH honeypot with OpenBSD and Kippo</a></h3>

<ul>
<li>Everyone loves messing with script kiddies, right?</li>
<li>This blog post introduces <a href="https://code.google.com/p/kippo/" rel="nofollow">Kippo</a>, an SSH honeypot tool, and how to use it in combination with OpenBSD</li>
<li>It includes a step by step (or rather, command by command) guide and some tips for running a honeypot securely</li>
<li>You can use this to get new 0day exploits or find weaknesses in your systems</li>
<li>OpenBSD makes a great companion for security testing tools like this with all its exploit mitigation techniques that protect all running applications
***</li>
</ul>

<h3><a href="https://www.netbsd.org/foundation/reports/financial/2013.html" rel="nofollow">NetBSD foundation financial report</a></h3>

<ul>
<li>The NetBSD foundation has posted their 2013 financial report</li>
<li>It&#39;s a very &quot;no nonsense&quot; page, pretty much only the hard numbers</li>
<li>In 2013, they got $26,000 of income in donations</li>
<li>The rest of the page shows all the details, how they spent it on hardware, consulting, conference fees, legal costs and everything else</li>
<li>Be sure to donate to whichever BSDs you like and use!
***</li>
</ul>

<h3><a href="http://www.geektechnique.org/projectlab/796/how-to-build-a-fully-encrypted-nas-on-openbsd.html" rel="nofollow">Building a fully-encrypted NAS with OpenBSD</a></h3>

<ul>
<li>Usually the popular choice for a NAS system is FreeNAS, or plain FreeBSD if you know what you&#39;re doing</li>
<li>This article takes a look at the OpenBSD side and <a href="http://www.geektechnique.org/projectlab/797/openbsd-encrypted-nas-howto.html" rel="nofollow">explains how</a> to build a NAS with security in mind</li>
<li>The NAS will be fully encrypted, no separate /boot partition like FreeBSD and FreeNAS require - this means the kernel itself is even protected</li>
<li>The obvious trade-off is the lack of ZFS support for storage, but this is an interesting idea that would fit most people&#39;s needs too</li>
<li>There&#39;s also a bit of background information on NAS systems in general, some NAS-specific security tips and even some nice graphs and pictures of the hardware - fantastic write up!
***</li>
</ul>

<h2>Interview - Brian Callahan &amp; Aaron Bieber - <a href="mailto:admin@lists.nycbug.org" rel="nofollow">admin@lists.nycbug.org</a> &amp; <a href="mailto:admin@cobug.org" rel="nofollow">admin@cobug.org</a></h2>

<p>Forming a local BSD Users Group</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pkgsrc" rel="nofollow">The basics of pkgsrc</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://deranfangvomende.wordpress.com/2014/05/11/freebsd-periodic-mails-vs-monitoring/" rel="nofollow">FreeBSD periodic mails vs. monitoring</a></h3>

<ul>
<li>If you&#39;ve ever been an admin for a lot of FreeBSD boxes, you&#39;ve probably noticed that you get a lot of email</li>
<li>This page tells about all the different alert emails, cron emails and other reports you might end up getting, as well as how to manage them</li>
<li>From bad SSH logins to Zabbix alerts, it all adds up quickly</li>
<li>It highlights the periodic.conf file and FreeBSD&#39;s periodic daemon, as well as some third party monitoring tools you can use to keep track of your servers
***</li>
</ul>

<h3><a href="http://www.skogsrud.net/?p=44" rel="nofollow">Doing cool stuff with OpenBSD routing domains</a></h3>

<ul>
<li>A blog post from our viewer and regular emailer, Kjell-Aleksander!</li>
<li>He manages some internally-routed IP ranges at his work, but didn&#39;t want to have equipment for each separate project</li>
<li>This is where OpenBSD routing domains and pf come in to save the day</li>
<li>The blog post goes through the process with all the network details you could ever dream of</li>
<li>He even <a href="http://i.imgur.com/penYQFP.jpg" rel="nofollow">named his networking equipment... after us</a>
***</li>
</ul>

<h3><a href="http://insanecoding.blogspot.com/2014/04/libressl-good-and-bad.html" rel="nofollow">LibreSSL, the good and the bad</a></h3>

<ul>
<li>We&#39;re all probably familiar with OpenBSD&#39;s fork of OpenSSL at this point</li>
<li>However, &quot;for those of you that don&#39;t know it, OpenSSL is at the same time the best and most popular SSL/TLS library available, and utter junk&quot;</li>
<li>This article talks about some of the cryptographic development challenges involved with maintaining such a massive project</li>
<li>You need cryptographers, software engineers, software optimization specialists - there are a lot of roles that need to be filled</li>
<li>It also mentions some OpenSSL alternatives and recent LibreSSL progress, as well as some downsides to the fork - the main one being their aim for backwards compatibility
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-28-photos-of-the-new-appcafe-re-design/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots going on in PCBSD land this week, AppCafe has been redesigned</li>
<li>The PBI system is being replaced with pkgng, PBIs will be automatically converted once you update</li>
<li>In the more <a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-29-pbing/" rel="nofollow">recent post</a>, there&#39;s some further explanation of the PBI system and the reason for the transition</li>
<li>It&#39;s got lots of details on the different ways to install software, so hopefully it will clear up any possible confusion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UbEhgjce" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21XU0y3JP" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2QQtuawFl" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20XrT5Q8U" rel="nofollow">tsyn writes in</a></li>
<li><a href="http://slexy.org/view/s2ayZ1nsdv" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>37: BSDCanned Goods</title>
  <link>https://www.bsdnow.tv/37</link>
  <guid isPermaLink="false">3519165b-e16c-49e5-9148-ad92396b617e</guid>
  <pubDate>Wed, 14 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/3519165b-e16c-49e5-9148-ad92396b617e.mp3" length="92116660" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we're at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don't get arrested for harassment, we'll be back next week with your regularly scheduled programming. For now, we've got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We'll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>2:07:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we're at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don't get arrested for harassment, we'll be back next week with your regularly scheduled programming. For now, we've got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We'll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Presentation - Matthew Ahrens - &lt;a href="mailto:matt@mahrens.org" target="_blank" rel="nofollow noopener"&gt;matt@mahrens.org&lt;/a&gt; / &lt;a href="https://twitter.com/mahrens1" target="_blank" rel="nofollow noopener"&gt;@mahrens1&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenZFS discussion&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2kGZUlxjg" target="_blank" rel="nofollow noopener"&gt;Remy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s23j9RHsIx" target="_blank" rel="nofollow noopener"&gt;Darin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21dMlBAhM" target="_blank" rel="nofollow noopener"&gt;Steve writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20IyvdSmR" target="_blank" rel="nofollow noopener"&gt;Pascal writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, feedback, emails, questions, support, bsdcan, ottawa, conference, convention</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;re at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don&#39;t get arrested for harassment, we&#39;ll be back next week with your regularly scheduled programming. For now, we&#39;ve got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We&#39;ll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Presentation - Matthew Ahrens - <a href="mailto:matt@mahrens.org" rel="nofollow">matt@mahrens.org</a> / <a href="https://twitter.com/mahrens1" rel="nofollow">@mahrens1</a></h2>

<p>OpenZFS discussion</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kGZUlxjg" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s23j9RHsIx" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s21dMlBAhM" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s20IyvdSmR" rel="nofollow">Pascal writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;re at BSDCan, ganging up on people and forcing them to give us interviews. Assuming we don&#39;t get arrested for harassment, we&#39;ll be back next week with your regularly scheduled programming. For now, we&#39;ve got some feedback emails to catch up on, as well as a prerecorded talk Matt Ahrens gave about ZFS. We&#39;ll be back to tell you all about the conference next week, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Presentation - Matthew Ahrens - <a href="mailto:matt@mahrens.org" rel="nofollow">matt@mahrens.org</a> / <a href="https://twitter.com/mahrens1" rel="nofollow">@mahrens1</a></h2>

<p>OpenZFS discussion</p>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2kGZUlxjg" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s23j9RHsIx" rel="nofollow">Darin writes in</a></li>
<li><a href="http://slexy.org/view/s21dMlBAhM" rel="nofollow">Steve writes in</a></li>
<li><a href="http://slexy.org/view/s20IyvdSmR" rel="nofollow">Pascal writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>36: Let's Get RAID</title>
  <link>https://www.bsdnow.tv/36</link>
  <guid isPermaLink="false">485b12e9-ea67-4bc6-9709-4b0e38a76184</guid>
  <pubDate>Wed, 07 May 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/485b12e9-ea67-4bc6-9709-4b0e38a76184.mp3" length="65368948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show we'll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There's also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we'll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source"&gt;&lt;/a&gt;&lt;a href="http://www.tarsnap.com/bsdnow" title="Tarsnap" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/55.html" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you &lt;a href="https://https.openbsd.org/cgi-bin/order" target="_blank" rel="nofollow noopener"&gt;ordered&lt;/a&gt; a &lt;a href="https://twitter.com/blakkheim/status/461909893813784576" target="_blank" rel="nofollow noopener"&gt;CD set&lt;/a&gt; then you've probably had it for a little while already, but OpenBSD has formally announced the &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140501153339" target="_blank" rel="nofollow noopener"&gt;public release&lt;/a&gt; of 5.5&lt;/li&gt;
&lt;li&gt;This is one of the biggest releases to date, with a very long list of changes and improvements&lt;/li&gt;
&lt;li&gt;Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://www.openbsd.org/plus55.html" target="_blank" rel="nofollow noopener"&gt;full list of changes&lt;/a&gt; is HUGE, be sure to read through it all if you're interested in the details&lt;/li&gt;
&lt;li&gt;If you're doing an upgrade from 5.4 instead of a fresh install, pay careful attention to &lt;a href="http://www.openbsd.org/faq/upgrade55.html" target="_blank" rel="nofollow noopener"&gt;the upgrade guide&lt;/a&gt; as there are some very specific steps for this version&lt;/li&gt;
&lt;li&gt;Also be sure to apply the &lt;a href="http://www.openbsd.org/errata55.html" target="_blank" rel="nofollow noopener"&gt;errata patches&lt;/a&gt; on your new installations... especially those OpenSSL ones (some of which &lt;a href="http://marc.info/?l=oss-security&amp;amp;m=139906348230995&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;still aren't fixed&lt;/a&gt; in the other BSDs yet)&lt;/li&gt;
&lt;li&gt;On the topic of errata patches, the project is now going to also send them out (&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140502103355" target="_blank" rel="nofollow noopener"&gt;signed&lt;/a&gt;) via the &lt;a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&amp;amp;passw=&amp;amp;func=lists-long-full&amp;amp;extra=announce" target="_blank" rel="nofollow noopener"&gt;announce mailing list&lt;/a&gt;, a very welcome change&lt;/li&gt;
&lt;li&gt;Congrats to the whole team on this great release - 5.6 is going to be even more awesome with "Libre"SSL and lots of other stuff that's currently in development
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation funding highlights&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation posts a new update on how they're spending the money that everyone donates&lt;/li&gt;
&lt;li&gt;"As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we've done to help FreeBSD become the most innovative, reliable, and high-performance operation system"&lt;/li&gt;
&lt;li&gt;During this spring, they want to highlight the new UEFI boot support &lt;a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" target="_blank" rel="nofollow noopener"&gt;and newcons&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's a lot of details about what exactly UEFI is and why we need it going forward&lt;/li&gt;
&lt;li&gt;FreeBSD has also needed some updates to its console to support UTF8 and wide characters&lt;/li&gt;
&lt;li&gt;Hopefully this series will continue and we'll get to see what other work is being sponsored
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139879453001957&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenSSH without OpenSSL&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional&lt;/li&gt;
&lt;li&gt;Since it won't have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security&lt;/li&gt;
&lt;li&gt;This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the &lt;a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" target="_blank" rel="nofollow noopener"&gt;new combination&lt;/a&gt; of the Chacha20 stream cipher with Poly1305 for packet integrity&lt;/li&gt;
&lt;li&gt;Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs&lt;/li&gt;
&lt;li&gt;No support for RSA, DSA or ECDSA public keys - only Ed25519&lt;/li&gt;
&lt;li&gt;It also includes a &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139883582313750&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;new buffer API&lt;/a&gt; and a set of wrappers to make it compatible with the existing API&lt;/li&gt;
&lt;li&gt;Believe it or not, this was planned before all the heartbleed craziness&lt;/li&gt;
&lt;li&gt;Maybe someday soon we'll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag's April 2014 issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The free monthly BSD magazine has got a new issue available for download&lt;/li&gt;
&lt;li&gt;This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online&lt;/li&gt;
&lt;li&gt;Anyone can contribute to the magazine, just send the editors an email about what you want to write&lt;/li&gt;
&lt;li&gt;No Linux articles this time around, good
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - David Chisnall - &lt;a href="mailto:theraven@freebsd.org" target="_blank" rel="nofollow noopener"&gt;theraven@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The LLVM/Clang switch, FreeBSD's core team, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/raid" target="_blank" rel="nofollow noopener"&gt;RAID in FreeBSD and OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" target="_blank" rel="nofollow noopener"&gt;BSDTalk episode 240&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time&lt;/li&gt;
&lt;li&gt;Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more&lt;/li&gt;
&lt;li&gt;GNN also talks a little about the &lt;a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" target="_blank" rel="nofollow noopener"&gt;Precision Time Protocol&lt;/a&gt; and how it's different than NTP&lt;/li&gt;
&lt;li&gt;Two &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;people&lt;/a&gt; we've &lt;a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" target="_blank" rel="nofollow noopener"&gt;interviewed&lt;/a&gt; talking to each other, awesome&lt;/li&gt;
&lt;li&gt;If you're interested in NTP, be sure to see our &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;tutorial&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140502092427" target="_blank" rel="nofollow noopener"&gt;m2k14 trip reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've got a few more reports from the recent OpenBSD hackathon in Morocco&lt;/li&gt;
&lt;li&gt;The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the &lt;a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" target="_blank" rel="nofollow noopener"&gt;OpenBSD desktop tutorial&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;"Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do"&lt;/li&gt;
&lt;li&gt;He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports' compatibility with LibreSSL&lt;/li&gt;
&lt;li&gt;Speaking of LibreSSL, there's &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140505062023" target="_blank" rel="nofollow noopener"&gt;an article&lt;/a&gt; all would-be portable version writers should probably read and take into consideration&lt;/li&gt;
&lt;li&gt;Jasper Adriaanse &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140501185019" target="_blank" rel="nofollow noopener"&gt;also writes&lt;/a&gt; about what he got done over there&lt;/li&gt;
&lt;li&gt;He cleaned up and fixed the puppet port to work better with OpenBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" target="_blank" rel="nofollow noopener"&gt;Why you should use FreeBSD on your cloud VPS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD&lt;/li&gt;
&lt;li&gt;Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows&lt;/li&gt;
&lt;li&gt;The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options&lt;/li&gt;
&lt;li&gt;The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Big changes coming in the way PCBSD manages software&lt;/li&gt;
&lt;li&gt;The PBI system, AppCafe and related tools are all going to use pkgng now&lt;/li&gt;
&lt;li&gt;The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree&lt;/li&gt;
&lt;li&gt;New rating system coming soon and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21bk2oPuQ" target="_blank" rel="nofollow noopener"&gt;Martin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2n9fx1Rpw" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2rBBKLA4u" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20JY6ZI71" target="_blank" rel="nofollow noopener"&gt;Goetz writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20YV5Ohpa" target="_blank" rel="nofollow noopener"&gt;Jarrad writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, theraven, david chisnall, core, core team, clang, gcc, llvm, raid, stripe, mirror, bioctl, gstripe, zfs, gmirror, graid, ufs, ffs, disks, the worst pun i've done so far, i regret this already, redundancy, raid0, raid1, raid5, raidz, raid-z, filesystem, 5.5, pie, aslr, cd set, demo, tour, opensmtpd, pf, gnome, gnome3, marcusports, ports, router, signify, hackathon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show we&#39;ll be showing you how to set up RAID arrays in both FreeBSD and OpenBSD. There&#39;s also an interview with David Chisnall - of the FreeBSD core team - about the switch to Clang and a lot more. As usual, we&#39;ll be dropping the latest news and answering your emails, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise servers and storage for open source" /></a><a href="http://www.tarsnap.com/bsdnow" title="Tarsnap"><img src="/images/tarsnap1.png" alt="Tarsnap - online backups for the truly paranoid" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.openbsd.org/55.html" rel="nofollow">OpenBSD 5.5 released</a></h3>

<ul>
<li>If you <a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">ordered</a> a <a href="https://twitter.com/blakkheim/status/461909893813784576" rel="nofollow">CD set</a> then you&#39;ve probably had it for a little while already, but OpenBSD has formally announced the <a href="http://undeadly.org/cgi?action=article&sid=20140501153339" rel="nofollow">public release</a> of 5.5</li>
<li>This is one of the biggest releases to date, with a very long list of changes and improvements</li>
<li>Some of the highlights include: time_t being 64 bit on all platforms, release sets and binary packages being signed with the new signify tool, a new autoinstall feature of the installer, SMP support on Alpha, a new AViiON port, lots of new hardware drivers including newer NICs, the new vxlan driver, relayd improvements, a new pf queue system for bandwidth shaping, dhcpd and dhclient fixes, OpenSMTPD 5.4.2 and all its new features, position-independent executables being default for i386, the RNG has been replaced with ChaCha20 as well as some other security improvements, FUSE support, tmpfs, softraid partitions larger than 2TB and a RAID 5 implementation, OpenSSH 6.6 with all its new features and fixes... and a lot more</li>
<li>The <a href="http://www.openbsd.org/plus55.html" rel="nofollow">full list of changes</a> is HUGE, be sure to read through it all if you&#39;re interested in the details</li>
<li>If you&#39;re doing an upgrade from 5.4 instead of a fresh install, pay careful attention to <a href="http://www.openbsd.org/faq/upgrade55.html" rel="nofollow">the upgrade guide</a> as there are some very specific steps for this version</li>
<li>Also be sure to apply the <a href="http://www.openbsd.org/errata55.html" rel="nofollow">errata patches</a> on your new installations... especially those OpenSSL ones (some of which <a href="http://marc.info/?l=oss-security&m=139906348230995&w=2" rel="nofollow">still aren&#39;t fixed</a> in the other BSDs yet)</li>
<li>On the topic of errata patches, the project is now going to also send them out (<a href="http://undeadly.org/cgi?action=article&sid=20140502103355" rel="nofollow">signed</a>) via the <a href="http://lists.openbsd.org/cgi-bin/mj_wwwusr?user=&passw=&func=lists-long-full&extra=announce" rel="nofollow">announce mailing list</a>, a very welcome change</li>
<li>Congrats to the whole team on this great release - 5.6 is going to be even more awesome with &quot;Libre&quot;SSL and lots of other stuff that&#39;s currently in development
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising_28.html" rel="nofollow">FreeBSD foundation funding highlights</a></h3>

<ul>
<li>The FreeBSD foundation posts a new update on how they&#39;re spending the money that everyone donates</li>
<li>&quot;As we embark on our 15th year of serving the FreeBSD Project and community, we are proud of what we&#39;ve done to help FreeBSD become the most innovative, reliable, and high-performance operation system&quot;</li>
<li>During this spring, they want to highlight the new UEFI boot support <a href="http://freebsdfoundation.blogspot.com/2014/05/freebsd-foundation-newcons-project.html" rel="nofollow">and newcons</a></li>
<li>There&#39;s a lot of details about what exactly UEFI is and why we need it going forward</li>
<li>FreeBSD has also needed some updates to its console to support UTF8 and wide characters</li>
<li>Hopefully this series will continue and we&#39;ll get to see what other work is being sponsored
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=139879453001957&w=2" rel="nofollow">OpenSSH without OpenSSL</a></h3>

<ul>
<li>The OpenSSH team has been hard at work, making it even better, and now OpenSSL is completely optional</li>
<li>Since it won&#39;t have access to the primitives OpenSSL uses, there will be a trade-off of features vs. security</li>
<li>This version will drop support for legacy SSH v1, and the only two cryptographic algorithms supported are an in-house implementation of AES in counter mode and the <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.chacha20poly1305?rev=HEAD;content-type=text%2Fplain" rel="nofollow">new combination</a> of the Chacha20 stream cipher with Poly1305 for packet integrity</li>
<li>Key exchange is limited to elliptic curve Diffie-Hellman and the newer Curve25519 KEXs</li>
<li>No support for RSA, DSA or ECDSA public keys - only Ed25519</li>
<li>It also includes a <a href="http://marc.info/?l=openbsd-cvs&m=139883582313750&w=2" rel="nofollow">new buffer API</a> and a set of wrappers to make it compatible with the existing API</li>
<li>Believe it or not, this was planned before all the heartbleed craziness</li>
<li>Maybe someday soon we&#39;ll have a mini-openssh-portable in FreeBSD ports and NetBSD pkgsrc, would be really neat
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1861-free-pascal-on-bsd-april-bsd-issue" rel="nofollow">BSDMag&#39;s April 2014 issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine has got a new issue available for download</li>
<li>This time the articles include: pascal on BSD, an introduction to revision control systems and configuration management, deploying NetBSD on AWS EC2, more GIMP tutorials, an AsiaBSDCon 2014 report and a piece about how easily credit cards are stolen online</li>
<li>Anyone can contribute to the magazine, just send the editors an email about what you want to write</li>
<li>No Linux articles this time around, good
***</li>
</ul>

<h2>Interview - David Chisnall - <a href="mailto:theraven@freebsd.org" rel="nofollow">theraven@freebsd.org</a></h2>

<p>The LLVM/Clang switch, FreeBSD&#39;s core team, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/raid" rel="nofollow">RAID in FreeBSD and OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bsdtalk.blogspot.com/2014/04/bsdtalk240-about-time-with-george.html" rel="nofollow">BSDTalk episode 240</a></h3>

<ul>
<li>Our buddy Will Backman has uploaded a new episode of BSDTalk, this time with our other buddy GNN as the guest - mainly to talk about NTP and keeping reliable time</li>
<li>Topics include the specific details of crystals used in watches and computers to keep time, how temperature affects the quality, different sources of inaccuracy, some general NTP information, why you might want extremely precise time, different time sources (GPS, satellite, etc), differences in stratum levels, the problem of packet delay and estimating the round trip time, some of the recent NTP amplification attacks, the downsides to using UDP instead of TCP and... much more</li>
<li>GNN also talks a little about the <a href="https://en.wikipedia.org/wiki/Precision_Time_Protocol" rel="nofollow">Precision Time Protocol</a> and how it&#39;s different than NTP</li>
<li>Two <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">people</a> we&#39;ve <a href="http://www.bsdnow.tv/episodes/2014_03_05-bsd_now_vs_bsdtalk" rel="nofollow">interviewed</a> talking to each other, awesome</li>
<li>If you&#39;re interested in NTP, be sure to see our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">tutorial</a> too
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140502092427" rel="nofollow">m2k14 trip reports</a></h3>

<ul>
<li>We&#39;ve got a few more reports from the recent OpenBSD hackathon in Morocco</li>
<li>The first one is from Antoine Jacoutot (who is a key GNOME porter and gave us the screenshots for the <a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">OpenBSD desktop tutorial</a>)</li>
<li>&quot;Since I always fail at actually doing whatever I have planned for a hackathon, this time I decided to come to m2k14 unprepared about what I was going to do&quot;</li>
<li>He got lots of work done with ports and pushing GNOME-related patches back up to the main project, then worked on fixing ports&#39; compatibility with LibreSSL</li>
<li>Speaking of LibreSSL, there&#39;s <a href="http://undeadly.org/cgi?action=article&sid=20140505062023" rel="nofollow">an article</a> all would-be portable version writers should probably read and take into consideration</li>
<li>Jasper Adriaanse <a href="http://undeadly.org/cgi?action=article&sid=20140501185019" rel="nofollow">also writes</a> about what he got done over there</li>
<li>He cleaned up and fixed the puppet port to work better with OpenBSD
***</li>
</ul>

<h3><a href="https://www.atlantic.net/blog/2014/04/08/freebsd-ssd-cloud-vps-hosting-10-reasons/" rel="nofollow">Why you should use FreeBSD on your cloud VPS</a></h3>

<ul>
<li>Here we have a blog post from Atlantic, a VPS and hosting provider, about 10 reasons for using FreeBSD</li>
<li>Starts off with a little bit of BSD history for those who are unfamiliar with it and only know Linux and Windows</li>
<li>The 10 reasons are: community, stability, collaboration, ease of use, ports, security, ZFS, GEOM, sound and having lots of options</li>
<li>The post goes into detail about each of them and why FreeBSD makes a great choice for a VPS OS
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/05/weekly-feature-digest-27-software-system-redesign/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Big changes coming in the way PCBSD manages software</li>
<li>The PBI system, AppCafe and related tools are all going to use pkgng now</li>
<li>The AppCafe will no longer be limited to PBIs, so much more software will be easily available from the ports tree</li>
<li>New rating system coming soon and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21bk2oPuQ" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s2n9fx1Rpw" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s2rBBKLA4u" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s20JY6ZI71" rel="nofollow">Goetz writes in</a></li>
<li><a href="http://slexy.org/view/s20YV5Ohpa" rel="nofollow">Jarrad writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>35: Puffy Firewall</title>
  <link>https://www.bsdnow.tv/35</link>
  <guid isPermaLink="false">203904d9-509c-4727-918f-d5e6a6276cf8</guid>
  <pubDate>Wed, 30 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/203904d9-509c-4727-918f-d5e6a6276cf8.mp3" length="57157492" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back again! On this week's packed show, we've got one of the biggest tutorials we've done in a while. It's an in-depth look at PF, OpenBSD's firewall, with some practical examples and different use cases. We'll also be talking to Peter Hansteen about the new edition of "The Book of PF." Of course, we've got news and answers to your emails too, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:19:23</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back again! On this week's packed show, we've got one of the biggest tutorials we've done in a while. It's an in-depth look at PF, OpenBSD's firewall, with some practical examples and different use cases. We'll also be talking to Peter Hansteen about the new edition of "The Book of PF." Of course, we've got news and answers to your emails too, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140419151959" target="_blank" rel="nofollow noopener"&gt;ALTQ removed from PF&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Kicking off our big PF episode...&lt;/li&gt;
&lt;li&gt;The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current&lt;/li&gt;
&lt;li&gt;There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the "queue" keyword with "oldqueue" in your pf.conf&lt;/li&gt;
&lt;li&gt;As of 5.6, due about six months from now, you'll have to change your ruleset to the new syntax if you're using it for bandwidth shaping&lt;/li&gt;
&lt;li&gt;After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem&lt;/li&gt;
&lt;li&gt;This doesn't affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2014-01-2014-03.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Quarterly Status Report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The quarterly status report from FreeBSD is out, detailing some of the project's ongoing tasks&lt;/li&gt;
&lt;li&gt;Some highlights include the first "stable" branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added&lt;/li&gt;
&lt;li&gt;We've got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team&lt;/li&gt;
&lt;li&gt;LOTS of details and LOTS of topics to cover, give it a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140417184158" target="_blank" rel="nofollow noopener"&gt;OpenBSD's OpenSSL rewrite continues with m2k14&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A mini OpenBSD &lt;a href="http://www.openbsd.org/hackathons.html" target="_blank" rel="nofollow noopener"&gt;hackathon&lt;/a&gt; begins in Morocco, Africa&lt;/li&gt;
&lt;li&gt;You can follow the changes in &lt;a href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/" target="_blank" rel="nofollow noopener"&gt;the -current CVS log&lt;/a&gt;, but &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140418063443" target="_blank" rel="nofollow noopener"&gt;a lot of work&lt;/a&gt; is mainly going towards the OpenSSL cleaning&lt;/li&gt;
&lt;li&gt;We've got two &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140429121423" target="_blank" rel="nofollow noopener"&gt;trip&lt;/a&gt; &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140425115340" target="_blank" rel="nofollow noopener"&gt;reports&lt;/a&gt; so far, hopefully we'll have some more to show you in a future episode&lt;/li&gt;
&lt;li&gt;You can see some of the &lt;a href="http://opensslrampage.org/" target="_blank" rel="nofollow noopener"&gt;more interesting quotes&lt;/a&gt; from the tear-down or &lt;a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" target="_blank" rel="nofollow noopener"&gt;see everything&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140423045847" target="_blank" rel="nofollow noopener"&gt;Apparently&lt;/a&gt; they are going to call the fork "&lt;a href="https://news.ycombinator.com/item?id=7623789" target="_blank" rel="nofollow noopener"&gt;LibreSSL&lt;/a&gt;" ....&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" target="_blank" rel="nofollow noopener"&gt;What were the OpenSSL developers thinking&lt;/a&gt;? The RSA private key was used to seed the entropy!&lt;/li&gt;
&lt;li&gt;We also got &lt;a href="http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/" target="_blank" rel="nofollow noopener"&gt;some mainstream news coverage&lt;/a&gt; and &lt;a href="http://www.tedunangst.com/flak/post/origins-of-libressl" target="_blank" rel="nofollow noopener"&gt;another post from Ted&lt;/a&gt; about the history of the fork&lt;/li&gt;
&lt;li&gt;Definitely consider &lt;a href="http://www.openbsdfoundation.org/donations.html" target="_blank" rel="nofollow noopener"&gt;donating to the OpenBSD foundation&lt;/a&gt;, this fork will benefit all the other BSDs too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and" target="_blank" rel="nofollow noopener"&gt;NetBSD 6.1.4 and 6.0.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes&lt;/li&gt;
&lt;li&gt;The main update is - of course - the heartbleed vulnerability&lt;/li&gt;
&lt;li&gt;Also includes fixes for other security issues and even a kernel panic... on Atari&lt;/li&gt;
&lt;li&gt;Patch your Ataris right now, this is serious business
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Peter Hansteen - &lt;a href="mailto:peter@bsdly.net" target="_blank" rel="nofollow noopener"&gt;peter@bsdly.net&lt;/a&gt; / &lt;a href="https://twitter.com/pitrh" target="_blank" rel="nofollow noopener"&gt;@pitrh&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The Book of PF: 3rd edition&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/pf" target="_blank" rel="nofollow noopener"&gt;BSD Firewalls: PF&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=351411" target="_blank" rel="nofollow noopener"&gt;New Xorg now the default in FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For quite a while now, FreeBSD has had two versions of X11 in ports&lt;/li&gt;
&lt;li&gt;The older, stable version was the default, but you could install a newer one by having "WITH_NEW_XORG" in /etc/make.conf&lt;/li&gt;
&lt;li&gt;They've finally made the switch for 10-STABLE and 9-STABLE&lt;/li&gt;
&lt;li&gt;Check &lt;a href="https://wiki.freebsd.org/Graphics" target="_blank" rel="nofollow noopener"&gt;this wiki page&lt;/a&gt; for more info
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation" target="_blank" rel="nofollow noopener"&gt;GSoC-accepted BSD projects&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what's planned&lt;/li&gt;
&lt;li&gt;OpenBSD's list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd" target="_blank" rel="nofollow noopener"&gt;FreeBSD list&lt;/a&gt; was also posted&lt;/li&gt;
&lt;li&gt;Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more&lt;/li&gt;
&lt;li&gt;Good luck to all the students participating, hopefully they become full time BSD users
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/" target="_blank" rel="nofollow noopener"&gt;Complexity of FreeBSD VFS using ZFS as an example&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;HybridCluster posted the second part of their VFS and ZFS series&lt;/li&gt;
&lt;li&gt;This new post has lots of technical details once again, definitely worth reading if you're a ZFS guy&lt;/li&gt;
&lt;li&gt;Of course, also watch &lt;a href="http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud" target="_blank" rel="nofollow noopener"&gt;episode 24&lt;/a&gt; for our interview with HybridCluster - they do really interesting stuff
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Preload has been ported over, it's a daemon that prefetches applications&lt;/li&gt;
&lt;li&gt;PCBSD is developing their own desktop environment, Lumina (&lt;a href="http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/" target="_blank" rel="nofollow noopener"&gt;there's also an FAQ&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;It's still in active development, but you can try it out by installing from ports&lt;/li&gt;
&lt;li&gt;We'll be showing a live demo of it in a few weeks (when development settles down a bit)&lt;/li&gt;
&lt;li&gt;Some kid in Australia &lt;a href="https://www.youtube.com/watch?v=ETxhbf3-z18" target="_blank" rel="nofollow noopener"&gt;subjects his poor mother to being on camera&lt;/a&gt; while she tries out PCBSD and gives her impressions of it
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pf, firewall, pfsense, ipfw, ipfilter, router, packet filter, book of pf, third edition, 3rd, bsdcan, presentation, security, peter hansteen, peter n.m. hansteen, pitrh, iptables, npf, nostarch, no starch press, m2k14, hackathon, libressl, openssl, fork</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back again! On this week&#39;s packed show, we&#39;ve got one of the biggest tutorials we&#39;ve done in a while. It&#39;s an in-depth look at PF, OpenBSD&#39;s firewall, with some practical examples and different use cases. We&#39;ll also be talking to Peter Hansteen about the new edition of &quot;The Book of PF.&quot; Of course, we&#39;ve got news and answers to your emails too, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">ALTQ removed from PF</a></h3>

<ul>
<li>Kicking off our big PF episode...</li>
<li>The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current</li>
<li>There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the &quot;queue&quot; keyword with &quot;oldqueue&quot; in your pf.conf</li>
<li>As of 5.6, due about six months from now, you&#39;ll have to change your ruleset to the new syntax if you&#39;re using it for bandwidth shaping</li>
<li>After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem</li>
<li>This doesn&#39;t affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-01-2014-03.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The quarterly status report from FreeBSD is out, detailing some of the project&#39;s ongoing tasks</li>
<li>Some highlights include the first &quot;stable&quot; branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added</li>
<li>We&#39;ve got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team</li>
<li>LOTS of details and LOTS of topics to cover, give it a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140417184158" rel="nofollow">OpenBSD&#39;s OpenSSL rewrite continues with m2k14</a></h3>

<ul>
<li>A mini OpenBSD <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a> begins in Morocco, Africa</li>
<li>You can follow the changes in <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/" rel="nofollow">the -current CVS log</a>, but <a href="http://undeadly.org/cgi?action=article&sid=20140418063443" rel="nofollow">a lot of work</a> is mainly going towards the OpenSSL cleaning</li>
<li>We&#39;ve got two <a href="http://undeadly.org/cgi?action=article&sid=20140429121423" rel="nofollow">trip</a> <a href="http://undeadly.org/cgi?action=article&sid=20140425115340" rel="nofollow">reports</a> so far, hopefully we&#39;ll have some more to show you in a future episode</li>
<li>You can see some of the <a href="http://opensslrampage.org/" rel="nofollow">more interesting quotes</a> from the tear-down or <a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">see everything</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140423045847" rel="nofollow">Apparently</a> they are going to call the fork &quot;<a href="https://news.ycombinator.com/item?id=7623789" rel="nofollow">LibreSSL</a>&quot; ....</li>
<li><a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">What were the OpenSSL developers thinking</a>? The RSA private key was used to seed the entropy!</li>
<li>We also got <a href="http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/" rel="nofollow">some mainstream news coverage</a> and <a href="http://www.tedunangst.com/flak/post/origins-of-libressl" rel="nofollow">another post from Ted</a> about the history of the fork</li>
<li>Definitely consider <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">donating to the OpenBSD foundation</a>, this fork will benefit all the other BSDs too
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and" rel="nofollow">NetBSD 6.1.4 and 6.0.5 released</a></h3>

<ul>
<li>New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes</li>
<li>The main update is - of course - the heartbleed vulnerability</li>
<li>Also includes fixes for other security issues and even a kernel panic... on Atari</li>
<li>Patch your Ataris right now, this is serious business
***</li>
</ul>

<h2>Interview - Peter Hansteen - <a href="mailto:peter@bsdly.net" rel="nofollow">peter@bsdly.net</a> / <a href="https://twitter.com/pitrh" rel="nofollow">@pitrh</a></h2>

<p>The Book of PF: 3rd edition</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">BSD Firewalls: PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=351411" rel="nofollow">New Xorg now the default in FreeBSD</a></h3>

<ul>
<li>For quite a while now, FreeBSD has had two versions of X11 in ports</li>
<li>The older, stable version was the default, but you could install a newer one by having &quot;WITH_NEW_XORG&quot; in /etc/make.conf</li>
<li>They&#39;ve finally made the switch for 10-STABLE and 9-STABLE</li>
<li>Check <a href="https://wiki.freebsd.org/Graphics" rel="nofollow">this wiki page</a> for more info
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what&#39;s planned</li>
<li>OpenBSD&#39;s list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon</li>
<li>The <a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd" rel="nofollow">FreeBSD list</a> was also posted</li>
<li>Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more</li>
<li>Good luck to all the students participating, hopefully they become full time BSD users
***</li>
</ul>

<h3><a href="http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/" rel="nofollow">Complexity of FreeBSD VFS using ZFS as an example</a></h3>

<ul>
<li>HybridCluster posted the second part of their VFS and ZFS series</li>
<li>This new post has lots of technical details once again, definitely worth reading if you&#39;re a ZFS guy</li>
<li>Of course, also watch <a href="http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud" rel="nofollow">episode 24</a> for our interview with HybridCluster - they do really interesting stuff
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Preload has been ported over, it&#39;s a daemon that prefetches applications</li>
<li>PCBSD is developing their own desktop environment, Lumina (<a href="http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/" rel="nofollow">there&#39;s also an FAQ</a>)</li>
<li>It&#39;s still in active development, but you can try it out by installing from ports</li>
<li>We&#39;ll be showing a live demo of it in a few weeks (when development settles down a bit)</li>
<li>Some kid in Australia <a href="https://www.youtube.com/watch?v=ETxhbf3-z18" rel="nofollow">subjects his poor mother to being on camera</a> while she tries out PCBSD and gives her impressions of it
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back again! On this week&#39;s packed show, we&#39;ve got one of the biggest tutorials we&#39;ve done in a while. It&#39;s an in-depth look at PF, OpenBSD&#39;s firewall, with some practical examples and different use cases. We&#39;ll also be talking to Peter Hansteen about the new edition of &quot;The Book of PF.&quot; Of course, we&#39;ve got news and answers to your emails too, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140419151959" rel="nofollow">ALTQ removed from PF</a></h3>

<ul>
<li>Kicking off our big PF episode...</li>
<li>The classic packet queueing system, ALTQ, was recently removed from OpenBSD -current</li>
<li>There will be a transitional phase between 5.5 and 5.6 where you can still use it by replacing the &quot;queue&quot; keyword with &quot;oldqueue&quot; in your pf.conf</li>
<li>As of 5.6, due about six months from now, you&#39;ll have to change your ruleset to the new syntax if you&#39;re using it for bandwidth shaping</li>
<li>After more than ten years, bandwidth queueing has matured quite a bit and we can finally put ALTQ to rest, in favor of the new queueing subsystem</li>
<li>This doesn&#39;t affect FreeBSD, PCBSD, NetBSD or DragonflyBSD since all of their PFs are older and maintained separately.
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2014-01-2014-03.html" rel="nofollow">FreeBSD Quarterly Status Report</a></h3>

<ul>
<li>The quarterly status report from FreeBSD is out, detailing some of the project&#39;s ongoing tasks</li>
<li>Some highlights include the first &quot;stable&quot; branch of ports, ARM improvements (including SMP), bhyve improvements, more work on the test suite, desktop improvements including the new vt console driver and UEFI booting support finally being added</li>
<li>We&#39;ve got some specific updates from the cluster admin team, core team, documentation team, portmgr team, email team and release engineering team</li>
<li>LOTS of details and LOTS of topics to cover, give it a read
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140417184158" rel="nofollow">OpenBSD&#39;s OpenSSL rewrite continues with m2k14</a></h3>

<ul>
<li>A mini OpenBSD <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">hackathon</a> begins in Morocco, Africa</li>
<li>You can follow the changes in <a href="http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/src/ssl/" rel="nofollow">the -current CVS log</a>, but <a href="http://undeadly.org/cgi?action=article&sid=20140418063443" rel="nofollow">a lot of work</a> is mainly going towards the OpenSSL cleaning</li>
<li>We&#39;ve got two <a href="http://undeadly.org/cgi?action=article&sid=20140429121423" rel="nofollow">trip</a> <a href="http://undeadly.org/cgi?action=article&sid=20140425115340" rel="nofollow">reports</a> so far, hopefully we&#39;ll have some more to show you in a future episode</li>
<li>You can see some of the <a href="http://opensslrampage.org/" rel="nofollow">more interesting quotes</a> from the tear-down or <a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">see everything</a></li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140423045847" rel="nofollow">Apparently</a> they are going to call the fork &quot;<a href="https://news.ycombinator.com/item?id=7623789" rel="nofollow">LibreSSL</a>&quot; ....</li>
<li><a href="http://freshbsd.org/commit/openbsd/e5136d69ece4682e6167c8f4a8122270236898bf" rel="nofollow">What were the OpenSSL developers thinking</a>? The RSA private key was used to seed the entropy!</li>
<li>We also got <a href="http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/" rel="nofollow">some mainstream news coverage</a> and <a href="http://www.tedunangst.com/flak/post/origins-of-libressl" rel="nofollow">another post from Ted</a> about the history of the fork</li>
<li>Definitely consider <a href="http://www.openbsdfoundation.org/donations.html" rel="nofollow">donating to the OpenBSD foundation</a>, this fork will benefit all the other BSDs too
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_4_and" rel="nofollow">NetBSD 6.1.4 and 6.0.5 released</a></h3>

<ul>
<li>New updates for the 6.1 and 6.0 branches of NetBSD, focusing on bugfixes</li>
<li>The main update is - of course - the heartbleed vulnerability</li>
<li>Also includes fixes for other security issues and even a kernel panic... on Atari</li>
<li>Patch your Ataris right now, this is serious business
***</li>
</ul>

<h2>Interview - Peter Hansteen - <a href="mailto:peter@bsdly.net" rel="nofollow">peter@bsdly.net</a> / <a href="https://twitter.com/pitrh" rel="nofollow">@pitrh</a></h2>

<p>The Book of PF: 3rd edition</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pf" rel="nofollow">BSD Firewalls: PF</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=351411" rel="nofollow">New Xorg now the default in FreeBSD</a></h3>

<ul>
<li>For quite a while now, FreeBSD has had two versions of X11 in ports</li>
<li>The older, stable version was the default, but you could install a newer one by having &quot;WITH_NEW_XORG&quot; in /etc/make.conf</li>
<li>They&#39;ve finally made the switch for 10-STABLE and 9-STABLE</li>
<li>Check <a href="https://wiki.freebsd.org/Graphics" rel="nofollow">this wiki page</a> for more info
***</li>
</ul>

<h3><a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/openbsdfoundation" rel="nofollow">GSoC-accepted BSD projects</a></h3>

<ul>
<li>The Google Summer of Code team has got the list of accepted project proposals uploaded so we can see what&#39;s planned</li>
<li>OpenBSD&#39;s list includes DHCP configuration parsing improvements, systemd replacements, porting capsicum, GPT and UEFI support, and modernizing the DHCP daemon</li>
<li>The <a href="https://www.google-melange.com/gsoc/org2/google/gsoc2014/freebsd" rel="nofollow">FreeBSD list</a> was also posted</li>
<li>Theirs includes porting FreeBSD to the Android emulator, CTF in the kernel debugger, improved unicode support, converting firewall rules to a C module, pkgng improvements, MicroBlaze support, PXE fixes, bhyve caching, bootsplash and lots more</li>
<li>Good luck to all the students participating, hopefully they become full time BSD users
***</li>
</ul>

<h3><a href="http://www.hybridcluster.com/blog/complexity-freebsd-vfs-using-zfs-example-part-2/" rel="nofollow">Complexity of FreeBSD VFS using ZFS as an example</a></h3>

<ul>
<li>HybridCluster posted the second part of their VFS and ZFS series</li>
<li>This new post has lots of technical details once again, definitely worth reading if you&#39;re a ZFS guy</li>
<li>Of course, also watch <a href="http://www.bsdnow.tv/episodes/2014_02_12-the_cluster_the_cloud" rel="nofollow">episode 24</a> for our interview with HybridCluster - they do really interesting stuff
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/weekly-feature-digest-26-the-lumina-project-and-preload/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Preload has been ported over, it&#39;s a daemon that prefetches applications</li>
<li>PCBSD is developing their own desktop environment, Lumina (<a href="http://blog.pcbsd.org/2014/04/quick-lumina-desktop-faq/" rel="nofollow">there&#39;s also an FAQ</a>)</li>
<li>It&#39;s still in active development, but you can try it out by installing from ports</li>
<li>We&#39;ll be showing a live demo of it in a few weeks (when development settles down a bit)</li>
<li>Some kid in Australia <a href="https://www.youtube.com/watch?v=ETxhbf3-z18" rel="nofollow">subjects his poor mother to being on camera</a> while she tries out PCBSD and gives her impressions of it
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>34: It's Gonna Get NASty</title>
  <link>https://www.bsdnow.tv/34</link>
  <guid isPermaLink="false">47904615-f374-468c-b27c-625dad704346</guid>
  <pubDate>Wed, 23 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/47904615-f374-468c-b27c-625dad704346.mp3" length="16314196" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, Allan's at a conference so we've got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.</itunes:subtitle>
  <itunes:duration>22:39</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, Allan's at a conference so we've got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - John Hixson - &lt;a href="mailto:john@ixsystems.com" target="_blank" rel="nofollow noopener"&gt;john@ixsystems.com&lt;/a&gt; / &lt;a href="https://twitter.com/bsdwhore" target="_blank" rel="nofollow noopener"&gt;@bsdwhore&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeNAS development&lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, john hixson, ixsystems, freenas, plugins, jails, development</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, Allan&#39;s at a conference so we&#39;ve got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - John Hixson - <a href="mailto:john@ixsystems.com" rel="nofollow">john@ixsystems.com</a> / <a href="https://twitter.com/bsdwhore" rel="nofollow">@bsdwhore</a></h2>

<p>FreeNAS development</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, Allan&#39;s at a conference so we&#39;ve got a short episode for you. We sat down with John Hixson to discuss FreeNAS development and all their future plans. The show will be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - John Hixson - <a href="mailto:john@ixsystems.com" rel="nofollow">john@ixsystems.com</a> / <a href="https://twitter.com/bsdwhore" rel="nofollow">@bsdwhore</a></h2>

<p>FreeNAS development</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>33: Certified Package Delivery</title>
  <link>https://www.bsdnow.tv/33</link>
  <guid isPermaLink="false">f0c15113-8ade-464b-a89f-3398734256dc</guid>
  <pubDate>Wed, 16 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/f0c15113-8ade-464b-a89f-3398734256dc.mp3" length="57837748" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:20:19</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we'll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There's a boatload of news and we've got answers to your questions, coming up on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/schedule/" target="_blank" rel="nofollow noopener"&gt;BSDCan schedule, speakers and talks&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's BSDCan will kick off on May 14th in Ottawa&lt;/li&gt;
&lt;li&gt;The &lt;a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" target="_blank" rel="nofollow noopener"&gt;list of speakers&lt;/a&gt; is also out&lt;/li&gt;
&lt;li&gt;And finally &lt;a href="https://www.bsdcan.org/2014/schedule/events.en.html" target="_blank" rel="nofollow noopener"&gt;the talks&lt;/a&gt; everyone's looking forward to&lt;/li&gt;
&lt;li&gt;Lots of great tutorials and talks, spanning a wide range of topics of interest&lt;/li&gt;
&lt;li&gt;Be sure to come by so you can and meet Allan and Kris in person &lt;a href="https://twitter.com/bsdcan/status/454990067552247808" target="_blank" rel="nofollow noopener"&gt;and get BSDCan shirts&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=4bPduH6O7lI" target="_blank" rel="nofollow noopener"&gt;NYCBSDCon talks uploaded&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon&lt;/li&gt;
&lt;li&gt;Jeff Rizzo's talk, "Releasing NetBSD: So Many Targets, So Little Time"&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" target="_blank" rel="nofollow noopener"&gt;Dru Lavigne's talk&lt;/a&gt;, "ZFS Management Tools in FreeNAS and PC-BSD"&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=FL5U4wr86L4" target="_blank" rel="nofollow noopener"&gt;Scott Long's talk&lt;/a&gt;, "Serving one third of the Internet via FreeBSD"&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/watch?v=buo5JlMnGPI" target="_blank" rel="nofollow noopener"&gt;Michael W. Lucas' talk&lt;/a&gt;, "BSD Breaking Barriers"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD Journal, issue 2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The bi-monthly FreeBSD journal's second issue is out&lt;/li&gt;
&lt;li&gt;Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates&lt;/li&gt;
&lt;li&gt;In less than two months, they've already gotten over 1000 subscribers! It's available on Google Play, iTunes, Amazon, etc&lt;/li&gt;
&lt;li&gt;"We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD"&lt;/li&gt;
&lt;li&gt;Check &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;our interview with GNN&lt;/a&gt; for more information about the journal
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsd.slashdot.org/story/200567" target="_blank" rel="nofollow noopener"&gt;OpenSSL, more like OpenSS-Hell&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy&lt;/li&gt;
&lt;li&gt;There's been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so&lt;/li&gt;
&lt;li&gt;We finally have &lt;a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" target="_blank" rel="nofollow noopener"&gt;a timeline of events&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Reactions from &lt;a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" target="_blank" rel="nofollow noopener"&gt;ISC&lt;/a&gt;, &lt;a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" target="_blank" rel="nofollow noopener"&gt;PCBSD&lt;/a&gt;, &lt;a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;, the &lt;a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" target="_blank" rel="nofollow noopener"&gt;Tor&lt;/a&gt; &lt;a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" target="_blank" rel="nofollow noopener"&gt;project&lt;/a&gt;, &lt;a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD&lt;/a&gt;, &lt;a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" target="_blank" rel="nofollow noopener"&gt;NetBSD&lt;/a&gt;, &lt;a href="http://seclists.org/oss-sec/2014/q2/index.html" target="_blank" rel="nofollow noopener"&gt;oss-sec&lt;/a&gt;, &lt;a href="https://queue.acm.org/detail.cfm?id=2602816" target="_blank" rel="nofollow noopener"&gt;PHK&lt;/a&gt;, &lt;a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" target="_blank" rel="nofollow noopener"&gt;Varnish&lt;/a&gt; and &lt;a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" target="_blank" rel="nofollow noopener"&gt;Akamai&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;pfSense&lt;/a&gt; released &lt;a href="https://blog.pfsense.org/?p=1253" target="_blank" rel="nofollow noopener"&gt;a new version to fix it&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;OpenBSD &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139715336230455&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;disabled heartbeat entirely&lt;/a&gt; and is very &lt;a href="https://news.ycombinator.com/item?id=7568921" target="_blank" rel="nofollow noopener"&gt;unforgiving of the IETF&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; has two &lt;a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" target="_blank" rel="nofollow noopener"&gt;good&lt;/a&gt; &lt;a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" target="_blank" rel="nofollow noopener"&gt;write-ups&lt;/a&gt; about the issue and how horrible the OpenSSL codebase is&lt;/li&gt;
&lt;li&gt;A nice quote from one of the OpenBSD lists: "Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL's bug tracker is only used to park bugs, not fix them"&lt;/li&gt;
&lt;li&gt;Sounds like &lt;a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" target="_blank" rel="nofollow noopener"&gt;someone else&lt;/a&gt; was having fun with the bug for a while too&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;There's also another OpenSSL bug&lt;/strong&gt; that &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139732441810737&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD patched&lt;/a&gt; - it allows an attacker to &lt;strong&gt;inject data from one connection into another&lt;/strong&gt; &lt;/li&gt;
&lt;li&gt;OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we're &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140415093252" target="_blank" rel="nofollow noopener"&gt;seeing a fork&lt;/a&gt; in real time
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jim Brown - &lt;a href="mailto:info@bsdcertification.org" target="_blank" rel="nofollow noopener"&gt;info@bsdcertification.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The &lt;a href="http://bsdcertification.org/" target="_blank" rel="nofollow noopener"&gt;BSD Certification&lt;/a&gt; exams&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/dpb" target="_blank" rel="nofollow noopener"&gt;Building OpenBSD binary packages in bulk&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://github.com/aperezdc/signify" target="_blank" rel="nofollow noopener"&gt;Portable signify&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;episode 23&lt;/a&gt; we talked with Ted Unangst about the new "signify" tool in OpenBSD&lt;/li&gt;
&lt;li&gt;Now there's a (completely unofficial) portable version of it on github&lt;/li&gt;
&lt;li&gt;If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it&lt;/li&gt;
&lt;li&gt;Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" target="_blank" rel="nofollow noopener"&gt;Foundation goals and updates&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD foundation has reached their 2014 goal of $150,000&lt;/li&gt;
&lt;li&gt;You can check &lt;a href="http://www.openbsdfoundation.org/activities.html" target="_blank" rel="nofollow noopener"&gt;their activities and goals&lt;/a&gt; to see where the money is going&lt;/li&gt;
&lt;li&gt;Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data&lt;/li&gt;
&lt;li&gt;The FreeBSD foundation has kicked off their &lt;a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" target="_blank" rel="nofollow noopener"&gt;spring fundraising&lt;/a&gt; campaign&lt;/li&gt;
&lt;li&gt;There's also a list of their activities and goals available to read through&lt;/li&gt;
&lt;li&gt;Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New PBI runtime that fixes stability issues and decreases load times&lt;/li&gt;
&lt;li&gt;"Update Center" is getting a lot of development and improvements&lt;/li&gt;
&lt;li&gt;Lots of misc. bug fixes and updates
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" target="_blank" rel="nofollow noopener"&gt;There's a reddit thread&lt;/a&gt; we wanted to highlight - a user wants to show his friend BSD and why it's great&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Tso9a6v" target="_blank" rel="nofollow noopener"&gt;Brad writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21DfdV9yt" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2di8XRt73" target="_blank" rel="nofollow noopener"&gt;iGibbs writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20m2g8UgV" target="_blank" rel="nofollow noopener"&gt;Matt writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, dpb, distributed ports builder, marc espie, poudriere, package builds, jim brown, bsdcertification, bsd certification, exam, test, openssl, heartbleed, exploit, ssl, tls, heartbeat, openssh, theo de raadt, hole, 0day, zero day, bsdcan, nycbsdcon, presentations, talks, conference, recording, netflix, tarsnap, mitigation, ixsystems, foundation, journal, cve</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week, we sit down with Jim Brown from the BSD Certification group to talk about the BSD exams. Following that, we&#39;ll be showing you how to build OpenBSD binary packages in bulk, a la poudriere. There&#39;s a boatload of news and we&#39;ve got answers to your questions, coming up on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.bsdcan.org/2014/schedule/" rel="nofollow">BSDCan schedule, speakers and talks</a></h3>

<ul>
<li>This year&#39;s BSDCan will kick off on May 14th in Ottawa</li>
<li>The <a href="https://www.bsdcan.org/2014/schedule/speakers.en.html" rel="nofollow">list of speakers</a> is also out</li>
<li>And finally <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">the talks</a> everyone&#39;s looking forward to</li>
<li>Lots of great tutorials and talks, spanning a wide range of topics of interest</li>
<li>Be sure to come by so you can and meet Allan and Kris in person <a href="https://twitter.com/bsdcan/status/454990067552247808" rel="nofollow">and get BSDCan shirts</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=4bPduH6O7lI" rel="nofollow">NYCBSDCon talks uploaded</a></h3>

<ul>
<li>The BSD TV YouTube channel has been uploading recordings from the 2014 NYCBSDCon</li>
<li>Jeff Rizzo&#39;s talk, &quot;Releasing NetBSD: So Many Targets, So Little Time&quot;</li>
<li><a href="https://www.youtube.com/watch?v=DAmZ3cbfigA" rel="nofollow">Dru Lavigne&#39;s talk</a>, &quot;ZFS Management Tools in FreeNAS and PC-BSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=FL5U4wr86L4" rel="nofollow">Scott Long&#39;s talk</a>, &quot;Serving one third of the Internet via FreeBSD&quot;</li>
<li><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">Michael W. Lucas&#39; talk</a>, &quot;BSD Breaking Barriers&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-journal-issue-2-is-now-available.html" rel="nofollow">FreeBSD Journal, issue 2</a></h3>

<ul>
<li>The bi-monthly FreeBSD journal&#39;s second issue is out</li>
<li>Topics in this issue include pkg, poudriere, the PBI format, hwpmc and journaled soft-updates</li>
<li>In less than two months, they&#39;ve already gotten over 1000 subscribers! It&#39;s available on Google Play, iTunes, Amazon, etc</li>
<li>&quot;We are also working on a dynamic version of the magazine that can be read in many web browsers, including those that run on FreeBSD&quot;</li>
<li>Check <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">our interview with GNN</a> for more information about the journal
***</li>
</ul>

<h3><a href="http://bsd.slashdot.org/story/200567" rel="nofollow">OpenSSL, more like OpenSS-Hell</a></h3>

<ul>
<li>We mentioned this huge OpenSSL bug last week during all the chaos, but the aftermath is just as messy</li>
<li>There&#39;s been a pretty vicious response from security experts all across the internet and in all of the BSD projects - and rightfully so</li>
<li>We finally have <a href="http://www.smh.com.au/it-pro/security-it/heartbleed-disclosure-timeline-who-knew-what-and-when-20140414-zqurk.html" rel="nofollow">a timeline of events</a></li>
<li>Reactions from <a href="https://isc.sans.edu/diary/Testing+for+Heartbleed/17933" rel="nofollow">ISC</a>, <a href="http://blog.pcbsd.org/2014/04/openssl-security-update/" rel="nofollow">PCBSD</a>, <a href="http://www.daemonology.net/blog/2014-04-09-tarsnap-no-heartbleed-here.html" rel="nofollow">Tarsnap</a>, the <a href="https://lists.torproject.org/pipermail/tor-talk/2014-April/thread.html" rel="nofollow">Tor</a> <a href="https://lists.torproject.org/pipermail/tor-relays/2014-April/thread.html" rel="nofollow">project</a>, <a href="https://lists.freebsd.org/pipermail/freebsd-security/2014-April/thread.html" rel="nofollow">FreeBSD</a>, <a href="http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-004.txt.asc" rel="nofollow">NetBSD</a>, <a href="http://seclists.org/oss-sec/2014/q2/index.html" rel="nofollow">oss-sec</a>, <a href="https://queue.acm.org/detail.cfm?id=2602816" rel="nofollow">PHK</a>, <a href="https://www.varnish-cache.org/docs/trunk/phk/dough.html" rel="nofollow">Varnish</a> and <a href="https://blogs.akamai.com/2014/04/heartbleed-update.html" rel="nofollow">Akamai</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">pfSense</a> released <a href="https://blog.pfsense.org/?p=1253" rel="nofollow">a new version to fix it</a></li>
<li>OpenBSD <a href="http://marc.info/?l=openbsd-cvs&m=139715336230455&w=2" rel="nofollow">disabled heartbeat entirely</a> and is very <a href="https://news.ycombinator.com/item?id=7568921" rel="nofollow">unforgiving of the IETF</a></li>
<li><a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> has two <a href="http://www.tedunangst.com/flak/post/heartbleed-vs-mallocconf" rel="nofollow">good</a> <a href="http://www.tedunangst.com/flak/post/analysis-of-openssl-freelist-reuse" rel="nofollow">write-ups</a> about the issue and how horrible the OpenSSL codebase is</li>
<li>A nice quote from one of the OpenBSD lists: &quot;Given how trivial one-liner fixes such as #2569 have remained unfixed for 2.5+ years, one can only assume that OpenSSL&#39;s bug tracker is only used to park bugs, not fix them&quot;</li>
<li>Sounds like <a href="http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html" rel="nofollow">someone else</a> was having fun with the bug for a while too</li>
<li><strong>There&#39;s also another OpenSSL bug</strong> that <a href="http://marc.info/?l=openbsd-cvs&m=139732441810737&w=2" rel="nofollow">OpenBSD patched</a> - it allows an attacker to <strong>inject data from one connection into another</strong> </li>
<li>OpenBSD has also imported the most current version of OpenSSL and are ripping it apart from the inside out - we&#39;re <a href="http://undeadly.org/cgi?action=article&sid=20140415093252" rel="nofollow">seeing a fork</a> in real time
***</li>
</ul>

<h2>Interview - Jim Brown - <a href="mailto:info@bsdcertification.org" rel="nofollow">info@bsdcertification.org</a></h2>

<p>The <a href="http://bsdcertification.org/" rel="nofollow">BSD Certification</a> exams</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">Building OpenBSD binary packages in bulk</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://github.com/aperezdc/signify" rel="nofollow">Portable signify</a></h3>

<ul>
<li>Back in <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">episode 23</a> we talked with Ted Unangst about the new &quot;signify&quot; tool in OpenBSD</li>
<li>Now there&#39;s a (completely unofficial) portable version of it on github</li>
<li>If you want to verify your OpenBSD sets ahead of time on another OS, this tool should let you do it</li>
<li>Maybe other BSD projects can adopt it as a replacement for gpg and incorporate it into their base systems
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc@openbsd.org/msg128240.html" rel="nofollow">Foundation goals and updates</a></h3>

<ul>
<li>The OpenBSD foundation has reached their 2014 goal of $150,000</li>
<li>You can check <a href="http://www.openbsdfoundation.org/activities.html" rel="nofollow">their activities and goals</a> to see where the money is going</li>
<li>Remember that funding also goes to OpenSSH, which EVERY system uses and relies on everyday to protect their data</li>
<li>The FreeBSD foundation has kicked off their <a href="http://freebsdfoundation.blogspot.com/2014/04/freebsd-foundation-spring-fundraising.html" rel="nofollow">spring fundraising</a> campaign</li>
<li>There&#39;s also a list of their activities and goals available to read through</li>
<li>Be sure to support your favorite BSD, whichever one, so they can continue to make and improve great software that powers the whole internet
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-25/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI runtime that fixes stability issues and decreases load times</li>
<li>&quot;Update Center&quot; is getting a lot of development and improvements</li>
<li>Lots of misc. bug fixes and updates
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://www.reddit.com/r/BSD/comments/22y497/i_need_a_bit_of_help_showing_my_friends_bsd_and/" rel="nofollow">There&#39;s a reddit thread</a> we wanted to highlight - a user wants to show his friend BSD and why it&#39;s great</li>
<li><a href="http://slexy.org/view/s20Tso9a6v" rel="nofollow">Brad writes in</a></li>
<li><a href="http://slexy.org/view/s21DfdV9yt" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2di8XRt73" rel="nofollow">iGibbs writes in</a></li>
<li><a href="http://slexy.org/view/s20m2g8UgV" rel="nofollow">Matt writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>32: PXE Dust</title>
  <link>https://www.bsdnow.tv/32</link>
  <guid isPermaLink="false">a909eddb-036d-451c-8d5a-e7b8e358239f</guid>
  <pubDate>Wed, 09 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/a909eddb-036d-451c-8d5a-e7b8e358239f.mp3" length="55324948" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:16:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the big show we'll be showing off OpenBSD's new "autoinstall" feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it's the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" target="_blank" rel="nofollow noopener"&gt;FreeBSD ASLR status update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD&lt;/li&gt;
&lt;li&gt;He's implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)&lt;/li&gt;
&lt;li&gt;Work has also started on testing ASLR on ARM, using a Raspberry Pi&lt;/li&gt;
&lt;li&gt;He's giving a presentation at BSDCan this year about his ASLR work&lt;/li&gt;
&lt;li&gt;While we're on the topic of BSDCan...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" target="_blank" rel="nofollow noopener"&gt;BSDCan tutorials, improving the experience&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials&lt;/li&gt;
&lt;li&gt;The tutorials are called "Building the network you need with PF, the OpenBSD packet filter" and "Transitioning to OpenBSD 5.5" - both scheduled to last three hours each&lt;/li&gt;
&lt;li&gt;He's requesting anyone that'll be there to go ahead and contact him, telling him exactly what you'd like to learn&lt;/li&gt;
&lt;li&gt;There's also a bit of background information about the tutorials and how he's looking to improve them&lt;/li&gt;
&lt;li&gt;If you're interested in OpenBSD and going to BSDCan this year, hit him up
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" target="_blank" rel="nofollow noopener"&gt;pkgsrc-2014Q1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The new stable branch of pkgsrc packages has been built and is ready&lt;/li&gt;
&lt;li&gt;Python 3.3 is now a "first class citizen" in pkgsrc&lt;/li&gt;
&lt;li&gt;14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64&lt;/li&gt;
&lt;li&gt;There's a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined&lt;/li&gt;
&lt;li&gt;They're also looking into &lt;a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" target="_blank" rel="nofollow noopener"&gt;signing packages&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" target="_blank" rel="nofollow noopener"&gt;Only two holes in a heck of a long time, who cares?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list&lt;/li&gt;
&lt;li&gt;He questions "what's the big deal" about OpenBSD's slogan being "Only two remote holes in the default install, in a heck of a long time!"&lt;/li&gt;
&lt;li&gt;Luckily, the community and Theo &lt;a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" target="_blank" rel="nofollow noopener"&gt;set the record straight&lt;/a&gt; about why you should care about this&lt;/li&gt;
&lt;li&gt;Running insecure applications on OpenBSD is actually &lt;strong&gt;more&lt;/strong&gt; secure than running them on other systems, due to things like ASLR, PIE and all the &lt;a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" target="_blank" rel="nofollow noopener"&gt;security features&lt;/a&gt; of OpenBSD&lt;/li&gt;
&lt;li&gt;It spawned a discussion about ease of management and Linux's poor security record, definitely &lt;a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" target="_blank" rel="nofollow noopener"&gt;worth reading&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Dru Lavigne - &lt;a href="mailto:dru@freebsd.org" target="_blank" rel="nofollow noopener"&gt;dru@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/bsdevents" target="_blank" rel="nofollow noopener"&gt;@bsdevents&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD's documentation printing, documentation springs, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/autoinstall" target="_blank" rel="nofollow noopener"&gt;Automatic, unattended OpenBSD installs with PXE&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" target="_blank" rel="nofollow noopener"&gt;pfSense 2.1.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new version of pfSense is released, mainly to fix some security issues&lt;/li&gt;
&lt;li&gt;Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router&lt;/li&gt;
&lt;li&gt;There are also some NIC driver updates &lt;a href="https://blog.pfsense.org/?p=1238" target="_blank" rel="nofollow noopener"&gt;and other things&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Of course if you want to learn more about pfSense, watch &lt;a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" target="_blank" rel="nofollow noopener"&gt;episode 25&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;2.1.2 is already up for testing too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=264095" target="_blank" rel="nofollow noopener"&gt;FreeBSD gets UEFI support&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It looks like FreeBSD's battle with UEFI may be coming to a close?&lt;/li&gt;
&lt;li&gt;Ed Maste committed a giant list of patches to enable UEFI support on x86_64&lt;/li&gt;
&lt;li&gt;Look through the list to see all the details and information&lt;/li&gt;
&lt;li&gt;Thanks FreeBSD foundation!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" target="_blank" rel="nofollow noopener"&gt;Ideas for the next DragonflyBSD release&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Mr. Dragonfly release engineer himself, &lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;Justin Sherrill&lt;/a&gt; posts some of his ideas for the upcoming release&lt;/li&gt;
&lt;li&gt;They're aiming for late May for the next version&lt;/li&gt;
&lt;li&gt;Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support&lt;/li&gt;
&lt;li&gt;Gasp, they're even considering dropping i386
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lots of new PBI updates for 10.0, new runtime implementation&lt;/li&gt;
&lt;li&gt;New support for running 32 bit applications in PBI runtime&lt;/li&gt;
&lt;li&gt;New default CD and DVD player, umplayer&lt;/li&gt;
&lt;li&gt;Latest GNOME 3 and Cinnamon merged, new edge package builds
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s273oSezFs" target="_blank" rel="nofollow noopener"&gt;Remy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2I3H1HsVb" target="_blank" rel="nofollow noopener"&gt;Jan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2wUTRowzU" target="_blank" rel="nofollow noopener"&gt;Eddie writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2RA0whmwz" target="_blank" rel="nofollow noopener"&gt;Zen writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2pwE20Ov6" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pxe, pxeboot, autoinstall, dru lavigne, documentation, sprints, handbook, printed, bsdcan, aslr, arm, desktop, linux, games, ports, stable, pkgsrc, aslr, security, pie, branch, ports, pkgng, freenas</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the big show we&#39;ll be showing off OpenBSD&#39;s new &quot;autoinstall&quot; feature to do completely automatic, unattended installations. We also have an interview with Dru Lavigne about all the writing work she does for FreeBSD, PCBSD and FreeNAS. The latest headlines and answers to your emails, on BSD Now - it&#39;s the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-04-03/awesome-freebsd-aslr-progress" rel="nofollow">FreeBSD ASLR status update</a></h3>

<ul>
<li>Shawn Webb gives us a little update on his address space layout randomization work for FreeBSD</li>
<li>He&#39;s implemented execbase randomization for position-independent executables (which OpenBSD also just enabled globally in 5.5 on i386)</li>
<li>Work has also started on testing ASLR on ARM, using a Raspberry Pi</li>
<li>He&#39;s giving a presentation at BSDCan this year about his ASLR work</li>
<li>While we&#39;re on the topic of BSDCan...
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/04/bsdcan-tutorials-please-help-me-improve.html" rel="nofollow">BSDCan tutorials, improving the experience</a></h3>

<ul>
<li>Peter Hansteen writes a new blog post about his upcoming BSDCan tutorials</li>
<li>The tutorials are called &quot;Building the network you need with PF, the OpenBSD packet filter&quot; and &quot;Transitioning to OpenBSD 5.5&quot; - both scheduled to last three hours each</li>
<li>He&#39;s requesting anyone that&#39;ll be there to go ahead and contact him, telling him exactly what you&#39;d like to learn</li>
<li>There&#39;s also a bit of background information about the tutorials and how he&#39;s looking to improve them</li>
<li>If you&#39;re interested in OpenBSD and going to BSDCan this year, hit him up
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/netbsd-announce/2014/04/04/msg000202.html" rel="nofollow">pkgsrc-2014Q1 released</a></h3>

<ul>
<li>The new stable branch of pkgsrc packages has been built and is ready</li>
<li>Python 3.3 is now a &quot;first class citizen&quot; in pkgsrc</li>
<li>14255 packages for NetBSD-current/x86_64, 11233 binary packages built with clang for FreeBSD 10/x86_64</li>
<li>There&#39;s a new release every three months, and remember pkgsrc works on MANY operating systems, not just NetBSD - you could even use pkgsrc instead of pkgng or ports if you were so inclined</li>
<li>They&#39;re also looking into <a href="http://mail-index.netbsd.org/tech-pkg/2014/03/31/msg012873.html" rel="nofollow">signing packages</a>
***</li>
</ul>

<h3><a href="https://www.mail-archive.com/misc%40openbsd.org/index.html#127993" rel="nofollow">Only two holes in a heck of a long time, who cares?</a></h3>

<ul>
<li>A particularly vocal Debian user, a lost soul, somehow finds his way to the misc@ OpenBSD mailing list</li>
<li>He questions &quot;what&#39;s the big deal&quot; about OpenBSD&#39;s slogan being &quot;Only two remote holes in the default install, in a heck of a long time!&quot;</li>
<li>Luckily, the community and Theo <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128001.html" rel="nofollow">set the record straight</a> about why you should care about this</li>
<li>Running insecure applications on OpenBSD is actually <strong>more</strong> secure than running them on other systems, due to things like ASLR, PIE and all the <a href="https://www.mail-archive.com/misc%40openbsd.org/msg127995.html" rel="nofollow">security features</a> of OpenBSD</li>
<li>It spawned a discussion about ease of management and Linux&#39;s poor security record, definitely <a href="https://www.mail-archive.com/misc%40openbsd.org/msg128073.html" rel="nofollow">worth reading</a>
***</li>
</ul>

<h2>Interview - Dru Lavigne - <a href="mailto:dru@freebsd.org" rel="nofollow">dru@freebsd.org</a> / <a href="https://twitter.com/bsdevents" rel="nofollow">@bsdevents</a></h2>

<p>FreeBSD&#39;s documentation printing, documentation springs, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/autoinstall" rel="nofollow">Automatic, unattended OpenBSD installs with PXE</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense 2.1.1 released</a></h3>

<ul>
<li>A new version of pfSense is released, mainly to fix some security issues</li>
<li>Tracking some recent FreeBSD advisories, pfSense usually only applies the ones that would matter on a firewall or router</li>
<li>There are also some NIC driver updates <a href="https://blog.pfsense.org/?p=1238" rel="nofollow">and other things</a></li>
<li>Of course if you want to learn more about pfSense, watch <a href="http://www.bsdnow.tv/episodes/2014_02_19-a_sixth_pfsense" rel="nofollow">episode 25</a></li>
<li>2.1.2 is already up for testing too
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=264095" rel="nofollow">FreeBSD gets UEFI support</a></h3>

<ul>
<li>It looks like FreeBSD&#39;s battle with UEFI may be coming to a close?</li>
<li>Ed Maste committed a giant list of patches to enable UEFI support on x86_64</li>
<li>Look through the list to see all the details and information</li>
<li>Thanks FreeBSD foundation!
***</li>
</ul>

<h3><a href="http://lists.dragonflybsd.org/pipermail/kernel/2014-March/094909.html" rel="nofollow">Ideas for the next DragonflyBSD release</a></h3>

<ul>
<li>Mr. Dragonfly release engineer himself, <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherrill</a> posts some of his ideas for the upcoming release</li>
<li>They&#39;re aiming for late May for the next version</li>
<li>Ideas include better support for running in a VM, pkgng fixes, documentation updates and PAM support</li>
<li>Gasp, they&#39;re even considering dropping i386
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/04/pc-bsd-weekly-feature-digest-24/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of new PBI updates for 10.0, new runtime implementation</li>
<li>New support for running 32 bit applications in PBI runtime</li>
<li>New default CD and DVD player, umplayer</li>
<li>Latest GNOME 3 and Cinnamon merged, new edge package builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s273oSezFs" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2I3H1HsVb" rel="nofollow">Jan writes in</a></li>
<li><a href="http://slexy.org/view/s2wUTRowzU" rel="nofollow">Eddie writes in</a></li>
<li><a href="http://slexy.org/view/s2RA0whmwz" rel="nofollow">Zen writes in</a></li>
<li><a href="http://slexy.org/view/s2pwE20Ov6" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>31: Edgy BSD Users</title>
  <link>https://www.bsdnow.tv/31</link>
  <guid isPermaLink="false">00e67148-6432-475e-a473-fa50bef3a29d</guid>
  <pubDate>Tue, 01 Apr 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/00e67148-6432-475e-a473-fa50bef3a29d.mp3" length="49769716" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we'll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.</itunes:subtitle>
  <itunes:duration>1:09:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we'll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we'll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.amazon.com/gp/aw/d/0321968972/" target="_blank" rel="nofollow noopener"&gt;Preorders for cool BSD stuff&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The 2nd edition of The Design and Implementation of the FreeBSD Operating System is up for preorder&lt;/li&gt;
&lt;li&gt;We &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;talked to GNN&lt;/a&gt; briefly about it, but he and &lt;a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" target="_blank" rel="nofollow noopener"&gt;Kirk&lt;/a&gt; have apparently finally finished the book&lt;/li&gt;
&lt;li&gt;"For many years, The Design and Implementation of the FreeBSD Operating System has been recognized as the most complete, up-to-date, and authoritative technical guide to FreeBSD's internal structure. Now, this definitive guide has been extensively updated to reflect all major FreeBSD improvements between Versions 5 and Versions 11"&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://https.openbsd.org/cgi-bin/order" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.5 preorders&lt;/a&gt; are also up, so you can buy a CD set now&lt;/li&gt;
&lt;li&gt;You can help support the project, and even get the -release of the OS before it's available publicly&lt;/li&gt;
&lt;li&gt;5.5 is a huge release with lots of big changes, so now is the right time to purchase one of these - tell Austin we sent you!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/pkgsrc-users/2014/03/18/msg019424.html" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon 2014 CFP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's pkgsrcCon is in London, on June 21st and 22nd&lt;/li&gt;
&lt;li&gt;There's a Call For Papers out now, so you can submit your talks&lt;/li&gt;
&lt;li&gt;Anything related to pkgsrc is fine, it's pretty informal&lt;/li&gt;
&lt;li&gt;Does anyone in the audience know if the talks will be recorded? This con is relatively unknown
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1860-deploying-netbsd-on-the-cloud-using-aws-ec2-march-bsd-issue" target="_blank" rel="nofollow noopener"&gt;BSDMag issue for March 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The monthly BSD magazine releases its newest issue&lt;/li&gt;
&lt;li&gt;Topics this time include: deploying NetBSD using AWS EC2, creating a multi-purpose file server with NetBSD, DragonflyBSD as a backup server, more GIMP lessons, network analysis with wireshark and a general security article&lt;/li&gt;
&lt;li&gt;The Linux article trend seems to continue... hmm
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.brianmoses.net/2014/03/why-i-chose-non-ecc-ram-for-my-freenas.html" target="_blank" rel="nofollow noopener"&gt;Non-ECC RAM in FreeNAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've gotten a few questions about ECC RAM with ZFS&lt;/li&gt;
&lt;li&gt;Here we've got a surprising blog post about why someone &lt;strong&gt;did not&lt;/strong&gt; go with ECC RAM for his NAS build&lt;/li&gt;
&lt;li&gt;The article mentions the benefits of ECC and admits it is a better choice in nearly all instances, but unfortunately it's not very widespread in consumer hardware motherboards and it's more expensive&lt;/li&gt;
&lt;li&gt;Regular RAM also has "special" issues with ZFS and pool corruption&lt;/li&gt;
&lt;li&gt;Long post, so check out the whole thing if you've been considering your memory options and weighing the benefits
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Pierre Pronchery - &lt;a href="mailto:khorben@edgebsd.org" target="_blank" rel="nofollow noopener"&gt;khorben@edgebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/khorben" target="_blank" rel="nofollow noopener"&gt;@khorben&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://www.youtube.com/watch?v=_D_iaad5rPo" target="_blank" rel="nofollow noopener"&gt;EdgeBSD&lt;/a&gt; (&lt;a href="http://ftp.netbsd.org/pub/NetBSD/misc/khorben/asiabsdcon2014/" target="_blank" rel="nofollow noopener"&gt;slides&lt;/a&gt;)&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" target="_blank" rel="nofollow noopener"&gt;Building an OpenBSD desktop&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/03/25/getting-to-know-your-portmgr-lurker-frederic-culot" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr-lurkers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This week we get to hear from Frederic Culot, colut@&lt;/li&gt;
&lt;li&gt;Originally an OpenBSD user from France, Frederic joined as a ports committer in 2010 and recently joined the portmgr lurkers team&lt;/li&gt;
&lt;li&gt;"FreeBSD is also one of my sources of inspiration when it comes to how
organizations behave and innovate, and I find it very interesting to compare FreeBSD with
the for-profit companies I work for"&lt;/li&gt;
&lt;li&gt;We get to find out a little bit about him, why he loves FreeBSD and what he does for the project
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/the_playstation2_port_is_back" target="_blank" rel="nofollow noopener"&gt;NetBSD on the Playstation 2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Who doesn't want to run NetBSD on their old PS2?&lt;/li&gt;
&lt;li&gt;The PS2 port of NetBSD was sadly removed in 2009, but it has been revived&lt;/li&gt;
&lt;li&gt;It's using a slightly unusual MIPS CPU that didn't have much GCC support&lt;/li&gt;
&lt;li&gt;Hopefully a bootable kernel will be available soon
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.thelinuxcauldron.com/2014/03/24/freebsd-challenge-day-22-30/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD Challenge update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend from the Linux Foundation continues his FreeBSD switching journey&lt;/li&gt;
&lt;li&gt;This time he starts off by discovering virtual machines suck at keeping accurate time, and some ports weren't working because of his clock being way off&lt;/li&gt;
&lt;li&gt;After polling the IRC for help, he finally learns the difference between ntpdate and ntpd and both of their use cases&lt;/li&gt;
&lt;li&gt;Maybe he should've just read our &lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;NTP tutorial&lt;/a&gt;!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-23/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The mount tray icon got lots of updates and fixes&lt;/li&gt;
&lt;li&gt;The faulty distribution server has finally been tracked down and... destroyed&lt;/li&gt;
&lt;li&gt;New language localization project is in progress&lt;/li&gt;
&lt;li&gt;Many many updates to ports and PBIs, new -STABLE builds
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s27d69qHJW" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21FhLCHbB" target="_blank" rel="nofollow noopener"&gt;Patrick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Hisk3Yw" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20rBZyTLC" target="_blank" rel="nofollow noopener"&gt;Ron writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2s4CxE4gd" target="_blank" rel="nofollow noopener"&gt;Tyler writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, edgebsd, april fools, zfs, on linux, zpool, zol, zfsonlinux, gnu, linux, rms, richard stallman, gpl, copyright, copyleft, license, debian, centos, gentoo, ubuntu, arch, security, worst puns, desktop, gnome, xfce, gnome3, gnome-shell, ixsystems, ps2, mips, cpu, playstation 2, sony, edgebsd, fosdem, presentation, talk</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we&#39;ll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.amazon.com/gp/aw/d/0321968972/" rel="nofollow">Preorders for cool BSD stuff</a></h3>

<ul>
<li>The 2nd edition of The Design and Implementation of the FreeBSD Operating System is up for preorder</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">talked to GNN</a> briefly about it, but he and <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk</a> have apparently finally finished the book</li>
<li>&quot;For many years, The Design and Implementation of the FreeBSD Operating System has been recognized as the most complete, up-to-date, and authoritative technical guide to FreeBSD&#39;s internal structure. Now, this definitive guide has been extensively updated to reflect all major FreeBSD improvements between Versions 5 and Versions 11&quot;</li>
<li><a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">OpenBSD 5.5 preorders</a> are also up, so you can buy a CD set now</li>
<li>You can help support the project, and even get the -release of the OS before it&#39;s available publicly</li>
<li>5.5 is a huge release with lots of big changes, so now is the right time to purchase one of these - tell Austin we sent you!
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2014/03/18/msg019424.html" rel="nofollow">pkgsrcCon 2014 CFP</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon is in London, on June 21st and 22nd</li>
<li>There&#39;s a Call For Papers out now, so you can submit your talks</li>
<li>Anything related to pkgsrc is fine, it&#39;s pretty informal</li>
<li>Does anyone in the audience know if the talks will be recorded? This con is relatively unknown
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1860-deploying-netbsd-on-the-cloud-using-aws-ec2-march-bsd-issue" rel="nofollow">BSDMag issue for March 2014</a></h3>

<ul>
<li>The monthly BSD magazine releases its newest issue</li>
<li>Topics this time include: deploying NetBSD using AWS EC2, creating a multi-purpose file server with NetBSD, DragonflyBSD as a backup server, more GIMP lessons, network analysis with wireshark and a general security article</li>
<li>The Linux article trend seems to continue... hmm
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/03/why-i-chose-non-ecc-ram-for-my-freenas.html" rel="nofollow">Non-ECC RAM in FreeNAS</a></h3>

<ul>
<li>We&#39;ve gotten a few questions about ECC RAM with ZFS</li>
<li>Here we&#39;ve got a surprising blog post about why someone <strong>did not</strong> go with ECC RAM for his NAS build</li>
<li>The article mentions the benefits of ECC and admits it is a better choice in nearly all instances, but unfortunately it&#39;s not very widespread in consumer hardware motherboards and it&#39;s more expensive</li>
<li>Regular RAM also has &quot;special&quot; issues with ZFS and pool corruption</li>
<li>Long post, so check out the whole thing if you&#39;ve been considering your memory options and weighing the benefits
***</li>
</ul>

<h2>Interview - Pierre Pronchery - <a href="mailto:khorben@edgebsd.org" rel="nofollow">khorben@edgebsd.org</a> / <a href="https://twitter.com/khorben" rel="nofollow">@khorben</a></h2>

<p><a href="https://www.youtube.com/watch?v=_D_iaad5rPo" rel="nofollow">EdgeBSD</a> (<a href="http://ftp.netbsd.org/pub/NetBSD/misc/khorben/asiabsdcon2014/" rel="nofollow">slides</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">Building an OpenBSD desktop</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/25/getting-to-know-your-portmgr-lurker-frederic-culot" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>This week we get to hear from Frederic Culot, colut@</li>
<li>Originally an OpenBSD user from France, Frederic joined as a ports committer in 2010 and recently joined the portmgr lurkers team</li>
<li>&quot;FreeBSD is also one of my sources of inspiration when it comes to how
organizations behave and innovate, and I find it very interesting to compare FreeBSD with
the for-profit companies I work for&quot;</li>
<li>We get to find out a little bit about him, why he loves FreeBSD and what he does for the project
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/the_playstation2_port_is_back" rel="nofollow">NetBSD on the Playstation 2</a></h3>

<ul>
<li>Who doesn&#39;t want to run NetBSD on their old PS2?</li>
<li>The PS2 port of NetBSD was sadly removed in 2009, but it has been revived</li>
<li>It&#39;s using a slightly unusual MIPS CPU that didn&#39;t have much GCC support</li>
<li>Hopefully a bootable kernel will be available soon
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/03/24/freebsd-challenge-day-22-30/" rel="nofollow">The FreeBSD Challenge update</a></h3>

<ul>
<li>Our friend from the Linux Foundation continues his FreeBSD switching journey</li>
<li>This time he starts off by discovering virtual machines suck at keeping accurate time, and some ports weren&#39;t working because of his clock being way off</li>
<li>After polling the IRC for help, he finally learns the difference between ntpdate and ntpd and both of their use cases</li>
<li>Maybe he should&#39;ve just read our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP tutorial</a>!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-23/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>The mount tray icon got lots of updates and fixes</li>
<li>The faulty distribution server has finally been tracked down and... destroyed</li>
<li>New language localization project is in progress</li>
<li>Many many updates to ports and PBIs, new -STABLE builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s27d69qHJW" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21FhLCHbB" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s20Hisk3Yw" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20rBZyTLC" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2s4CxE4gd" rel="nofollow">Tyler writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking to Richard Stallman about the upcoming GPLv4 and how it will protect our software from being stolen. After that, we&#39;ll show you how to recover from those pesky ZFS on Linux corruption issues, as well as some tips on how to explain to your boss that all the production boxes were compromised. Your questions and all the latest GNUs, on Linux Now - the place to Lin.. ux.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.amazon.com/gp/aw/d/0321968972/" rel="nofollow">Preorders for cool BSD stuff</a></h3>

<ul>
<li>The 2nd edition of The Design and Implementation of the FreeBSD Operating System is up for preorder</li>
<li>We <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">talked to GNN</a> briefly about it, but he and <a href="http://www.bsdnow.tv/episodes/2013-10-02_stacks_of_cache" rel="nofollow">Kirk</a> have apparently finally finished the book</li>
<li>&quot;For many years, The Design and Implementation of the FreeBSD Operating System has been recognized as the most complete, up-to-date, and authoritative technical guide to FreeBSD&#39;s internal structure. Now, this definitive guide has been extensively updated to reflect all major FreeBSD improvements between Versions 5 and Versions 11&quot;</li>
<li><a href="https://https.openbsd.org/cgi-bin/order" rel="nofollow">OpenBSD 5.5 preorders</a> are also up, so you can buy a CD set now</li>
<li>You can help support the project, and even get the -release of the OS before it&#39;s available publicly</li>
<li>5.5 is a huge release with lots of big changes, so now is the right time to purchase one of these - tell Austin we sent you!
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2014/03/18/msg019424.html" rel="nofollow">pkgsrcCon 2014 CFP</a></h3>

<ul>
<li>This year&#39;s pkgsrcCon is in London, on June 21st and 22nd</li>
<li>There&#39;s a Call For Papers out now, so you can submit your talks</li>
<li>Anything related to pkgsrc is fine, it&#39;s pretty informal</li>
<li>Does anyone in the audience know if the talks will be recorded? This con is relatively unknown
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1860-deploying-netbsd-on-the-cloud-using-aws-ec2-march-bsd-issue" rel="nofollow">BSDMag issue for March 2014</a></h3>

<ul>
<li>The monthly BSD magazine releases its newest issue</li>
<li>Topics this time include: deploying NetBSD using AWS EC2, creating a multi-purpose file server with NetBSD, DragonflyBSD as a backup server, more GIMP lessons, network analysis with wireshark and a general security article</li>
<li>The Linux article trend seems to continue... hmm
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/03/why-i-chose-non-ecc-ram-for-my-freenas.html" rel="nofollow">Non-ECC RAM in FreeNAS</a></h3>

<ul>
<li>We&#39;ve gotten a few questions about ECC RAM with ZFS</li>
<li>Here we&#39;ve got a surprising blog post about why someone <strong>did not</strong> go with ECC RAM for his NAS build</li>
<li>The article mentions the benefits of ECC and admits it is a better choice in nearly all instances, but unfortunately it&#39;s not very widespread in consumer hardware motherboards and it&#39;s more expensive</li>
<li>Regular RAM also has &quot;special&quot; issues with ZFS and pool corruption</li>
<li>Long post, so check out the whole thing if you&#39;ve been considering your memory options and weighing the benefits
***</li>
</ul>

<h2>Interview - Pierre Pronchery - <a href="mailto:khorben@edgebsd.org" rel="nofollow">khorben@edgebsd.org</a> / <a href="https://twitter.com/khorben" rel="nofollow">@khorben</a></h2>

<p><a href="https://www.youtube.com/watch?v=_D_iaad5rPo" rel="nofollow">EdgeBSD</a> (<a href="http://ftp.netbsd.org/pub/NetBSD/misc/khorben/asiabsdcon2014/" rel="nofollow">slides</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/the-desktop-obsd" rel="nofollow">Building an OpenBSD desktop</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/25/getting-to-know-your-portmgr-lurker-frederic-culot" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>This week we get to hear from Frederic Culot, colut@</li>
<li>Originally an OpenBSD user from France, Frederic joined as a ports committer in 2010 and recently joined the portmgr lurkers team</li>
<li>&quot;FreeBSD is also one of my sources of inspiration when it comes to how
organizations behave and innovate, and I find it very interesting to compare FreeBSD with
the for-profit companies I work for&quot;</li>
<li>We get to find out a little bit about him, why he loves FreeBSD and what he does for the project
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/the_playstation2_port_is_back" rel="nofollow">NetBSD on the Playstation 2</a></h3>

<ul>
<li>Who doesn&#39;t want to run NetBSD on their old PS2?</li>
<li>The PS2 port of NetBSD was sadly removed in 2009, but it has been revived</li>
<li>It&#39;s using a slightly unusual MIPS CPU that didn&#39;t have much GCC support</li>
<li>Hopefully a bootable kernel will be available soon
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/03/24/freebsd-challenge-day-22-30/" rel="nofollow">The FreeBSD Challenge update</a></h3>

<ul>
<li>Our friend from the Linux Foundation continues his FreeBSD switching journey</li>
<li>This time he starts off by discovering virtual machines suck at keeping accurate time, and some ports weren&#39;t working because of his clock being way off</li>
<li>After polling the IRC for help, he finally learns the difference between ntpdate and ntpd and both of their use cases</li>
<li>Maybe he should&#39;ve just read our <a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">NTP tutorial</a>!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-23/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>The mount tray icon got lots of updates and fixes</li>
<li>The faulty distribution server has finally been tracked down and... destroyed</li>
<li>New language localization project is in progress</li>
<li>Many many updates to ports and PBIs, new -STABLE builds
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s27d69qHJW" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s21FhLCHbB" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s20Hisk3Yw" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20rBZyTLC" rel="nofollow">Ron writes in</a></li>
<li><a href="http://slexy.org/view/s2s4CxE4gd" rel="nofollow">Tyler writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>30: Documentation is King</title>
  <link>https://www.bsdnow.tv/30</link>
  <guid isPermaLink="false">ab836072-6c9b-4d13-9011-8d9ddf4294e7</guid>
  <pubDate>Wed, 26 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/ab836072-6c9b-4d13-9011-8d9ddf4294e7.mp3" length="59694113" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:22:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Finally hit 30 episodes! Today we'll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you've ever wondered about the scary world of mailing lists, today's tutorial will show you the basics of how to get help and contribute back. There's lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" target="_blank" rel="nofollow noopener"&gt;OpenBSD on a Sun T5120&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt; got himself a cool Sun box&lt;/li&gt;
&lt;li&gt;Of course he had to write a post about installing and running OpenBSD on it&lt;/li&gt;
&lt;li&gt;The post goes through some of the quirks and steps to go through in case you're interested in one of these fine SPARC machines&lt;/li&gt;
&lt;li&gt;He's also got another post about OpenBSD on a &lt;a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" target="_blank" rel="nofollow noopener"&gt;Dell CS24-SC server&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&amp;amp;sm=3" target="_blank" rel="nofollow noopener"&gt;Bhyvecon 2014 videos are up&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Like we mentioned last week, &lt;a href="http://bhyvecon.org/" target="_blank" rel="nofollow noopener"&gt;Bhyvecon&lt;/a&gt; was an almost-impromptu conference before AsiaBSDCon&lt;/li&gt;
&lt;li&gt;The talks have apparently already been uploaded!&lt;/li&gt;
&lt;li&gt;Subjects include Bhyve's past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization&lt;/li&gt;
&lt;li&gt;Lots more detail in the videos, so check 'em all out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" target="_blank" rel="nofollow noopener"&gt;Building a FreeBSD wireless access point&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've got a new blog post about creating a wireless access point with FreeBSD&lt;/li&gt;
&lt;li&gt;After all the recent news of consumer routers being pwned like candy, it's time for people to start building &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;BSD routers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;The author goes through a lot of the process of getting one set up using good ol' FreeBSD&lt;/li&gt;
&lt;li&gt;Using hostapd, he's able to share his wireless card in hostap mode and offer DHCP to all the clients&lt;/li&gt;
&lt;li&gt;Plenty of config files and more messy details in the post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" target="_blank" rel="nofollow noopener"&gt;Switching from Synology to FreeNAS&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The author has been considering getting a NAS for quite a while and documents his research&lt;/li&gt;
&lt;li&gt;He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY&lt;/li&gt;
&lt;li&gt;After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice&lt;/li&gt;
&lt;li&gt;The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Warren Block - &lt;a href="mailto:wblock@freebsd.org" target="_blank" rel="nofollow noopener"&gt;wblock@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD's documentation project, igor, doceng&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/mailing-lists" target="_blank" rel="nofollow noopener"&gt;The world of BSD mailing lists&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" target="_blank" rel="nofollow noopener"&gt;HAMMER2 work and notes&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Matthew Dillon has posted some updated notes about the development of the new HAMMER version&lt;/li&gt;
&lt;li&gt;The start of a cluster API was committed to the tree&lt;/li&gt;
&lt;li&gt;There are also links to design document, a freemap design document, a changes list and a todo list
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=buo5JlMnGPI" target="_blank" rel="nofollow noopener"&gt;BSD Breaking Barriers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;MWL&lt;/a&gt; gave a talk at NYCBSDCon about BSD "breaking barriers"&lt;/li&gt;
&lt;li&gt;"What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We'll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years."&lt;/li&gt;
&lt;li&gt;He also has another upcoming talk, (or "webcast") called "&lt;a href="http://oreillynet.com/pub/e/3059" target="_blank" rel="nofollow noopener"&gt;Beyond Security: Getting to Know OpenBSD's Real Purpose&lt;/a&gt;"&lt;/li&gt;
&lt;li&gt;"OpenBSD is frequently billed as a high-security operating system. That's true, but security isn't the OpenBSD Project's main goal. This webcast will introduce systems administrators to OpenBSD, explain the project's mission, and discuss the features and benefits."&lt;/li&gt;
&lt;li&gt;It's on May 27th and will hopefully be recorded
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://dreamcat4.github.io/finch/" target="_blank" rel="nofollow noopener"&gt;FreeBSD in a chroot&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Finch, "FreeBSD running IN a CHroot," is a new project&lt;/li&gt;
&lt;li&gt;It's a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)&lt;/li&gt;
&lt;li&gt;All the details and some interesting use cases are on the github page&lt;/li&gt;
&lt;li&gt;He really needs to &lt;a href="https://www.freshports.org/net-im/finch" target="_blank" rel="nofollow noopener"&gt;change the project name&lt;/a&gt; though
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lots of bugfixes for PCBSD coming down the tubes&lt;/li&gt;
&lt;li&gt;LZ4 compression is now enabled by default on the whole pool&lt;/li&gt;
&lt;li&gt;The latest 10-STABLE has been imported and builds are going&lt;/li&gt;
&lt;li&gt;Also the latest GNOME and Cinnamon builds have been imported and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20SlvTcwd" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt; (IRC suggests md5deep)&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2PeMqXFid" target="_blank" rel="nofollow noopener"&gt;Don writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21yii6KZe" target="_blank" rel="nofollow noopener"&gt;kaltheat writes in&lt;/a&gt; (We use R0DE Podcast microphones and Logitech C920 HD webcams)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21SkX19Cp" target="_blank" rel="nofollow noopener"&gt;Harri writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, rtfm, mailing lists, lists, documentation, doceng, igor, man pages, manpages, wireless, access point, wap, router, pfsense, sun, t5120, dell, cs24-c, server, bhyve, bhyvecon, asiabsdcon, 2014, synology, freenas, ixsystems, megaport, foundation, rack, datacenter, mail, hammer, hammer2, hammerfs, fs, filesystem, rump kernels</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Finally hit 30 episodes! Today we&#39;ll be chatting with Warren Block to discuss BSD documentation efforts and future plans. If you&#39;ve ever wondered about the scary world of mailing lists, today&#39;s tutorial will show you the basics of how to get help and contribute back. There&#39;s lots to get to today, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-a-Sun-T5120" rel="nofollow">OpenBSD on a Sun T5120</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a> got himself a cool Sun box</li>
<li>Of course he had to write a post about installing and running OpenBSD on it</li>
<li>The post goes through some of the quirks and steps to go through in case you&#39;re interested in one of these fine SPARC machines</li>
<li>He&#39;s also got another post about OpenBSD on a <a href="http://www.tedunangst.com/flak/post/Dell-CS24-SC-server" rel="nofollow">Dell CS24-SC server</a>
***</li>
</ul>

<h3><a href="https://www.youtube.com/results?search_query=bhyvecon%20tokyo&sm=3" rel="nofollow">Bhyvecon 2014 videos are up</a></h3>

<ul>
<li>Like we mentioned last week, <a href="http://bhyvecon.org/" rel="nofollow">Bhyvecon</a> was an almost-impromptu conference before AsiaBSDCon</li>
<li>The talks have apparently already been uploaded!</li>
<li>Subjects include Bhyve&#39;s past, present and future, OSv on Bhyve, a general introduction to the tool, migrating those last few pesky Linux boxes to virtualization</li>
<li>Lots more detail in the videos, so check &#39;em all out
***</li>
</ul>

<h3><a href="http://blog.khubla.com/freebsd/building-my-own-wireless-point" rel="nofollow">Building a FreeBSD wireless access point</a></h3>

<ul>
<li>We&#39;ve got a new blog post about creating a wireless access point with FreeBSD</li>
<li>After all the recent news of consumer routers being pwned like candy, it&#39;s time for people to start building <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">BSD routers</a></li>
<li>The author goes through a lot of the process of getting one set up using good ol&#39; FreeBSD</li>
<li>Using hostapd, he&#39;s able to share his wireless card in hostap mode and offer DHCP to all the clients</li>
<li>Plenty of config files and more messy details in the post
***</li>
</ul>

<h3><a href="http://www.notquitemainstream.com/2014/03/15/why-im-switching-from-synology-to-freenas/" rel="nofollow">Switching from Synology to FreeNAS</a></h3>

<ul>
<li>The author has been considering getting a NAS for quite a while and documents his research</li>
<li>He was faced with the compromise of convenience vs. flexibility - prebuilt or DIY</li>
<li>After seeing the potential security issues with proprietary NAS devices, and dealing with frustration with trying to get bugs fixed, he makes the right choice</li>
<li>The post also goes into some detail about his setup, all the things he needed a NAS to do as well as all the advantages an open source solution would give
***</li>
</ul>

<h2>Interview - Warren Block - <a href="mailto:wblock@freebsd.org" rel="nofollow">wblock@freebsd.org</a></h2>

<p>FreeBSD&#39;s documentation project, igor, doceng</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/mailing-lists" rel="nofollow">The world of BSD mailing lists</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/03/18/13651.html" rel="nofollow">HAMMER2 work and notes</a></h3>

<ul>
<li>Matthew Dillon has posted some updated notes about the development of the new HAMMER version</li>
<li>The start of a cluster API was committed to the tree</li>
<li>There are also links to design document, a freemap design document, a changes list and a todo list
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?v=buo5JlMnGPI" rel="nofollow">BSD Breaking Barriers</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> gave a talk at NYCBSDCon about BSD &quot;breaking barriers&quot;</li>
<li>&quot;What makes the BSD operating systems special? Why should you deploy your applications on BSD? Why does the BSD community keep growing, and why do Linux sites like DistroWatch say that BSD is where the interesting development work is happening? We&#39;ll cover the not-so-obvious reasons why BSD still stands tall after almost 40 years.&quot;</li>
<li>He also has another upcoming talk, (or &quot;webcast&quot;) called &quot;<a href="http://oreillynet.com/pub/e/3059" rel="nofollow">Beyond Security: Getting to Know OpenBSD&#39;s Real Purpose</a>&quot;</li>
<li>&quot;OpenBSD is frequently billed as a high-security operating system. That&#39;s true, but security isn&#39;t the OpenBSD Project&#39;s main goal. This webcast will introduce systems administrators to OpenBSD, explain the project&#39;s mission, and discuss the features and benefits.&quot;</li>
<li>It&#39;s on May 27th and will hopefully be recorded
***</li>
</ul>

<h3><a href="http://dreamcat4.github.io/finch/" rel="nofollow">FreeBSD in a chroot</a></h3>

<ul>
<li>Finch, &quot;FreeBSD running IN a CHroot,&quot; is a new project</li>
<li>It&#39;s a way to extend the functionality of restricted USB-based FreeBSD systems (FreeNAS, etc.)</li>
<li>All the details and some interesting use cases are on the github page</li>
<li>He really needs to <a href="https://www.freshports.org/net-im/finch" rel="nofollow">change the project name</a> though
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-22/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Lots of bugfixes for PCBSD coming down the tubes</li>
<li>LZ4 compression is now enabled by default on the whole pool</li>
<li>The latest 10-STABLE has been imported and builds are going</li>
<li>Also the latest GNOME and Cinnamon builds have been imported and much more
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20SlvTcwd" rel="nofollow">Bostjan writes in</a> (IRC suggests md5deep)</li>
<li><a href="http://slexy.org/view/s2PeMqXFid" rel="nofollow">Don writes in</a></li>
<li><a href="http://slexy.org/view/s21yii6KZe" rel="nofollow">kaltheat writes in</a> (We use R0DE Podcast microphones and Logitech C920 HD webcams)</li>
<li><a href="http://slexy.org/view/s21SkX19Cp" rel="nofollow">Harri writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>29: P.E.F.S.</title>
  <link>https://www.bsdnow.tv/29</link>
  <guid isPermaLink="false">4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a</guid>
  <pubDate>Wed, 19 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4af36dea-3dd3-4ac1-9ee9-a2e34dd54e3a.mp3" length="82610606" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:54:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We're back from AsiaBSDCon! This week we'll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we'll give you a step by step guide on how to actually use it. There's also the usual round of your questions and we've got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" target="_blank" rel="nofollow noopener"&gt;Using OpenSSH Certificate Authentication&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you're using&lt;/li&gt;
&lt;li&gt;They're not really that complex, there just isn't a lot of documentation on how to use them - this post tries to solve that&lt;/li&gt;
&lt;li&gt;There's the benefit of not needing a known_hosts file or authorized_users file anymore&lt;/li&gt;
&lt;li&gt;The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" target="_blank" rel="nofollow noopener"&gt;Back to FreeBSD, a new series&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Similar to the "FreeBSD Challenge" blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey&lt;/li&gt;
&lt;li&gt;"So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10"&lt;/li&gt;
&lt;li&gt;He's starting off with PCBSD since it's easy to get working with dual graphics&lt;/li&gt;
&lt;li&gt;Should be a fun series to follow!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140307130554" target="_blank" rel="nofollow noopener"&gt;OpenBSD's recent experiments in package building&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;If you'll remember back to our &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere tutorial&lt;/a&gt;, it lets you build FreeBSD binary packages in bulk - OpenBSD's version is called &lt;a href="http://www.bsdnow.tv/tutorials/dpb" target="_blank" rel="nofollow noopener"&gt;dpb&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware&lt;/li&gt;
&lt;li&gt;This article goes through some of his findings and plans for future versions that increase performance&lt;/li&gt;
&lt;li&gt;We'll be showing a tutorial of dpb on the show in a few weeks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" target="_blank" rel="nofollow noopener"&gt;Securing FreeBSD with 2FA&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;So maybe you've set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?&lt;/li&gt;
&lt;li&gt;This post walks us through the process of locking down an &lt;a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener"&gt;ssh server&lt;/a&gt; with 2FA&lt;/li&gt;
&lt;li&gt;With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Gleb Kurtsou - &lt;a href="mailto:gleb.kurtsou@gmail.com" target="_blank" rel="nofollow noopener"&gt;gleb.kurtsou@gmail.com&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;PEFS (security audit results &lt;a href="https://defuse.ca/audits/pefs.htm" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;)&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/pefs" target="_blank" rel="nofollow noopener"&gt;Filesystem-based encryption with PEFS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.bsdcan.org/2014/registration.php" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 registration&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Registration is finally open!&lt;/li&gt;
&lt;li&gt;The prices are available along with a full list of presentations&lt;/li&gt;
&lt;li&gt;Tutorial sessions for various topics as well&lt;/li&gt;
&lt;li&gt;You have to go
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140314080734" target="_blank" rel="nofollow noopener"&gt;Big changes for OpenBSD 5.6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising&lt;/li&gt;
&lt;li&gt;OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3&lt;/li&gt;
&lt;li&gt;They've also imported nginx into base a few years ago, but now have finally removed Apache&lt;/li&gt;
&lt;li&gt;Sendmail is also no longer the default MTA, OpenSMTPD &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140313052817" target="_blank" rel="nofollow noopener"&gt;is the new default&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Will BIND be removed next? &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139492163427518&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Maybe so&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;They've also discontinued the hp300, mvme68k and mvme88k ports
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr lurkers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The "getting to know your portmgr" series makes its return&lt;/li&gt;
&lt;li&gt;This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)&lt;/li&gt;
&lt;li&gt;How he got into FreeBSD? He "wanted a unix system that I could understand and that would not get bloated as time goes by"&lt;/li&gt;
&lt;li&gt;Mentions why he's still heavily involved with the project and lots more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Work has started to port Pulseaudio to PCBSD 10.0.1&lt;/li&gt;
&lt;li&gt;There's a new "pc-mixer" utility being worked on for sound management as well&lt;/li&gt;
&lt;li&gt;New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more&lt;/li&gt;
&lt;li&gt;PCBSD 10.0.1 &lt;a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" target="_blank" rel="nofollow noopener"&gt;was released&lt;/a&gt; too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QwjHkL2n" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2wLGlHF15" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21JsgRjMU" target="_blank" rel="nofollow noopener"&gt;Nick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2UX4sYdHy" target="_blank" rel="nofollow noopener"&gt;Sami writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s26z60Qd6z" target="_blank" rel="nofollow noopener"&gt;Christopher writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, encryption, pefs, fde, disk, asiabsdcon, 2014, asiabsdcon2014, presentation, talk, video, recording, openssh, certificate, authentication, dpb, two factor, 2fa, yubikey</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;re back from AsiaBSDCon! This week we&#39;ll be chatting with Gleb Kurtsou about some a filesystem-level encryption utility called PEFS. After that, we&#39;ll give you a step by step guide on how to actually use it. There&#39;s also the usual round of your questions and we&#39;ve got a lot of news to catch up on, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://neocri.me/documentation/using-ssh-certificate-authentication/" rel="nofollow">Using OpenSSH Certificate Authentication</a></h3>

<ul>
<li>SSH has a not-so-often-talked-about authentication option in addition to passwords and keys: certificates - you can add certificates to any current authentication method you&#39;re using</li>
<li>They&#39;re not really that complex, there just isn&#39;t a lot of documentation on how to use them - this post tries to solve that</li>
<li>There&#39;s the benefit of not needing a known_hosts file or authorized_users file anymore</li>
<li>The post goes into a fair amount of detail about the differences, advantages and implications of using certificates for authentication
***</li>
</ul>

<h3><a href="http://www.duckland.org/2014/03/back-to-freebsd-aka-day-1#more" rel="nofollow">Back to FreeBSD, a new series</a></h3>

<ul>
<li>Similar to the &quot;FreeBSD Challenge&quot; blog series, one of our listeners will be writing about his switching BACK to FreeBSD journey</li>
<li>&quot;So, a long time ago, I had a box which was running FreeBSD 4, running on a Pentium. 14 years later, I have decided to get back into FreeBSD, now at FreeBSD 10&quot;</li>
<li>He&#39;s starting off with PCBSD since it&#39;s easy to get working with dual graphics</li>
<li>Should be a fun series to follow!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140307130554" rel="nofollow">OpenBSD&#39;s recent experiments in package building</a></h3>

<ul>
<li>If you&#39;ll remember back to our <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere tutorial</a>, it lets you build FreeBSD binary packages in bulk - OpenBSD&#39;s version is called <a href="http://www.bsdnow.tv/tutorials/dpb" rel="nofollow">dpb</a></li>
<li>Marc Espie recently got some monster machines in russia to play with to help improve scaling of dpb on high end hardware</li>
<li>This article goes through some of his findings and plans for future versions that increase performance</li>
<li>We&#39;ll be showing a tutorial of dpb on the show in a few weeks
***</li>
</ul>

<h3><a href="http://jafdip.com/securing-freebsd-2fa-two-factor-authentication/" rel="nofollow">Securing FreeBSD with 2FA</a></h3>

<ul>
<li>So maybe you&#39;ve set up two-factor authentication with gmail or twitter, but have you done it with your BSD box?</li>
<li>This post walks us through the process of locking down an <a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">ssh server</a> with 2FA</li>
<li>With just a mobile phone and a few extra tools, you can enable two-factor auth on your BSD box and have just that little extra bit of protections
***</li>
</ul>

<h2>Interview - Gleb Kurtsou - <a href="mailto:gleb.kurtsou@gmail.com" rel="nofollow">gleb.kurtsou@gmail.com</a></h2>

<p>PEFS (security audit results <a href="https://defuse.ca/audits/pefs.htm" rel="nofollow">here</a>)</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/pefs" rel="nofollow">Filesystem-based encryption with PEFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.bsdcan.org/2014/registration.php" rel="nofollow">BSDCan 2014 registration</a></h3>

<ul>
<li>Registration is finally open!</li>
<li>The prices are available along with a full list of presentations</li>
<li>Tutorial sessions for various topics as well</li>
<li>You have to go
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140314080734" rel="nofollow">Big changes for OpenBSD 5.6</a></h3>

<ul>
<li>Although 5.5 was just frozen and the release process has started, 5.6 is already looking promising</li>
<li>OpenBSD has, for a long time, included a heavily-patched version of Apache based on 1.3</li>
<li>They&#39;ve also imported nginx into base a few years ago, but now have finally removed Apache</li>
<li>Sendmail is also no longer the default MTA, OpenSMTPD <a href="http://undeadly.org/cgi?action=article&sid=20140313052817" rel="nofollow">is the new default</a></li>
<li>Will BIND be removed next? <a href="http://marc.info/?l=openbsd-cvs&m=139492163427518&w=2" rel="nofollow">Maybe so</a></li>
<li>They&#39;ve also discontinued the hp300, mvme68k and mvme88k ports
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/03/11/getting-to-know-your-portmgr-lurker-alexy-dokuchaev/" rel="nofollow">Getting to know your portmgr lurkers</a></h3>

<ul>
<li>The &quot;getting to know your portmgr&quot; series makes its return</li>
<li>This time we get to talk with danfe@ (probably most known for being the nVidia driver maintainer, but he does a lot with ports)</li>
<li>How he got into FreeBSD? He &quot;wanted a unix system that I could understand and that would not get bloated as time goes by&quot;</li>
<li>Mentions why he&#39;s still heavily involved with the project and lots more
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-20/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Work has started to port Pulseaudio to PCBSD 10.0.1</li>
<li>There&#39;s a new &quot;pc-mixer&quot; utility being worked on for sound management as well</li>
<li>New PBIs, GNOME/Mate updates, Life Preserver fixes and a lot more</li>
<li>PCBSD 10.0.1 <a href="http://blog.pcbsd.org/2014/03/pc-bsd-weekly-feature-digest-21-pcbsd-10-0-1-released/" rel="nofollow">was released</a> too
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2QwjHkL2n" rel="nofollow">Alex writes in</a></li>
<li><a href="http://slexy.org/view/s2wLGlHF15" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s21JsgRjMU" rel="nofollow">Nick writes in</a></li>
<li><a href="http://slexy.org/view/s2UX4sYdHy" rel="nofollow">Sami writes in</a></li>
<li><a href="http://slexy.org/view/s26z60Qd6z" rel="nofollow">Christopher writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>28: Ghost of Partition</title>
  <link>https://www.bsdnow.tv/28</link>
  <guid isPermaLink="false">dbf43567-8b44-4e0a-a98c-df78dddd551f</guid>
  <pubDate>Wed, 12 Mar 2014 08:00:00 -0400</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dbf43567-8b44-4e0a-a98c-df78dddd551f.mp3" length="24331945" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we're at AsiaBSDCon, so it'll be a shorter episode. We've got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven't heard of GhostBSD? Well stay tuned then. There's also a really interesting tutorial on how to serially concatenate disks in NetBSD. We'll be back next week with a normal episode.</itunes:subtitle>
  <itunes:duration>33:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we're at AsiaBSDCon, so it'll be a shorter episode. We've got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven't heard of GhostBSD? Well stay tuned then. There's also a really interesting tutorial on how to serially concatenate disks in NetBSD. We'll be back next week with a normal episode.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Eric Turgeon - &lt;a href="mailto:ericturgeon@ghostbsd.org" target="_blank" rel="nofollow noopener"&gt;ericturgeon@ghostbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/GhostBSD1" target="_blank" rel="nofollow noopener"&gt;@GhostBSD1&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;GhostBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/nbsd-disks" target="_blank" rel="nofollow noopener"&gt;Serially concatenating disks in NetBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ff5BOdU0" target="_blank" rel="nofollow noopener"&gt;Dave writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2F6j5fVYH" target="_blank" rel="nofollow noopener"&gt;Shane writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2GHmy7tuS" target="_blank" rel="nofollow noopener"&gt;Rob writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2uM28feQe" target="_blank" rel="nofollow noopener"&gt;Predrag writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ghostbsd, disks, management, slice, partition, linux, device, opeth, ghost reveries, name, ericbsd, ericturgeonbsd, opeth, eric turgeon, growing filesystems, vnconfig, disks, disklabel, partitions, disk management</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;re at AsiaBSDCon, so it&#39;ll be a shorter episode. We&#39;ve got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven&#39;t heard of GhostBSD? Well stay tuned then. There&#39;s also a really interesting tutorial on how to serially concatenate disks in NetBSD. We&#39;ll be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - Eric Turgeon - <a href="mailto:ericturgeon@ghostbsd.org" rel="nofollow">ericturgeon@ghostbsd.org</a> / <a href="https://twitter.com/GhostBSD1" rel="nofollow">@GhostBSD1</a></h2>

<p>GhostBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nbsd-disks" rel="nofollow">Serially concatenating disks in NetBSD</a></h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ff5BOdU0" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s2F6j5fVYH" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s2GHmy7tuS" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s2uM28feQe" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;re at AsiaBSDCon, so it&#39;ll be a shorter episode. We&#39;ve got an interview with Eric Turgeon, founder of the desktop-focused GhostBSD project. Haven&#39;t heard of GhostBSD? Well stay tuned then. There&#39;s also a really interesting tutorial on how to serially concatenate disks in NetBSD. We&#39;ll be back next week with a normal episode.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - Eric Turgeon - <a href="mailto:ericturgeon@ghostbsd.org" rel="nofollow">ericturgeon@ghostbsd.org</a> / <a href="https://twitter.com/GhostBSD1" rel="nofollow">@GhostBSD1</a></h2>

<p>GhostBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/nbsd-disks" rel="nofollow">Serially concatenating disks in NetBSD</a></h3>

<hr>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ff5BOdU0" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s2F6j5fVYH" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s2GHmy7tuS" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s2uM28feQe" rel="nofollow">Predrag writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>27: BSD Now vs. BSDTalk</title>
  <link>https://www.bsdnow.tv/27</link>
  <guid isPermaLink="false">9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7</guid>
  <pubDate>Wed, 05 Mar 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/9c2ed198-48a2-4ed6-988c-6d5ce1ed66c7.mp3" length="73930325" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:42:40</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;The long-awaited meetup is finally happening on today's show. We're going to be interviewing the original BSD podcaster, Will Backman, to discuss what he's been up to and what the future of BSD advocacy looks like. After that, we'll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We've got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://wiki.freebsd.org/SummerOfCode2014" target="_blank" rel="nofollow noopener"&gt;FreeBSD and OpenBSD in GSOC2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Google Summer of Code is a way to encourage students to write code for open source projects and make some money&lt;/li&gt;
&lt;li&gt;Both FreeBSD and OpenBSD were accepted, and we'd love for anyone listening to check out their GSOC pages&lt;/li&gt;
&lt;li&gt;The FreeBSD wiki has a list of things that they'd be interested in someone helping out with&lt;/li&gt;
&lt;li&gt;OpenBSD's want list was &lt;a href="http://www.openbsdfoundation.org/gsoc2014.html" target="_blank" rel="nofollow noopener"&gt;also posted&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;DragonflyBSD and NetBSD were sadly not accepted this year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" target="_blank" rel="nofollow noopener"&gt;Yes, you too can be an evil network overlord&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new blog post about monitoring your network using only free tools&lt;/li&gt;
&lt;li&gt;OpenBSD is a great fit, and has all the stuff you need in the base system or via packages&lt;/li&gt;
&lt;li&gt;It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)&lt;/li&gt;
&lt;li&gt;There's also details about flowd and nfsen, more great tools to make network monitoring easy&lt;/li&gt;
&lt;li&gt;If you're listening, Peter... stop ignoring our emails and come on the show! We know you're watching!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" target="_blank" rel="nofollow noopener"&gt;BSDMag's February issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The theme is "configuring basic services on OpenBSD 5.4"&lt;/li&gt;
&lt;li&gt;There's also an interview with Peter Hansteen (oh hey...)&lt;/li&gt;
&lt;li&gt;Topics also include locking down SSH, a GIMP lesson, user/group management, and...&lt;/li&gt;
&lt;li&gt;Linux and Solaris articles? Why??
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=139320023202696&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;Changes in bcrypt&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation&lt;/li&gt;
&lt;li&gt;There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)&lt;/li&gt;
&lt;li&gt;"The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor 'b'."&lt;/li&gt;
&lt;li&gt;As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward&lt;/li&gt;
&lt;li&gt;Lots of specifics in the email, check the full thing
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Will Backman - &lt;a href="mailto:bitgeist@yahoo.com" target="_blank" rel="nofollow noopener"&gt;bitgeist@yahoo.com&lt;/a&gt; / &lt;a href="https://twitter.com/bsdtalk" target="_blank" rel="nofollow noopener"&gt;@bsdtalk&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The BSDTalk podcast, BSD advocacy, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/current-nbsd" target="_blank" rel="nofollow noopener"&gt;Tracking and cross-compiling -CURRENT (NetBSD)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140223112426" target="_blank" rel="nofollow noopener"&gt;X11 no longer needs root&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Xorg has long since required root privileges to run the main server&lt;/li&gt;
&lt;li&gt;With &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;;m=139245772023497&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;recent work&lt;/a&gt; from the OpenBSD team, now everything (even KMS) can run as a regular user&lt;/li&gt;
&lt;li&gt;Now you can set the "machdep.allowaperture" sysctl to 0 and still use a GUI
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.6 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Shortly after the huge 6.5 release, we get a routine bugfix update&lt;/li&gt;
&lt;li&gt;Test it out on as many systems as you can&lt;/li&gt;
&lt;li&gt;Check the mailing list for the full bug list
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140225072408" target="_blank" rel="nofollow noopener"&gt;Creating an OpenBSD USB drive&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Since OpenBSD doesn't distribute any official USB images, here are some instructions on how to do it&lt;/li&gt;
&lt;li&gt;Step by step guide on how you can make your very own&lt;/li&gt;
&lt;li&gt;However, there's some &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140228231258" target="_blank" rel="nofollow noopener"&gt;recent emails&lt;/a&gt; that suggest official USB images may be coming soon... &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=139377587526463&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;oh wait&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New PBI updates that allow separate ports from /usr/local&lt;/li&gt;
&lt;li&gt;You need to rebuild pbi-manager if you want to try it out&lt;/li&gt;
&lt;li&gt;Updates and changes to Life Preserver, App Cafe, PCDM
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JpJ5EaZp" target="_blank" rel="nofollow noopener"&gt;espressowar writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2QpPevJ3J" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2EZLxDfWh" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gEBZbmG" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2RnCO1p9c" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, will backman, bsdtalk, podcast, cross compile, build.sh, portable, portability, cross-build, building a release, google summer of code, gsoc, gsoc2014, 2014, spamd, dd, opensmtpd, tcpdump, packet filtering, monitoring, network, bcrypt, solar designer, ixsystems, usb, bootable, jails, openbsd usb drive, ezjail, jails, bsd jail, x11, openssh, pflow, pf</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The long-awaited meetup is finally happening on today&#39;s show. We&#39;re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he&#39;s been up to and what the future of BSD advocacy looks like. After that, we&#39;ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We&#39;ve got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" rel="nofollow">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we&#39;d love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they&#39;d be interested in someone helping out with</li>
<li>OpenBSD&#39;s want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" rel="nofollow">also posted</a></li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" rel="nofollow">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There&#39;s also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you&#39;re listening, Peter... stop ignoring our emails and come on the show! We know you&#39;re watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" rel="nofollow">BSDMag&#39;s February issue is out</a></h3>

<ul>
<li>The theme is &quot;configuring basic services on OpenBSD 5.4&quot;</li>
<li>There&#39;s also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=139320023202696&w=2" rel="nofollow">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>&quot;The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor &#39;b&#39;.&quot;</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" rel="nofollow">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" rel="nofollow">@bsdtalk</a></h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140223112426" rel="nofollow">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&;m=139245772023497&w=2" rel="nofollow">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the &quot;machdep.allowaperture&quot; sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" rel="nofollow">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140225072408" rel="nofollow">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn&#39;t distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there&#39;s some <a href="http://undeadly.org/cgi?action=article&sid=20140228231258" rel="nofollow">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&m=139377587526463&w=2" rel="nofollow">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" rel="nofollow">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s2RnCO1p9c" rel="nofollow">Alex writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The long-awaited meetup is finally happening on today&#39;s show. We&#39;re going to be interviewing the original BSD podcaster, Will Backman, to discuss what he&#39;s been up to and what the future of BSD advocacy looks like. After that, we&#39;ll be showing you how to track (and even cross-compile!) the -CURRENT branch of NetBSD. We&#39;ve got answers to user-submitted questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://wiki.freebsd.org/SummerOfCode2014" rel="nofollow">FreeBSD and OpenBSD in GSOC2014</a></h3>

<ul>
<li>The Google Summer of Code is a way to encourage students to write code for open source projects and make some money</li>
<li>Both FreeBSD and OpenBSD were accepted, and we&#39;d love for anyone listening to check out their GSOC pages</li>
<li>The FreeBSD wiki has a list of things that they&#39;d be interested in someone helping out with</li>
<li>OpenBSD&#39;s want list was <a href="http://www.openbsdfoundation.org/gsoc2014.html" rel="nofollow">also posted</a></li>
<li>DragonflyBSD and NetBSD were sadly not accepted this year
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/yes-you-too-can-be-evil-network.html" rel="nofollow">Yes, you too can be an evil network overlord</a></h3>

<ul>
<li>A new blog post about monitoring your network using only free tools</li>
<li>OpenBSD is a great fit, and has all the stuff you need in the base system or via packages</li>
<li>It talks about the pflow pseudo-interface, its capabilities and relation to NetFlow (also goes well with pf)</li>
<li>There&#39;s also details about flowd and nfsen, more great tools to make network monitoring easy</li>
<li>If you&#39;re listening, Peter... stop ignoring our emails and come on the show! We know you&#39;re watching!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1858-openbsd-5-4-configure-openbsd-basic-services" rel="nofollow">BSDMag&#39;s February issue is out</a></h3>

<ul>
<li>The theme is &quot;configuring basic services on OpenBSD 5.4&quot;</li>
<li>There&#39;s also an interview with Peter Hansteen (oh hey...)</li>
<li>Topics also include locking down SSH, a GIMP lesson, user/group management, and...</li>
<li>Linux and Solaris articles? Why??
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=139320023202696&w=2" rel="nofollow">Changes in bcrypt</a></h3>

<ul>
<li>Not specific to any OS, but the OpenBSD team is updating their bcrypt implementation</li>
<li>There is a bug in bcrypt when hashing long passwords - other OSes need to update theirs too! (FreeBSD already has)</li>
<li>&quot;The length is stored in an unsigned char type, which will overflow and wrap at 256. Although we consider the existence of affected hashes very rare, in order to differentiate hashes generated before and after the fix, we are introducing a new minor &#39;b&#39;.&quot;</li>
<li>As long as you upgrade your OpenBSD system in order (without skipping versions) you should be ok going forward</li>
<li>Lots of specifics in the email, check the full thing
***</li>
</ul>

<h2>Interview - Will Backman - <a href="mailto:bitgeist@yahoo.com" rel="nofollow">bitgeist@yahoo.com</a> / <a href="https://twitter.com/bsdtalk" rel="nofollow">@bsdtalk</a></h2>

<p>The BSDTalk podcast, BSD advocacy, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/current-nbsd" rel="nofollow">Tracking and cross-compiling -CURRENT (NetBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140223112426" rel="nofollow">X11 no longer needs root</a></h3>

<ul>
<li>Xorg has long since required root privileges to run the main server</li>
<li>With <a href="http://marc.info/?l=openbsd-cvs&;m=139245772023497&w=2" rel="nofollow">recent work</a> from the OpenBSD team, now everything (even KMS) can run as a regular user</li>
<li>Now you can set the &quot;machdep.allowaperture&quot; sysctl to 0 and still use a GUI
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-March/032259.html" rel="nofollow">OpenSSH 6.6 CFT</a></h3>

<ul>
<li>Shortly after the huge 6.5 release, we get a routine bugfix update</li>
<li>Test it out on as many systems as you can</li>
<li>Check the mailing list for the full bug list
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140225072408" rel="nofollow">Creating an OpenBSD USB drive</a></h3>

<ul>
<li>Since OpenBSD doesn&#39;t distribute any official USB images, here are some instructions on how to do it</li>
<li>Step by step guide on how you can make your very own</li>
<li>However, there&#39;s some <a href="http://undeadly.org/cgi?action=article&sid=20140228231258" rel="nofollow">recent emails</a> that suggest official USB images may be coming soon... <a href="http://marc.info/?l=openbsd-cvs&m=139377587526463&w=2" rel="nofollow">oh wait</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-19/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>New PBI updates that allow separate ports from /usr/local</li>
<li>You need to rebuild pbi-manager if you want to try it out</li>
<li>Updates and changes to Life Preserver, App Cafe, PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JpJ5EaZp" rel="nofollow">espressowar writes in</a></li>
<li><a href="http://slexy.org/view/s2QpPevJ3J" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2EZLxDfWh" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21gEBZbmG" rel="nofollow">Adam writes in</a></li>
<li><a href="http://slexy.org/view/s2RnCO1p9c" rel="nofollow">Alex writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>26: Port Authority</title>
  <link>https://www.bsdnow.tv/26</link>
  <guid isPermaLink="false">0e208963-5f59-446a-902e-9876d96c8f3f</guid>
  <pubDate>Wed, 26 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/0e208963-5f59-446a-902e-9876d96c8f3f.mp3" length="65589845" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:31:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;On today's show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" target="_blank" rel="nofollow noopener"&gt;Tailoring OpenBSD for an old, strange computer&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The author of this article had an &lt;a href="http://hpmuseum.net/display_item.php?hw=233" target="_blank" rel="nofollow noopener"&gt;OmniBook 800CT&lt;/a&gt;, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU&lt;/li&gt;
&lt;li&gt;Obviously he had to install some kind of BSD on it!&lt;/li&gt;
&lt;li&gt;This post goes through all his efforts of trimming down OpenBSD to work on such a limited device&lt;/li&gt;
&lt;li&gt;He goes through the trial and error of "compile, break it, rebuild, try again"&lt;/li&gt;
&lt;li&gt;After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.pkgsrc.org/pkgsrcCon/2014/" target="_blank" rel="nofollow noopener"&gt;pkgsrcCon and BSDCan&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;pkgsrccon is "a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure"&lt;/li&gt;
&lt;li&gt;This year it will be on June 21st and 22nd&lt;/li&gt;
&lt;li&gt;The &lt;a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" target="_blank" rel="nofollow noopener"&gt;schedule&lt;/a&gt; is still being worked out, so if you want to give a talk, submit it&lt;/li&gt;
&lt;li&gt;BSDCan's &lt;a href="https://www.bsdcan.org/2014/schedule/events.en.html" target="_blank" rel="nofollow noopener"&gt;schedule&lt;/a&gt; was also announced&lt;/li&gt;
&lt;li&gt;We'll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more&lt;/li&gt;
&lt;li&gt;Kris' presentation was accepted!&lt;/li&gt;
&lt;li&gt;Tons of topics, look forward to the recorded versions of all of them hopefully!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/login-pushover" target="_blank" rel="nofollow noopener"&gt;Two factor auth with pushover&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new write-up from our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" target="_blank" rel="nofollow noopener"&gt;Ted Unangst&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Pushover is "a web hook to smartphone push notification gateway" - you sent a POST to a web server and it sends a code to your phone&lt;/li&gt;
&lt;li&gt;His post goes through the steps of editing your login.conf and setting it all up to work&lt;/li&gt;
&lt;li&gt;Now you can get a two factor authenticated login for ssh!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140219085851" target="_blank" rel="nofollow noopener"&gt;The status of GNOME 3 on BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;It's no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems&lt;/li&gt;
&lt;li&gt;OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use&lt;/li&gt;
&lt;li&gt;This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes &lt;a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" target="_blank" rel="nofollow noopener"&gt;a screencast&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;A few &lt;a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" target="_blank" rel="nofollow noopener"&gt;recent&lt;/a&gt; &lt;a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" target="_blank" rel="nofollow noopener"&gt;posts&lt;/a&gt; from some GNOME developers show that they're finally working with the BSD guys to improve portability&lt;/li&gt;
&lt;li&gt;The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it's a beautiful thing&lt;/li&gt;
&lt;li&gt;This goes right along with our interview today!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Joe Marcus Clark - &lt;a href="mailto:marcus@freebsd.org" target="_blank" rel="nofollow noopener"&gt;marcus@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ports" target="_blank" rel="nofollow noopener"&gt;The FreeBSD Ports Collection&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://bugs.dragonflybsd.org/versions/4" target="_blank" rel="nofollow noopener"&gt;DragonflyBSD 3.8 goals and 3.6.1 release&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Dragonfly team is thinking about what should be in version 3.8&lt;/li&gt;
&lt;li&gt;On their bug tracker, it lists some of the things they'd like to get done before then&lt;/li&gt;
&lt;li&gt;In the meantime, &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" target="_blank" rel="nofollow noopener"&gt;3.6.1&lt;/a&gt; was released with lots of bugfixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" target="_blank" rel="nofollow noopener"&gt;NYCBSDCon 2014 wrap-up piece&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've got a nice wrap-up titled "NYCBSDCon 2014 Heats Up a Cold Winter Weekend"&lt;/li&gt;
&lt;li&gt;The author also interviews &lt;a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" target="_blank" rel="nofollow noopener"&gt;GNN&lt;/a&gt; about the conference&lt;/li&gt;
&lt;li&gt;There's even a little "beginner introduction" to BSD segment&lt;/li&gt;
&lt;li&gt;Includes a mention of the recently-launched journal and lots of pictures from the event
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?&amp;amp;v=5mv_oKFzACM#t=418" target="_blank" rel="nofollow noopener"&gt;FreeBSD and Linux, a comparative analysis&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux&lt;/li&gt;
&lt;li&gt;He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs "distros," development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences&lt;/li&gt;
&lt;li&gt;Serves as a good introduction you can show your Linux friends
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" target="_blank" rel="nofollow noopener"&gt;PCBSD CFT and weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Upgrade tools have gotten a major rewrite&lt;/li&gt;
&lt;li&gt;You have to help test it, there is no choice! Read more &lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;How dare Kris be "unimpressed with" freebsd-update and pkgng!?&lt;/li&gt;
&lt;li&gt;Various updates and fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s213KxUdVj" target="_blank" rel="nofollow noopener"&gt;Jeffrey writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20lwkjLVK" target="_blank" rel="nofollow noopener"&gt;Shane writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21DqJs77g" target="_blank" rel="nofollow noopener"&gt;Ferdinand writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20eXKEqJc" target="_blank" rel="nofollow noopener"&gt;Curtis writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21XMVFuVu" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20Xk05MHe" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, portmgr, ports, pkgng, packages, portsnap, make.conf, tinderbox, portlint, gnome, gnome 3, gnome-shell, omnibook, 800ct, ixsystems, pkgsrc, pkgsrccon, pushover, two factor authentication, bsdcan, 2014, dragonfly mail agent, dma, sendmail, postfix, ssmtp, flashrd, nylug, linux, differences, switching to bsd, presentation, lug, uug, bug, gnu, gpl, fsf, license, debate, nycbsdcon</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On today&#39;s show we have an interview with Joe Marcus Clark, one of the original portmgr members in FreeBSD, and one of the key GNOME porters. Keeping along with that topic, we have a FreeBSD ports tutorial for you as well. The latest news and answers to your BSD questions, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://multixden.blogspot.com/2014/02/tailoring-openbsd-for-old-strange.html" rel="nofollow">Tailoring OpenBSD for an old, strange computer</a></h3>

<ul>
<li>The author of this article had an <a href="http://hpmuseum.net/display_item.php?hw=233" rel="nofollow">OmniBook 800CT</a>, which comes with a pop-out mouse, black and white display, 32MB of RAM and a 133MHz CPU</li>
<li>Obviously he had to install some kind of BSD on it!</li>
<li>This post goes through all his efforts of trimming down OpenBSD to work on such a limited device</li>
<li>He goes through the trial and error of &quot;compile, break it, rebuild, try again&quot;</li>
<li>After cutting a lot out from the kernel, saving a precious megabyte here and there, he eventually gets it working
***</li>
</ul>

<h3><a href="http://www.pkgsrc.org/pkgsrcCon/2014/" rel="nofollow">pkgsrcCon and BSDCan</a></h3>

<ul>
<li>pkgsrccon is &quot;a technical conference for people working on the NetBSD Packages Collection, focusing on existing technologies, research projects, and works-in-progress in pkgsrc infrastructure&quot;</li>
<li>This year it will be on June 21st and 22nd</li>
<li>The <a href="http://www.pkgsrc.org/pkgsrcCon/2014/schedule.html" rel="nofollow">schedule</a> is still being worked out, so if you want to give a talk, submit it</li>
<li>BSDCan&#39;s <a href="https://www.bsdcan.org/2014/schedule/events.en.html" rel="nofollow">schedule</a> was also announced</li>
<li>We&#39;ll be having presentations about ARM on NetBSD and FreeBSD, PF on OpenBSD, Capsicum and casperd, ASLR in FreeBSD, more about migrating from Linux to BSD, FreeNAS stuff and much more</li>
<li>Kris&#39; presentation was accepted!</li>
<li>Tons of topics, look forward to the recorded versions of all of them hopefully!
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/login-pushover" rel="nofollow">Two factor auth with pushover</a></h3>

<ul>
<li>A new write-up from our friend <a href="http://www.bsdnow.tv/episodes/2014_02_05-time_signatures" rel="nofollow">Ted Unangst</a></li>
<li>Pushover is &quot;a web hook to smartphone push notification gateway&quot; - you sent a POST to a web server and it sends a code to your phone</li>
<li>His post goes through the steps of editing your login.conf and setting it all up to work</li>
<li>Now you can get a two factor authenticated login for ssh!
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140219085851" rel="nofollow">The status of GNOME 3 on BSD</a></h3>

<ul>
<li>It&#39;s no secret that the GNOME team is a Linux-obsessed bunch, almost to the point of being hostile towards other operating systems</li>
<li>OpenBSD keeps their GNOME 3 ports up to date very well, and Antoine Jacoutot writes about his work on that and how easy it is to use</li>
<li>This post goes through the process of how simple it is to get GNOME 3 set up on OpenBSD and even includes <a href="https://www.bsdfrog.org/tmp/undeadly-gnome.webm" rel="nofollow">a screencast</a></li>
<li>A few <a href="http://blogs.gnome.org/mclasen/2014/02/19/on-portability/" rel="nofollow">recent</a> <a href="http://blogs.gnome.org/desrt/2014/02/19/on-portability/" rel="nofollow">posts</a> from some GNOME developers show that they&#39;re finally working with the BSD guys to improve portability</li>
<li>The FreeBSD and OpenBSD teams are working together to bring the latest GNOME to all of us - it&#39;s a beautiful thing</li>
<li>This goes right along with our interview today!
***</li>
</ul>

<h2>Interview - Joe Marcus Clark - <a href="mailto:marcus@freebsd.org" rel="nofollow">marcus@freebsd.org</a></h2>

<p>The life and daily activities of portmgr, GNOME 3, Tinderbox, portlint, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ports" rel="nofollow">The FreeBSD Ports Collection</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://bugs.dragonflybsd.org/versions/4" rel="nofollow">DragonflyBSD 3.8 goals and 3.6.1 release</a></h3>

<ul>
<li>The Dragonfly team is thinking about what should be in version 3.8</li>
<li>On their bug tracker, it lists some of the things they&#39;d like to get done before then</li>
<li>In the meantime, <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-February/199294.html" rel="nofollow">3.6.1</a> was released with lots of bugfixes
***</li>
</ul>

<h3><a href="http://www.informit.com/blogs/blog.aspx?uk=NYCBSDCon-2014-Rocked-a-Cold-February-Weekend" rel="nofollow">NYCBSDCon 2014 wrap-up piece</a></h3>

<ul>
<li>We&#39;ve got a nice wrap-up titled &quot;NYCBSDCon 2014 Heats Up a Cold Winter Weekend&quot;</li>
<li>The author also interviews <a href="http://www.bsdnow.tv/episodes/2014_01_29-journaled_news_updates" rel="nofollow">GNN</a> about the conference</li>
<li>There&#39;s even a little &quot;beginner introduction&quot; to BSD segment</li>
<li>Includes a mention of the recently-launched journal and lots of pictures from the event
***</li>
</ul>

<h3><a href="https://www.youtube.com/watch?&v=5mv_oKFzACM#t=418" rel="nofollow">FreeBSD and Linux, a comparative analysis</a></h3>

<ul>
<li>GNN in yet another story - he gave a presentation at the NYLUG about the differences between FreeBSD and Linux</li>
<li>He mentions the history of BSD, the patch set and 386BSD, the lawsuit, philosophy and license differences, a complete system vs &quot;distros,&quot; development models, BSD-only features and technologies, how to become a committer, overall comparisons, different hats and roles, the different bsds and their goals and actual code differences</li>
<li>Serves as a good introduction you can show your Linux friends
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/call-for-testers-new-major-upgrade-methodology/" rel="nofollow">PCBSD CFT and weekly digest</a></h3>

<ul>
<li>Upgrade tools have gotten a major rewrite</li>
<li>You have to help test it, there is no choice! Read more <a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-18/" rel="nofollow">here</a></li>
<li>How dare Kris be &quot;unimpressed with&quot; freebsd-update and pkgng!?</li>
<li>Various updates and fixes
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s213KxUdVj" rel="nofollow">Jeffrey writes in</a></li>
<li><a href="http://slexy.org/view/s20lwkjLVK" rel="nofollow">Shane writes in</a></li>
<li><a href="http://slexy.org/view/s21DqJs77g" rel="nofollow">Ferdinand writes in</a></li>
<li><a href="http://slexy.org/view/s20eXKEqJc" rel="nofollow">Curtis writes in</a></li>
<li><a href="http://slexy.org/view/s21XMVFuVu" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20Xk05MHe" rel="nofollow">Peter writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>25: A Sixth pfSense</title>
  <link>https://www.bsdnow.tv/25</link>
  <guid isPermaLink="false">dad040a2-8866-4876-88fb-43b036b3e691</guid>
  <pubDate>Wed, 19 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/dad040a2-8866-4876-88fb-43b036b3e691.mp3" length="48903556" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:07:55</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We have a packed show for you this week! We'll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We'll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" target="_blank" rel="nofollow noopener"&gt;EuroBSDCon and AsiaBSDCon&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year, EuroBSDCon will be in September in Sofia, Bulgaria&lt;/li&gt;
&lt;li&gt;They've got a call for papers up now, so everyone can submit the talks they want to present&lt;/li&gt;
&lt;li&gt;There will also be a tutorial section of the conference&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://2014.asiabsdcon.org/timetable.html.en" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon&lt;/a&gt; will be next month, in March!&lt;/li&gt;
&lt;li&gt;All the info about the registration, tutorials, hotels, timetable and location have been posted&lt;/li&gt;
&lt;li&gt;Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://rtfm.net/FreeBSD/ERL/" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 on Ubiquiti EdgeRouter Lite&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU&lt;/li&gt;
&lt;li&gt;This article goes through the process of installing and configuring FreeBSD on it to use as a home router&lt;/li&gt;
&lt;li&gt;Lots of good pictures of the hardware and specific details needed to get you set up&lt;/li&gt;
&lt;li&gt;It also includes the scripts to create your own images if you don't want to use the ones rolled by someone else&lt;/li&gt;
&lt;li&gt;For such a cheap price, might be a really fun weekend project to replace your shitty consumer router&lt;/li&gt;
&lt;li&gt;Of course if you're more of an OpenBSD guy, you can always see &lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;our tutorial&lt;/a&gt; for that too
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.saveosx.org/signed-packages/" target="_blank" rel="nofollow noopener"&gt;Signed pkgsrc package guide&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up&lt;/li&gt;
&lt;li&gt;It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)&lt;/li&gt;
&lt;li&gt;He goes through the process of signing packages with a public key and how to verify the packages when you install them&lt;/li&gt;
&lt;li&gt;The author also happens to be an EdgeBSD developer
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140212083627" target="_blank" rel="nofollow noopener"&gt;Big batch of OpenBSD hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140213065843" target="_blank" rel="nofollow noopener"&gt;the second&lt;/a&gt;, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140213173808" target="_blank" rel="nofollow noopener"&gt;the third&lt;/a&gt;, jsg updated libdrm and mesa and did various work on xenocara&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140214070023" target="_blank" rel="nofollow noopener"&gt;the fourth&lt;/a&gt;, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he's done&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140214130039" target="_blank" rel="nofollow noopener"&gt;the fifth&lt;/a&gt;, claudio talks about some stuff he did for routing tables and misc. other things
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Chris Buechler - &lt;a href="mailto:cmb@pfsense.com" target="_blank" rel="nofollow noopener"&gt;cmb@pfsense.com&lt;/a&gt; / &lt;a href="https://twitter.com/cbuechler" target="_blank" rel="nofollow noopener"&gt;@cbuechler&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;pfSense&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;pfSense walkthrough&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" target="_blank" rel="nofollow noopener"&gt;FreeBSD challenge continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy from the Linux foundation continues his switching to BSD journey&lt;/li&gt;
&lt;li&gt;In day 13, he covers some tips for new users, mentions trying things out in a VM first&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" target="_blank" rel="nofollow noopener"&gt;day 14&lt;/a&gt;, he starts setting up XFCE and X11, feels like he's starting over as a new Linux user learning the ropes again - concludes that ports are the way to go&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" target="_blank" rel="nofollow noopener"&gt;day 15&lt;/a&gt;, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" target="_blank" rel="nofollow noopener"&gt;day 16&lt;/a&gt;, he dives into the world of &lt;a href="http://www.bsdnow.tv/tutorials/jails" target="_blank" rel="nofollow noopener"&gt;FreeBSD jails&lt;/a&gt;!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/1962" target="_blank" rel="nofollow noopener"&gt;BSD books in 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSD books are some of the highest quality technical writings available, and MWL has written a good number of them&lt;/li&gt;
&lt;li&gt;In this post, he details some of his plans for 2014&lt;/li&gt;
&lt;li&gt;In includes at least one OpenBSD book, at least one FreeBSD book and...&lt;/li&gt;
&lt;li&gt;Very strong possibility of Absolute FreeBSD 3rd edition (watch &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;our interview with him&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Check the link for all the details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" target="_blank" rel="nofollow noopener"&gt;How to build FreeBSD/EC2 images&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our friend &lt;a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" target="_blank" rel="nofollow noopener"&gt;Colin Percival&lt;/a&gt; details how to build EC2 images in a new blog post&lt;/li&gt;
&lt;li&gt;Most people just use the images he makes on their instances, but some people will want to make their own &lt;a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" target="_blank" rel="nofollow noopener"&gt;from scratch&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;You build a regular disk image and then turn it into an AMI&lt;/li&gt;
&lt;li&gt;It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This time around we discuss how you can become a developer&lt;/li&gt;
&lt;li&gt;Kris also details the length of supported releases&lt;/li&gt;
&lt;li&gt;Expect lots of new features in 10.1
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s216xJoCVG" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2gLrR3VVf" target="_blank" rel="nofollow noopener"&gt;Jake writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gfG3Iho" target="_blank" rel="nofollow noopener"&gt;Niclas writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JNyw5BCn" target="_blank" rel="nofollow noopener"&gt;Steffan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2kg3zoRfm" target="_blank" rel="nofollow noopener"&gt;Antonio writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2ZwSIfRjm" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, pfsense, pf, firewall, gateway, router, hangout, webui, web interface, php, ipfw, ipfilter, gateway, graphs, bandwidth, edgerouter, edgerouter lite, eurobsdcon, eurobsdcon2014, edge router, 2014, books, michael w lucas, freebsd journal, fosdem, asiabsdcon, mips, hackathon, new zealand, pkgsrc, signed packages, edgebsd, smp, ec2, amazon, images, instance, build, custom</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We have a packed show for you this week! We&#39;ll sit down for an interview with Chris Buechler, from the pfSense project, to learn just how easy it can be to deploy a BSD firewall. We&#39;ll also be showing you a walkthrough of the pfSense interface so you can get an idea of just how convenient and powerful it is. Answers to your questions and the latest headlines, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://2014.eurobsdcon.org/calendar/call-for-papers/" rel="nofollow">EuroBSDCon and AsiaBSDCon</a></h3>

<ul>
<li>This year, EuroBSDCon will be in September in Sofia, Bulgaria</li>
<li>They&#39;ve got a call for papers up now, so everyone can submit the talks they want to present</li>
<li>There will also be a tutorial section of the conference</li>
<li><a href="http://2014.asiabsdcon.org/timetable.html.en" rel="nofollow">AsiaBSDCon</a> will be next month, in March!</li>
<li>All the info about the registration, tutorials, hotels, timetable and location have been posted</li>
<li>Check the link for all the details on the talks - if you plan on going to Tokyo next month, hang out with Allan and Kris and lots of BSD developers!
***</li>
</ul>

<h3><a href="http://rtfm.net/FreeBSD/ERL/" rel="nofollow">FreeBSD 10 on Ubiquiti EdgeRouter Lite</a></h3>

<ul>
<li>The Ubiquiti EdgeRouter Lite is a router that costs less than $100 and has a MIPS CPU</li>
<li>This article goes through the process of installing and configuring FreeBSD on it to use as a home router</li>
<li>Lots of good pictures of the hardware and specific details needed to get you set up</li>
<li>It also includes the scripts to create your own images if you don&#39;t want to use the ones rolled by someone else</li>
<li>For such a cheap price, might be a really fun weekend project to replace your shitty consumer router</li>
<li>Of course if you&#39;re more of an OpenBSD guy, you can always see <a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">our tutorial</a> for that too
***</li>
</ul>

<h3><a href="http://blog.saveosx.org/signed-packages/" rel="nofollow">Signed pkgsrc package guide</a></h3>

<ul>
<li>We got a request on IRC for more pkgsrc stuff on the show, and a listener provided a nice write-up</li>
<li>It shows you how to set up signed packages with pkgsrc, which works on quite a few OSes (not just NetBSD)</li>
<li>He goes through the process of signing packages with a public key and how to verify the packages when you install them</li>
<li>The author also happens to be an EdgeBSD developer
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140212083627" rel="nofollow">Big batch of OpenBSD hackathon reports</a></h3>

<ul>
<li>Five trip reports from the OpenBSD hackathon in New Zealand! In the first one, jmatthew details his work on fiber channel controller drivers, some octeon USB work and ARM fixes for AHCI</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213065843" rel="nofollow">the second</a>, ketennis gets into his work with running interrupt handlers without holding the kernel lock, some SPARC64 improvements and a few other things</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140213173808" rel="nofollow">the third</a>, jsg updated libdrm and mesa and did various work on xenocara</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214070023" rel="nofollow">the fourth</a>, dlg came with the intention to improve SMP support, but got distracted and did SCSI stuff instead - but he talks a little bit about the struggle OpenBSD has with SMP and some of the work he&#39;s done</li>
<li>In <a href="http://undeadly.org/cgi?action=article&sid=20140214130039" rel="nofollow">the fifth</a>, claudio talks about some stuff he did for routing tables and misc. other things
***</li>
</ul>

<h2>Interview - Chris Buechler - <a href="mailto:cmb@pfsense.com" rel="nofollow">cmb@pfsense.com</a> / <a href="https://twitter.com/cbuechler" rel="nofollow">@cbuechler</a></h2>

<p>pfSense</p>

<hr>

<h2>Tutorial</h2>

<h3>pfSense walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/13/freebsd-challenge-day-13-30/" rel="nofollow">FreeBSD challenge continues</a></h3>

<ul>
<li>Our buddy from the Linux foundation continues his switching to BSD journey</li>
<li>In day 13, he covers some tips for new users, mentions trying things out in a VM first</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-14-30/" rel="nofollow">day 14</a>, he starts setting up XFCE and X11, feels like he&#39;s starting over as a new Linux user learning the ropes again - concludes that ports are the way to go</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/14/freebsd-challenge-day-15-30/" rel="nofollow">day 15</a>, he finishes up his XFCE configuration and details different versions of ports with different names, as well as learns how to apply his first patch</li>
<li>In <a href="http://www.thelinuxcauldron.com/2014/02/17/freebsd-challenge-day-16-30/" rel="nofollow">day 16</a>, he dives into the world of <a href="http://www.bsdnow.tv/tutorials/jails" rel="nofollow">FreeBSD jails</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1962" rel="nofollow">BSD books in 2014</a></h3>

<ul>
<li>BSD books are some of the highest quality technical writings available, and MWL has written a good number of them</li>
<li>In this post, he details some of his plans for 2014</li>
<li>In includes at least one OpenBSD book, at least one FreeBSD book and...</li>
<li>Very strong possibility of Absolute FreeBSD 3rd edition (watch <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">our interview with him</a>)</li>
<li>Check the link for all the details
***</li>
</ul>

<h3><a href="http://www.daemonology.net/blog/2014-02-16-FreeBSD-EC2-build.html" rel="nofollow">How to build FreeBSD/EC2 images</a></h3>

<ul>
<li>Our friend <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a> details how to build EC2 images in a new blog post</li>
<li>Most people just use the images he makes on their instances, but some people will want to make their own <a href="https://svnweb.freebsd.org/base/user/cperciva/EC2-build/" rel="nofollow">from scratch</a></li>
<li>You build a regular disk image and then turn it into an AMI</li>
<li>It requires a couple ports be installed on your system, but the whole process is pretty straightforward
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-17/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>This time around we discuss how you can become a developer</li>
<li>Kris also details the length of supported releases</li>
<li>Expect lots of new features in 10.1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s216xJoCVG" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s2gLrR3VVf" rel="nofollow">Jake writes in</a></li>
<li><a href="http://slexy.org/view/s21gfG3Iho" rel="nofollow">Niclas writes in</a></li>
<li><a href="http://slexy.org/view/s2JNyw5BCn" rel="nofollow">Steffan writes in</a></li>
<li><a href="http://slexy.org/view/s2kg3zoRfm" rel="nofollow">Antonio writes in</a></li>
<li><a href="http://slexy.org/view/s2ZwSIfRjm" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>24: The Cluster &amp; The Cloud</title>
  <link>https://www.bsdnow.tv/24</link>
  <guid isPermaLink="false">4472f6f6-5fb3-4ee9-b20c-04e927cf1299</guid>
  <pubDate>Wed, 12 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/4472f6f6-5fb3-4ee9-b20c-04e927cf1299.mp3" length="50214172" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:09:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on BSD Now... a wrap-up from NYCBSDCon! We'll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it's BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10 as a firewall&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead&lt;/li&gt;
&lt;li&gt;Now, with the release of 10.0, he's apparently changed his mind and switched back over&lt;/li&gt;
&lt;li&gt;It mentions the SMP version of pf, general performance advantages and more modern features&lt;/li&gt;
&lt;li&gt;The author is a regular listener of BSD Now, hi Joe!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" target="_blank" rel="nofollow noopener"&gt;Network Noise Reduction Using Free Tools&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD&lt;/li&gt;
&lt;li&gt;Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD's spamd and other security features to combat spam and malware&lt;/li&gt;
&lt;li&gt;He goes through his experiences with content filtering and disappointment with a certain proprietary vendor&lt;/li&gt;
&lt;li&gt;Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" target="_blank" rel="nofollow noopener"&gt;FreeBSD ASLR patches submitted&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;So far, FreeBSD hasn't had Address Space Layout Randomization&lt;/li&gt;
&lt;li&gt;ASLR is a nice security feature, &lt;a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" target="_blank" rel="nofollow noopener"&gt;see wikipedia&lt;/a&gt; for more information&lt;/li&gt;
&lt;li&gt;With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)&lt;/li&gt;
&lt;li&gt;We might have Shawn on the show to talk about it, but he's also giving a presentation at BSDCan about his work with ASLR
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" target="_blank" rel="nofollow noopener"&gt;Old-style pkg_ tools retired&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;At last the old pkg_add tools are being retired in FreeBSD&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng&lt;/a&gt; is a huge improvement, and now portmgr@ thinks it's time to cut the cord on the legacy toolset&lt;/li&gt;
&lt;li&gt;Ports aren't going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go&lt;/li&gt;
&lt;li&gt;All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Luke Marsden - &lt;a href="mailto:luke@hybridcluster.com" target="_blank" rel="nofollow noopener"&gt;luke@hybridcluster.com&lt;/a&gt; / &lt;a href="https://twitter.com/lmarsden" target="_blank" rel="nofollow noopener"&gt;@lmarsden&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BSD at HybridCluster&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/chroot-sftp" target="_blank" rel="nofollow noopener"&gt;Filesharing with chrooted SFTP&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://pellaeon.github.io/bsd-cloudinit/" target="_blank" rel="nofollow noopener"&gt;FreeBSD on OpenStack&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;a href="https://en.wikipedia.org/wiki/OpenStack" target="_blank" rel="nofollow noopener"&gt;OpenStack&lt;/a&gt; is a cloud computing project&lt;/li&gt;
&lt;li&gt;It consists of "a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API."&lt;/li&gt;
&lt;li&gt;Until now, there wasn't a good way to run a full BSD instance on OpenStack&lt;/li&gt;
&lt;li&gt;With a project in the vein of &lt;a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" target="_blank" rel="nofollow noopener"&gt;Colin Percival&lt;/a&gt;'s AWS startup scripts, now that's no longer the case! 
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://fosdem.org/2014/schedule/track/bsd/" target="_blank" rel="nofollow noopener"&gt;FOSDEM BSD videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This year's FOSDEM had seven BSD presentations&lt;/li&gt;
&lt;li&gt;The videos are &lt;a href="https://video.fosdem.org/2014/" target="_blank" rel="nofollow noopener"&gt;slowly being uploaded&lt;/a&gt; for your viewing pleasure&lt;/li&gt;
&lt;li&gt;Not all of the BSD ones are up yet, but by the time you're watching this they might be!&lt;/li&gt;
&lt;li&gt;Check &lt;a href="https://video.fosdem.org/2014/AW1121/Saturday/" target="_blank" rel="nofollow noopener"&gt;this directory&lt;/a&gt; for most of 'em&lt;/li&gt;
&lt;li&gt;The BSD dev room was full, lots of interest in what's going on from the other communities
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge finally returns!&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Due to prodding from a certain guy of a certain podcast, the "FreeBSD Challenge" series has finally resumed&lt;/li&gt;
&lt;li&gt;Our friend from the Linux foundation picks up with &lt;a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" target="_blank" rel="nofollow noopener"&gt;day 11&lt;/a&gt; and &lt;a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" target="_blank" rel="nofollow noopener"&gt;day 12&lt;/a&gt; on his switching from Linux journey&lt;/li&gt;
&lt;li&gt;This time he outlines the upgrade process of going from 9 to 10, using freebsd-update&lt;/li&gt;
&lt;li&gt;There's also some notes about different options for upgrading ports and some extra tips
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while&lt;/li&gt;
&lt;li&gt;During their "fine tuning phase" users are encouraged to submit any and all bugs via the trac system&lt;/li&gt;
&lt;li&gt;Warden got some fixes and the package manager got some updates as well&lt;/li&gt;
&lt;li&gt;Huge size reduction in PBI format
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21nbJKYmb" target="_blank" rel="nofollow noopener"&gt;Derrick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yhziVsBP" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20PuccWbo" target="_blank" rel="nofollow noopener"&gt;Patrick writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s22PL0SbUO" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20dkbjuOK" target="_blank" rel="nofollow noopener"&gt;Sean writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, cluster, cloud, cloud computing, hybridcluster, jails, scaling, virtualization, zfs, big data, provisioning, webhosting, instances, web hosting, chroot, sftp, filesharing, file sharing, shell, linux, switching to bsd, linux user, smp, pkg_add, pkg, pkgng, binary packages, openstack, open stack, httperf, performance, http, vpn, nycbsdcon, nycbug, nyc, conference, convention, talks, presentation, keynote, ssh</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on BSD Now... a wrap-up from NYCBSDCon! We&#39;ll also be talking to Luke Marsden, CEO of HybridCluster, about how they use BSD at large. Following that, our tutorial will show you how to securely share files with SFTP in a chroot. The latest news and answers to your questions, of course it&#39;s BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://www.pantz.org/software/pf/use_freebsd_10_as_a_pf_firewall.html" rel="nofollow">FreeBSD 10 as a firewall</a></h3>

<ul>
<li>Back in 2012, the author of this site wrote an article stating you should avoid FreeBSD 9 for a firewall and use OpenBSD instead</li>
<li>Now, with the release of 10.0, he&#39;s apparently changed his mind and switched back over</li>
<li>It mentions the SMP version of pf, general performance advantages and more modern features</li>
<li>The author is a regular listener of BSD Now, hi Joe!
***</li>
</ul>

<h3><a href="http://bsdly.blogspot.com/2014/02/effective-spam-and-malware.html" rel="nofollow">Network Noise Reduction Using Free Tools</a></h3>

<ul>
<li>Really long blog post, based on a BSDCan presentation, about fighting spam with OpenBSD</li>
<li>Peter Hansteen, author of the book of PF, goes through how he uses OpenBSD&#39;s spamd and other security features to combat spam and malware</li>
<li>He goes through his experiences with content filtering and disappointment with a certain proprietary vendor</li>
<li>Not totally BSD-specific, lots of people can enjoy the article - lots of virus history as well
***</li>
</ul>

<h3><a href="http://0xfeedface.org/blog/lattera/2014-02-02/freebsd-aslr-patch-submitted-upstream" rel="nofollow">FreeBSD ASLR patches submitted</a></h3>

<ul>
<li>So far, FreeBSD hasn&#39;t had Address Space Layout Randomization</li>
<li>ASLR is a nice security feature, <a href="https://en.wikipedia.org/wiki/Address_space_layout_randomization" rel="nofollow">see wikipedia</a> for more information</li>
<li>With a giant patch from Shawn Webb, it might be integrated into a future version (after a vicious review from the security team of course)</li>
<li>We might have Shawn on the show to talk about it, but he&#39;s also giving a presentation at BSDCan about his work with ASLR
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2014/02/03/time-to-bid-farewell-to-the-old-pkg_-tools/" rel="nofollow">Old-style pkg_ tools retired</a></h3>

<ul>
<li>At last the old pkg_add tools are being retired in FreeBSD</li>
<li><a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> is a huge improvement, and now portmgr@ thinks it&#39;s time to cut the cord on the legacy toolset</li>
<li>Ports aren&#39;t going away, and probably never will, but for binary package fans and new users that are used to things like apt, pkgng is the way to go</li>
<li>All pkg_ tools will be considered unsupported on September 1, 2014 - even on older branches
***</li>
</ul>

<h2>Interview - Luke Marsden - <a href="mailto:luke@hybridcluster.com" rel="nofollow">luke@hybridcluster.com</a> / <a href="https://twitter.com/lmarsden" rel="nofollow">@lmarsden</a></h2>

<p>BSD at HybridCluster</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/chroot-sftp" rel="nofollow">Filesharing with chrooted SFTP</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://pellaeon.github.io/bsd-cloudinit/" rel="nofollow">FreeBSD on OpenStack</a></h3>

<ul>
<li><a href="https://en.wikipedia.org/wiki/OpenStack" rel="nofollow">OpenStack</a> is a cloud computing project</li>
<li>It consists of &quot;a series of interrelated projects that control pools of processing, storage, and networking resources throughout a datacenter, able to be managed or provisioned through a web-based dashboard, command-line tools, or a RESTful API.&quot;</li>
<li>Until now, there wasn&#39;t a good way to run a full BSD instance on OpenStack</li>
<li>With a project in the vein of <a href="http://www.bsdnow.tv/episodes/2014_01_22-tendresse_for_ten" rel="nofollow">Colin Percival</a>&#39;s AWS startup scripts, now that&#39;s no longer the case! 
***</li>
</ul>

<h3><a href="https://fosdem.org/2014/schedule/track/bsd/" rel="nofollow">FOSDEM BSD videos</a></h3>

<ul>
<li>This year&#39;s FOSDEM had seven BSD presentations</li>
<li>The videos are <a href="https://video.fosdem.org/2014/" rel="nofollow">slowly being uploaded</a> for your viewing pleasure</li>
<li>Not all of the BSD ones are up yet, but by the time you&#39;re watching this they might be!</li>
<li>Check <a href="https://video.fosdem.org/2014/AW1121/Saturday/" rel="nofollow">this directory</a> for most of &#39;em</li>
<li>The BSD dev room was full, lots of interest in what&#39;s going on from the other communities
***</li>
</ul>

<h3><a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-returns-day-11-30/" rel="nofollow">The FreeBSD challenge finally returns!</a></h3>

<ul>
<li>Due to prodding from a certain guy of a certain podcast, the &quot;FreeBSD Challenge&quot; series has finally resumed</li>
<li>Our friend from the Linux foundation picks up with <a href="http://www.thelinuxcauldron.com/2014/02/05/freebsd-challenge-day-11-30/" rel="nofollow">day 11</a> and <a href="http://www.thelinuxcauldron.com/2014/02/09/freebsd-challenge-day-12-30/" rel="nofollow">day 12</a> on his switching from Linux journey</li>
<li>This time he outlines the upgrade process of going from 9 to 10, using freebsd-update</li>
<li>There&#39;s also some notes about different options for upgrading ports and some extra tips
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/02/pc-bsd-weekly-feature-digest-16/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>After the big 10.0 release, the PCBSD crew is focusing on bug fixes for a while</li>
<li>During their &quot;fine tuning phase&quot; users are encouraged to submit any and all bugs via the trac system</li>
<li>Warden got some fixes and the package manager got some updates as well</li>
<li>Huge size reduction in PBI format
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21nbJKYmb" rel="nofollow">Derrick writes in</a></li>
<li><a href="http://slexy.org/view/s2yhziVsBP" rel="nofollow">Sean writes in</a></li>
<li><a href="http://slexy.org/view/s20PuccWbo" rel="nofollow">Patrick writes in</a></li>
<li><a href="http://slexy.org/view/s22PL0SbUO" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s20dkbjuOK" rel="nofollow">Sean writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>23: Time Signatures</title>
  <link>https://www.bsdnow.tv/23</link>
  <guid isPermaLink="false">d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6</guid>
  <pubDate>Wed, 05 Feb 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9e9eb7a-e7aa-4029-8881-05cc5f75e8b6.mp3" length="54539109" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:15:44</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;On this week's episode, we'll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we've got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation's 2013 fundraising results&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation finally counted all the money they made in 2013&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;$768,562 from 1659 donors&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Nice little blog post from the team with a giant beastie picture&lt;/li&gt;
&lt;li&gt;"We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon."&lt;/li&gt;
&lt;li&gt;A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned the CFT last week, and it's &lt;a href="https://news.ycombinator.com/item?id=7154925" target="_blank" rel="nofollow noopener"&gt;finally here&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein's Curve25519 (now the default when both clients support it)&lt;/li&gt;
&lt;li&gt;Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA&lt;/li&gt;
&lt;li&gt;Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes &lt;a href="http://slexy.org/view/s2rI13v8F4" target="_blank" rel="nofollow noopener"&gt;can't even attempt to login&lt;/a&gt; lol~&lt;/li&gt;
&lt;li&gt;New bcrypt private key type, 500,000,000 times harder to brute force&lt;/li&gt;
&lt;li&gt;Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one&lt;/li&gt;
&lt;li&gt;Portable version &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261320" target="_blank" rel="nofollow noopener"&gt;already in&lt;/a&gt; FreeBSD -CURRENT, &lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;sortby=date&amp;amp;revision=342618" target="_blank" rel="nofollow noopener"&gt;and ports&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lots more bugfixes and features, see the full release note or &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;our interview&lt;/a&gt; with Damien&lt;/li&gt;
&lt;li&gt;Work has already started on 6.6, which &lt;a href="https://twitter.com/msfriedl/status/427902493176377344" target="_blank" rel="nofollow noopener"&gt;can be used without OpenSSL&lt;/a&gt;!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/1942" target="_blank" rel="nofollow noopener"&gt;Crazed Ferrets in a Berkeley Shower&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In 2000, &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;MWL&lt;/a&gt; wrote an essay for linux.com about why he uses the BSD license: "It’s actually stood up fairly well to the test of time, but it’s fourteen years old now."&lt;/li&gt;
&lt;li&gt;This is basically an updated version about why he uses the BSD license, in response to recent &lt;a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" target="_blank" rel="nofollow noopener"&gt;comments from Richard Stallman&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL&lt;/li&gt;
&lt;li&gt;Check out the full post if you're one of those people that gets into license arguments&lt;/li&gt;
&lt;li&gt;The takeaway is "BSD is about making the world a better place. For everyone."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" target="_blank" rel="nofollow noopener"&gt;OpenBSD on BeagleBone Black&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi&lt;/li&gt;
&lt;li&gt;A blog post about installing OpenBSD on a BBB from.. our guest for today!&lt;/li&gt;
&lt;li&gt;He describes it as "everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black"&lt;/li&gt;
&lt;li&gt;It goes through the whole process, details different storage options and some workarounds&lt;/li&gt;
&lt;li&gt;Could be a really fun weekend project if you're interested in small or embedded devices
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Ted Unangst - &lt;a href="mailto:tedu@openbsd.org" target="_blank" rel="nofollow noopener"&gt;tedu@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/tedunangst" target="_blank" rel="nofollow noopener"&gt;@tedunangst&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenBSD's &lt;a href="http://www.tedunangst.com/flak/post/signify" target="_blank" rel="nofollow noopener"&gt;signify&lt;/a&gt; infrastructure, ZFS on OpenBSD&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ntpd" target="_blank" rel="nofollow noopener"&gt;Running an NTP server&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" target="_blank" rel="nofollow noopener"&gt;Getting started with FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new video and blog series about starting out with FreeBSD&lt;/li&gt;
&lt;li&gt;The author has been a fan since the 90s and has installed it on every server he's worked with&lt;/li&gt;
&lt;li&gt;He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users&lt;/li&gt;
&lt;li&gt;The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140204080515" target="_blank" rel="nofollow noopener"&gt;More OpenBSD hackathon reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience&lt;/li&gt;
&lt;li&gt;He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work&lt;/li&gt;
&lt;li&gt;This summary goes into detail about all the stuff he got done there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=261266" target="_blank" rel="nofollow noopener"&gt;X11 in a jail&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We've gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!&lt;/li&gt;
&lt;li&gt;A new tunable option will let jails access /dev/kmem and similar device nodes&lt;/li&gt;
&lt;li&gt;Along with a change to DRM, this allows full X11 in a jail&lt;/li&gt;
&lt;li&gt;Be sure to check out our &lt;a href="http://www.bsdnow.tv/tutorials" target="_blank" rel="nofollow noopener"&gt;jail tutorial and jailed VNC tutorial&lt;/a&gt; for ideas
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;10.0 "Joule Edition" &lt;a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" target="_blank" rel="nofollow noopener"&gt;finally released&lt;/a&gt;!&lt;/li&gt;
&lt;li&gt;AMD graphics are now officially supported&lt;/li&gt;
&lt;li&gt;GNOME3, MATE and Cinnamon desktops are available&lt;/li&gt;
&lt;li&gt;Grub updates and fixes&lt;/li&gt;
&lt;li&gt;PCBSD also &lt;a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" target="_blank" rel="nofollow noopener"&gt;got a mention in eweek&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21VnbKZsH" target="_blank" rel="nofollow noopener"&gt;Justin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2nD7RF6bo" target="_blank" rel="nofollow noopener"&gt;Daniel writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2jwRrj7UV" target="_blank" rel="nofollow noopener"&gt;Martin writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s201koMD2c" target="_blank" rel="nofollow noopener"&gt;Alex writes in&lt;/a&gt; - &lt;a href="http://people.freebsd.org/%7Egjb/RPI/" target="_blank" rel="nofollow noopener"&gt;unofficial FreeBSD RPI Images&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2AntZmtRU" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20bGjMsIQ" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, security, gpg, gnupg, signed, packages, iso, set, patches, ted unangst, verify, verification, digital signature, ed25519, chacha20, license, debate, gnu, gpl, general public license, copyleft, copyfree, free software, open source, rms, richard stallman, clang, llvm, cddl, linux, gplv2, gplv3, ntp, ntpd, openntpd, isc, network time protocol, server, ssh, openssh, 6.5, foundation, donations, gcm, aes, aes-gcm, hmac, arm, armv7, beaglebone, black, serial, tty, zol, leaseweb, zfsonlinux, ecc</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this week&#39;s episode, we&#39;ll be talking with Ted Unangst of the OpenBSD team about their new signing infrastructure. After that, we&#39;ve got a tutorial on how to run your own NTP server. News, your feedback and even... the winner of our tutorial contest will be announced! So stay tuned to BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2014/01/freebsd-foundation-announces-2013.html" rel="nofollow">FreeBSD foundation&#39;s 2013 fundraising results</a></h3>

<ul>
<li>The FreeBSD foundation finally counted all the money they made in 2013</li>
<li><strong>$768,562 from 1659 donors</strong></li>
<li>Nice little blog post from the team with a giant beastie picture</li>
<li>&quot;We have already started our 2014 fundraising efforts. As of the end of January we are just under $40,000. Our goal is to raise $1,000,000. We are currently finalizing our 2014 budget. We plan to publish both our 2013 financial report and our 2014 budget soon.&quot;</li>
<li>A special thanks to all the BSD Now listeners that contributed, the foundation was really glad that we sent some people their way (and they mentioned us on Facebook)
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/032152.html" rel="nofollow">OpenSSH 6.5 released</a></h3>

<ul>
<li>We mentioned the CFT last week, and it&#39;s <a href="https://news.ycombinator.com/item?id=7154925" rel="nofollow">finally here</a>!</li>
<li>New key exchange using elliptic-curve Diffie Hellman in Daniel Bernstein&#39;s Curve25519 (now the default when both clients support it)</li>
<li>Ed25519 public keys are now available for host keys and user keys, considered more secure than DSA and ECDSA</li>
<li>Funny side effect: if you ONLY enable ed25519 host keys, all the compromised Linux boxes <a href="http://slexy.org/view/s2rI13v8F4" rel="nofollow">can&#39;t even attempt to login</a> lol~</li>
<li>New bcrypt private key type, 500,000,000 times harder to brute force</li>
<li>Chacha20-poly1305 transport cipher that builds an encrypted and authenticated stream in one</li>
<li>Portable version <a href="https://svnweb.freebsd.org/base?view=revision&revision=261320" rel="nofollow">already in</a> FreeBSD -CURRENT, <a href="https://svnweb.freebsd.org/ports?view=revision&sortby=date&revision=342618" rel="nofollow">and ports</a></li>
<li>Lots more bugfixes and features, see the full release note or <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">our interview</a> with Damien</li>
<li>Work has already started on 6.6, which <a href="https://twitter.com/msfriedl/status/427902493176377344" rel="nofollow">can be used without OpenSSL</a>!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1942" rel="nofollow">Crazed Ferrets in a Berkeley Shower</a></h3>

<ul>
<li>In 2000, <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">MWL</a> wrote an essay for linux.com about why he uses the BSD license: &quot;It’s actually stood up fairly well to the test of time, but it’s fourteen years old now.&quot;</li>
<li>This is basically an updated version about why he uses the BSD license, in response to recent <a href="http://gcc.gnu.org/ml/gcc/2014-01/msg00247.html" rel="nofollow">comments from Richard Stallman</a></li>
<li>Very nice post that gives some history about Berkeley, the basics of the BSD-style licenses and their contrast to the GNU GPL</li>
<li>Check out the full post if you&#39;re one of those people that gets into license arguments</li>
<li>The takeaway is &quot;BSD is about making the world a better place. For everyone.&quot;
***</li>
</ul>

<h3><a href="http://www.tedunangst.com/flak/post/OpenBSD-on-BeagleBone-Black" rel="nofollow">OpenBSD on BeagleBone Black</a></h3>

<ul>
<li>Beaglebone Blacks are cheap little ARM devices similar to a Raspberry Pi</li>
<li>A blog post about installing OpenBSD on a BBB from.. our guest for today!</li>
<li>He describes it as &quot;everything I wish I knew before installing the newly renamed armv7 port on a BeagleBone Black&quot;</li>
<li>It goes through the whole process, details different storage options and some workarounds</li>
<li>Could be a really fun weekend project if you&#39;re interested in small or embedded devices
***</li>
</ul>

<h2>Interview - Ted Unangst - <a href="mailto:tedu@openbsd.org" rel="nofollow">tedu@openbsd.org</a> / <a href="https://twitter.com/tedunangst" rel="nofollow">@tedunangst</a></h2>

<p>OpenBSD&#39;s <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">signify</a> infrastructure, ZFS on OpenBSD</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ntpd" rel="nofollow">Running an NTP server</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://smyck.net/2014/02/01/getting-started-with-freebsd/" rel="nofollow">Getting started with FreeBSD</a></h3>

<ul>
<li>A new video and blog series about starting out with FreeBSD</li>
<li>The author has been a fan since the 90s and has installed it on every server he&#39;s worked with</li>
<li>He mentioned some of the advantages of BSD over Linux and how to approach explaining them to new users</li>
<li>The first video is the installation, then he goes on to packages and other topics - 4 videos so far
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140204080515" rel="nofollow">More OpenBSD hackathon reports</a></h3>

<ul>
<li>As a followup to last week, this time Kenneth Westerback writes about his NZ hackathon experience</li>
<li>He arrived with two goals: disklabel fixes for drives with 4k sectors and some dhclient work</li>
<li>This summary goes into detail about all the stuff he got done there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=261266" rel="nofollow">X11 in a jail</a></h3>

<ul>
<li>We&#39;ve gotten at least one feedback email about running X in a jail Well.. with this commit, looks like now you can!</li>
<li>A new tunable option will let jails access /dev/kmem and similar device nodes</li>
<li>Along with a change to DRM, this allows full X11 in a jail</li>
<li>Be sure to check out our <a href="http://www.bsdnow.tv/tutorials" rel="nofollow">jail tutorial and jailed VNC tutorial</a> for ideas
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/whoami-im-pc-bsd-10-0-weekly-feature-digest-15/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 &quot;Joule Edition&quot; <a href="http://blog.pcbsd.org/2014/01/pc-bsd-10-0-release-is-now-available/" rel="nofollow">finally released</a>!</li>
<li>AMD graphics are now officially supported</li>
<li>GNOME3, MATE and Cinnamon desktops are available</li>
<li>Grub updates and fixes</li>
<li>PCBSD also <a href="http://www.eweek.com/enterprise-apps/slideshows/freebsd-open-source-os-comes-to-the-pc-bsd-desktop.html" rel="nofollow">got a mention in eweek</a>
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21VnbKZsH" rel="nofollow">Justin writes in</a></li>
<li><a href="http://slexy.org/view/s2nD7RF6bo" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2jwRrj7UV" rel="nofollow">Martin writes in</a></li>
<li><a href="http://slexy.org/view/s201koMD2c" rel="nofollow">Alex writes in</a> - <a href="http://people.freebsd.org/%7Egjb/RPI/" rel="nofollow">unofficial FreeBSD RPI Images</a></li>
<li><a href="http://slexy.org/view/s2AntZmtRU" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s20bGjMsIQ" rel="nofollow">John writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>22: Journaled News-Updates</title>
  <link>https://www.bsdnow.tv/22</link>
  <guid isPermaLink="false">e49b46fd-a367-451d-819a-544b35fc4f89</guid>
  <pubDate>Wed, 29 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/e49b46fd-a367-451d-819a-544b35fc4f89.mp3" length="64949427" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it's all about. After that, we've got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:30:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it's all about. After that, we've got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD quarterly status report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what's going on&lt;/li&gt;
&lt;li&gt;The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes&lt;/li&gt;
&lt;li&gt;Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving&lt;/li&gt;
&lt;li&gt;Secure boot support hopefully coming [by mid-year](&lt;a href="http://www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year" target="_blank" rel="nofollow noopener"&gt;www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;There's quite a bit going on in the FreeBSD world, many projects happening at the same time
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140124142027" target="_blank" rel="nofollow noopener"&gt;n2k14 OpenBSD Hackathon Report&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Recently, OpenBSD held one of &lt;a href="http://www.openbsd.org/hackathons.html" target="_blank" rel="nofollow noopener"&gt;their hackathons&lt;/a&gt; in New Zealand&lt;/li&gt;
&lt;li&gt;15 developers gathered there to sit in a room and write code for a few days&lt;/li&gt;
&lt;li&gt;Philip Guenther brings back a nice report of the event&lt;/li&gt;
&lt;li&gt;If you've been watching the -current CVS logs, you've seen the flood of commits just from this event alone&lt;/li&gt;
&lt;li&gt;Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140127083112" target="_blank" rel="nofollow noopener"&gt;Another report from Theo&lt;/a&gt; details his work&lt;/li&gt;
&lt;li&gt;Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd" target="_blank" rel="nofollow noopener"&gt;Four new NetBSD releases&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4&lt;/li&gt;
&lt;li&gt;These updates include lots of bug fixes and some security updates, not focused on new features&lt;/li&gt;
&lt;li&gt;You can upgrade depending on what branch you're currently on&lt;/li&gt;
&lt;li&gt;Confused about the different branches? &lt;a href="https://www.netbsd.org/releases/release-map.html#graph1" target="_blank" rel="nofollow noopener"&gt;See this graph.&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development" target="_blank" rel="nofollow noopener"&gt;The future of open source ZFS development &lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS&lt;/li&gt;
&lt;li&gt;The talk will be about the future of ZFS and the open source development since Oracle closed the code&lt;/li&gt;
&lt;li&gt;It's in San Jose, California - go if you can!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - George Neville-Neil - &lt;a href="mailto:gnn@freebsd.org" target="_blank" rel="nofollow noopener"&gt;gnn@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/gvnn3" target="_blank" rel="nofollow noopener"&gt;@gvnn3&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://freebsdjournal.com/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD Journal&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/stable-current-obsd" target="_blank" rel="nofollow noopener"&gt;Tracking -STABLE and -CURRENT (OpenBSD)&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" target="_blank" rel="nofollow noopener"&gt;pfSense news and 2.1.1 snapshots&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;pfSense has some snapshots available for the upcoming 2.1.1 release&lt;/li&gt;
&lt;li&gt;They include FreeBSD security fixes as well as some other updates&lt;/li&gt;
&lt;li&gt;There are &lt;a href="https://blog.pfsense.org/?p=1198" target="_blank" rel="nofollow noopener"&gt;recordings posted&lt;/a&gt; of some of the previous hangouts&lt;/li&gt;
&lt;li&gt;Unfortunately they're only for subscribers, so you'll have to wait until next month when we have Chris on the show to talk about pfSense!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ" target="_blank" rel="nofollow noopener"&gt;FreeBSD on Google Compute Engine&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Recently we mentioned some posts about getting OpenBSD to run on GCE, here's the FreeBSD version&lt;/li&gt;
&lt;li&gt;Nice big fat warning: "The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty."&lt;/li&gt;
&lt;li&gt;Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!&lt;/li&gt;
&lt;li&gt;Other than that it's a pretty good set of instructions on how to get up and running
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html" target="_blank" rel="nofollow noopener"&gt;Dragonfly ACPI update&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sascha Wildner committed some &lt;a href="http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html" target="_blank" rel="nofollow noopener"&gt;new ACPI code&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There's also a "heads up" to &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html" target="_blank" rel="nofollow noopener"&gt;update your BIOS&lt;/a&gt; if you experience problems&lt;/li&gt;
&lt;li&gt;Check the mailing list post for all the details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;10.0-RC4 users need to upgrade all their packages for 10.0-RC5&lt;/li&gt;
&lt;li&gt;PBIs needed to be rebuilt.. actually everything did&lt;/li&gt;
&lt;li&gt;Help test GNOME 3 so we can get it in the official ports tree&lt;/li&gt;
&lt;li&gt;By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21ZlfOdTt" target="_blank" rel="nofollow noopener"&gt;Tony writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2BFZ68Na5" target="_blank" rel="nofollow noopener"&gt;Jeff writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20epArsQI" target="_blank" rel="nofollow noopener"&gt;Remy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s213CoNvLt" target="_blank" rel="nofollow noopener"&gt;Nils writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21XWnThNS" target="_blank" rel="nofollow noopener"&gt;Solomon writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, freebsd journal, journal, news, stable, current, cvs, anoncvs, branch, update, upgrade, binary, buildworld, make build, release engineering, ufs, ffs, gce, google compute engine, openzfs, zfs, matt ahrens, uefi, efi, secureboot, secure boot, acpi, pfsense, poudriere, hackathon, new zealand, n2k14, george neville-neil, gnn, nycbsdcon, nyc, convention, conference</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it&#39;s all about. After that, we&#39;ve got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what&#39;s going on</li>
<li>The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes</li>
<li>Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving</li>
<li>Secure boot support hopefully coming [by mid-year](<a href="http://www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year" rel="nofollow">www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year</a>)</li>
<li>There&#39;s quite a bit going on in the FreeBSD world, many projects happening at the same time
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140124142027" rel="nofollow">n2k14 OpenBSD Hackathon Report</a></h3>

<ul>
<li>Recently, OpenBSD held one of <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">their hackathons</a> in New Zealand</li>
<li>15 developers gathered there to sit in a room and write code for a few days</li>
<li>Philip Guenther brings back a nice report of the event</li>
<li>If you&#39;ve been watching the -current CVS logs, you&#39;ve seen the flood of commits just from this event alone</li>
<li>Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140127083112" rel="nofollow">Another report from Theo</a> details his work</li>
<li>Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd" rel="nofollow">Four new NetBSD releases</a></h3>

<ul>
<li>NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4</li>
<li>These updates include lots of bug fixes and some security updates, not focused on new features</li>
<li>You can upgrade depending on what branch you&#39;re currently on</li>
<li>Confused about the different branches? <a href="https://www.netbsd.org/releases/release-map.html#graph1" rel="nofollow">See this graph.</a>
***</li>
</ul>

<h3><a href="http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development" rel="nofollow">The future of open source ZFS development </a></h3>

<ul>
<li>On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS</li>
<li>The talk will be about the future of ZFS and the open source development since Oracle closed the code</li>
<li>It&#39;s in San Jose, California - go if you can!
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p><a href="http://freebsdjournal.com/" rel="nofollow">The FreeBSD Journal</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-current-obsd" rel="nofollow">Tracking -STABLE and -CURRENT (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense news and 2.1.1 snapshots</a></h3>

<ul>
<li>pfSense has some snapshots available for the upcoming 2.1.1 release</li>
<li>They include FreeBSD security fixes as well as some other updates</li>
<li>There are <a href="https://blog.pfsense.org/?p=1198" rel="nofollow">recordings posted</a> of some of the previous hangouts</li>
<li>Unfortunately they&#39;re only for subscribers, so you&#39;ll have to wait until next month when we have Chris on the show to talk about pfSense!
***</li>
</ul>

<h3><a href="https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ" rel="nofollow">FreeBSD on Google Compute Engine</a></h3>

<ul>
<li>Recently we mentioned some posts about getting OpenBSD to run on GCE, here&#39;s the FreeBSD version</li>
<li>Nice big fat warning: &quot;The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty.&quot;</li>
<li>Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!</li>
<li>Other than that it&#39;s a pretty good set of instructions on how to get up and running
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html" rel="nofollow">Dragonfly ACPI update</a></h3>

<ul>
<li>Sascha Wildner committed some <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html" rel="nofollow">new ACPI code</a></li>
<li>There&#39;s also a &quot;heads up&quot; to <a href="http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html" rel="nofollow">update your BIOS</a> if you experience problems</li>
<li>Check the mailing list post for all the details
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 users need to upgrade all their packages for 10.0-RC5</li>
<li>PBIs needed to be rebuilt.. actually everything did</li>
<li>Help test GNOME 3 so we can get it in the official ports tree</li>
<li>By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21ZlfOdTt" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s2BFZ68Na5" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20epArsQI" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s213CoNvLt" rel="nofollow">Nils writes in</a></li>
<li><a href="http://slexy.org/view/s21XWnThNS" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be talking with George Neville-Neil about the brand new FreeBSD Journal and what it&#39;s all about. After that, we&#39;ve got a tutorial on how to track the -stable and -current branches of OpenBSD. Answers to all your BSD questions and the latest headlines, only on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/077085.html" rel="nofollow">FreeBSD quarterly status report</a></h3>

<ul>
<li>Gabor Pali sent out the October-December 2013 status report to get everyone up to date on what&#39;s going on</li>
<li>The report contains 37 entries and is very very long... various reports from all the different teams under the FreeBSD umbrella, probably too many to even list in the show notes</li>
<li>Lots of work going on in the ARM world, EC2/Xen and Google Compute Engine are also improving</li>
<li>Secure boot support hopefully coming [by mid-year](<a href="http://www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year" rel="nofollow">www.itwire.com/business-it-news/open-source/62855-freebsd-to-support-secure-boot-by-mid-year</a>)</li>
<li>There&#39;s quite a bit going on in the FreeBSD world, many projects happening at the same time
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140124142027" rel="nofollow">n2k14 OpenBSD Hackathon Report</a></h3>

<ul>
<li>Recently, OpenBSD held one of <a href="http://www.openbsd.org/hackathons.html" rel="nofollow">their hackathons</a> in New Zealand</li>
<li>15 developers gathered there to sit in a room and write code for a few days</li>
<li>Philip Guenther brings back a nice report of the event</li>
<li>If you&#39;ve been watching the -current CVS logs, you&#39;ve seen the flood of commits just from this event alone</li>
<li>Fixes with threading, Linux compat, ACPI, and various other things - some will make it into 5.5 and others need more testing</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20140127083112" rel="nofollow">Another report from Theo</a> details his work</li>
<li>Updates to the random subsystem, some work-in-progress pf fixes, suspend/resume fixes and more signing stuff
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/netbsd_6_1_3_netbsd" rel="nofollow">Four new NetBSD releases</a></h3>

<ul>
<li>NetBSD released versions 6.1.3, 6.0.4, 5.2.2 and 5.1.4</li>
<li>These updates include lots of bug fixes and some security updates, not focused on new features</li>
<li>You can upgrade depending on what branch you&#39;re currently on</li>
<li>Confused about the different branches? <a href="https://www.netbsd.org/releases/release-map.html#graph1" rel="nofollow">See this graph.</a>
***</li>
</ul>

<h3><a href="http://sites.ieee.org/scv-cs/archives/openzfs-future-open-source-zfs-development" rel="nofollow">The future of open source ZFS development </a></h3>

<ul>
<li>On February 11, 2014, Matt Ahrens will be giving a presentation about ZFS</li>
<li>The talk will be about the future of ZFS and the open source development since Oracle closed the code</li>
<li>It&#39;s in San Jose, California - go if you can!
***</li>
</ul>

<h2>Interview - George Neville-Neil - <a href="mailto:gnn@freebsd.org" rel="nofollow">gnn@freebsd.org</a> / <a href="https://twitter.com/gvnn3" rel="nofollow">@gvnn3</a></h2>

<p><a href="http://freebsdjournal.com/" rel="nofollow">The FreeBSD Journal</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/stable-current-obsd" rel="nofollow">Tracking -STABLE and -CURRENT (OpenBSD)</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://doc.pfsense.org/index.php/2.1.1_New_Features_and_Changes" rel="nofollow">pfSense news and 2.1.1 snapshots</a></h3>

<ul>
<li>pfSense has some snapshots available for the upcoming 2.1.1 release</li>
<li>They include FreeBSD security fixes as well as some other updates</li>
<li>There are <a href="https://blog.pfsense.org/?p=1198" rel="nofollow">recordings posted</a> of some of the previous hangouts</li>
<li>Unfortunately they&#39;re only for subscribers, so you&#39;ll have to wait until next month when we have Chris on the show to talk about pfSense!
***</li>
</ul>

<h3><a href="https://groups.google.com/forum/#!msg/gce-discussion/YWoa3Aa_49U/FYAg9oiRlLUJ" rel="nofollow">FreeBSD on Google Compute Engine</a></h3>

<ul>
<li>Recently we mentioned some posts about getting OpenBSD to run on GCE, here&#39;s the FreeBSD version</li>
<li>Nice big fat warning: &quot;The team has put together a best-effort posting that will get most, if not all, of you up and running. That being said, we need to remind you that FreeBSD is being supported on Google Compute Engine by the community. The instructions are being provided as-is and without warranty.&quot;</li>
<li>Their instructions are a little too Linuxy (assuming wget, etc.) for our taste, someone should probably get it updated!</li>
<li>Other than that it&#39;s a pretty good set of instructions on how to get up and running
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/22/13225.html" rel="nofollow">Dragonfly ACPI update</a></h3>

<ul>
<li>Sascha Wildner committed some <a href="http://lists.dragonflybsd.org/pipermail/commits/2014-January/199071.html" rel="nofollow">new ACPI code</a></li>
<li>There&#39;s also a &quot;heads up&quot; to <a href="http://lists.dragonflybsd.org/pipermail/users/2014-January/090504.html" rel="nofollow">update your BIOS</a> if you experience problems</li>
<li>Check the mailing list post for all the details
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-6/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 users need to upgrade all their packages for 10.0-RC5</li>
<li>PBIs needed to be rebuilt.. actually everything did</li>
<li>Help test GNOME 3 so we can get it in the official ports tree</li>
<li>By the way, I think Kris has an announcement - PCBSD 10.0 is out!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21ZlfOdTt" rel="nofollow">Tony writes in</a></li>
<li><a href="http://slexy.org/view/s2BFZ68Na5" rel="nofollow">Jeff writes in</a></li>
<li><a href="http://slexy.org/view/s20epArsQI" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s213CoNvLt" rel="nofollow">Nils writes in</a></li>
<li><a href="http://slexy.org/view/s21XWnThNS" rel="nofollow">Solomon writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>21: Tendresse for Ten</title>
  <link>https://www.bsdnow.tv/21</link>
  <guid isPermaLink="false">353e6a60-9bd0-494f-ac34-4337e3dfa734</guid>
  <pubDate>Wed, 22 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/353e6a60-9bd0-494f-ac34-4337e3dfa734.mp3" length="77103576" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we've got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it's finally here! We're gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we'll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We've got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:47:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we've got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it's finally here! We're gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we'll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We've got a round of your questions and the latest news, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/releases/10.0R/announce.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.0-RELEASE is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The long awaited, giant release of FreeBSD is now official and &lt;a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/" target="_blank" rel="nofollow noopener"&gt;ready to be downloaded&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;One of the biggest releases in FreeBSD history, with tons of new updates&lt;/li&gt;
&lt;li&gt;Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... &lt;a href="https://www.freebsd.org/releases/10.0R/relnotes.html" target="_blank" rel="nofollow noopener"&gt;the list goes on and on&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Start up your freebsd-update or do a source-based upgrade
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.5 CFT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt; announced a Call For Testing for OpenSSH 6.5&lt;/li&gt;
&lt;li&gt;Huge, huge release, focused on new features rather than bugfixes (but it includes those too)&lt;/li&gt;
&lt;li&gt;New ciphers, new key formats, new config options, see the mailing list for all the details&lt;/li&gt;
&lt;li&gt;Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html" target="_blank" rel="nofollow noopener"&gt;DIY NAS story, FreeNAS 9.2.1-BETA&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another new blog post about FreeNAS!&lt;/li&gt;
&lt;li&gt;Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014&lt;/li&gt;
&lt;li&gt;"I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS"&lt;/li&gt;
&lt;li&gt;Really long article with lots of nice details about his setup, why you might want a NAS, etc.&lt;/li&gt;
&lt;li&gt;Speaking of FreeNAS, they released &lt;a href="http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html" target="_blank" rel="nofollow noopener"&gt;9.2.1-BETA&lt;/a&gt; with lots of bugfixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://news.ycombinator.com/item?id=7069889" target="_blank" rel="nofollow noopener"&gt;OpenBSD needed funding for electricity.. and they got it&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Briefly mentioned at the end of last week's show, but has blown up over the internet since&lt;/li&gt;
&lt;li&gt;OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments&lt;/li&gt;
&lt;li&gt;They needed about $20,000 to cover electric costs for the &lt;a href="http://www.openbsd.org/images/rack2009.jpg" target="_blank" rel="nofollow noopener"&gt;server rack in Theo's basement&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Lots of positive reaction from the community helping out so far, and it appears they have &lt;a href="http://www.openbsdfoundation.org/campaign2104.html" target="_blank" rel="nofollow noopener"&gt;reached their goal&lt;/a&gt; and got $100,000 in donations&lt;/li&gt;
&lt;li&gt;From Bob Beck: "we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation"&lt;/li&gt;
&lt;li&gt;This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Colin Percival - &lt;a href="mailto:cperciva@freebsd.org" target="_blank" rel="nofollow noopener"&gt;cperciva@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/cperciva" target="_blank" rel="nofollow noopener"&gt;@cperciva&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD &lt;a href="http://www.daemonology.net/freebsd-on-ec2/" target="_blank" rel="nofollow noopener"&gt;on Amazon EC2&lt;/a&gt;, backups with &lt;a href="https://www.tarsnap.com/" target="_blank" rel="nofollow noopener"&gt;Tarsnap&lt;/a&gt;, 10.0-RELEASE, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" target="_blank" rel="nofollow noopener"&gt;Bandwidth monitoring and testing&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://blog.pfsense.org/?p=1176" target="_blank" rel="nofollow noopener"&gt;pfSense talk at Tokyo FreeBSD Benkyoukai&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Isaac Levy will be presenting "pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments"&lt;/li&gt;
&lt;li&gt;He's also going to be looking for help to translate the pfSense documentation into Japanese&lt;/li&gt;
&lt;li&gt;The event is on February 17, 2014 if you're in the Tokyo area
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://m0n0.ch/wall/downloads.php" target="_blank" rel="nofollow noopener"&gt;m0n0wall 1.8.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For those who don't know, m0n0wall is an older BSD-based firewall OS that's mostly focused on embedded applications&lt;/li&gt;
&lt;li&gt;pfSense was forked from it in 2004, and has a lot more active development now&lt;/li&gt;
&lt;li&gt;They switched to FreeBSD 8.4 for this new version&lt;/li&gt;
&lt;li&gt;Full list of updates in the changelog&lt;/li&gt;
&lt;li&gt;This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/1933" target="_blank" rel="nofollow noopener"&gt;Ansible and PF, plus NTP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another blog post from our buddy &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;Michael Lucas&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;There've been some NTP amplification attacks &lt;a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" target="_blank" rel="nofollow noopener"&gt;recently&lt;/a&gt; in the news&lt;/li&gt;
&lt;li&gt;The post describes how he configured ntpd on a lot of servers without a lot of work&lt;/li&gt;
&lt;li&gt;He leverages pf and ansible for the configuration&lt;/li&gt;
&lt;li&gt;OpenNTPD is, not surprisingly, unaffected - use it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140115054839" target="_blank" rel="nofollow noopener"&gt;ruBSD videos online&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Just a quick followup from a few weeks ago&lt;/li&gt;
&lt;li&gt;Theo and Henning's talks from ruBSD are now available for download&lt;/li&gt;
&lt;li&gt;There's also a nice interview with Theo
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;10.0-RC4 images are available&lt;/li&gt;
&lt;li&gt;Wine PBI is now available for 10&lt;/li&gt;
&lt;li&gt;9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2WQXwMASZ" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2H0FURAtZ" target="_blank" rel="nofollow noopener"&gt;Kjell-Aleksander writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21eKKPgqh" target="_blank" rel="nofollow noopener"&gt;Mike writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21UMLnV0G" target="_blank" rel="nofollow noopener"&gt;Charlie writes in (and gets a reply)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2SuazcfoR" target="_blank" rel="nofollow noopener"&gt;Kevin writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ec2, colin percival, cperciva, amazon, cloud, aws, instance, vm, virtual machine, xen, hypervisor, generic, 10.0, in the cloud, custom kernel, tarsnap, backup, backups, encrypted, dropbox, offsite, off site, crashplan, vnstat, iperf, performance, network, sysctl, throughput, speed, download, upload, check, test, freenas, m0n0wall, pfsense, zfs, vfs, tokyo, benkyokai, benkyoukai, ansible, nas, freenas, pf, ntp, openntpd, vulnerability, ntpd</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ve got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it&#39;s finally here! We&#39;re gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we&#39;ll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We&#39;ve got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.0R/announce.html" rel="nofollow">FreeBSD 10.0-RELEASE is out</a></h3>

<ul>
<li>The long awaited, giant release of FreeBSD is now official and <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/" rel="nofollow">ready to be downloaded</a></li>
<li>One of the biggest releases in FreeBSD history, with tons of new updates</li>
<li>Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... <a href="https://www.freebsd.org/releases/10.0R/relnotes.html" rel="nofollow">the list goes on and on</a></li>
<li>Start up your freebsd-update or do a source-based upgrade
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html" rel="nofollow">OpenSSH 6.5 CFT</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> announced a Call For Testing for OpenSSH 6.5</li>
<li>Huge, huge release, focused on new features rather than bugfixes (but it includes those too)</li>
<li>New ciphers, new key formats, new config options, see the mailing list for all the details</li>
<li>Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html" rel="nofollow">DIY NAS story, FreeNAS 9.2.1-BETA</a></h3>

<ul>
<li>Another new blog post about FreeNAS!</li>
<li>Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014</li>
<li>&quot;I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS&quot;</li>
<li>Really long article with lots of nice details about his setup, why you might want a NAS, etc.</li>
<li>Speaking of FreeNAS, they released <a href="http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html" rel="nofollow">9.2.1-BETA</a> with lots of bugfixes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=7069889" rel="nofollow">OpenBSD needed funding for electricity.. and they got it</a></h3>

<ul>
<li>Briefly mentioned at the end of last week&#39;s show, but has blown up over the internet since</li>
<li>OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments</li>
<li>They needed about $20,000 to cover electric costs for the <a href="http://www.openbsd.org/images/rack2009.jpg" rel="nofollow">server rack in Theo&#39;s basement</a></li>
<li>Lots of positive reaction from the community helping out so far, and it appears they have <a href="http://www.openbsdfoundation.org/campaign2104.html" rel="nofollow">reached their goal</a> and got $100,000 in donations</li>
<li>From Bob Beck: &quot;we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation&quot;</li>
<li>This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***</li>
</ul>

<h2>Interview - Colin Percival - <a href="mailto:cperciva@freebsd.org" rel="nofollow">cperciva@freebsd.org</a> / <a href="https://twitter.com/cperciva" rel="nofollow">@cperciva</a></h2>

<p>FreeBSD <a href="http://www.daemonology.net/freebsd-on-ec2/" rel="nofollow">on Amazon EC2</a>, backups with <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a>, 10.0-RELEASE, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">Bandwidth monitoring and testing</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.pfsense.org/?p=1176" rel="nofollow">pfSense talk at Tokyo FreeBSD Benkyoukai</a></h3>

<ul>
<li>Isaac Levy will be presenting &quot;pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments&quot;</li>
<li>He&#39;s also going to be looking for help to translate the pfSense documentation into Japanese</li>
<li>The event is on February 17, 2014 if you&#39;re in the Tokyo area
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/downloads.php" rel="nofollow">m0n0wall 1.8.1 released</a></h3>

<ul>
<li>For those who don&#39;t know, m0n0wall is an older BSD-based firewall OS that&#39;s mostly focused on embedded applications</li>
<li>pfSense was forked from it in 2004, and has a lot more active development now</li>
<li>They switched to FreeBSD 8.4 for this new version</li>
<li>Full list of updates in the changelog</li>
<li>This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1933" rel="nofollow">Ansible and PF, plus NTP</a></h3>

<ul>
<li>Another blog post from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>There&#39;ve been some NTP amplification attacks <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" rel="nofollow">recently</a> in the news</li>
<li>The post describes how he configured ntpd on a lot of servers without a lot of work</li>
<li>He leverages pf and ansible for the configuration</li>
<li>OpenNTPD is, not surprisingly, unaffected - use it
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140115054839" rel="nofollow">ruBSD videos online</a></h3>

<ul>
<li>Just a quick followup from a few weeks ago</li>
<li>Theo and Henning&#39;s talks from ruBSD are now available for download</li>
<li>There&#39;s also a nice interview with Theo
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 images are available</li>
<li>Wine PBI is now available for 10</li>
<li>9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2WQXwMASZ" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2H0FURAtZ" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s21eKKPgqh" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21UMLnV0G" rel="nofollow">Charlie writes in (and gets a reply)</a></li>
<li><a href="http://slexy.org/view/s2SuazcfoR" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ve got some great news for OpenBSD, as well as the scoop on FreeBSD 10.0-RELEASE - yes it&#39;s finally here! We&#39;re gonna talk to Colin Percival about running FreeBSD 10 on EC2 and lots of other interesting stuff. After that, we&#39;ll be showing you how to do some bandwidth monitoring and network performance testing in a combo tutorial. We&#39;ve got a round of your questions and the latest news, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://www.freebsd.org/releases/10.0R/announce.html" rel="nofollow">FreeBSD 10.0-RELEASE is out</a></h3>

<ul>
<li>The long awaited, giant release of FreeBSD is now official and <a href="http://ftp.freebsd.org/pub/FreeBSD/ISO-IMAGES-amd64/10.0/" rel="nofollow">ready to be downloaded</a></li>
<li>One of the biggest releases in FreeBSD history, with tons of new updates</li>
<li>Some features include: LDNS/Unbound replacing BIND, Clang by default (no GCC anymore), native Raspberry Pi support and other ARM improvements, bhyve, hyper-v support, AMD KMS, VirtIO, Xen PVHVM in GENERIC, lots of driver updates, ZFS on root in the installer, SMP patches to pf that drastically improve performance, Netmap support, pkgng by default, wireless stack improvements, a new iSCSI stack, FUSE in the base system... <a href="https://www.freebsd.org/releases/10.0R/relnotes.html" rel="nofollow">the list goes on and on</a></li>
<li>Start up your freebsd-update or do a source-based upgrade
***</li>
</ul>

<h3><a href="https://lists.mindrot.org/pipermail/openssh-unix-dev/2014-January/031987.html" rel="nofollow">OpenSSH 6.5 CFT</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a> announced a Call For Testing for OpenSSH 6.5</li>
<li>Huge, huge release, focused on new features rather than bugfixes (but it includes those too)</li>
<li>New ciphers, new key formats, new config options, see the mailing list for all the details</li>
<li>Should be in OpenBSD 5.5 in May, look forward to it - but also help test on other platforms!
***</li>
</ul>

<h3><a href="http://blog.brianmoses.net/2014/01/diy-nas-2014-edition.html" rel="nofollow">DIY NAS story, FreeNAS 9.2.1-BETA</a></h3>

<ul>
<li>Another new blog post about FreeNAS!</li>
<li>Instead of updating the older tutorials, the author started fresh and wrote a new one for 2014</li>
<li>&quot;I did briefly consider suggesting nas4free for the EconoNAS blog, since it’s essentially a fork off the FreeNAS tree but may run better on slower hardware, but ultimately I couldn’t recommend anything other than FreeNAS&quot;</li>
<li>Really long article with lots of nice details about his setup, why you might want a NAS, etc.</li>
<li>Speaking of FreeNAS, they released <a href="http://www.freenas.org/whats-new/2014/01/freenas-9-2-1-beta-now-ready-for-download.html" rel="nofollow">9.2.1-BETA</a> with lots of bugfixes
***</li>
</ul>

<h3><a href="https://news.ycombinator.com/item?id=7069889" rel="nofollow">OpenBSD needed funding for electricity.. and they got it</a></h3>

<ul>
<li>Briefly mentioned at the end of last week&#39;s show, but has blown up over the internet since</li>
<li>OpenBSD in the headlines of major tech news sites: slashdot, zdnet, the register, hacker news, reddit, twitter.. thousands of comments</li>
<li>They needed about $20,000 to cover electric costs for the <a href="http://www.openbsd.org/images/rack2009.jpg" rel="nofollow">server rack in Theo&#39;s basement</a></li>
<li>Lots of positive reaction from the community helping out so far, and it appears they have <a href="http://www.openbsdfoundation.org/campaign2104.html" rel="nofollow">reached their goal</a> and got $100,000 in donations</li>
<li>From Bob Beck: &quot;we have in one week gone from being in a dire situation to having a commitment of approximately $100,000 in donations to the foundation&quot;</li>
<li>This is a shining example of the BSD community coming together, and even the Linux people realizing how critical BSD is to the world at large
***</li>
</ul>

<h2>Interview - Colin Percival - <a href="mailto:cperciva@freebsd.org" rel="nofollow">cperciva@freebsd.org</a> / <a href="https://twitter.com/cperciva" rel="nofollow">@cperciva</a></h2>

<p>FreeBSD <a href="http://www.daemonology.net/freebsd-on-ec2/" rel="nofollow">on Amazon EC2</a>, backups with <a href="https://www.tarsnap.com/" rel="nofollow">Tarsnap</a>, 10.0-RELEASE, various topics</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/vnstat-iperf" rel="nofollow">Bandwidth monitoring and testing</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://blog.pfsense.org/?p=1176" rel="nofollow">pfSense talk at Tokyo FreeBSD Benkyoukai</a></h3>

<ul>
<li>Isaac Levy will be presenting &quot;pfSense Practical Experiences: from home routers, to High-Availability Datacenter Deployments&quot;</li>
<li>He&#39;s also going to be looking for help to translate the pfSense documentation into Japanese</li>
<li>The event is on February 17, 2014 if you&#39;re in the Tokyo area
***</li>
</ul>

<h3><a href="http://m0n0.ch/wall/downloads.php" rel="nofollow">m0n0wall 1.8.1 released</a></h3>

<ul>
<li>For those who don&#39;t know, m0n0wall is an older BSD-based firewall OS that&#39;s mostly focused on embedded applications</li>
<li>pfSense was forked from it in 2004, and has a lot more active development now</li>
<li>They switched to FreeBSD 8.4 for this new version</li>
<li>Full list of updates in the changelog</li>
<li>This version requires at least 128MB RAM and a disk/CF size of 32MB or more, oh no!
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1933" rel="nofollow">Ansible and PF, plus NTP</a></h3>

<ul>
<li>Another blog post from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>There&#39;ve been some NTP amplification attacks <a href="https://www.freebsd.org/security/advisories/FreeBSD-SA-14:02.ntpd.asc" rel="nofollow">recently</a> in the news</li>
<li>The post describes how he configured ntpd on a lot of servers without a lot of work</li>
<li>He leverages pf and ansible for the configuration</li>
<li>OpenNTPD is, not surprisingly, unaffected - use it
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140115054839" rel="nofollow">ruBSD videos online</a></h3>

<ul>
<li>Just a quick followup from a few weeks ago</li>
<li>Theo and Henning&#39;s talks from ruBSD are now available for download</li>
<li>There&#39;s also a nice interview with Theo
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-5/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC4 images are available</li>
<li>Wine PBI is now available for 10</li>
<li>9.2 systems will now be able to upgrade to version 10 and keep their PBI library
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2WQXwMASZ" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2H0FURAtZ" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s21eKKPgqh" rel="nofollow">Mike writes in</a></li>
<li><a href="http://slexy.org/view/s21UMLnV0G" rel="nofollow">Charlie writes in (and gets a reply)</a></li>
<li><a href="http://slexy.org/view/s2SuazcfoR" rel="nofollow">Kevin writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>20: Bhyve Mind</title>
  <link>https://www.bsdnow.tv/20</link>
  <guid isPermaLink="false">6125c3d9-473a-4557-a429-423dffa36cbf</guid>
  <pubDate>Wed, 15 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6125c3d9-473a-4557-a429-423dffa36cbf.mp3" length="60158675" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>It's our big 20th episode! We're going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:23:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;It's our big 20th episode! We're going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20140106055302" target="_blank" rel="nofollow noopener"&gt;OpenBSD automatic installation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A CFT (call for testing) was posted for OpenBSD's new automatic installer process&lt;/li&gt;
&lt;li&gt;Using this new system, you can spin up fully-configured OpenBSD installs very quickly&lt;/li&gt;
&lt;li&gt;It will answer all the questions for you and can put files into place and start services&lt;/li&gt;
&lt;li&gt;Great for large deployments, help test it and report your findings
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/channel/UCL09rVicvyZrqe-I2LP5Vyg/videos" target="_blank" rel="nofollow noopener"&gt;FreeNAS install guide and blog posts&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A multipart series on YouTube about installing FreeNAS&lt;/li&gt;
&lt;li&gt;In part 1, the guy (who is possibly Dracula, with his very Transylvanian accent..) builds his new file server and shows off the hardware&lt;/li&gt;
&lt;li&gt;In part 2, he shows how to install and configure FreeNAS, uses IPMI, sets up his pools&lt;/li&gt;
&lt;li&gt;He pronounces gigabytes as jiggabytes and it's hilarious&lt;/li&gt;
&lt;li&gt;We've also got an &lt;a href="http://enoriver.net/index.php/2014/01/11/freenas-works-as-advertised/" target="_blank" rel="nofollow noopener"&gt;unrelated blog post&lt;/a&gt; about a very satisfied FreeNAS user who details his setup&lt;/li&gt;
&lt;li&gt;As well as &lt;a href="http://devinteske.com/freenas-development/" target="_blank" rel="nofollow noopener"&gt;another blog post&lt;/a&gt; from our old pal &lt;a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" target="_blank" rel="nofollow noopener"&gt;Devin Teske&lt;/a&gt; about his recent foray into the FreeNAS development world
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/076800.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD 10.0-RC5 is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another, unexpected RC is out for 10.0&lt;/li&gt;
&lt;li&gt;Minor fixes included, please help test and report any bugs&lt;/li&gt;
&lt;li&gt;You can update via freebsd-update or from source&lt;/li&gt;
&lt;li&gt;Hopefully this will be the last one before 10.0-RELEASE, which has tons of new features we'll talk about&lt;/li&gt;
&lt;li&gt;It's been &lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=260664" target="_blank" rel="nofollow noopener"&gt;tagged -RELEASE&lt;/a&gt; in SVN already too!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=138952598914052&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD 5.5-beta is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Theo updated the branch status to 5.5-beta&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.openbsd.org/plus.html" target="_blank" rel="nofollow noopener"&gt;list of changes&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://ftp.openbsd.org/pub/OpenBSD/snapshots/" target="_blank" rel="nofollow noopener"&gt;Help test&lt;/a&gt; and report any bugs you find&lt;/li&gt;
&lt;li&gt;Lots of rapid development with signify (which we mentioned last week), the beta includes some "test keys"&lt;/li&gt;
&lt;li&gt;Does that mean it'll be part of the final release? We'll find out in May.. or when we interview Ted (soon)
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Neel Natu &amp;amp; Peter Grehan - &lt;a href="mailto:neel@freebsd.org" target="_blank" rel="nofollow noopener"&gt;neel@freebsd.org&lt;/a&gt; &amp;amp; &lt;a href="mailto:grehan@freebsd.org" target="_blank" rel="nofollow noopener"&gt;grehan@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;BHyVe - the BSD hypervisor&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/bhyve" target="_blank" rel="nofollow noopener"&gt;Virtualization with bhyve&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2014/01/hostname-canonicalisation-in-openssh.html" target="_blank" rel="nofollow noopener"&gt;Hostname canonicalisation in OpenSSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Blog post from our friend &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;Damien Miller&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;This new feature allows clients to canonicalize unqualified domain names&lt;/li&gt;
&lt;li&gt;SSH will know if you typed "ssh bsdnow" you meant "ssh bsdnow.tv" with new config options&lt;/li&gt;
&lt;li&gt;This will help clean up some ssh configs, especially if you have many hosts&lt;/li&gt;
&lt;li&gt;Should make it into OpenSSH 6.5, which is "due really soon"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2014/01/07/13078.html" target="_blank" rel="nofollow noopener"&gt;Dragonfly on a Chromebook&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Some work has been done by Matthew Dillon to get DragonflyBSD working on a Google Chromebook&lt;/li&gt;
&lt;li&gt;These &lt;a href="http://www.shiningsilence.com/dbsdlog/2014/01/10/13132.html" target="_blank" rel="nofollow noopener"&gt;couple of posts&lt;/a&gt; detail some of the things he's got working so far&lt;/li&gt;
&lt;li&gt;Changes were needed to the boot process, trackpad and wifi drivers needed updating...&lt;/li&gt;
&lt;li&gt;Also includes a guide written by Dillon on how to get yours working
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://kazarka.com/index.php?section=spiderinabox" target="_blank" rel="nofollow noopener"&gt;Spider in a box&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"Spiderinabox" is a new OpenBSD-based project&lt;/li&gt;
&lt;li&gt;Using a combination of OpenBSD, Firefox, XQuartz and VirtualBox, it creates a secure browsing experience for OS X&lt;/li&gt;
&lt;li&gt;Firefox runs encapsulated in OpenBSD and doesn't have access to OS X in any way&lt;/li&gt;
&lt;li&gt;The developer is looking for testers on other operating systems!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-3/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PCBSD 10 has entered into the code freeze phase&lt;/li&gt;
&lt;li&gt;They're focusing on fixing bugs now, rather than adding new features&lt;/li&gt;
&lt;li&gt;The update system got a lot of improvements&lt;/li&gt;
&lt;li&gt;PBI load times reduced by up to 40%! what!!!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s25zbSPtcm" target="_blank" rel="nofollow noopener"&gt;Scott writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2EarxbZz1" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2MWKxtWxF" target="_blank" rel="nofollow noopener"&gt;SW writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20kzex2qm" target="_blank" rel="nofollow noopener"&gt;Ole writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2858Ph4o0" target="_blank" rel="nofollow noopener"&gt;Gertjan writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, bhyve, virtualization, xen, hypervisor, type 2, neel natu, peter grehan, presentation, dom0, domu, automatic install, pxe, pxeboot, freenas, installation, chromebook, edgebsd, spiderinabox, spider in a box, vm</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>It&#39;s our big 20th episode! We&#39;re going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140106055302" rel="nofollow">OpenBSD automatic installation</a></h3>

<ul>
<li>A CFT (call for testing) was posted for OpenBSD&#39;s new automatic installer process</li>
<li>Using this new system, you can spin up fully-configured OpenBSD installs very quickly</li>
<li>It will answer all the questions for you and can put files into place and start services</li>
<li>Great for large deployments, help test it and report your findings
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UCL09rVicvyZrqe-I2LP5Vyg/videos" rel="nofollow">FreeNAS install guide and blog posts</a></h3>

<ul>
<li>A multipart series on YouTube about installing FreeNAS</li>
<li>In part 1, the guy (who is possibly Dracula, with his very Transylvanian accent..) builds his new file server and shows off the hardware</li>
<li>In part 2, he shows how to install and configure FreeNAS, uses IPMI, sets up his pools</li>
<li>He pronounces gigabytes as jiggabytes and it&#39;s hilarious</li>
<li>We&#39;ve also got an <a href="http://enoriver.net/index.php/2014/01/11/freenas-works-as-advertised/" rel="nofollow">unrelated blog post</a> about a very satisfied FreeNAS user who details his setup</li>
<li>As well as <a href="http://devinteske.com/freenas-development/" rel="nofollow">another blog post</a> from our old pal <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a> about his recent foray into the FreeNAS development world
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/076800.html" rel="nofollow">FreeBSD 10.0-RC5 is out</a></h3>

<ul>
<li>Another, unexpected RC is out for 10.0</li>
<li>Minor fixes included, please help test and report any bugs</li>
<li>You can update via freebsd-update or from source</li>
<li>Hopefully this will be the last one before 10.0-RELEASE, which has tons of new features we&#39;ll talk about</li>
<li>It&#39;s been <a href="https://svnweb.freebsd.org/base?view=revision&revision=260664" rel="nofollow">tagged -RELEASE</a> in SVN already too!
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138952598914052&w=2" rel="nofollow">OpenBSD 5.5-beta is out</a></h3>

<ul>
<li>Theo updated the branch status to 5.5-beta</li>
<li>A <a href="http://www.openbsd.org/plus.html" rel="nofollow">list of changes</a></li>
<li><a href="http://ftp.openbsd.org/pub/OpenBSD/snapshots/" rel="nofollow">Help test</a> and report any bugs you find</li>
<li>Lots of rapid development with signify (which we mentioned last week), the beta includes some &quot;test keys&quot;</li>
<li>Does that mean it&#39;ll be part of the final release? We&#39;ll find out in May.. or when we interview Ted (soon)
***</li>
</ul>

<h2>Interview - Neel Natu &amp; Peter Grehan - <a href="mailto:neel@freebsd.org" rel="nofollow">neel@freebsd.org</a> &amp; <a href="mailto:grehan@freebsd.org" rel="nofollow">grehan@freebsd.org</a></h2>

<p>BHyVe - the BSD hypervisor</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">Virtualization with bhyve</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.djm.net.au/2014/01/hostname-canonicalisation-in-openssh.html" rel="nofollow">Hostname canonicalisation in OpenSSH</a></h3>

<ul>
<li>Blog post from our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a></li>
<li>This new feature allows clients to canonicalize unqualified domain names</li>
<li>SSH will know if you typed &quot;ssh bsdnow&quot; you meant &quot;ssh bsdnow.tv&quot; with new config options</li>
<li>This will help clean up some ssh configs, especially if you have many hosts</li>
<li>Should make it into OpenSSH 6.5, which is &quot;due really soon&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/07/13078.html" rel="nofollow">Dragonfly on a Chromebook</a></h3>

<ul>
<li>Some work has been done by Matthew Dillon to get DragonflyBSD working on a Google Chromebook</li>
<li>These <a href="http://www.shiningsilence.com/dbsdlog/2014/01/10/13132.html" rel="nofollow">couple of posts</a> detail some of the things he&#39;s got working so far</li>
<li>Changes were needed to the boot process, trackpad and wifi drivers needed updating...</li>
<li>Also includes a guide written by Dillon on how to get yours working
***</li>
</ul>

<h3><a href="http://kazarka.com/index.php?section=spiderinabox" rel="nofollow">Spider in a box</a></h3>

<ul>
<li>&quot;Spiderinabox&quot; is a new OpenBSD-based project</li>
<li>Using a combination of OpenBSD, Firefox, XQuartz and VirtualBox, it creates a secure browsing experience for OS X</li>
<li>Firefox runs encapsulated in OpenBSD and doesn&#39;t have access to OS X in any way</li>
<li>The developer is looking for testers on other operating systems!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-3/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCBSD 10 has entered into the code freeze phase</li>
<li>They&#39;re focusing on fixing bugs now, rather than adding new features</li>
<li>The update system got a lot of improvements</li>
<li>PBI load times reduced by up to 40%! what!!!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25zbSPtcm" rel="nofollow">Scott writes in</a></li>
<li><a href="http://slexy.org/view/s2EarxbZz1" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2MWKxtWxF" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s20kzex2qm" rel="nofollow">Ole writes in</a></li>
<li><a href="http://slexy.org/view/s2858Ph4o0" rel="nofollow">Gertjan writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>It&#39;s our big 20th episode! We&#39;re going to sit down for a chat with Neel Natu and Peter Grehan, the developers of bhyve. Not familiar with bhyve? Our tutorial will show you all you need to know about this awesome new virtualization technology. Answers to your questions and all the latest news, here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20140106055302" rel="nofollow">OpenBSD automatic installation</a></h3>

<ul>
<li>A CFT (call for testing) was posted for OpenBSD&#39;s new automatic installer process</li>
<li>Using this new system, you can spin up fully-configured OpenBSD installs very quickly</li>
<li>It will answer all the questions for you and can put files into place and start services</li>
<li>Great for large deployments, help test it and report your findings
***</li>
</ul>

<h3><a href="https://www.youtube.com/channel/UCL09rVicvyZrqe-I2LP5Vyg/videos" rel="nofollow">FreeNAS install guide and blog posts</a></h3>

<ul>
<li>A multipart series on YouTube about installing FreeNAS</li>
<li>In part 1, the guy (who is possibly Dracula, with his very Transylvanian accent..) builds his new file server and shows off the hardware</li>
<li>In part 2, he shows how to install and configure FreeNAS, uses IPMI, sets up his pools</li>
<li>He pronounces gigabytes as jiggabytes and it&#39;s hilarious</li>
<li>We&#39;ve also got an <a href="http://enoriver.net/index.php/2014/01/11/freenas-works-as-advertised/" rel="nofollow">unrelated blog post</a> about a very satisfied FreeNAS user who details his setup</li>
<li>As well as <a href="http://devinteske.com/freenas-development/" rel="nofollow">another blog post</a> from our old pal <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a> about his recent foray into the FreeNAS development world
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-stable/2014-January/076800.html" rel="nofollow">FreeBSD 10.0-RC5 is out</a></h3>

<ul>
<li>Another, unexpected RC is out for 10.0</li>
<li>Minor fixes included, please help test and report any bugs</li>
<li>You can update via freebsd-update or from source</li>
<li>Hopefully this will be the last one before 10.0-RELEASE, which has tons of new features we&#39;ll talk about</li>
<li>It&#39;s been <a href="https://svnweb.freebsd.org/base?view=revision&revision=260664" rel="nofollow">tagged -RELEASE</a> in SVN already too!
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138952598914052&w=2" rel="nofollow">OpenBSD 5.5-beta is out</a></h3>

<ul>
<li>Theo updated the branch status to 5.5-beta</li>
<li>A <a href="http://www.openbsd.org/plus.html" rel="nofollow">list of changes</a></li>
<li><a href="http://ftp.openbsd.org/pub/OpenBSD/snapshots/" rel="nofollow">Help test</a> and report any bugs you find</li>
<li>Lots of rapid development with signify (which we mentioned last week), the beta includes some &quot;test keys&quot;</li>
<li>Does that mean it&#39;ll be part of the final release? We&#39;ll find out in May.. or when we interview Ted (soon)
***</li>
</ul>

<h2>Interview - Neel Natu &amp; Peter Grehan - <a href="mailto:neel@freebsd.org" rel="nofollow">neel@freebsd.org</a> &amp; <a href="mailto:grehan@freebsd.org" rel="nofollow">grehan@freebsd.org</a></h2>

<p>BHyVe - the BSD hypervisor</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/bhyve" rel="nofollow">Virtualization with bhyve</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://blog.djm.net.au/2014/01/hostname-canonicalisation-in-openssh.html" rel="nofollow">Hostname canonicalisation in OpenSSH</a></h3>

<ul>
<li>Blog post from our friend <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">Damien Miller</a></li>
<li>This new feature allows clients to canonicalize unqualified domain names</li>
<li>SSH will know if you typed &quot;ssh bsdnow&quot; you meant &quot;ssh bsdnow.tv&quot; with new config options</li>
<li>This will help clean up some ssh configs, especially if you have many hosts</li>
<li>Should make it into OpenSSH 6.5, which is &quot;due really soon&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2014/01/07/13078.html" rel="nofollow">Dragonfly on a Chromebook</a></h3>

<ul>
<li>Some work has been done by Matthew Dillon to get DragonflyBSD working on a Google Chromebook</li>
<li>These <a href="http://www.shiningsilence.com/dbsdlog/2014/01/10/13132.html" rel="nofollow">couple of posts</a> detail some of the things he&#39;s got working so far</li>
<li>Changes were needed to the boot process, trackpad and wifi drivers needed updating...</li>
<li>Also includes a guide written by Dillon on how to get yours working
***</li>
</ul>

<h3><a href="http://kazarka.com/index.php?section=spiderinabox" rel="nofollow">Spider in a box</a></h3>

<ul>
<li>&quot;Spiderinabox&quot; is a new OpenBSD-based project</li>
<li>Using a combination of OpenBSD, Firefox, XQuartz and VirtualBox, it creates a secure browsing experience for OS X</li>
<li>Firefox runs encapsulated in OpenBSD and doesn&#39;t have access to OS X in any way</li>
<li>The developer is looking for testers on other operating systems!
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-3/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCBSD 10 has entered into the code freeze phase</li>
<li>They&#39;re focusing on fixing bugs now, rather than adding new features</li>
<li>The update system got a lot of improvements</li>
<li>PBI load times reduced by up to 40%! what!!!
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s25zbSPtcm" rel="nofollow">Scott writes in</a></li>
<li><a href="http://slexy.org/view/s2EarxbZz1" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s2MWKxtWxF" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s20kzex2qm" rel="nofollow">Ole writes in</a></li>
<li><a href="http://slexy.org/view/s2858Ph4o0" rel="nofollow">Gertjan writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>19: The Installfest</title>
  <link>https://www.bsdnow.tv/19</link>
  <guid isPermaLink="false">6e52e1f8-72f4-4ef7-be58-b8d78ab97072</guid>
  <pubDate>Wed, 08 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/6e52e1f8-72f4-4ef7-be58-b8d78ab97072.mp3" length="58342747" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>We've got some special treats for you this week on the show. It's the long-awaited "installfest" segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There's a lot to get to today on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:21:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;We've got some special treats for you this week on the show. It's the long-awaited "installfest" segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There's a lot to get to today on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD's new testing infrastructure&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A new test suite was added to FreeBSD, with 3 powerful machines available&lt;/li&gt;
&lt;li&gt;Both -CURRENT and stable/10 have got the test suite build infrastructure in place&lt;/li&gt;
&lt;li&gt;Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM&lt;/li&gt;
&lt;li&gt;More details &lt;a href="http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html" target="_blank" rel="nofollow noopener"&gt;available here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Could the iXsystems monster server be involved...?
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=138845902916897&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD gets signify&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;At long last, OpenBSD gets support for signed releases!&lt;/li&gt;
&lt;li&gt;For "the world's most secure OS" it was very easy to MITM kernel patches, updates, installer isos, everything&lt;/li&gt;
&lt;li&gt;A commit to the -current tree reveals a new "signify" tool is currently being kicked around&lt;/li&gt;
&lt;li&gt;More details in &lt;a href="http://www.tedunangst.com/flak/post/signify" target="_blank" rel="nofollow noopener"&gt;a blog post&lt;/a&gt; from the guy who committed it&lt;/li&gt;
&lt;li&gt;Quote: "yeah, briefly, the plan is to sign sets and packages. that's still work in progress."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This time they interview Isabell Long&lt;/li&gt;
&lt;li&gt;She's a volunteer staff member on the freenode IRC network&lt;/li&gt;
&lt;li&gt;In 2011, she participated in the Google Code-In contest and became involved with documentation&lt;/li&gt;
&lt;li&gt;"The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html" target="_blank" rel="nofollow noopener"&gt;pkgsrc-2013Q4 branched&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The quarterly pkgsrc branch from NetBSD is out&lt;/li&gt;
&lt;li&gt;13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!&lt;/li&gt;
&lt;li&gt;Lots of numbers and stats in the announcement&lt;/li&gt;
&lt;li&gt;pkgsrc works on quite a few different OSes, not just NetBSD&lt;/li&gt;
&lt;li&gt;See &lt;a href="http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells" target="_blank" rel="nofollow noopener"&gt;our interview&lt;/a&gt; with Amitai Schlair for a bit about pkgsrc
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://marc.info/?l=openbsd-misc&amp;amp;m=138610199311393&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;OpenBSD on Google's Compute Engine&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Google Compute Engine is a "cloud computing" platform similar to EC2&lt;/li&gt;
&lt;li&gt;Unfortunately, they only offer poor choices for the OS (Debian and CentOS)&lt;/li&gt;
&lt;li&gt;Recently it's been announced that there is a custom OS option&lt;/li&gt;
&lt;li&gt;It's using a WIP virtio-scsi driver, lots of things still need more work&lt;/li&gt;
&lt;li&gt;Lots of technical and networking details about the struggles to get OpenBSD working on it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;The Installfest&lt;/h2&gt;

&lt;p&gt;We'll be showing you the installer of each of the main BSDs. As of the date this episode airs, we're using:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FreeBSD 10.0&lt;/li&gt;
&lt;li&gt;OpenBSD 5.4&lt;/li&gt;
&lt;li&gt;NetBSD 6.1.2&lt;/li&gt;
&lt;li&gt;DragonflyBSD 3.6&lt;/li&gt;
&lt;li&gt;PCBSD 10.0
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://ctors.net/2013/12/30/openbsd_wireless_access_point" target="_blank" rel="nofollow noopener"&gt;Building an OpenBSD wireless access point&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A neat write up we found around the internet about making an OpenBSD wifi router&lt;/li&gt;
&lt;li&gt;Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless&lt;/li&gt;
&lt;li&gt;Even includes a puffy sticker on the Soekris box at the end, how cute
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blather.michaelwlucas.com/archives/1919" target="_blank" rel="nofollow noopener"&gt;FreeBSD 4.X jails on 10.0&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Blog entry from our buddy &lt;a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" target="_blank" rel="nofollow noopener"&gt;Michael Lucas&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;For whatever reason (an "in-house application"), he needed to run a FreeBSD 4 jail in FreeBSD 10&lt;/li&gt;
&lt;li&gt;Talks about the options he had: porting software, virtualizing, dealing with slow old hardware&lt;/li&gt;
&lt;li&gt;He goes through the whole process of making an ancient jail&lt;/li&gt;
&lt;li&gt;It's "an acceptable trade-off, if it means I don’t have to touch actual PHP code."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/" target="_blank" rel="nofollow noopener"&gt;Unscrewed: a story about OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Pretty long blog post about how a network admin used OpenBSD to save the day&lt;/li&gt;
&lt;li&gt;To set the tone, "It was 5am, and the network was down"&lt;/li&gt;
&lt;li&gt;Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD&lt;/li&gt;
&lt;li&gt;Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;10.0-RC3 is out and ready to be tested&lt;/li&gt;
&lt;li&gt;New detection of ATI Hybrid Graphics, they're working on nVidia next&lt;/li&gt;
&lt;li&gt;Re-classifying Linux jails as unsupported / experimental
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2uns1hMml" target="_blank" rel="nofollow noopener"&gt;Daniel writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2MeJNCCiu" target="_blank" rel="nofollow noopener"&gt;Erik writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21fBXkP2K" target="_blank" rel="nofollow noopener"&gt;SW writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;[Bostjan writes in[(&lt;a href="http://slexy.org/view/s20N9bfkum" target="_blank" rel="nofollow noopener"&gt;http://slexy.org/view/s20N9bfkum&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20FU9wUO5" target="_blank" rel="nofollow noopener"&gt;Samuel writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, contest, pillow, giveaway, competition, sweepstakes, router, tuning, performance, dnscrypt, dnscurve, opendns, pkgsrc, testing, megacore, ixsystems, signify, signed packages, sets, mitm, gce, google compute engine, access point, jails, installfest, installer, sysinstall, bsdinstall, pc-sysinstall</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We&#39;ve got some special treats for you this week on the show. It&#39;s the long-awaited &quot;installfest&quot; segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There&#39;s a lot to get to today on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html" rel="nofollow">FreeBSD&#39;s new testing infrastructure</a></h3>

<ul>
<li>A new test suite was added to FreeBSD, with 3 powerful machines available</li>
<li>Both -CURRENT and stable/10 have got the test suite build infrastructure in place</li>
<li>Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM</li>
<li>More details <a href="http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html" rel="nofollow">available here</a></li>
<li>Could the iXsystems monster server be involved...?
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138845902916897&w=2" rel="nofollow">OpenBSD gets signify</a></h3>

<ul>
<li>At long last, OpenBSD gets support for signed releases!</li>
<li>For &quot;the world&#39;s most secure OS&quot; it was very easy to MITM kernel patches, updates, installer isos, everything</li>
<li>A commit to the -current tree reveals a new &quot;signify&quot; tool is currently being kicked around</li>
<li>More details in <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">a blog post</a> from the guy who committed it</li>
<li>Quote: &quot;yeah, briefly, the plan is to sign sets and packages. that&#39;s still work in progress.&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This time they interview Isabell Long</li>
<li>She&#39;s a volunteer staff member on the freenode IRC network</li>
<li>In 2011, she participated in the Google Code-In contest and became involved with documentation</li>
<li>&quot;The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved.&quot;
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html" rel="nofollow">pkgsrc-2013Q4 branched</a></h3>

<ul>
<li>The quarterly pkgsrc branch from NetBSD is out</li>
<li>13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!</li>
<li>Lots of numbers and stats in the announcement</li>
<li>pkgsrc works on quite a few different OSes, not just NetBSD</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells" rel="nofollow">our interview</a> with Amitai Schlair for a bit about pkgsrc
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>Google Compute Engine is a &quot;cloud computing&quot; platform similar to EC2</li>
<li>Unfortunately, they only offer poor choices for the OS (Debian and CentOS)</li>
<li>Recently it&#39;s been announced that there is a custom OS option</li>
<li>It&#39;s using a WIP virtio-scsi driver, lots of things still need more work</li>
<li>Lots of technical and networking details about the struggles to get OpenBSD working on it
***</li>
</ul>

<h2>The Installfest</h2>

<p>We&#39;ll be showing you the installer of each of the main BSDs. As of the date this episode airs, we&#39;re using:</p>

<ul>
<li>FreeBSD 10.0</li>
<li>OpenBSD 5.4</li>
<li>NetBSD 6.1.2</li>
<li>DragonflyBSD 3.6</li>
<li>PCBSD 10.0
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ctors.net/2013/12/30/openbsd_wireless_access_point" rel="nofollow">Building an OpenBSD wireless access point</a></h3>

<ul>
<li>A neat write up we found around the internet about making an OpenBSD wifi router</li>
<li>Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless</li>
<li>Even includes a puffy sticker on the Soekris box at the end, how cute
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1919" rel="nofollow">FreeBSD 4.X jails on 10.0</a></h3>

<ul>
<li>Blog entry from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>For whatever reason (an &quot;in-house application&quot;), he needed to run a FreeBSD 4 jail in FreeBSD 10</li>
<li>Talks about the options he had: porting software, virtualizing, dealing with slow old hardware</li>
<li>He goes through the whole process of making an ancient jail</li>
<li>It&#39;s &quot;an acceptable trade-off, if it means I don’t have to touch actual PHP code.&quot;
***</li>
</ul>

<h3><a href="http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/" rel="nofollow">Unscrewed: a story about OpenBSD</a></h3>

<ul>
<li>Pretty long blog post about how a network admin used OpenBSD to save the day</li>
<li>To set the tone, &quot;It was 5am, and the network was down&quot;</li>
<li>Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD</li>
<li>Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC3 is out and ready to be tested</li>
<li>New detection of ATI Hybrid Graphics, they&#39;re working on nVidia next</li>
<li>Re-classifying Linux jails as unsupported / experimental
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2uns1hMml" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2MeJNCCiu" rel="nofollow">Erik writes in</a></li>
<li><a href="http://slexy.org/view/s21fBXkP2K" rel="nofollow">SW writes in</a></li>
<li>[Bostjan writes in[(<a href="http://slexy.org/view/s20N9bfkum" rel="nofollow">http://slexy.org/view/s20N9bfkum</a>)</li>
<li><a href="http://slexy.org/view/s20FU9wUO5" rel="nofollow">Samuel writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We&#39;ve got some special treats for you this week on the show. It&#39;s the long-awaited &quot;installfest&quot; segment, where we go through the installer of each of the different BSDs. Of course we also have your feedback and the latest news as well... and... we even have our very first viewer contest! There&#39;s a lot to get to today on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-hackers/2013-December/044009.html" rel="nofollow">FreeBSD&#39;s new testing infrastructure</a></h3>

<ul>
<li>A new test suite was added to FreeBSD, with 3 powerful machines available</li>
<li>Both -CURRENT and stable/10 have got the test suite build infrastructure in place</li>
<li>Designed to help developers test and improve major scalability across huge amounts of CPUs and RAM</li>
<li>More details <a href="http://julipedia.meroh.net/2013/12/introducing-freebsd-test-suite.html" rel="nofollow">available here</a></li>
<li>Could the iXsystems monster server be involved...?
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-cvs&m=138845902916897&w=2" rel="nofollow">OpenBSD gets signify</a></h3>

<ul>
<li>At long last, OpenBSD gets support for signed releases!</li>
<li>For &quot;the world&#39;s most secure OS&quot; it was very easy to MITM kernel patches, updates, installer isos, everything</li>
<li>A commit to the -current tree reveals a new &quot;signify&quot; tool is currently being kicked around</li>
<li>More details in <a href="http://www.tedunangst.com/flak/post/signify" rel="nofollow">a blog post</a> from the guy who committed it</li>
<li>Quote: &quot;yeah, briefly, the plan is to sign sets and packages. that&#39;s still work in progress.&quot;
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.ca/2013/12/faces-of-freebsd-isabell-long.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This time they interview Isabell Long</li>
<li>She&#39;s a volunteer staff member on the freenode IRC network</li>
<li>In 2011, she participated in the Google Code-In contest and became involved with documentation</li>
<li>&quot;The new committer mentoring process proved very useful and that, plus the accepting community of FreeBSD, are reasons why I stay involved.&quot;
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/12/31/msg019107.html" rel="nofollow">pkgsrc-2013Q4 branched</a></h3>

<ul>
<li>The quarterly pkgsrc branch from NetBSD is out</li>
<li>13472 total packages for NetBSD-current/amd64 + 13049 binary packages built with clang!</li>
<li>Lots of numbers and stats in the announcement</li>
<li>pkgsrc works on quite a few different OSes, not just NetBSD</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_20-collecting_shells" rel="nofollow">our interview</a> with Amitai Schlair for a bit about pkgsrc
***</li>
</ul>

<h3><a href="http://marc.info/?l=openbsd-misc&m=138610199311393&w=2" rel="nofollow">OpenBSD on Google&#39;s Compute Engine</a></h3>

<ul>
<li>Google Compute Engine is a &quot;cloud computing&quot; platform similar to EC2</li>
<li>Unfortunately, they only offer poor choices for the OS (Debian and CentOS)</li>
<li>Recently it&#39;s been announced that there is a custom OS option</li>
<li>It&#39;s using a WIP virtio-scsi driver, lots of things still need more work</li>
<li>Lots of technical and networking details about the struggles to get OpenBSD working on it
***</li>
</ul>

<h2>The Installfest</h2>

<p>We&#39;ll be showing you the installer of each of the main BSDs. As of the date this episode airs, we&#39;re using:</p>

<ul>
<li>FreeBSD 10.0</li>
<li>OpenBSD 5.4</li>
<li>NetBSD 6.1.2</li>
<li>DragonflyBSD 3.6</li>
<li>PCBSD 10.0
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://ctors.net/2013/12/30/openbsd_wireless_access_point" rel="nofollow">Building an OpenBSD wireless access point</a></h3>

<ul>
<li>A neat write up we found around the internet about making an OpenBSD wifi router</li>
<li>Goes through the process of PXE booting, installing base, using a serial console, setting up networking and wireless</li>
<li>Even includes a puffy sticker on the Soekris box at the end, how cute
***</li>
</ul>

<h3><a href="http://blather.michaelwlucas.com/archives/1919" rel="nofollow">FreeBSD 4.X jails on 10.0</a></h3>

<ul>
<li>Blog entry from our buddy <a href="http://www.bsdnow.tv/episodes/2013_11_06-year_of_the_bsd_desktop" rel="nofollow">Michael Lucas</a></li>
<li>For whatever reason (an &quot;in-house application&quot;), he needed to run a FreeBSD 4 jail in FreeBSD 10</li>
<li>Talks about the options he had: porting software, virtualizing, dealing with slow old hardware</li>
<li>He goes through the whole process of making an ancient jail</li>
<li>It&#39;s &quot;an acceptable trade-off, if it means I don’t have to touch actual PHP code.&quot;
***</li>
</ul>

<h3><a href="http://www.skeptech.org/blog/2013/01/13/unscrewed-a-story-about-openbsd/" rel="nofollow">Unscrewed: a story about OpenBSD</a></h3>

<ul>
<li>Pretty long blog post about how a network admin used OpenBSD to save the day</li>
<li>To set the tone, &quot;It was 5am, and the network was down&quot;</li>
<li>Great war story about replacing expensive routers and networking equipment with cheaper hardware and BSD</li>
<li>Mentions a lot of the built in tools and how OpenBSD is great for routers and high security applications
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2014/01/pc-bsd-weekly-feature-digest-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0-RC3 is out and ready to be tested</li>
<li>New detection of ATI Hybrid Graphics, they&#39;re working on nVidia next</li>
<li>Re-classifying Linux jails as unsupported / experimental
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2uns1hMml" rel="nofollow">Daniel writes in</a></li>
<li><a href="http://slexy.org/view/s2MeJNCCiu" rel="nofollow">Erik writes in</a></li>
<li><a href="http://slexy.org/view/s21fBXkP2K" rel="nofollow">SW writes in</a></li>
<li>[Bostjan writes in[(<a href="http://slexy.org/view/s20N9bfkum" rel="nofollow">http://slexy.org/view/s20N9bfkum</a>)</li>
<li><a href="http://slexy.org/view/s20FU9wUO5" rel="nofollow">Samuel writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>18: Eclipsing Binaries</title>
  <link>https://www.bsdnow.tv/18</link>
  <guid isPermaLink="false">96a80a26-313b-4891-a505-fa71245e4e84</guid>
  <pubDate>Wed, 01 Jan 2014 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/96a80a26-313b-4891-a505-fa71245e4e84.mp3" length="50662433" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Put away the Christmas trees and update your ports trees! We're back with the first show of 2014, and we've got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we'll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:10:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Put away the Christmas trees and update your ports trees! We're back with the first show of 2014, and we've got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we'll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-shteryana-shopova.html" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our first one details Shteryana Shopova, the local organizer for EuroBSDCon 2014 in Sophia&lt;/li&gt;
&lt;li&gt;Gives some information about how she got into BSD&lt;/li&gt;
&lt;li&gt;"I installed FreeBSD on my laptop, alongside the Windows and Slackware Linux I was running on it at the time. Several months later I realized that apart from FreeBSD, I hadn't booted the other two operating systems in months. So I wiped them out."&lt;/li&gt;
&lt;li&gt;She wrote bsnmpd and extended it with the help of a grant from the FreeBSD Foundation&lt;/li&gt;
&lt;li&gt;We've also got one for &lt;a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-kevin-martin.html" target="_blank" rel="nofollow noopener"&gt;Kevin Martin&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Started off with a pinball website, ended up learning about FreeBSD from an ISP and starting his own hosting company&lt;/li&gt;
&lt;li&gt;"FreeBSD has been an asset to our operations, and while we have branched out a bit, we still primarily use FreeBSD and promote it whenever possible.  FreeBSD is a terrific technology with a terrific community."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/12/19/13008.html" target="_blank" rel="nofollow noopener"&gt;OpenPF?&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A blog post over at the &lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;Dragonfly digest&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;What if we had some cross platform development of OpenBSD's firewall?&lt;/li&gt;
&lt;li&gt;Similar to portable &lt;a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" target="_blank" rel="nofollow noopener"&gt;OpenSSH&lt;/a&gt; or &lt;a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" target="_blank" rel="nofollow noopener"&gt;OpenZFS&lt;/a&gt;, there could be a centrally-developed version with compatibility glue&lt;/li&gt;
&lt;li&gt;Right now FreeBSD 9's pf is old, FreeBSD 10's pf is old (but has the best performance of any implementation due to custom patches), NetBSD's pf is old (but they're working on a fork) and Dragonfly's pf is old&lt;/li&gt;
&lt;li&gt;Further complicated by the fact that PF itself doesn’t have a version number, since it was designed to just be ‘the pf that came with OpenBSD 5.4’&lt;/li&gt;
&lt;li&gt;Not likely to happen any time soon, but it's good food for thought
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mxey.net/the-year-of-freebsd-on-the-server/" target="_blank" rel="nofollow noopener"&gt;Year of BSD on the server&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A good blog post about switching servers from Linux to BSD&lt;/li&gt;
&lt;li&gt;2014 is going to be the year of a lot of switching, due to FreeBSD 10's amazing new features&lt;/li&gt;
&lt;li&gt;This author was particularly taken with &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng&lt;/a&gt; and the more coherent layout of BSD systems&lt;/li&gt;
&lt;li&gt;Similarly, there was also a recent &lt;a href="http://www.reddit.com/r/BSD/comments/1tdrz1/why_did_you_choose_bsd_over_linux/" target="_blank" rel="nofollow noopener"&gt;reddit thread&lt;/a&gt;, "Why did you choose BSD over Linux?"&lt;/li&gt;
&lt;li&gt;Both are excellent reads for Linux users that are thinking about making the switch, send 'em to your friends
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2013/12/24/getting-to-know-your-portmgr-bryan-drewery/" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This time in the series they interview Bryan Drewery, a fairly new addition to the team&lt;/li&gt;
&lt;li&gt;He started maintaining portupgrade and portmaster, and eventually ended up on the ports management team&lt;/li&gt;
&lt;li&gt;Believe it or not, his wife actually had a lot to do with him getting into FreeBSD full-time&lt;/li&gt;
&lt;li&gt;Lots of fun trivia and background about him&lt;/li&gt;
&lt;li&gt;Speaking of portmgr, our interview for today is...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Baptiste Daroussin - &lt;a href="mailto:bapt@freebsd.org" target="_blank" rel="nofollow noopener"&gt;bapt@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The future of FreeBSD's &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;binary packages&lt;/a&gt;, ports' features, various topics&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=aD-2e9u3tug" target="_blank" rel="nofollow noopener"&gt;pfSense december hang out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Interview/presentation from pfSense developer Chris Buechler with an &lt;a href="http://blog.pfsense.org/?p=1146" target="_blank" rel="nofollow noopener"&gt;accompanying blog post&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;"This is the first in what will be a monthly recurring series. Each month, we’ll have a how to tutorial on a specific topic or area of the system, and updates on development and other happenings with the project. We have several topics in mind, but also welcome community suggestions on topics"&lt;/li&gt;
&lt;li&gt;Speaking of pfSense, they recently opened an &lt;a href="http://blog.pfsense.org/?p=1156" target="_blank" rel="nofollow noopener"&gt;online store&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;We're planning on having a pfSense episode next month!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1854-carp-on-freebsd-how-to-use-devd-to-take-action-on-kernel-events" target="_blank" rel="nofollow noopener"&gt;BSDMag December issue is out&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The free monthly BSD magazine gets a new release for December&lt;/li&gt;
&lt;li&gt;Topics include CARP on FreeBSD, more BSD programming, "unix basics for security professionals," some kernel introductions, using OpenBSD as a transparent proxy with relayd, GhostBSD overview and some stuff about SSH
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131217081921" target="_blank" rel="nofollow noopener"&gt;OpenBSD gets tmpfs&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In addition to the recently-added FUSE support, OpenBSD now has tmpfs&lt;/li&gt;
&lt;li&gt;To get more testing, it was enabled by default in -current&lt;/li&gt;
&lt;li&gt;Should make its way into 5.5 if everything goes according to plan&lt;/li&gt;
&lt;li&gt;Enables lots of new possibilities, like our &lt;a href="http://www.bsdnow.tv/tutorials/ccache" target="_blank" rel="nofollow noopener"&gt;ccache and tmpfs guide&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-122013/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digests&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Catching up with all the work going on in PCBSD land..&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blog.pcbsd.org/2013/12/weekly-feature-digest-122713/" target="_blank" rel="nofollow noopener"&gt;10.0-RC2 is now available&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The big pkgng 1.2 problems seem to have been worked out
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2UrUzlnf6" target="_blank" rel="nofollow noopener"&gt;Remy writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iqnywwKX" target="_blank" rel="nofollow noopener"&gt;Jason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2IUcPySbh" target="_blank" rel="nofollow noopener"&gt;Rob writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21aYlbXz2" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21vrYSqU8" target="_blank" rel="nofollow noopener"&gt;Stuart writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, binary, upgrade, update, openbsd-binary-upgrade, freebsd-update, patches, signed, bapt, portmgr, ports, binary star, packages, pkgng, tmpfs, pkg_add, pf, firewall, pfsense, hangout, switching from linux to bsd, linux bsd differences, bsdmag</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Put away the Christmas trees and update your ports trees! We&#39;re back with the first show of 2014, and we&#39;ve got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we&#39;ll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-shteryana-shopova.html" rel="nofollow">Faces of FreeBSD continues</a></h3>

<ul>
<li>Our first one details Shteryana Shopova, the local organizer for EuroBSDCon 2014 in Sophia</li>
<li>Gives some information about how she got into BSD</li>
<li>&quot;I installed FreeBSD on my laptop, alongside the Windows and Slackware Linux I was running on it at the time. Several months later I realized that apart from FreeBSD, I hadn&#39;t booted the other two operating systems in months. So I wiped them out.&quot;</li>
<li>She wrote bsnmpd and extended it with the help of a grant from the FreeBSD Foundation</li>
<li>We&#39;ve also got one for <a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-kevin-martin.html" rel="nofollow">Kevin Martin</a></li>
<li>Started off with a pinball website, ended up learning about FreeBSD from an ISP and starting his own hosting company</li>
<li>&quot;FreeBSD has been an asset to our operations, and while we have branched out a bit, we still primarily use FreeBSD and promote it whenever possible.  FreeBSD is a terrific technology with a terrific community.&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/19/13008.html" rel="nofollow">OpenPF?</a></h3>

<ul>
<li>A blog post over at the <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Dragonfly digest</a></li>
<li>What if we had some cross platform development of OpenBSD&#39;s firewall?</li>
<li>Similar to portable <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">OpenSSH</a> or <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">OpenZFS</a>, there could be a centrally-developed version with compatibility glue</li>
<li>Right now FreeBSD 9&#39;s pf is old, FreeBSD 10&#39;s pf is old (but has the best performance of any implementation due to custom patches), NetBSD&#39;s pf is old (but they&#39;re working on a fork) and Dragonfly&#39;s pf is old</li>
<li>Further complicated by the fact that PF itself doesn’t have a version number, since it was designed to just be ‘the pf that came with OpenBSD 5.4’</li>
<li>Not likely to happen any time soon, but it&#39;s good food for thought
***</li>
</ul>

<h3><a href="http://mxey.net/the-year-of-freebsd-on-the-server/" rel="nofollow">Year of BSD on the server</a></h3>

<ul>
<li>A good blog post about switching servers from Linux to BSD</li>
<li>2014 is going to be the year of a lot of switching, due to FreeBSD 10&#39;s amazing new features</li>
<li>This author was particularly taken with <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> and the more coherent layout of BSD systems</li>
<li>Similarly, there was also a recent <a href="http://www.reddit.com/r/BSD/comments/1tdrz1/why_did_you_choose_bsd_over_linux/" rel="nofollow">reddit thread</a>, &quot;Why did you choose BSD over Linux?&quot;</li>
<li>Both are excellent reads for Linux users that are thinking about making the switch, send &#39;em to your friends
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/24/getting-to-know-your-portmgr-bryan-drewery/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>This time in the series they interview Bryan Drewery, a fairly new addition to the team</li>
<li>He started maintaining portupgrade and portmaster, and eventually ended up on the ports management team</li>
<li>Believe it or not, his wife actually had a lot to do with him getting into FreeBSD full-time</li>
<li>Lots of fun trivia and background about him</li>
<li>Speaking of portmgr, our interview for today is...
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>The future of FreeBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">binary packages</a>, ports&#39; features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=aD-2e9u3tug" rel="nofollow">pfSense december hang out</a></h3>

<ul>
<li>Interview/presentation from pfSense developer Chris Buechler with an <a href="http://blog.pfsense.org/?p=1146" rel="nofollow">accompanying blog post</a></li>
<li>&quot;This is the first in what will be a monthly recurring series. Each month, we’ll have a how to tutorial on a specific topic or area of the system, and updates on development and other happenings with the project. We have several topics in mind, but also welcome community suggestions on topics&quot;</li>
<li>Speaking of pfSense, they recently opened an <a href="http://blog.pfsense.org/?p=1156" rel="nofollow">online store</a></li>
<li>We&#39;re planning on having a pfSense episode next month!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1854-carp-on-freebsd-how-to-use-devd-to-take-action-on-kernel-events" rel="nofollow">BSDMag December issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine gets a new release for December</li>
<li>Topics include CARP on FreeBSD, more BSD programming, &quot;unix basics for security professionals,&quot; some kernel introductions, using OpenBSD as a transparent proxy with relayd, GhostBSD overview and some stuff about SSH
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131217081921" rel="nofollow">OpenBSD gets tmpfs</a></h3>

<ul>
<li>In addition to the recently-added FUSE support, OpenBSD now has tmpfs</li>
<li>To get more testing, it was enabled by default in -current</li>
<li>Should make its way into 5.5 if everything goes according to plan</li>
<li>Enables lots of new possibilities, like our <a href="http://www.bsdnow.tv/tutorials/ccache" rel="nofollow">ccache and tmpfs guide</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-122013/" rel="nofollow">PCBSD weekly digests</a></h3>

<ul>
<li>Catching up with all the work going on in PCBSD land..</li>
<li><a href="http://blog.pcbsd.org/2013/12/weekly-feature-digest-122713/" rel="nofollow">10.0-RC2 is now available</a></li>
<li>The big pkgng 1.2 problems seem to have been worked out
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UrUzlnf6" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2iqnywwKX" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2IUcPySbh" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s21aYlbXz2" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21vrYSqU8" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Put away the Christmas trees and update your ports trees! We&#39;re back with the first show of 2014, and we&#39;ve got some catching up to do. This time on the show, we have an interview with Baptiste Daroussin about the future of FreeBSD binary packages. Following that, we&#39;ll be highlighting a cool script to do binary upgrades on OpenBSD. Lots of holiday news and listener feedback, on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-shteryana-shopova.html" rel="nofollow">Faces of FreeBSD continues</a></h3>

<ul>
<li>Our first one details Shteryana Shopova, the local organizer for EuroBSDCon 2014 in Sophia</li>
<li>Gives some information about how she got into BSD</li>
<li>&quot;I installed FreeBSD on my laptop, alongside the Windows and Slackware Linux I was running on it at the time. Several months later I realized that apart from FreeBSD, I hadn&#39;t booted the other two operating systems in months. So I wiped them out.&quot;</li>
<li>She wrote bsnmpd and extended it with the help of a grant from the FreeBSD Foundation</li>
<li>We&#39;ve also got one for <a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-kevin-martin.html" rel="nofollow">Kevin Martin</a></li>
<li>Started off with a pinball website, ended up learning about FreeBSD from an ISP and starting his own hosting company</li>
<li>&quot;FreeBSD has been an asset to our operations, and while we have branched out a bit, we still primarily use FreeBSD and promote it whenever possible.  FreeBSD is a terrific technology with a terrific community.&quot;
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/19/13008.html" rel="nofollow">OpenPF?</a></h3>

<ul>
<li>A blog post over at the <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Dragonfly digest</a></li>
<li>What if we had some cross platform development of OpenBSD&#39;s firewall?</li>
<li>Similar to portable <a href="http://www.bsdnow.tv/episodes/2013_12_18-cryptocrystalline" rel="nofollow">OpenSSH</a> or <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">OpenZFS</a>, there could be a centrally-developed version with compatibility glue</li>
<li>Right now FreeBSD 9&#39;s pf is old, FreeBSD 10&#39;s pf is old (but has the best performance of any implementation due to custom patches), NetBSD&#39;s pf is old (but they&#39;re working on a fork) and Dragonfly&#39;s pf is old</li>
<li>Further complicated by the fact that PF itself doesn’t have a version number, since it was designed to just be ‘the pf that came with OpenBSD 5.4’</li>
<li>Not likely to happen any time soon, but it&#39;s good food for thought
***</li>
</ul>

<h3><a href="http://mxey.net/the-year-of-freebsd-on-the-server/" rel="nofollow">Year of BSD on the server</a></h3>

<ul>
<li>A good blog post about switching servers from Linux to BSD</li>
<li>2014 is going to be the year of a lot of switching, due to FreeBSD 10&#39;s amazing new features</li>
<li>This author was particularly taken with <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng</a> and the more coherent layout of BSD systems</li>
<li>Similarly, there was also a recent <a href="http://www.reddit.com/r/BSD/comments/1tdrz1/why_did_you_choose_bsd_over_linux/" rel="nofollow">reddit thread</a>, &quot;Why did you choose BSD over Linux?&quot;</li>
<li>Both are excellent reads for Linux users that are thinking about making the switch, send &#39;em to your friends
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/24/getting-to-know-your-portmgr-bryan-drewery/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>This time in the series they interview Bryan Drewery, a fairly new addition to the team</li>
<li>He started maintaining portupgrade and portmaster, and eventually ended up on the ports management team</li>
<li>Believe it or not, his wife actually had a lot to do with him getting into FreeBSD full-time</li>
<li>Lots of fun trivia and background about him</li>
<li>Speaking of portmgr, our interview for today is...
***</li>
</ul>

<h2>Interview - Baptiste Daroussin - <a href="mailto:bapt@freebsd.org" rel="nofollow">bapt@freebsd.org</a></h2>

<p>The future of FreeBSD&#39;s <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">binary packages</a>, ports&#39; features, various topics</p>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=aD-2e9u3tug" rel="nofollow">pfSense december hang out</a></h3>

<ul>
<li>Interview/presentation from pfSense developer Chris Buechler with an <a href="http://blog.pfsense.org/?p=1146" rel="nofollow">accompanying blog post</a></li>
<li>&quot;This is the first in what will be a monthly recurring series. Each month, we’ll have a how to tutorial on a specific topic or area of the system, and updates on development and other happenings with the project. We have several topics in mind, but also welcome community suggestions on topics&quot;</li>
<li>Speaking of pfSense, they recently opened an <a href="http://blog.pfsense.org/?p=1156" rel="nofollow">online store</a></li>
<li>We&#39;re planning on having a pfSense episode next month!
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1854-carp-on-freebsd-how-to-use-devd-to-take-action-on-kernel-events" rel="nofollow">BSDMag December issue is out</a></h3>

<ul>
<li>The free monthly BSD magazine gets a new release for December</li>
<li>Topics include CARP on FreeBSD, more BSD programming, &quot;unix basics for security professionals,&quot; some kernel introductions, using OpenBSD as a transparent proxy with relayd, GhostBSD overview and some stuff about SSH
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131217081921" rel="nofollow">OpenBSD gets tmpfs</a></h3>

<ul>
<li>In addition to the recently-added FUSE support, OpenBSD now has tmpfs</li>
<li>To get more testing, it was enabled by default in -current</li>
<li>Should make its way into 5.5 if everything goes according to plan</li>
<li>Enables lots of new possibilities, like our <a href="http://www.bsdnow.tv/tutorials/ccache" rel="nofollow">ccache and tmpfs guide</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-122013/" rel="nofollow">PCBSD weekly digests</a></h3>

<ul>
<li>Catching up with all the work going on in PCBSD land..</li>
<li><a href="http://blog.pcbsd.org/2013/12/weekly-feature-digest-122713/" rel="nofollow">10.0-RC2 is now available</a></li>
<li>The big pkgng 1.2 problems seem to have been worked out
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2UrUzlnf6" rel="nofollow">Remy writes in</a></li>
<li><a href="http://slexy.org/view/s2iqnywwKX" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2IUcPySbh" rel="nofollow">Rob writes in</a></li>
<li><a href="http://slexy.org/view/s21aYlbXz2" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21vrYSqU8" rel="nofollow">Stuart writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>17: The Gift of Giving</title>
  <link>https://www.bsdnow.tv/17</link>
  <guid isPermaLink="false">c51be78b-bd80-4b82-ac8c-4c8a6a8a1116</guid>
  <pubDate>Wed, 25 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/c51be78b-bd80-4b82-ac8c-4c8a6a8a1116.mp3" length="13521166" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>Merry Christmas everyone! We're taking the holiday off and just have an interview for you today. We sat down with Scott Long to discuss using FreeBSD at Netflix and lots of other things. Next week we will return with the normal round of news and tutorials.</itunes:subtitle>
  <itunes:duration>18:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;Merry Christmas everyone! We're taking the holiday off and just have an interview for you today. We sat down with Scott Long to discuss using FreeBSD at Netflix and lots of other things. Next week we will return with the normal round of news and tutorials.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Interview - Scott Long - &lt;a href="mailto:scottl@freebsd.org" target="_blank" rel="nofollow noopener"&gt;scottl@freebsd.org&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD at Netflix, OpenConnect, network performance, various topics&lt;/p&gt;

&lt;hr&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, netflix, yahoo, scott long, scottl, release engineering, cdn, openconnect, high performance, ssd, raid, gigabit, tuning</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Merry Christmas everyone! We&#39;re taking the holiday off and just have an interview for you today. We sat down with Scott Long to discuss using FreeBSD at Netflix and lots of other things. Next week we will return with the normal round of news and tutorials.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - Scott Long - <a href="mailto:scottl@freebsd.org" rel="nofollow">scottl@freebsd.org</a></h2>

<p>FreeBSD at Netflix, OpenConnect, network performance, various topics</p>

<hr>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Merry Christmas everyone! We&#39;re taking the holiday off and just have an interview for you today. We sat down with Scott Long to discuss using FreeBSD at Netflix and lots of other things. Next week we will return with the normal round of news and tutorials.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Interview - Scott Long - <a href="mailto:scottl@freebsd.org" rel="nofollow">scottl@freebsd.org</a></h2>

<p>FreeBSD at Netflix, OpenConnect, network performance, various topics</p>

<hr>]]>
  </itunes:summary>
</item>
<item>
  <title>16: Cryptocrystalline</title>
  <link>https://www.bsdnow.tv/16</link>
  <guid isPermaLink="false">d9af27cf-c4ff-4572-b119-cbfd0e4167c8</guid>
  <pubDate>Wed, 18 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/d9af27cf-c4ff-4572-b119-cbfd0e4167c8.mp3" length="79454910" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:50:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you're into data security, today's the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" target="_blank" rel="nofollow noopener"&gt;Secure communications with OpenBSD and OpenVPN&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Starting off today's theme of encryption...&lt;/li&gt;
&lt;li&gt;A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic&lt;/li&gt;
&lt;li&gt;Part 1 covers installing OpenBSD with full disk encryption (which we'll be doing later on in the show)&lt;/li&gt;
&lt;li&gt;Part 2 covers the initial setup of OpenVPN certificates and keys&lt;/li&gt;
&lt;li&gt;Parts 3 and 4 are the OpenVPN server and client configuration&lt;/li&gt;
&lt;li&gt;Part 5 is some updates and closing remarks
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" target="_blank" rel="nofollow noopener"&gt;FreeBSD Foundation Newsletter&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The December 2013 semi-annual newsletter was sent out from the foundation&lt;/li&gt;
&lt;li&gt;In the newsletter you will find the president's letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored&lt;/li&gt;
&lt;li&gt;The president's letter alone is worth the read, really amazing&lt;/li&gt;
&lt;li&gt;Really long, with lots of details and stories from the conferences and projects
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://evertiq.com/design/33394" target="_blank" rel="nofollow noopener"&gt;Use of NetBSD with Marvell Kirkwood Processors&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer&lt;/li&gt;
&lt;li&gt;The IP-Plug is a "multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger)."&lt;/li&gt;
&lt;li&gt;Really cool little NetBSD ARM project with lots of graphs, pictures and details
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" target="_blank" rel="nofollow noopener"&gt;Experimenting with zero-copy network IO&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD&lt;/li&gt;
&lt;li&gt;Discusses the different OS' implementations and options&lt;/li&gt;
&lt;li&gt;He's able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn't stopping there&lt;/li&gt;
&lt;li&gt;Tons of details, check the full post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Damien Miller - &lt;a href="mailto:djm@openbsd.org" target="_blank" rel="nofollow noopener"&gt;djm@openbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/damienmiller" target="_blank" rel="nofollow noopener"&gt;@damienmiller&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;Cryptography in OpenBSD and OpenSSH&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/fde" target="_blank" rel="nofollow noopener"&gt;Full disk encryption in FreeBSD &amp;amp; OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" target="_blank" rel="nofollow noopener"&gt;OpenZFS office hours&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Our buddy &lt;a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" target="_blank" rel="nofollow noopener"&gt;George Wilson&lt;/a&gt; sat down to take some ZFS questions from the community&lt;/li&gt;
&lt;li&gt;You can see more info about it &lt;a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" target="_blank" rel="nofollow noopener"&gt;License summaries in pkgng&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A discussion between &lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;Justin Sherill&lt;/a&gt; and some NYCBUG guys about license frameworks in pkgng&lt;/li&gt;
&lt;li&gt;Similar to pkgsrc's "ACCEPTABLE_LICENSES" setting, pkgng could let the user decide which software licenses he wants to allow&lt;/li&gt;
&lt;li&gt;Maybe we could get a "pkg licenses" command to display the license of all installed packages&lt;/li&gt;
&lt;li&gt;Ok bapt, do it
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge continues&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Checking in with our buddy from the Linux foundation...&lt;/li&gt;
&lt;li&gt;The switching from Linux to FreeBSD blog series continues for his month-long trial&lt;/li&gt;
&lt;li&gt;Follow up from last week: "As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding."&lt;/li&gt;
&lt;li&gt;Since we last mentioned it, he's decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=336615" target="_blank" rel="nofollow noopener"&gt;Ports gets a stable branch&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;For the first time ever, FreeBSD's ports tree will have a maintained "stable" branch&lt;/li&gt;
&lt;li&gt;This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes&lt;/li&gt;
&lt;li&gt;All commits to this branch require approval of portmgr, looks like it'll start in 2014Q1
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2iRV1tOzB" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21gAR5lgf" target="_blank" rel="nofollow noopener"&gt;Spencer writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s203iOnFh1" target="_blank" rel="nofollow noopener"&gt;Campbell writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2yUqj3vKW" target="_blank" rel="nofollow noopener"&gt;Sha'ul writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2egcTPBXH" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonfly bsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, arm, openssh, sftp, security, damien miller, djm, mindrot, encryption, crypto, chacha20, poly1305, aes, hmac, mac, sha256, cipher, rc4, base64, encode, decode, ed25519, bcrypt, md5, hash, salt, openzfs, office hours, openvpn, vps, vpn, ssl, tun, tap, foundation, newsletter, freebsd journal, ixsystems, ecc, rsa, dsa, ecdsa, tunnel, keys, password, passphrase, full disk encryption, fde, installation, encrypted install, unencrypted</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be showing you how to do a fully-encrypted installation of FreeBSD and OpenBSD. We also have an interview with Damien Miller - one of the lead developers of OpenSSH - about some recent crypto changes in the project. If you&#39;re into data security, today&#39;s the show for you. The latest news and all your burning questions answered, right here on BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://johnchapin.boostrot.net/blog/2013/12/07/secure-comms-with-openbsd-and-openvpn-part-1/" rel="nofollow">Secure communications with OpenBSD and OpenVPN</a></h3>

<ul>
<li>Starting off today&#39;s theme of encryption...</li>
<li>A new blog series about combining OpenBSD and OpenVPN to secure your internet traffic</li>
<li>Part 1 covers installing OpenBSD with full disk encryption (which we&#39;ll be doing later on in the show)</li>
<li>Part 2 covers the initial setup of OpenVPN certificates and keys</li>
<li>Parts 3 and 4 are the OpenVPN server and client configuration</li>
<li>Part 5 is some updates and closing remarks
***</li>
</ul>

<h3><a href="https://www.freebsdfoundation.org/press/2013Dec-newsletter" rel="nofollow">FreeBSD Foundation Newsletter</a></h3>

<ul>
<li>The December 2013 semi-annual newsletter was sent out from the foundation</li>
<li>In the newsletter you will find the president&#39;s letter, articles on the current development projects they sponsor and reports from all the conferences and summits they sponsored</li>
<li>The president&#39;s letter alone is worth the read, really amazing</li>
<li>Really long, with lots of details and stories from the conferences and projects
***</li>
</ul>

<h3><a href="http://evertiq.com/design/33394" rel="nofollow">Use of NetBSD with Marvell Kirkwood Processors</a></h3>

<ul>
<li>Article that gives a brief history of NetBSD and how to use it on an IP-Plug computer</li>
<li>The IP-Plug is a &quot;multi-functional mini-server was developed by Promwad engineers by the order of AK-Systems. It is designed for solving a wide range of tasks in IP networks and can perform the functions of a computer or a server. The IP-Plug is powered from a 220V network and has low power consumption, as well as a small size (which can be compared to the size of a mobile phone charger).&quot;</li>
<li>Really cool little NetBSD ARM project with lots of graphs, pictures and details
***</li>
</ul>

<h3><a href="http://adrianchadd.blogspot.com/2013/12/experimenting-with-zero-copy-network-io.html" rel="nofollow">Experimenting with zero-copy network IO</a></h3>

<ul>
<li>Long blog post from Adrian Chadd about zero-copy network IO on FreeBSD</li>
<li>Discusses the different OS&#39; implementations and options</li>
<li>He&#39;s able to get 35 gbit/sec out of 70,000 active TCP sockets, but isn&#39;t stopping there</li>
<li>Tons of details, check the full post
***</li>
</ul>

<h2>Interview - Damien Miller - <a href="mailto:djm@openbsd.org" rel="nofollow">djm@openbsd.org</a> / <a href="https://twitter.com/damienmiller" rel="nofollow">@damienmiller</a></h2>

<p>Cryptography in OpenBSD and OpenSSH</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/fde" rel="nofollow">Full disk encryption in FreeBSD &amp; OpenBSD</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="https://www.youtube.com/watch?v=wWmVW2R_uz8" rel="nofollow">OpenZFS office hours</a></h3>

<ul>
<li>Our buddy <a href="http://www.bsdnow.tv/episodes/2013_12_04-zettabytes_for_days" rel="nofollow">George Wilson</a> sat down to take some ZFS questions from the community</li>
<li>You can see more info about it <a href="http://open-zfs.org/wiki/OpenZFS_Office_Hours" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/12/09/12934.html" rel="nofollow">License summaries in pkgng</a></h3>

<ul>
<li>A discussion between <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">Justin Sherill</a> and some NYCBUG guys about license frameworks in pkgng</li>
<li>Similar to pkgsrc&#39;s &quot;ACCEPTABLE_LICENSES&quot; setting, pkgng could let the user decide which software licenses he wants to allow</li>
<li>Maybe we could get a &quot;pkg licenses&quot; command to display the license of all installed packages</li>
<li>Ok bapt, do it
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge continues</a></h3>

<ul>
<li>Checking in with our buddy from the Linux foundation...</li>
<li>The switching from Linux to FreeBSD blog series continues for his month-long trial</li>
<li>Follow up from last week: &quot;As a matter of fact, I did check out PC-BSD, and wanted the challenge.  Call me addicted to pain and suffering, but the pride and accomplishment you feel from diving into FreeBSD is quite rewarding.&quot;</li>
<li>Since we last mentioned it, he&#39;s decided to go from a VM to real hardware, got all of his common software installed, experimented with the Linux emulation, set up virtualbox, learned about slices/partitions/disk management, found BSD alternatives to his regularly-used commands and lots more
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=336615" rel="nofollow">Ports gets a stable branch</a></h3>

<ul>
<li>For the first time ever, FreeBSD&#39;s ports tree will have a maintained &quot;stable&quot; branch</li>
<li>This is similar to how pkgsrc does things, with a rolling release for updated software and stable branch for only security and big fixes</li>
<li>All commits to this branch require approval of portmgr, looks like it&#39;ll start in 2014Q1
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2iRV1tOzB" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s21gAR5lgf" rel="nofollow">Spencer writes in</a></li>
<li><a href="http://slexy.org/view/s203iOnFh1" rel="nofollow">Campbell writes in</a></li>
<li><a href="http://slexy.org/view/s2yUqj3vKW" rel="nofollow">Sha&#39;ul writes in</a></li>
<li><a href="http://slexy.org/view/s2egcTPBXH" rel="nofollow">Clint writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>15: Kickin' NAS</title>
  <link>https://www.bsdnow.tv/15</link>
  <guid isPermaLink="false">cbf73b1a-fa1e-4acd-a1c4-ad96edb36916</guid>
  <pubDate>Wed, 11 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/cbf73b1a-fa1e-4acd-a1c4-ad96edb36916.mp3" length="77923925" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:48:13</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we'll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he's on the FreeBSD release engineering team too, and does quite a lot for the project. We've got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;This episode was brought to you by&lt;/h2&gt;

&lt;p&gt;&lt;a href="http://www.ixsystems.com/bsdnow" title="iXsystems" target="_blank" rel="nofollow noopener"&gt;&lt;img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" target="_blank" rel="nofollow noopener"&gt;More faces of FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Another installment of the FoF series&lt;/li&gt;
&lt;li&gt;This time they talk with Reid Linnemann who works at Spectra Logic&lt;/li&gt;
&lt;li&gt;Gives a history of all the different jobs he's done, all the programming languages he knows&lt;/li&gt;
&lt;li&gt;Mentions how he first learned about FreeBSD, actually pretty similar to Kris' story&lt;/li&gt;
&lt;li&gt;"I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD."&lt;/li&gt;
&lt;li&gt;Now works on FreeBSD as his day job&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" target="_blank" rel="nofollow noopener"&gt;The second one&lt;/a&gt; covers Brooks Davis&lt;/li&gt;
&lt;li&gt;FreeBSD committer since 2001 and core team member from 2006 through 2012&lt;/li&gt;
&lt;li&gt;He's helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain&lt;/li&gt;
&lt;li&gt;"One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it."&lt;/li&gt;
&lt;li&gt;Lots more in the show notes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" target="_blank" rel="nofollow noopener"&gt;We cannot trust Intel and Via’s chip-based crypto&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We woke up to see FreeBSD on the front page of &lt;a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" target="_blank" rel="nofollow noopener"&gt;The Register&lt;/a&gt;, &lt;a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" target="_blank" rel="nofollow noopener"&gt;Ars Technica&lt;/a&gt;, &lt;a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" target="_blank" rel="nofollow noopener"&gt;Slashdot&lt;/a&gt; and &lt;a href="https://news.ycombinator.com/item?id=6880474" target="_blank" rel="nofollow noopener"&gt;Hacker News&lt;/a&gt; for their strong stance on security and respecting privacy&lt;/li&gt;
&lt;li&gt;At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.&lt;/li&gt;
&lt;li&gt;FreeBSD's /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA's hardware RNGs as the sole point of entropy&lt;/li&gt;
&lt;li&gt;"It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" target="_blank" rel="nofollow noopener"&gt;OpenSMTPD 5.4.1 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenBSD developers came out with major a new version&lt;/li&gt;
&lt;li&gt;Improved config syntax (please check your smtpd.conf before upgrading)&lt;/li&gt;
&lt;li&gt;Adds support for TLS Perfect Forward Secrecy and custom CA certificate&lt;/li&gt;
&lt;li&gt;MTA, Queue and SMTP server improvements&lt;/li&gt;
&lt;li&gt;SNI support confirmed for the next version&lt;/li&gt;
&lt;li&gt;Check the show notes for the full list of changes, pretty huge release&lt;/li&gt;
&lt;li&gt;Watch &lt;a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" target="_blank" rel="nofollow noopener"&gt;Episode 3&lt;/a&gt; for an interview we did with the developers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" target="_blank" rel="nofollow noopener"&gt;More getting to know your portmgr&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The portmgr secretary, Thomas Abthorpe, interviews... himself!&lt;/li&gt;
&lt;li&gt;Joined as -secretary in March 2010, upgraded to full member in March 2011&lt;/li&gt;
&lt;li&gt;His inspiration for using BSD is "I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go."&lt;/li&gt;
&lt;li&gt;Mentions how he loves that anyone can contribute and watch it "go live"&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" target="_blank" rel="nofollow noopener"&gt;The second one&lt;/a&gt; covers Baptiste Daroussin&lt;/li&gt;
&lt;li&gt;The reason for his nick, bapt, is "Baptiste is too long to type"&lt;/li&gt;
&lt;li&gt;There's even &lt;a href="https://www.youtube.com/watch?v=tZk__K8rqOg" target="_blank" rel="nofollow noopener"&gt;a video&lt;/a&gt; of bapt joining the team!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Santa Clause - &lt;a href="mailto:josh@ixsystems.com" target="_blank" rel="nofollow noopener"&gt;josh@ixsystems.com&lt;/a&gt; / &lt;a href="https://twitter.com/freenasteam" target="_blank" rel="nofollow noopener"&gt;@freenasteam&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeNAS &lt;a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" target="_blank" rel="nofollow noopener"&gt;9.2.0&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.&lt;/strong&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;FreeNAS walkthrough&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" target="_blank" rel="nofollow noopener"&gt;Introducing configinit&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;CloudInit is "a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2"&lt;/li&gt;
&lt;li&gt;Wasn't ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)&lt;/li&gt;
&lt;li&gt;Colin Percival came up with configinit, a FreeBSD alternative&lt;/li&gt;
&lt;li&gt;Alongside his new "firstboot-pkgs" port, it can spin up a webserver in 120 seconds from "launch" of the EC2 instance&lt;/li&gt;
&lt;li&gt;Check the show notes for full blog post
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" target="_blank" rel="nofollow noopener"&gt;OpenSSH support for Ed25519 and bcrypt keys&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code&lt;/li&gt;
&lt;li&gt;SSH private keys were encrypted with a symmetric key that's just an MD5 of their password&lt;/li&gt;
&lt;li&gt;Now they'll be using bcrypt &lt;a href="http://marc.info/?l=openbsd-cvs&amp;amp;m=138633721618361&amp;amp;w=2" target="_blank" rel="nofollow noopener"&gt;by default&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;We'll get more into this in next week's interview
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" target="_blank" rel="nofollow noopener"&gt;The FreeBSD challenge&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A member of the Linux foundation blogs about using FreeBSD&lt;/li&gt;
&lt;li&gt;Goes through all the beginner steps, has to "unlearn" some of his Linux ways&lt;/li&gt;
&lt;li&gt;Only a few posts as of this time, but it's a continuing series that may be helpful for switchers
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;GNOME3, cinnamon and mate desktops are in the installer&lt;/li&gt;
&lt;li&gt;Compat layer updated to CentOS 6, enables newest Skype&lt;/li&gt;
&lt;li&gt;Looking for people to test printers and hplip&lt;/li&gt;
&lt;li&gt;Continuing work on grub, but the ability to switch between bootloaders is back
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20k2gumbP" target="_blank" rel="nofollow noopener"&gt;Bostjan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2PM8tfKfe" target="_blank" rel="nofollow noopener"&gt;Jason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2KgXIKqrJ" target="_blank" rel="nofollow noopener"&gt;John writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20DLk8bac" target="_blank" rel="nofollow noopener"&gt;Kjell-Aleksander writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s2nmmJHvgR" target="_blank" rel="nofollow noopener"&gt;Alexy writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ports, freenas, ixsystems, nas, network attached storage, josh paetzel, jpaetzel, cto, zfs, zpool, encryption, 9.2.0, walkthrough, web, interface, ui, frontend, opensmtpd, bcrypt, openssh, portmgr, linux foundation, switching from linux to bsd, linux</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we&#39;ll be looking at the new version of FreeNAS, a BSD-based network attached storage solution, as well as talking to Josh Paetzel - one of the key developers of FreeNAS. Actually, he&#39;s on the FreeBSD release engineering team too, and does quite a lot for the project. We&#39;ve got answers to your viewer-submitted questions and plenty of news to cover, so get ready for some BSD Now - the place to B.. SD.</p>

<h2>This episode was brought to you by</h2>

<p><a href="http://www.ixsystems.com/bsdnow" title="iXsystems"><img src="/images/iXlogo2.png" alt="iXsystems - Enterprise Servers and Storage For Open Source" /></a></p>

<hr>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-reid-linnemann.html" rel="nofollow">More faces of FreeBSD</a></h3>

<ul>
<li>Another installment of the FoF series</li>
<li>This time they talk with Reid Linnemann who works at Spectra Logic</li>
<li>Gives a history of all the different jobs he&#39;s done, all the programming languages he knows</li>
<li>Mentions how he first learned about FreeBSD, actually pretty similar to Kris&#39; story</li>
<li>&quot;I used the system to build and install ports, and explored, getting actively involved in the mailing lists and forums, studying, passing on my own limited knowledge to those who could benefit from it. I pursued my career in the open source software world, learning the differences in BSD and GNU licensing and the fragmented nature of Linux distributions, realizing the FreeBSD community was more mature and well distributed about industry, education, and research. Everything steered me towards working with and on FreeBSD.&quot;</li>
<li>Now works on FreeBSD as his day job</li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/12/faces-of-freebsd-brooks-davis.html" rel="nofollow">The second one</a> covers Brooks Davis</li>
<li>FreeBSD committer since 2001 and core team member from 2006 through 2012</li>
<li>He&#39;s helped drive our transition from a GNU toolchain to a more modern LLVM-based toolchain</li>
<li>&quot;One of the reasons I like FreeBSD is the community involved in the process of building a principled, technically-advanced operating system platform. Not only do we produce a great product, but we have fun doing it.&quot;</li>
<li>Lots more in the show notes
***</li>
</ul>

<h3><a href="https://www.freebsd.org/news/status/report-2013-09-devsummit.html#Security" rel="nofollow">We cannot trust Intel and Via’s chip-based crypto</a></h3>

<ul>
<li>We woke up to see FreeBSD on the front page of <a href="http://www.theregister.co.uk/2013/12/09/freebsd_abandoning_hardware_randomness/" rel="nofollow">The Register</a>, <a href="http://arstechnica.com/security/2013/12/we-cannot-trust-intel-and-vias-chip-based-crypto-freebsd-developers-say/" rel="nofollow">Ars Technica</a>, <a href="http://it.slashdot.org/story/13/12/11/1919201/freebsd-developers-will-not-trust-chip-based-encryption" rel="nofollow">Slashdot</a> and <a href="https://news.ycombinator.com/item?id=6880474" rel="nofollow">Hacker News</a> for their strong stance on security and respecting privacy</li>
<li>At the EuroBSDCon dev summit, there was some discussion about removing support for hardware-based random number generators.</li>
<li>FreeBSD&#39;s /dev/random got some updates and, for 10.0, will no longer allow the use of Intel or VIA&#39;s hardware RNGs as the sole point of entropy</li>
<li>&quot;It will still be possible to access hardware random number generators, that is, RDRAND, Padlock etc., directly by inline assembly or by using OpenSSL from userland, if required, but we cannot trust them any more&quot;
***</li>
</ul>

<h3><a href="http://article.gmane.org/gmane.mail.opensmtpd.general/1146" rel="nofollow">OpenSMTPD 5.4.1 released</a></h3>

<ul>
<li>The OpenBSD developers came out with major a new version</li>
<li>Improved config syntax (please check your smtpd.conf before upgrading)</li>
<li>Adds support for TLS Perfect Forward Secrecy and custom CA certificate</li>
<li>MTA, Queue and SMTP server improvements</li>
<li>SNI support confirmed for the next version</li>
<li>Check the show notes for the full list of changes, pretty huge release</li>
<li>Watch <a href="http://www.bsdnow.tv/episodes/2013-09-18_mx_with_ttx" rel="nofollow">Episode 3</a> for an interview we did with the developers
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/12/02/getting-to-know-your-portmgr-thomas-abthorpe/" rel="nofollow">More getting to know your portmgr</a></h3>

<ul>
<li>The portmgr secretary, Thomas Abthorpe, interviews... himself!</li>
<li>Joined as -secretary in March 2010, upgraded to full member in March 2011</li>
<li>His inspiration for using BSD is &quot;I wanted to run a webserver, and I wanted something free. I was going to use something linux, then met up with a former prof from university, and shared my story with him. He told me FreeBSD was the way to go.&quot;</li>
<li>Mentions how he loves that anyone can contribute and watch it &quot;go live&quot;</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/12/09/getting-to-know-your-portmgr-baptiste-daroussin/" rel="nofollow">The second one</a> covers Baptiste Daroussin</li>
<li>The reason for his nick, bapt, is &quot;Baptiste is too long to type&quot;</li>
<li>There&#39;s even <a href="https://www.youtube.com/watch?v=tZk__K8rqOg" rel="nofollow">a video</a> of bapt joining the team!
***</li>
</ul>

<h2>Interview - Santa Clause - <a href="mailto:josh@ixsystems.com" rel="nofollow">josh@ixsystems.com</a> / <a href="https://twitter.com/freenasteam" rel="nofollow">@freenasteam</a></h2>

<p>FreeNAS <a href="http://www.freenas.org/whats-new/2013/12/freenas-9-2-0-rc-available.html" rel="nofollow">9.2.0</a></p>

<p><strong>Note: we originally scheduled the interview to be with Josh Paetzel, but Santa showed up instead.</strong></p>

<hr>

<h2>Tutorial</h2>

<h3>FreeNAS walkthrough</h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://www.daemonology.net/blog/2013-12-09-FreeBSD-EC2-configinit.html" rel="nofollow">Introducing configinit</a></h3>

<ul>
<li>CloudInit is &quot;a system originally written for Ubuntu which performs configuration of a system at boot-time based on user-data provided via EC2&quot;</li>
<li>Wasn&#39;t ideal for FreeBSD since it requires python and is designed around the concept of configuring a system by running commands (rather than editing configuration files)</li>
<li>Colin Percival came up with configinit, a FreeBSD alternative</li>
<li>Alongside his new &quot;firstboot-pkgs&quot; port, it can spin up a webserver in 120 seconds from &quot;launch&quot; of the EC2 instance</li>
<li>Check the show notes for full blog post
***</li>
</ul>

<h3><a href="http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/PROTOCOL.key?rev=1.1;content-type=text%2Fx-cvsweb-markup" rel="nofollow">OpenSSH support for Ed25519 and bcrypt keys</a></h3>

<ul>
<li>New Ed25519 key support (hostkeys and user identities) using the public domain ed25519 reference code</li>
<li>SSH private keys were encrypted with a symmetric key that&#39;s just an MD5 of their password</li>
<li>Now they&#39;ll be using bcrypt <a href="http://marc.info/?l=openbsd-cvs&m=138633721618361&w=2" rel="nofollow">by default</a></li>
<li>We&#39;ll get more into this in next week&#39;s interview
***</li>
</ul>

<h3><a href="http://thelinuxcauldron.com/2013/12/08/freebsd-challenge/" rel="nofollow">The FreeBSD challenge</a></h3>

<ul>
<li>A member of the Linux foundation blogs about using FreeBSD</li>
<li>Goes through all the beginner steps, has to &quot;unlearn&quot; some of his Linux ways</li>
<li>Only a few posts as of this time, but it&#39;s a continuing series that may be helpful for switchers
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/12/pc-bsd-weekly-feature-digest-111513-2/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>GNOME3, cinnamon and mate desktops are in the installer</li>
<li>Compat layer updated to CentOS 6, enables newest Skype</li>
<li>Looking for people to test printers and hplip</li>
<li>Continuing work on grub, but the ability to switch between bootloaders is back
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s20k2gumbP" rel="nofollow">Bostjan writes in</a></li>
<li><a href="http://slexy.org/view/s2PM8tfKfe" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s2KgXIKqrJ" rel="nofollow">John writes in</a></li>
<li><a href="http://slexy.org/view/s20DLk8bac" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2nmmJHvgR" rel="nofollow">Alexy writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>14: Zettabytes for Days</title>
  <link>https://www.bsdnow.tv/14</link>
  <guid isPermaLink="false">8a946478-3ac7-4087-a433-ad139e4d7aa9</guid>
  <pubDate>Wed, 04 Dec 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8a946478-3ac7-4087-a433-ad139e4d7aa9.mp3" length="56736843" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:18:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week is the long-awaited episode you've been asking for! We'll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project's recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/ports?view=revision&amp;amp;revision=334937" target="_blank" rel="nofollow noopener"&gt;pkgng 1.2 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;bapt and bdrewery from the portmgr team released pkgng 1.2 final&lt;/li&gt;
&lt;li&gt;New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new "pkg config" command, repo improvements, vuXML is now default, new fingerprint features and much more&lt;/li&gt;
&lt;li&gt;Really simple to upgrade, check our &lt;a href="http://www.bsdnow.tv/tutorials/pkgng" target="_blank" rel="nofollow noopener"&gt;pkgng tutorial&lt;/a&gt; if you want some easy instructions&lt;/li&gt;
&lt;li&gt;It's also made its way &lt;a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" target="_blank" rel="nofollow noopener"&gt;into Dragonfly&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;See the show notes for the full list of new features and fixes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" target="_blank" rel="nofollow noopener"&gt;ChaCha20 and Poly1305 in OpenSSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305&lt;/li&gt;
&lt;li&gt;Long blog post explaining what these are and why we need them&lt;/li&gt;
&lt;li&gt;This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC&lt;/li&gt;
&lt;li&gt;RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn't show the packet length in cleartext&lt;/li&gt;
&lt;li&gt;Great explanation of the differences between EtM, MtE and EaM and their advantages&lt;/li&gt;
&lt;li&gt;"Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly."
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" target="_blank" rel="nofollow noopener"&gt;Is it time to dump Linux and move to BSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;ITworld did an article about switching from Linux to BSD&lt;/li&gt;
&lt;li&gt;The author's interest was sparked from a review he was reading that said "I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0"&lt;/li&gt;
&lt;li&gt;The whole article can be summed up with "yes" - ok, next story!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://www.youtube.com/user/deirdres/videos" target="_blank" rel="nofollow noopener"&gt;OpenZFS devsummit videos&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The OpenZFS &lt;a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" target="_blank" rel="nofollow noopener"&gt;developer summit&lt;/a&gt; discussion and presentation videos are up&lt;/li&gt;
&lt;li&gt;People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced&lt;/li&gt;
&lt;li&gt;Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation&lt;/li&gt;
&lt;li&gt;Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production&lt;/li&gt;
&lt;li&gt;TONS of video, about 6 hours' worth&lt;/li&gt;
&lt;li&gt;This leads us into our interview, which is...
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - George Wilson - &lt;a href="mailto:wilzun@gmail.com" target="_blank" rel="nofollow noopener"&gt;wilzun@gmail.com&lt;/a&gt; / &lt;a href="https://twitter.com/zfsdude" target="_blank" rel="nofollow noopener"&gt;@zfsdude&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;OpenZFS&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/zfs" target="_blank" rel="nofollow noopener"&gt;A crash course on ZFS&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131126113154" target="_blank" rel="nofollow noopener"&gt;ruBSD 2013 information&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia&lt;/li&gt;
&lt;li&gt;Speakers include three OpenBSD developers, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" target="_blank" rel="nofollow noopener"&gt;Theo de Raadt&lt;/a&gt;, &lt;a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" target="_blank" rel="nofollow noopener"&gt;Henning Brauer&lt;/a&gt; and Mike Belopuhov&lt;/li&gt;
&lt;li&gt;Their talks are titled "The bane of backwards compatibility," "OpenBSD's pf: Design, Implementation and Future" and "OpenBSD: Where crypto is going?"&lt;/li&gt;
&lt;li&gt;No word on if there will be video recordings, but we'll let you know if that changes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" target="_blank" rel="nofollow noopener"&gt;DragonFly roadmap, post 3.6&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;John Marino posted a possible roadmap for DragonFly, now that they're past the 3.6 release&lt;/li&gt;
&lt;li&gt;He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)&lt;/li&gt;
&lt;li&gt;Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still&lt;/li&gt;
&lt;li&gt;Bring in fixes and new stuff from FreeBSD 10
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" target="_blank" rel="nofollow noopener"&gt;BSDCan 2014 CFP&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;BSDCan 2014 will be held on May 16-17 in Ottawa, Canada&lt;/li&gt;
&lt;li&gt;They're now accepting proposals for talks&lt;/li&gt;
&lt;li&gt;If you are doing something interesting with a BSD operating system, please submit a proposal&lt;/li&gt;
&lt;li&gt;We'll be getting lots of interviews there
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258838" target="_blank" rel="nofollow noopener"&gt;casperd added to -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;"It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted."&lt;/li&gt;
&lt;li&gt;Lists some sysctls that can be controlled
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=258704" target="_blank" rel="nofollow noopener"&gt;ZFS corruption bug fixed in -CURRENT&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2JDWKjs7l" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20BLqxTWD" target="_blank" rel="nofollow noopener"&gt;SW writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2939tUOf5" target="_blank" rel="nofollow noopener"&gt;Jason writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21qKY6qIb" target="_blank" rel="nofollow noopener"&gt;Clint writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20LWlmhoK" target="_blank" rel="nofollow noopener"&gt;Chris writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, zfs, openzfs, devsummit, george wilson, zpool, raidz, raidz2, raidz3, mirror, delphix, linux, switch, zol, zfsonlinux, illumos, solaris, opensolaris, itworld, pkgng, pkg, 1.2, openssh, ssh, chacha20, cipher, encryption, mac, poly1305, rc4, security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week is the long-awaited episode you&#39;ve been asking for! We&#39;ll be giving you a crash course on becoming a ZFS wizard, as well as having a chat with George Wilson about the OpenZFS project&#39;s recent developments. We have answers to your feedback emails and there are some great news items to get caught up on too, so stay tuned to BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="https://svnweb.freebsd.org/ports?view=revision&revision=334937" rel="nofollow">pkgng 1.2 released</a></h3>

<ul>
<li>bapt and bdrewery from the portmgr team released pkgng 1.2 final</li>
<li>New features include an improved build system, plugin improvements, new bootstrapping command, SRV mirror improvements, a new &quot;pkg config&quot; command, repo improvements, vuXML is now default, new fingerprint features and much more</li>
<li>Really simple to upgrade, check our <a href="http://www.bsdnow.tv/tutorials/pkgng" rel="nofollow">pkgng tutorial</a> if you want some easy instructions</li>
<li>It&#39;s also made its way <a href="http://lists.dragonflybsd.org/pipermail/users/2013-November/090339.html" rel="nofollow">into Dragonfly</a></li>
<li>See the show notes for the full list of new features and fixes
***</li>
</ul>

<h3><a href="http://blog.djm.net.au/2013/11/chacha20-and-poly1305-in-openssh.html" rel="nofollow">ChaCha20 and Poly1305 in OpenSSH</a></h3>

<ul>
<li>Damien Miller recently committed support for a new authenticated encryption cipher for OpenSSH, chacha20-poly1305</li>
<li>Long blog post explaining what these are and why we need them</li>
<li>This cipher combines two primitives: the ChaCha20 cipher and the Poly1305 MAC</li>
<li>RC4 is broken, we needed an authenticated encryption mode to complement AES-GCM that doesn&#39;t show the packet length in cleartext</li>
<li>Great explanation of the differences between EtM, MtE and EaM and their advantages</li>
<li>&quot;Both AES-GCM and the EtM MAC modes have a small downside though: because we no longer desire to decrypt the packet as we go, the packet length must be transmitted in plaintext. This unfortunately makes some forms of traffic analysis easier as the attacker can just read the packet lengths directly.&quot;
***</li>
</ul>

<h3><a href="http://www.itworld.com/open-source/384383/should-you-switch-linux-bsd" rel="nofollow">Is it time to dump Linux and move to BSD</a></h3>

<ul>
<li>ITworld did an article about switching from Linux to BSD</li>
<li>The author&#39;s interest was sparked from a review he was reading that said &quot;I feel the BSD communities, especially the FreeBSD-based projects, are where the interesting developments are happening these days. Over in FreeBSD land we have efficient PBI bundles, a mature advanced file system in the form of ZFS, new friendly and powerful system installers, a new package manager (pkgng), a powerful jail manager and there will soon be new virtualization technology coming with the release of FreeBSD 10.0&quot;</li>
<li>The whole article can be summed up with &quot;yes&quot; - ok, next story!
***</li>
</ul>

<h3><a href="https://www.youtube.com/user/deirdres/videos" rel="nofollow">OpenZFS devsummit videos</a></h3>

<ul>
<li>The OpenZFS <a href="http://www.open-zfs.org/wiki/OpenZFS_Developer_Summit_2013" rel="nofollow">developer summit</a> discussion and presentation videos are up</li>
<li>People from various operating systems (FreeBSD, Mac OS X, illumos, etc.) were there to discuss ZFS on their platforms and the challenges they faced</li>
<li>Question and answer session from representatives of every OS - had a couple FreeBSD guys there including one from the foundation</li>
<li>Presentations both about ZFS itself and some hardware-based solutions for implementing ZFS in production</li>
<li>TONS of video, about 6 hours&#39; worth</li>
<li>This leads us into our interview, which is...
***</li>
</ul>

<h2>Interview - George Wilson - <a href="mailto:wilzun@gmail.com" rel="nofollow">wilzun@gmail.com</a> / <a href="https://twitter.com/zfsdude" rel="nofollow">@zfsdude</a></h2>

<p>OpenZFS</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/zfs" rel="nofollow">A crash course on ZFS</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131126113154" rel="nofollow">ruBSD 2013 information</a></h3>

<ul>
<li>The ruBSD 2013 conference will take place on Saturday December 14, 2013 at 10:30 AM in Moscow, Russia</li>
<li>Speakers include three OpenBSD developers, <a href="http://www.bsdnow.tv/episodes/2013_10_09-doing_it_de_raadt_way" rel="nofollow">Theo de Raadt</a>, <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">Henning Brauer</a> and Mike Belopuhov</li>
<li>Their talks are titled &quot;The bane of backwards compatibility,&quot; &quot;OpenBSD&#39;s pf: Design, Implementation and Future&quot; and &quot;OpenBSD: Where crypto is going?&quot;</li>
<li>No word on if there will be video recordings, but we&#39;ll let you know if that changes
***</li>
</ul>

<h3><a href="http://www.shiningsilence.com/dbsdlog/2013/11/28/12874.html" rel="nofollow">DragonFly roadmap, post 3.6</a></h3>

<ul>
<li>John Marino posted a possible roadmap for DragonFly, now that they&#39;re past the 3.6 release</li>
<li>He wants some third party vendor software updated from very old versions (WPA supplicant, bmake, binutils)</li>
<li>Plans to replace GCC44 with Clang, but GCC47 will probably be the primary compiler still</li>
<li>Bring in fixes and new stuff from FreeBSD 10
***</li>
</ul>

<h3><a href="http://lists.bsdcan.org/pipermail/bsdcan-announce/2013-December/000123.html" rel="nofollow">BSDCan 2014 CFP</a></h3>

<ul>
<li>BSDCan 2014 will be held on May 16-17 in Ottawa, Canada</li>
<li>They&#39;re now accepting proposals for talks</li>
<li>If you are doing something interesting with a BSD operating system, please submit a proposal</li>
<li>We&#39;ll be getting lots of interviews there
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258838" rel="nofollow">casperd added to -CURRENT</a></h3>

<ul>
<li>&quot;It (and its services) will be responsible forgiving access to functionality that is not available in capability modes and box. The functionality can be precisely restricted.&quot;</li>
<li>Lists some sysctls that can be controlled
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=258704" rel="nofollow">ZFS corruption bug fixed in -CURRENT</a></h3>

<ul>
<li>Just a quick follow-up from last week, the ZFS corruption bug in FreeBSD -CURRENT was very quickly fixed, before that episode was even uploaded
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2JDWKjs7l" rel="nofollow">Chris writes in</a></li>
<li><a href="http://slexy.org/view/s20BLqxTWD" rel="nofollow">SW writes in</a></li>
<li><a href="http://slexy.org/view/s2939tUOf5" rel="nofollow">Jason writes in</a></li>
<li><a href="http://slexy.org/view/s21qKY6qIb" rel="nofollow">Clint writes in</a></li>
<li><a href="http://slexy.org/view/s20LWlmhoK" rel="nofollow">Chris writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>13: Bridging the Gap</title>
  <link>https://www.bsdnow.tv/13</link>
  <guid isPermaLink="false">bf19202c-3646-4560-bc01-29393b43dde4</guid>
  <pubDate>Wed, 27 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/bf19202c-3646-4560-bc01-29393b43dde4.mp3" length="49103236" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we'll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We've also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we'll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We've also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2013/11/18/getting-to-know-your-portmgr-erwin-lansing/" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;In this interview they talk to one of the "Annoying Reminder Guys" - Erwin Lansing, the second longest serving member of FreeBSD's portmgr (also vice-president of the FreeBSD Foundation)&lt;/li&gt;
&lt;li&gt;He actually maintains the .dk ccTLD&lt;/li&gt;
&lt;li&gt;Describes FreeBSD as "the best well-hidden success story in operating systems, by now in the hands of more people than one can count and used by even more people, and not one of them knows it! It’s not only the best operating system currently around, but also the most supportive and inspiring community."&lt;/li&gt;
&lt;li&gt;In &lt;a href="http://blogs.freebsdish.org/portmgr/2013/11/25/getting-to-know-your-portmgr-martin-wilke/" target="_blank" rel="nofollow noopener"&gt;the next one&lt;/a&gt; they speak with Martin Wilke (miwi@)&lt;/li&gt;
&lt;li&gt;The usual, "what inspires you about FreeBSD" "how did you get into it" etc.
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.hostileadmin.com/2013/11/20/vbsdcon-wrap-ups/" target="_blank" rel="nofollow noopener"&gt;vBSDCon wrap-up compilation&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Lots of write-ups about vBSDCon gathered in one place&lt;/li&gt;
&lt;li&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131121050402" target="_blank" rel="nofollow noopener"&gt;Some from OpenBSD guys&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2013/11/vbsdcon-trip-report-john-mark-gurney.html" target="_blank" rel="nofollow noopener"&gt;Some from FreeBSD guys&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.rootbsd.net/vbsdcon-2013-wrap-up/" target="_blank" rel="nofollow noopener"&gt;Some from RootBSD&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://www.ixsystems.com/resources/ix/blog/vbsdcon-2013.html" target="_blank" rel="nofollow noopener"&gt;Some from iXsystems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://blogs.verisigninc.com/blog/entry/builders_and_archaeologists" target="_blank" rel="nofollow noopener"&gt;Some from Verisign&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;And of course our own wrap-up chat in &lt;a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" target="_blank" rel="nofollow noopener"&gt;BSD Now Episode 009&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-each-week-we-are-going.html" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;This week they talk to Gábor Páli from Hungary&lt;/li&gt;
&lt;li&gt;Talks about his past as a game programmer and how it got involved with FreeBSD&lt;/li&gt;
&lt;li&gt;"I met János Háber, who admired the technical merits of FreeBSD and recommended it over the popular GNU/Linux distributions. I downloaded FreeBSD 4.3-RELEASE, found it reliable, consistent, easy to install, update and use."&lt;/li&gt;
&lt;li&gt;He's been contributing since 2008 and does lots of work with Haskell in ports&lt;/li&gt;
&lt;li&gt;He also organizes EuroBSDCon and is secretary of the FreeBSD Core Team
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.dragonflybsd.org/release36/" target="_blank" rel="nofollow noopener"&gt;Dragonfly 3.6 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;dports now default instead of pkgsrc&lt;/li&gt;
&lt;li&gt;Big SMP scaling improvements&lt;/li&gt;
&lt;li&gt;Experimental i915 and KMS support&lt;/li&gt;
&lt;li&gt;See &lt;a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" target="_blank" rel="nofollow noopener"&gt;our interview&lt;/a&gt; with Justin Sherrill if you want to hear (a lot) more about it - nearly an hour long
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Jordan Hubbard - &lt;a href="mailto:jkh@freebsd.org" target="_blank" rel="nofollow noopener"&gt;jkh@freebsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/omgjkh" target="_blank" rel="nofollow noopener"&gt;@omgjkh&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;FreeBSD's founding and future&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;Building an OpenBSD router, part 2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.&lt;/strong&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://blog.pfsense.org/?p=1132" target="_blank" rel="nofollow noopener"&gt;pfSense 2.1 on AWS EC2&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We now have pfSense 2.1 available on Amazon’s Elastic Compute Cloud (EC2)&lt;/li&gt;
&lt;li&gt;In keeping with the community spirit, they’re also offering a free "public" AMI&lt;/li&gt;
&lt;li&gt;Check the FAQ and User Guide on their site for additional details&lt;/li&gt;
&lt;li&gt;Interesting possibilities with pfSense in the cloud
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://distrowatch.com/weekly.php?issue=20131118#feature" target="_blank" rel="nofollow noopener"&gt;Puffy on the desktop&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Distrowatch, a primarily Linux-focused site, features an OpenBSD 5.4 review&lt;/li&gt;
&lt;li&gt;They talk about using it on the desktop, how to set it up&lt;/li&gt;
&lt;li&gt;Very long write-up, curious Linux users should give it a read&lt;/li&gt;
&lt;li&gt;Ends with "Most people will still see OpenBSD as an operating system for servers and firewalls, but OpenBSD can also be used in desktop environments if the user doesn't mind a little manual work. The payoff is a very light, responsive system that is unlikely to ever misbehave"
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://cmacr.ae/openbsd/security/networking/2013/11/25/ssh-yubi.html" target="_blank" rel="nofollow noopener"&gt;Two-factor authentication with SSH&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Blog post about using a yubikey with SSH public keys&lt;/li&gt;
&lt;li&gt;Uses a combination of a OTP, BSDAuth and OpenBSD's login.conf, but it can be used with PAM on other systems as well&lt;/li&gt;
&lt;li&gt;Allows for two-factor authentication (a la gmail) in case your private key is compromised&lt;/li&gt;
&lt;li&gt;Anyone interested in an extra-hardened SSH server should give it a read
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2013/11/weekly-feature-digest-112313/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;10.0 has approximately 400 PBIs for public consumption&lt;/li&gt;
&lt;li&gt;They will be merging the GNOME3, MATE and Cinnamon desktops into the 10.0 ports tree - please help test them, this is pretty big news in and of itself!&lt;/li&gt;
&lt;li&gt;PCDM is coming along nicely, more bugs are getting fixed&lt;/li&gt;
&lt;li&gt;Added ZFS dataset options to PCBSD’s new text installer front-end
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ag1fA7Ug" target="_blank" rel="nofollow noopener"&gt;Ben writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2TSIvZzVO" target="_blank" rel="nofollow noopener"&gt;Florian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20Po4soFF" target="_blank" rel="nofollow noopener"&gt;Zach writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s20ntzqi9c" target="_blank" rel="nofollow noopener"&gt;Addison writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2EYJjVKBk" target="_blank" rel="nofollow noopener"&gt;Adam writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://twitter.com/redshirtlinux" target="_blank" rel="nofollow noopener"&gt;Adam&lt;/a&gt;'s BSD Router Project tutorial can be downloaded &lt;a href="http://bsdnow.cdn.scaleengine.net/bsdrouterproject.m4v" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;.
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, jordan hubbard, jhk, founder, portmgr, openzfs, pfsense, puffy, ec2, amazon, firewall, router, high performance, email alerts, tunneling, errata, patches, cron, script, current, stable, release, cvs, anoncvs, bsd router project</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we&#39;ll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We&#39;ve also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/18/getting-to-know-your-portmgr-erwin-lansing/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>In this interview they talk to one of the &quot;Annoying Reminder Guys&quot; - Erwin Lansing, the second longest serving member of FreeBSD&#39;s portmgr (also vice-president of the FreeBSD Foundation)</li>
<li>He actually maintains the .dk ccTLD</li>
<li>Describes FreeBSD as &quot;the best well-hidden success story in operating systems, by now in the hands of more people than one can count and used by even more people, and not one of them knows it! It’s not only the best operating system currently around, but also the most supportive and inspiring community.&quot;</li>
<li>In <a href="http://blogs.freebsdish.org/portmgr/2013/11/25/getting-to-know-your-portmgr-martin-wilke/" rel="nofollow">the next one</a> they speak with Martin Wilke (miwi@)</li>
<li>The usual, &quot;what inspires you about FreeBSD&quot; &quot;how did you get into it&quot; etc.
***</li>
</ul>

<h3><a href="http://blog.hostileadmin.com/2013/11/20/vbsdcon-wrap-ups/" rel="nofollow">vBSDCon wrap-up compilation</a></h3>

<ul>
<li>Lots of write-ups about vBSDCon gathered in one place</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20131121050402" rel="nofollow">Some from OpenBSD guys</a></li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/11/vbsdcon-trip-report-john-mark-gurney.html" rel="nofollow">Some from FreeBSD guys</a></li>
<li><a href="http://www.rootbsd.net/vbsdcon-2013-wrap-up/" rel="nofollow">Some from RootBSD</a></li>
<li><a href="http://www.ixsystems.com/resources/ix/blog/vbsdcon-2013.html" rel="nofollow">Some from iXsystems</a></li>
<li><a href="http://blogs.verisigninc.com/blog/entry/builders_and_archaeologists" rel="nofollow">Some from Verisign</a></li>
<li>And of course our own wrap-up chat in <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">BSD Now Episode 009</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-each-week-we-are-going.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This week they talk to Gábor Páli from Hungary</li>
<li>Talks about his past as a game programmer and how it got involved with FreeBSD</li>
<li>&quot;I met János Háber, who admired the technical merits of FreeBSD and recommended it over the popular GNU/Linux distributions. I downloaded FreeBSD 4.3-RELEASE, found it reliable, consistent, easy to install, update and use.&quot;</li>
<li>He&#39;s been contributing since 2008 and does lots of work with Haskell in ports</li>
<li>He also organizes EuroBSDCon and is secretary of the FreeBSD Core Team
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release36/" rel="nofollow">Dragonfly 3.6 released</a></h3>

<ul>
<li>dports now default instead of pkgsrc</li>
<li>Big SMP scaling improvements</li>
<li>Experimental i915 and KMS support</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">our interview</a> with Justin Sherrill if you want to hear (a lot) more about it - nearly an hour long
***</li>
</ul>

<h2>Interview - Jordan Hubbard - <a href="mailto:jkh@freebsd.org" rel="nofollow">jkh@freebsd.org</a> / <a href="https://twitter.com/omgjkh" rel="nofollow">@omgjkh</a></h2>

<p>FreeBSD&#39;s founding and future</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD router, part 2</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.pfsense.org/?p=1132" rel="nofollow">pfSense 2.1 on AWS EC2</a></h3>

<ul>
<li>We now have pfSense 2.1 available on Amazon’s Elastic Compute Cloud (EC2)</li>
<li>In keeping with the community spirit, they’re also offering a free &quot;public&quot; AMI</li>
<li>Check the FAQ and User Guide on their site for additional details</li>
<li>Interesting possibilities with pfSense in the cloud
***</li>
</ul>

<h3><a href="http://distrowatch.com/weekly.php?issue=20131118#feature" rel="nofollow">Puffy on the desktop</a></h3>

<ul>
<li>Distrowatch, a primarily Linux-focused site, features an OpenBSD 5.4 review</li>
<li>They talk about using it on the desktop, how to set it up</li>
<li>Very long write-up, curious Linux users should give it a read</li>
<li>Ends with &quot;Most people will still see OpenBSD as an operating system for servers and firewalls, but OpenBSD can also be used in desktop environments if the user doesn&#39;t mind a little manual work. The payoff is a very light, responsive system that is unlikely to ever misbehave&quot;
***</li>
</ul>

<h3><a href="http://cmacr.ae/openbsd/security/networking/2013/11/25/ssh-yubi.html" rel="nofollow">Two-factor authentication with SSH</a></h3>

<ul>
<li>Blog post about using a yubikey with SSH public keys</li>
<li>Uses a combination of a OTP, BSDAuth and OpenBSD&#39;s login.conf, but it can be used with PAM on other systems as well</li>
<li>Allows for two-factor authentication (a la gmail) in case your private key is compromised</li>
<li>Anyone interested in an extra-hardened SSH server should give it a read
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/weekly-feature-digest-112313/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 has approximately 400 PBIs for public consumption</li>
<li>They will be merging the GNOME3, MATE and Cinnamon desktops into the 10.0 ports tree - please help test them, this is pretty big news in and of itself!</li>
<li>PCDM is coming along nicely, more bugs are getting fixed</li>
<li>Added ZFS dataset options to PCBSD’s new text installer front-end
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ag1fA7Ug" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2TSIvZzVO" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s20Po4soFF" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s20ntzqi9c" rel="nofollow">Addison writes in</a></li>
<li><a href="http://slexy.org/view/s2EYJjVKBk" rel="nofollow">Adam writes in</a></li>
<li><a href="https://twitter.com/redshirtlinux" rel="nofollow">Adam</a>&#39;s BSD Router Project tutorial can be downloaded <a href="http://bsdnow.cdn.scaleengine.net/bsdrouterproject.m4v" rel="nofollow">here</a>.
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week on the show, we sit down for an interview with Jordan Hubbard, one of the founders of the FreeBSD project - and the one who invented ports! Later in the show, we&#39;ll be showing you some new updates to the OpenBSD router tutorial from a couple weeks ago. We&#39;ve also got news, your questions and even our first viewer-submitted video, right here on BSD Now.. the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/18/getting-to-know-your-portmgr-erwin-lansing/" rel="nofollow">Getting to know your portmgr</a></h3>

<ul>
<li>In this interview they talk to one of the &quot;Annoying Reminder Guys&quot; - Erwin Lansing, the second longest serving member of FreeBSD&#39;s portmgr (also vice-president of the FreeBSD Foundation)</li>
<li>He actually maintains the .dk ccTLD</li>
<li>Describes FreeBSD as &quot;the best well-hidden success story in operating systems, by now in the hands of more people than one can count and used by even more people, and not one of them knows it! It’s not only the best operating system currently around, but also the most supportive and inspiring community.&quot;</li>
<li>In <a href="http://blogs.freebsdish.org/portmgr/2013/11/25/getting-to-know-your-portmgr-martin-wilke/" rel="nofollow">the next one</a> they speak with Martin Wilke (miwi@)</li>
<li>The usual, &quot;what inspires you about FreeBSD&quot; &quot;how did you get into it&quot; etc.
***</li>
</ul>

<h3><a href="http://blog.hostileadmin.com/2013/11/20/vbsdcon-wrap-ups/" rel="nofollow">vBSDCon wrap-up compilation</a></h3>

<ul>
<li>Lots of write-ups about vBSDCon gathered in one place</li>
<li><a href="http://undeadly.org/cgi?action=article&sid=20131121050402" rel="nofollow">Some from OpenBSD guys</a></li>
<li><a href="http://freebsdfoundation.blogspot.com/2013/11/vbsdcon-trip-report-john-mark-gurney.html" rel="nofollow">Some from FreeBSD guys</a></li>
<li><a href="http://www.rootbsd.net/vbsdcon-2013-wrap-up/" rel="nofollow">Some from RootBSD</a></li>
<li><a href="http://www.ixsystems.com/resources/ix/blog/vbsdcon-2013.html" rel="nofollow">Some from iXsystems</a></li>
<li><a href="http://blogs.verisigninc.com/blog/entry/builders_and_archaeologists" rel="nofollow">Some from Verisign</a></li>
<li>And of course our own wrap-up chat in <a href="http://www.bsdnow.tv/episodes/2013_10_30-current_events" rel="nofollow">BSD Now Episode 009</a>
***</li>
</ul>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-each-week-we-are-going.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>This week they talk to Gábor Páli from Hungary</li>
<li>Talks about his past as a game programmer and how it got involved with FreeBSD</li>
<li>&quot;I met János Háber, who admired the technical merits of FreeBSD and recommended it over the popular GNU/Linux distributions. I downloaded FreeBSD 4.3-RELEASE, found it reliable, consistent, easy to install, update and use.&quot;</li>
<li>He&#39;s been contributing since 2008 and does lots of work with Haskell in ports</li>
<li>He also organizes EuroBSDCon and is secretary of the FreeBSD Core Team
***</li>
</ul>

<h3><a href="http://www.dragonflybsd.org/release36/" rel="nofollow">Dragonfly 3.6 released</a></h3>

<ul>
<li>dports now default instead of pkgsrc</li>
<li>Big SMP scaling improvements</li>
<li>Experimental i915 and KMS support</li>
<li>See <a href="http://www.bsdnow.tv/episodes/2013_11_13-the_gateway_drug" rel="nofollow">our interview</a> with Justin Sherrill if you want to hear (a lot) more about it - nearly an hour long
***</li>
</ul>

<h2>Interview - Jordan Hubbard - <a href="mailto:jkh@freebsd.org" rel="nofollow">jkh@freebsd.org</a> / <a href="https://twitter.com/omgjkh" rel="nofollow">@omgjkh</a></h2>

<p>FreeBSD&#39;s founding and future</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD router, part 2</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://blog.pfsense.org/?p=1132" rel="nofollow">pfSense 2.1 on AWS EC2</a></h3>

<ul>
<li>We now have pfSense 2.1 available on Amazon’s Elastic Compute Cloud (EC2)</li>
<li>In keeping with the community spirit, they’re also offering a free &quot;public&quot; AMI</li>
<li>Check the FAQ and User Guide on their site for additional details</li>
<li>Interesting possibilities with pfSense in the cloud
***</li>
</ul>

<h3><a href="http://distrowatch.com/weekly.php?issue=20131118#feature" rel="nofollow">Puffy on the desktop</a></h3>

<ul>
<li>Distrowatch, a primarily Linux-focused site, features an OpenBSD 5.4 review</li>
<li>They talk about using it on the desktop, how to set it up</li>
<li>Very long write-up, curious Linux users should give it a read</li>
<li>Ends with &quot;Most people will still see OpenBSD as an operating system for servers and firewalls, but OpenBSD can also be used in desktop environments if the user doesn&#39;t mind a little manual work. The payoff is a very light, responsive system that is unlikely to ever misbehave&quot;
***</li>
</ul>

<h3><a href="http://cmacr.ae/openbsd/security/networking/2013/11/25/ssh-yubi.html" rel="nofollow">Two-factor authentication with SSH</a></h3>

<ul>
<li>Blog post about using a yubikey with SSH public keys</li>
<li>Uses a combination of a OTP, BSDAuth and OpenBSD&#39;s login.conf, but it can be used with PAM on other systems as well</li>
<li>Allows for two-factor authentication (a la gmail) in case your private key is compromised</li>
<li>Anyone interested in an extra-hardened SSH server should give it a read
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/weekly-feature-digest-112313/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>10.0 has approximately 400 PBIs for public consumption</li>
<li>They will be merging the GNOME3, MATE and Cinnamon desktops into the 10.0 ports tree - please help test them, this is pretty big news in and of itself!</li>
<li>PCDM is coming along nicely, more bugs are getting fixed</li>
<li>Added ZFS dataset options to PCBSD’s new text installer front-end
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s2ag1fA7Ug" rel="nofollow">Ben writes in</a></li>
<li><a href="http://slexy.org/view/s2TSIvZzVO" rel="nofollow">Florian writes in</a></li>
<li><a href="http://slexy.org/view/s20Po4soFF" rel="nofollow">Zach writes in</a></li>
<li><a href="http://slexy.org/view/s20ntzqi9c" rel="nofollow">Addison writes in</a></li>
<li><a href="http://slexy.org/view/s2EYJjVKBk" rel="nofollow">Adam writes in</a></li>
<li><a href="https://twitter.com/redshirtlinux" rel="nofollow">Adam</a>&#39;s BSD Router Project tutorial can be downloaded <a href="http://bsdnow.cdn.scaleengine.net/bsdrouterproject.m4v" rel="nofollow">here</a>.
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>12: Collecting SSHells</title>
  <link>https://www.bsdnow.tv/12</link>
  <guid isPermaLink="false">8552d8d2-0590-4641-9780-81ca0dc91bd1</guid>
  <pubDate>Wed, 20 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/8552d8d2-0590-4641-9780-81ca0dc91bd1.mp3" length="49103236" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This week we'll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD's future plans and much more. After that, if you've ever wondered what all this SSH stuff is about, today's tutorial has got you covered. We'll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:08:11</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This week we'll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD's future plans and much more. After that, if you've ever wondered what all this SSH stuff is about, today's tutorial has got you covered. We'll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" target="_blank" rel="nofollow noopener"&gt;Faces of FreeBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation is publishing articles on different FreeBSD developers&lt;/li&gt;
&lt;li&gt;This one is about Colin Percival (cperciva@), the ex-security officer&lt;/li&gt;
&lt;li&gt;Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer&lt;/li&gt;
&lt;li&gt;Running series with more to come
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" target="_blank" rel="nofollow noopener"&gt;Lots of BSD presentation videos uploaded&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL's presentation video&lt;/li&gt;
&lt;li&gt;Most of us never get to see the dev summit talks since they're only for developers&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://www.youtube.com/user/bsdconferences" target="_blank" rel="nofollow noopener"&gt;AsiaBSDCon 2013 videos also up&lt;/a&gt; finally&lt;/li&gt;
&lt;li&gt;List of AsiaBSDCon presentation topics &lt;a href="http://2013.asiabsdcon.org/papers/index.html" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Our buddy Michael W Lucas gave an &lt;a href="http://blather.michaelwlucas.com/archives/1879" target="_blank" rel="nofollow noopener"&gt;"OpenBSD for Linux users" talk&lt;/a&gt; at a Michigan Unix Users Group.&lt;/li&gt;
&lt;li&gt;He says "Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff"&lt;/li&gt;
&lt;li&gt;Really informative presentation, pretty long, answers some common questions at the end
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" target="_blank" rel="nofollow noopener"&gt;Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium&lt;/li&gt;
&lt;li&gt;Just like in the last years, there will be both a BSD booth and a developer's room&lt;/li&gt;
&lt;li&gt;The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.&lt;/li&gt;
&lt;li&gt;If you are in the area or want to go, check the show notes for details&lt;/li&gt;
&lt;li&gt;NYCBSDCon &lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131119053455" target="_blank" rel="nofollow noopener"&gt;is also accepting papers&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;It'll be in New York City at the beginning of February 2014&lt;/li&gt;
&lt;li&gt;If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" target="_blank" rel="nofollow noopener"&gt;FreeBSD foundation's year-end fundraising campaign&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years&lt;/li&gt;
&lt;li&gt;As of today they have raised about half a million dollars, but still have a while to go&lt;/li&gt;
&lt;li&gt;Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events&lt;/li&gt;
&lt;li&gt;They are preparing the debut of a new online magazine, the FreeBSD Journal&lt;/li&gt;
&lt;li&gt;Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://www.freebsdfoundation.org/donate/" target="_blank" rel="nofollow noopener"&gt;Make your donation today&lt;/a&gt; over at freebsdfoundation.org, every little bit helps&lt;/li&gt;
&lt;li&gt;Everyone involved with BSD Now made a donation last year and will do so again this year
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Amitai Schlair - &lt;a href="mailto:schmonz@netbsd.org" target="_blank" rel="nofollow noopener"&gt;schmonz@netbsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/schmonz" target="_blank" rel="nofollow noopener"&gt;@schmonz&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;The NetBSD Foundation, pkgsrc, future plans&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/ssh-tmux" target="_blank" rel="nofollow noopener"&gt;Combining SSH and tmux&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.&lt;/strong&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" target="_blank" rel="nofollow noopener"&gt;PS4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Sony's Playstation 4 is finally released&lt;/li&gt;
&lt;li&gt;As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things&lt;/li&gt;
&lt;li&gt;Link in the show notes contains the &lt;a href="http://www.scei.co.jp/ps4-license/" target="_blank" rel="nofollow noopener"&gt;full list of BSD software they're using&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Always good to see BSD being so widespread
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" target="_blank" rel="nofollow noopener"&gt;BSD Mag November issue&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Free monthly BSD magazine publishes another issue&lt;/li&gt;
&lt;li&gt;This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp;amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others&lt;/li&gt;
&lt;li&gt;PDF linked in the show notes
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" target="_blank" rel="nofollow noopener"&gt;pbulk builds made easy&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;NetBSD's &lt;a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" target="_blank" rel="nofollow noopener"&gt;pbulk tool&lt;/a&gt; is similar to &lt;a href="http://www.bsdnow.tv/tutorials/poudriere" target="_blank" rel="nofollow noopener"&gt;poudriere&lt;/a&gt;, but for pkgsrc&lt;/li&gt;
&lt;li&gt;While working on updating the documentation, a developer cleaned up quite a lot of code&lt;/li&gt;
&lt;li&gt;He wrote a script that automates pbulk deployment and setup&lt;/li&gt;
&lt;li&gt;The whole setup of a dedicated machine has been reduced to just three commands
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe&lt;/li&gt;
&lt;li&gt;Many PC-BSD programs received some necessary bug fixes and updates&lt;/li&gt;
&lt;li&gt;Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21oh3vP7t" target="_blank" rel="nofollow noopener"&gt;Peter writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21zfqcWMP" target="_blank" rel="nofollow noopener"&gt;Kjell-Aleksander writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2ZmW77Odb" target="_blank" rel="nofollow noopener"&gt;Jordan writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s2BZq7xiyo" target="_blank" rel="nofollow noopener"&gt;Christian writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s21xrk0M4k" target="_blank" rel="nofollow noopener"&gt;entransic writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, pcbsd, tutorial, howto, guide, bsd, interview, ssh, openssh, gnu, screen, tmux, presentation, talk, foundation, fundraiser, donations, michael w lucas, linux, amitai schlair, schmonz, pkgsrc, tetris, devsummit, dev, developer, summit, eurobsdcon, eurobsdcon2013, 2013, sony, ps4, launch, playstation, playstation4, orbis os, orbisos, asiabsdcon, pbulk</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This week we&#39;ll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD&#39;s future plans and much more. After that, if you&#39;ve ever wondered what all this SSH stuff is about, today&#39;s tutorial has got you covered. We&#39;ll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>The FreeBSD foundation is publishing articles on different FreeBSD developers</li>
<li>This one is about Colin Percival (cperciva@), the ex-security officer</li>
<li>Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer</li>
<li>Running series with more to come
***</li>
</ul>

<h3><a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" rel="nofollow">Lots of BSD presentation videos uploaded</a></h3>

<ul>
<li>EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL&#39;s presentation video</li>
<li>Most of us never get to see the dev summit talks since they&#39;re only for developers</li>
<li><a href="https://www.youtube.com/user/bsdconferences" rel="nofollow">AsiaBSDCon 2013 videos also up</a> finally</li>
<li>List of AsiaBSDCon presentation topics <a href="http://2013.asiabsdcon.org/papers/index.html" rel="nofollow">here</a></li>
<li>Our buddy Michael W Lucas gave an <a href="http://blather.michaelwlucas.com/archives/1879" rel="nofollow">&quot;OpenBSD for Linux users&quot; talk</a> at a Michigan Unix Users Group.</li>
<li>He says &quot;Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff&quot;</li>
<li>Really informative presentation, pretty long, answers some common questions at the end
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" rel="nofollow">Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014</a></h3>

<ul>
<li>FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium</li>
<li>Just like in the last years, there will be both a BSD booth and a developer&#39;s room</li>
<li>The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.</li>
<li>If you are in the area or want to go, check the show notes for details</li>
<li>NYCBSDCon <a href="http://undeadly.org/cgi?action=article&sid=20131119053455" rel="nofollow">is also accepting papers</a>.</li>
<li>It&#39;ll be in New York City at the beginning of February 2014</li>
<li>If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" rel="nofollow">FreeBSD foundation&#39;s year-end fundraising campaign</a></h3>

<ul>
<li>The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years</li>
<li>As of today they have raised about half a million dollars, but still have a while to go</li>
<li>Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events</li>
<li>They are preparing the debut of a new online magazine, the FreeBSD Journal</li>
<li>Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year</li>
<li><a href="http://www.freebsdfoundation.org/donate/" rel="nofollow">Make your donation today</a> over at freebsdfoundation.org, every little bit helps</li>
<li>Everyone involved with BSD Now made a donation last year and will do so again this year
***</li>
</ul>

<h2>Interview - Amitai Schlair - <a href="mailto:schmonz@netbsd.org" rel="nofollow">schmonz@netbsd.org</a> / <a href="https://twitter.com/schmonz" rel="nofollow">@schmonz</a></h2>

<p>The NetBSD Foundation, pkgsrc, future plans</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">Combining SSH and tmux</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" rel="nofollow">PS4 released</a></h3>

<ul>
<li>Sony&#39;s Playstation 4 is finally released</li>
<li>As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things</li>
<li>Link in the show notes contains the <a href="http://www.scei.co.jp/ps4-license/" rel="nofollow">full list of BSD software they&#39;re using</a></li>
<li>Always good to see BSD being so widespread
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" rel="nofollow">BSD Mag November issue</a></h3>

<ul>
<li>Free monthly BSD magazine publishes another issue</li>
<li>This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others</li>
<li>PDF linked in the show notes
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" rel="nofollow">pbulk builds made easy</a></h3>

<ul>
<li>NetBSD&#39;s <a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" rel="nofollow">pbulk tool</a> is similar to <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, but for pkgsrc</li>
<li>While working on updating the documentation, a developer cleaned up quite a lot of code</li>
<li>He wrote a script that automates pbulk deployment and setup</li>
<li>The whole setup of a dedicated machine has been reduced to just three commands
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe</li>
<li>Many PC-BSD programs received some necessary bug fixes and updates</li>
<li>Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21oh3vP7t" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21zfqcWMP" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2ZmW77Odb" rel="nofollow">Jordan writes in</a></li>
<li><a href="http://slexy.org/view/s2BZq7xiyo" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21xrk0M4k" rel="nofollow">entransic writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This week we&#39;ll be talking to Amitai Schlair of the NetBSD foundation about pkgsrc, NetBSD&#39;s future plans and much more. After that, if you&#39;ve ever wondered what all this SSH stuff is about, today&#39;s tutorial has got you covered. We&#39;ll be showing you the basics of SSH, as well as how to combine it with tmux for persistent sessions. News, feedback and everything else, right here on BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://freebsdfoundation.blogspot.com/2013/11/faces-of-freebsd-colin-percival.html" rel="nofollow">Faces of FreeBSD</a></h3>

<ul>
<li>The FreeBSD foundation is publishing articles on different FreeBSD developers</li>
<li>This one is about Colin Percival (cperciva@), the ex-security officer</li>
<li>Tells the story of how he first found BSD, what he contributed back, how he eventually became the security officer</li>
<li>Running series with more to come
***</li>
</ul>

<h3><a href="http://www.freebsdnews.net/2013/11/14/eurobsdcon-2013-devsummit-video-recordings/" rel="nofollow">Lots of BSD presentation videos uploaded</a></h3>

<ul>
<li>EuroBSDCon 2013 dev summit videos, AsiaBSDCon 2013 videos, MWL&#39;s presentation video</li>
<li>Most of us never get to see the dev summit talks since they&#39;re only for developers</li>
<li><a href="https://www.youtube.com/user/bsdconferences" rel="nofollow">AsiaBSDCon 2013 videos also up</a> finally</li>
<li>List of AsiaBSDCon presentation topics <a href="http://2013.asiabsdcon.org/papers/index.html" rel="nofollow">here</a></li>
<li>Our buddy Michael W Lucas gave an <a href="http://blather.michaelwlucas.com/archives/1879" rel="nofollow">&quot;OpenBSD for Linux users&quot; talk</a> at a Michigan Unix Users Group.</li>
<li>He says &quot;Among other things, I compare OpenBSD to Richard Stallman and physically assault an audience member. We also talk long long time, memory randomization, PF, BSD license versus GPL, Microsoft and other OpenBSD stuff&quot;</li>
<li>Really informative presentation, pretty long, answers some common questions at the end
***</li>
</ul>

<h3><a href="https://blog.netbsd.org/tnf/entry/call_for_presentations_bsd_devroom" rel="nofollow">Call for Presentations: FOSDEM 2014 and NYCBSDCon 2014</a></h3>

<ul>
<li>FOSDEM 2014 will take place on 1–2 February, 2014, in Brussels, Belgium</li>
<li>Just like in the last years, there will be both a BSD booth and a developer&#39;s room</li>
<li>The topics of the devroom include all BSD operating systems. Every talk is welcome, from internal hacker discussion to real-world examples and presentations about new and shiny features.</li>
<li>If you are in the area or want to go, check the show notes for details</li>
<li>NYCBSDCon <a href="http://undeadly.org/cgi?action=article&sid=20131119053455" rel="nofollow">is also accepting papers</a>.</li>
<li>It&#39;ll be in New York City at the beginning of February 2014</li>
<li>If anyone wants to give a talk at one of these conferences, go ahead and send in your stuff!
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-announce/2013-November/001511.html" rel="nofollow">FreeBSD foundation&#39;s year-end fundraising campaign</a></h3>

<ul>
<li>The FreeBSD foundation has been supporting the FreeBSD project and community for over 13 years</li>
<li>As of today they have raised about half a million dollars, but still have a while to go</li>
<li>Donations go towards new features, paying for the server infrastructure, conferences, supporting the community, hiring full-time staff members and promoting FreeBSD at events</li>
<li>They are preparing the debut of a new online magazine, the FreeBSD Journal</li>
<li>Typically big companies make their huge donations in December, like a couple of anonymous donors that gave around $250,000 each last year</li>
<li><a href="http://www.freebsdfoundation.org/donate/" rel="nofollow">Make your donation today</a> over at freebsdfoundation.org, every little bit helps</li>
<li>Everyone involved with BSD Now made a donation last year and will do so again this year
***</li>
</ul>

<h2>Interview - Amitai Schlair - <a href="mailto:schmonz@netbsd.org" rel="nofollow">schmonz@netbsd.org</a> / <a href="https://twitter.com/schmonz" rel="nofollow">@schmonz</a></h2>

<p>The NetBSD Foundation, pkgsrc, future plans</p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/ssh-tmux" rel="nofollow">Combining SSH and tmux</a></h3>

<ul>
<li><strong>Note: there was a mistake in the video version of the tutorial, please consult the written version for the proper instructions.</strong>
***</li>
</ul>

<h2>News Roundup</h2>

<h3><a href="http://www.theregister.co.uk/2013/11/16/sony_playstation_4_kernel" rel="nofollow">PS4 released</a></h3>

<ul>
<li>Sony&#39;s Playstation 4 is finally released</li>
<li>As previously thought, its OS is heavily based on FreeBSD and uses the kernel among other things</li>
<li>Link in the show notes contains the <a href="http://www.scei.co.jp/ps4-license/" rel="nofollow">full list of BSD software they&#39;re using</a></li>
<li>Always good to see BSD being so widespread
***</li>
</ul>

<h3><a href="http://bsdmag.org/magazine/1853-hast-on-freebsd-how-to-make-storage-highly-availble-by-using-hast" rel="nofollow">BSD Mag November issue</a></h3>

<ul>
<li>Free monthly BSD magazine publishes another issue</li>
<li>This time their topics include: Configuring a Highly Available Service on FreeBSD, IT Inventory &amp; Asset Management Automation, more FreeBSD Programming Primer, PfSense and Snort and a few others</li>
<li>PDF linked in the show notes
***</li>
</ul>

<h3><a href="http://mail-index.netbsd.org/pkgsrc-users/2013/11/09/msg018881.html" rel="nofollow">pbulk builds made easy</a></h3>

<ul>
<li>NetBSD&#39;s <a href="https://www.netbsd.org/docs/pkgsrc/bulk.html" rel="nofollow">pbulk tool</a> is similar to <a href="http://www.bsdnow.tv/tutorials/poudriere" rel="nofollow">poudriere</a>, but for pkgsrc</li>
<li>While working on updating the documentation, a developer cleaned up quite a lot of code</li>
<li>He wrote a script that automates pbulk deployment and setup</li>
<li>The whole setup of a dedicated machine has been reduced to just three commands
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-111513/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>Over 200 PBIs have been populated in to the PC-BSD 10 Stable Appcafe</li>
<li>Many PC-BSD programs received some necessary bug fixes and updates</li>
<li>Some include network detection in the package and update managers, nvidia graphic detection, security updates for PCDM
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21oh3vP7t" rel="nofollow">Peter writes in</a></li>
<li><a href="http://slexy.org/view/s21zfqcWMP" rel="nofollow">Kjell-Aleksander writes in</a></li>
<li><a href="http://slexy.org/view/s2ZmW77Odb" rel="nofollow">Jordan writes in</a></li>
<li><a href="http://slexy.org/view/s2BZq7xiyo" rel="nofollow">Christian writes in</a></li>
<li><a href="http://slexy.org/view/s21xrk0M4k" rel="nofollow">entransic writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
<item>
  <title>11: The Gateway Drug</title>
  <link>https://www.bsdnow.tv/11</link>
  <guid isPermaLink="false">43438bdb-8de0-4237-81e2-da2f448be5ef</guid>
  <pubDate>Wed, 13 Nov 2013 08:00:00 -0500</pubDate>
  <author>JT Pennington</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/c91b88f1-e824-4815-bcb8-5227818d6010/43438bdb-8de0-4237-81e2-da2f448be5ef.mp3" length="78628291" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>JT Pennington</itunes:author>
  <itunes:subtitle>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</itunes:subtitle>
  <itunes:duration>1:49:12</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/c/c91b88f1-e824-4815-bcb8-5227818d6010/cover.jpg?v=4"/>
  <description>&lt;p&gt;This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we'll be showing you a huge tutorial that's been baking for over a month - how to build an OpenBSD router that'll destroy any consumer router on the market! There's lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.&lt;/p&gt;

&lt;h2&gt;Headlines&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://openssh.com/txt/release-6.4" target="_blank" rel="nofollow noopener"&gt;OpenSSH 6.4 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Security fixes in &lt;a href="http://openssh.com/" target="_blank" rel="nofollow noopener"&gt;OpenSSH&lt;/a&gt; don't happen very often&lt;/li&gt;
&lt;li&gt;6.4 fixes a memory corruption problem, no new features&lt;/li&gt;
&lt;li&gt;If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.&lt;/li&gt;
&lt;li&gt;Disabling AES-GCM in the server configuration is a workaround&lt;/li&gt;
&lt;li&gt;Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9's base OpenSSL is unaffected, for example)&lt;/li&gt;
&lt;li&gt;Full details &lt;a href="http://www.openssh.com/txt/gcmrekey.adv" target="_blank" rel="nofollow noopener"&gt;here&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" target="_blank" rel="nofollow noopener"&gt;Getting to know your portmgr-lurkers&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Next entry in portmgr interview series&lt;/li&gt;
&lt;li&gt;This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously&lt;/li&gt;
&lt;li&gt;Lots of questions ranging from why he uses BSD to what he had for breakfast&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" target="_blank" rel="nofollow noopener"&gt;Another one&lt;/a&gt; was since released, with Antoine Brodin aka antoine@
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131108082749" target="_blank" rel="nofollow noopener"&gt;FUSE in OpenBSD&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;As we glossed over last week, FUSE was recently added to OpenBSD&lt;/li&gt;
&lt;li&gt;Now the guys from the OpenBSD Journal have tracked down more information&lt;/li&gt;
&lt;li&gt;This version is released under an ISC license&lt;/li&gt;
&lt;li&gt;Should be in OpenBSD 5.5, released a little less than 6 months from now&lt;/li&gt;
&lt;li&gt;Will finally enable things like SSHFS to work in OpenBSD
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" target="_blank" rel="nofollow noopener"&gt;Automated submission of kernel panic reports&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;New tool from Colin Percival&lt;/li&gt;
&lt;li&gt;Saves information about kernel panics and emails it to FreeBSD&lt;/li&gt;
&lt;li&gt;Lets you review before sending so you can edit out any private info&lt;/li&gt;
&lt;li&gt;Automatically encrypted before being sent&lt;/li&gt;
&lt;li&gt;FreeBSD never kernel panics so this won't get much use
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Interview - Justin Sherrill - &lt;a href="mailto:justin@dragonflybsd.org" target="_blank" rel="nofollow noopener"&gt;justin@dragonflybsd.org&lt;/a&gt; / &lt;a href="https://twitter.com/dragonflybsd" target="_blank" rel="nofollow noopener"&gt;@dragonflybsd&lt;/a&gt;
&lt;/h2&gt;

&lt;p&gt;DragonflyBSD 3.6 and the &lt;a href="http://www.shiningsilence.com/dbsdlog/" target="_blank" rel="nofollow noopener"&gt;Dragonfly Digest&lt;/a&gt;&lt;/p&gt;

&lt;hr&gt;

&lt;h2&gt;Tutorial&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://www.bsdnow.tv/tutorials/openbsd-router" target="_blank" rel="nofollow noopener"&gt;Building an OpenBSD Router&lt;/a&gt;&lt;/h3&gt;

&lt;hr&gt;

&lt;h2&gt;News Roundup&lt;/h2&gt;

&lt;h3&gt;&lt;a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" target="_blank" rel="nofollow noopener"&gt;BSD router project 1.5 released&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router&lt;/li&gt;
&lt;li&gt;It's an alternative to pfSense, but not nearly as well known or popular&lt;/li&gt;
&lt;li&gt;New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes&lt;/li&gt;
&lt;li&gt;Fits on a 256MB Compact Flash/USB drive
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" target="_blank" rel="nofollow noopener"&gt;Curve25519 now default key exchange&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;We mentioned in an earlier episode about a patch for &lt;a href="http://cr.yp.to/ecdh.html" target="_blank" rel="nofollow noopener"&gt;curve25519&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Now it's become the default for key exchange&lt;/li&gt;
&lt;li&gt;Will probably make its way into OpenSSH 6.5, would've been in 6.4 if we didn't have that security vulnerability&lt;/li&gt;
&lt;li&gt;It's interesting to see all these big changes in cryptography in OpenBSD lately
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="https://svnweb.freebsd.org/base?view=revision&amp;amp;revision=257650" target="_blank" rel="nofollow noopener"&gt;FreeBSD kernel selection in boot menu&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Adds a kernel selection menu to the beastie menu&lt;/li&gt;
&lt;li&gt;List of kernels is taken from 'kernels' in loader.conf as a space or comma separated list of names to display (up to 9)&lt;/li&gt;
&lt;li&gt;From our good buddy &lt;a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" target="_blank" rel="nofollow noopener"&gt;Devin Teske&lt;/a&gt;
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" target="_blank" rel="nofollow noopener"&gt;PCBSD weekly digest&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;PCDM has officially replaced GDM as the default login manager&lt;/li&gt;
&lt;li&gt;New ISO build scripts (we got a sneak preview last week)&lt;/li&gt;
&lt;li&gt;Lots of bug fixes&lt;/li&gt;
&lt;li&gt;Second set of 10-STABLE ISOs available with new artwork and much more
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;&lt;a href="http://undeadly.org/cgi?action=article&amp;amp;sid=20131113074042&amp;amp;mode=expanded&amp;amp;count=0" target="_blank" rel="nofollow noopener"&gt;Theo de Raadt speaking at MUUG&lt;/a&gt;&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Theo will be speaking at Manitoba UNIX User Group in Winnipeg&lt;/li&gt;
&lt;li&gt;On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)&lt;/li&gt;
&lt;li&gt;If you're watching the show live you have time to make plans, if you're watching the downloaded version it might be happening right now!&lt;/li&gt;
&lt;li&gt;No agenda, but expect some OpenBSD discussion
***&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;Feedback/Questions&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21YXhiLRB" target="_blank" rel="nofollow noopener"&gt;Dave writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s215EjcgdM" target="_blank" rel="nofollow noopener"&gt;James writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s21mCP2ecL" target="_blank" rel="nofollow noopener"&gt;Allen writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://slexy.org/view/s207ePFrna" target="_blank" rel="nofollow noopener"&gt;Chess writes in&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;
&lt;a href="http://slexy.org/view/s20iVFXJve" target="_blank" rel="nofollow noopener"&gt;Frank writes in&lt;/a&gt;
*** &lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>freebsd, openbsd, netbsd, dragonflybsd, building, bsd, router, gateway, soho, small home office, pcbsd, server, tutorial, guide, howto, interview, firewall, network, hammer fs, dragonfly, openssh, 6.4, dragonfly digest, aes gcm, openssl, bsd router project, tbrp, portmgr, fuse, filesystem in userspace, kernel panic, automatic</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>This time on the show, we sit down to chat with Justin Sherrill of the DragonflyBSD project about their new 3.6 release. Later on, we&#39;ll be showing you a huge tutorial that&#39;s been baking for over a month - how to build an OpenBSD router that&#39;ll destroy any consumer router on the market! There&#39;s lots of news to get caught up on as well, so sit back and enjoy some BSD Now - the place to B.. SD.</p>

<h2>Headlines</h2>

<h3><a href="http://openssh.com/txt/release-6.4" rel="nofollow">OpenSSH 6.4 released</a></h3>

<ul>
<li>Security fixes in <a href="http://openssh.com/" rel="nofollow">OpenSSH</a> don&#39;t happen very often</li>
<li>6.4 fixes a memory corruption problem, no new features</li>
<li>If exploited, this vulnerability might permit code execution with the privileges of the authenticated user and may therefore allow bypassing restricted shell/command configurations.</li>
<li>Disabling AES-GCM in the server configuration is a workaround</li>
<li>Only affects 6.2 and 6.3 if compiled against a newer OpenSSL (so FreeBSD 9&#39;s base OpenSSL is unaffected, for example)</li>
<li>Full details <a href="http://www.openssh.com/txt/gcmrekey.adv" rel="nofollow">here</a>
***</li>
</ul>

<h3><a href="http://blogs.freebsdish.org/portmgr/2013/11/04/getting-to-know-your-portmgr-mathieu-arnold/" rel="nofollow">Getting to know your portmgr-lurkers</a></h3>

<ul>
<li>Next entry in portmgr interview series</li>
<li>This time they chat with Mathieu Arnold, one of the portmgr-lurkers we mentioned previously</li>
<li>Lots of questions ranging from why he uses BSD to what he had for breakfast</li>
<li><a href="http://blogs.freebsdish.org/portmgr/2013/11/11/getting-to-know-your-portmgr-antoine-brodin/" rel="nofollow">Another one</a> was since released, with Antoine Brodin aka antoine@
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131108082749" rel="nofollow">FUSE in OpenBSD</a></h3>

<ul>
<li>As we glossed over last week, FUSE was recently added to OpenBSD</li>
<li>Now the guys from the OpenBSD Journal have tracked down more information</li>
<li>This version is released under an ISC license</li>
<li>Should be in OpenBSD 5.5, released a little less than 6 months from now</li>
<li>Will finally enable things like SSHFS to work in OpenBSD
***</li>
</ul>

<h3><a href="https://lists.freebsd.org/pipermail/freebsd-current/2013-November/046175.html" rel="nofollow">Automated submission of kernel panic reports</a></h3>

<ul>
<li>New tool from Colin Percival</li>
<li>Saves information about kernel panics and emails it to FreeBSD</li>
<li>Lets you review before sending so you can edit out any private info</li>
<li>Automatically encrypted before being sent</li>
<li>FreeBSD never kernel panics so this won&#39;t get much use
***</li>
</ul>

<h2>Interview - Justin Sherrill - <a href="mailto:justin@dragonflybsd.org" rel="nofollow">justin@dragonflybsd.org</a> / <a href="https://twitter.com/dragonflybsd" rel="nofollow">@dragonflybsd</a></h2>

<p>DragonflyBSD 3.6 and the <a href="http://www.shiningsilence.com/dbsdlog/" rel="nofollow">Dragonfly Digest</a></p>

<hr>

<h2>Tutorial</h2>

<h3><a href="http://www.bsdnow.tv/tutorials/openbsd-router" rel="nofollow">Building an OpenBSD Router</a></h3>

<hr>

<h2>News Roundup</h2>

<h3><a href="http://sourceforge.net/projects/bsdrp/files/BSD_Router_Project/1.5/" rel="nofollow">BSD router project 1.5 released</a></h3>

<ul>
<li>Nice timing for our router tutorial; TBRP is a FreeBSD distribution for installing on a router</li>
<li>It&#39;s an alternative to pfSense, but not nearly as well known or popular</li>
<li>New version is based on 9.2-RELEASE, includes lots of general updates and bugfixes</li>
<li>Fits on a 256MB Compact Flash/USB drive
***</li>
</ul>

<h3><a href="http://freshbsd.org/commit/openbsd/5cfc11a2aa3696190b675b6e3e1da7e8ff28582e" rel="nofollow">Curve25519 now default key exchange</a></h3>

<ul>
<li>We mentioned in an earlier episode about a patch for <a href="http://cr.yp.to/ecdh.html" rel="nofollow">curve25519</a></li>
<li>Now it&#39;s become the default for key exchange</li>
<li>Will probably make its way into OpenSSH 6.5, would&#39;ve been in 6.4 if we didn&#39;t have that security vulnerability</li>
<li>It&#39;s interesting to see all these big changes in cryptography in OpenBSD lately
***</li>
</ul>

<h3><a href="https://svnweb.freebsd.org/base?view=revision&revision=257650" rel="nofollow">FreeBSD kernel selection in boot menu</a></h3>

<ul>
<li>Adds a kernel selection menu to the beastie menu</li>
<li>List of kernels is taken from &#39;kernels&#39; in loader.conf as a space or comma separated list of names to display (up to 9)</li>
<li>From our good buddy <a href="http://www.bsdnow.tv/episodes/2013-09-25_teskeing_the_possibilities" rel="nofollow">Devin Teske</a>
***</li>
</ul>

<h3><a href="http://blog.pcbsd.org/2013/11/pc-bsd-weekly-feature-digest-11813/" rel="nofollow">PCBSD weekly digest</a></h3>

<ul>
<li>PCDM has officially replaced GDM as the default login manager</li>
<li>New ISO build scripts (we got a sneak preview last week)</li>
<li>Lots of bug fixes</li>
<li>Second set of 10-STABLE ISOs available with new artwork and much more
***</li>
</ul>

<h3><a href="http://undeadly.org/cgi?action=article&sid=20131113074042&mode=expanded&count=0" rel="nofollow">Theo de Raadt speaking at MUUG</a></h3>

<ul>
<li>Theo will be speaking at Manitoba UNIX User Group in Winnipeg</li>
<li>On Friday, Nov 15, 2013 at 5:30PM (see show notes for the address)</li>
<li>If you&#39;re watching the show live you have time to make plans, if you&#39;re watching the downloaded version it might be happening right now!</li>
<li>No agenda, but expect some OpenBSD discussion
***</li>
</ul>

<h2>Feedback/Questions</h2>

<ul>
<li><a href="http://slexy.org/view/s21YXhiLRB" rel="nofollow">Dave writes in</a></li>
<li><a href="http://slexy.org/view/s215EjcgdM" rel="nofollow">James writes in</a></li>
<li><a href="http://slexy.org/view/s21mCP2ecL" rel="nofollow">Allen writes in</a></li>
<li><a href="http://slexy.org/view/s207ePFrna" rel="nofollow">Chess writes in</a></li>
<li><a href="http://slexy.org/view/s20iVFXJve" rel="nofollow">Frank writes in</a>
***</li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
